paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1710.08528 | 1 | 1710 | 2017-10-23T22:12:51 | A Two-Level Classification Approach for Detecting Clickbait Posts using Text-Based Features | [
"cs.SI",
"cs.CL"
] | The emergence of social media as news sources has led to the rise of clickbait posts attempting to attract users to click on article links without informing them on the actual article content. This paper presents our efforts to create a clickbait detector inspired by fake news detection algorithms, and our submission to the Clickbait Challenge 2017. The detector is based almost exclusively on text-based features taken from previous work on clickbait detection, our own work on fake post detection, and features we designed specifically for the challenge. We use a two-level classification approach, combining the outputs of 65 first-level classifiers in a second-level feature vector. We present our exploratory results with individual features and their combinations, taken from the post text and the target article title, as well as feature selection. While our own blind tests with the dataset led to an F-score of 0.63, our final evaluation in the Challenge only achieved an F-score of 0.43. We explore the possible causes of this, and lay out potential future steps to achieve more successful results. | cs.SI | cs | A Two-Level Classification Approach for Detecting
Clickbait Posts using Text-Based Features
The snapper Clickbait Detector at the Clickbait Challenge 2017
Olga Papadopoulou, Markos Zampoglou, Symeon Papadopoulos, Ioannis Kompatsiaris
Centre for Research and Technology Hellas - Information Technologies institute, Greece
{olgapapa, markzampoglou, papadop, ikom}@iti.gr
7
1
0
2
t
c
O
3
2
]
I
S
.
s
c
[
1
v
8
2
5
8
0
.
0
1
7
1
:
v
i
X
r
a
ABSTRACT
The emergence of social media as news sources has led to the rise
of clickbait posts attempting to attract users to click on article links
without informing them on the actual article content. This paper
presents our efforts to create a clickbait detector inspired by fake
news detection algorithms, and our submission to the Clickbait
Challenge 2017. The detector is based almost exclusively on text-
based features taken from previous work on clickbait detection,
our own work on fake post detection, and features we designed
specifically for the challenge. We use a two-level classification
approach, combining the outputs of 65 first-level classifiers in a
second-level feature vector. We present our exploratory results with
individual features and their combinations, taken from the post text
and the target article title, as well as feature selection. While our
own blind tests with the dataset led to an F-score of 0.63, our final
evaluation in the Challenge only achieved an F-score of 0.43. We
explore the possible causes of this, and lay out potential future steps
to achieve more successful results.
1.
INTRODUCTION
The number of people turning to social media to get information
online, as opposed to traditional news sources such as the websites
of news agencies, newspapers and TV channels, has significantly
risen in recent years. This has caused a major shift in how news is
presented, and has allowed the emergence of new actors in the news
market, in the form of outlets that disseminate fake information or
rely on "clickbait" practices to draw readers' attention.
Clickbait can be defined as the phenomenon where a short post
in a social network platform introduces an article by promising
exciting or surprising information, but without being sufficiently
explanatory for the reader to decide if they are going to be interested
in the article or not before clicking. Thus, the article itself may fail
to deliver, but the phrasing of the post manages to attract traffic for
the site nonetheless. Clickbaiting is thus a marketing technique for
attracting readers even in the absence of interesting content.
While not strictly illegal or dangerous, clickbaiting is often
frowned upon as dishonest. Facebook in particular is taking steps in
reducing the presence of clickbait posts from users' timelines1. Such
efforts, however, require a reliable way of automatically detecting
clickbait in order to filter results.
This paper presents our submission to the Clickbait Challenge
2017 [8], aimed at building a system that detects whether a social
media post is clickbait or not based on the post, any accompanying
media, and the article itself, including its title, description, keywords,
and text.
1https://newsroom.fb.com/news/2017/05/
news-feed-fyi-new-updates-to-reduce-clickbait-headlines/
Table 1 shows the two main fields for six items from the Challenge
dataset, plus their annotations.
In the rest of this paper we present the methodology we decided to
follow and the rationale behind it, the results we achieved using the
provided validation data, and the results achieved during the final
evaluation. Given the significant discrepancy between the validation
results and the actual evaluation, we attempt to explain its causes
and plan for more successful future attempts.
2. RELATED WORK
The problem of clickbait posts is relatively recent, yet active
research is already developing around it. One of the first publications
on the subject [5] proposed a set of potential features that could
be used for the task, without providing a quantitative analysis of
their potential. The proposed features included lexical and semantic
features in order to distinguish between high- vs low-quality text by
analyzing their stylometry, and syntactic and pragmatic features to
measure the emotional impact of headlines. Besides textual features,
they also proposed image and user behavior analysis in order to
extract information from the context of the post.
Notable attempts to create clickbait detection systems include
an approach using a large number of text features over various
classifiers [7] and a statistical analysis of the value discrepancies
between clickbait and non-clickbait posts over a number of features
[4]. The latter approach also attempts to detect clickbait posts using
an SVM classifier, and proposes specialized models using only
subsets of features to reflect different user definitions of clickbait.
Both approaches rely on various text features, ranging from length
statistics and bag-of-words features to common bait phrases.
On the other hand, a different approach to clickbait detection
would be to train a deep learning classifier. Two recent approaches
have been proposed [1, 10]. While both begin by an embedding
layer -as is common in neural networks for language processing-,
the former uses a Recurrent Neural Network (RNN) layers, while
the latter is based on Convolutional Layers.
While we had no prior experience with clickbait detection, we
noted a striking similarity of the task to that of fake post detection.
While the task of misleading (fake) post detection [3], i.e. evaluating
whether a post contains true information or not, is not the same as
clickbait detection, the approach of extracting text-based features
from a post and training a classifier on them is very similar, as are
the expectations concerning the distinguishing features for clickbait
posts and fake posts. For example, low readability or the increased
presence of punctuation are related with both fake and clickbait
posts. Given our previous experience with fake post detection [2],
we decided to follow a similar approach for our submission to the
clickbait detection challenge.
Table 1: Clickbait Challenge examples: post text, associated target article title, and assigned clickbait scores by five annotators. High
values correspond to clickbait, while low ones to non-clickbait.
Post text
SAPVoice: One solution that turns shipping delays to your advantage
i thought michelle obama already made this happen?
UK's response to modern slavery leaving victims
Panama Papers: Europol links 3,500 names to suspected criminals
Two dead after standoff with cops in Philadelphia @nbcphiladelphia
Donald Trump's biggest fan is worried he won't follow through on
immigration 'promises'
Target article title
SAPVoice: One Solution That Turns Shipping Delays To Your Advantage
Escaped Chibok Girl on Anniversary of Abduction by Boko Haram: "Bring
Those Girls Back"
"Inexcusable" failures in UK's response to modern slavery leaving victims
destitute while abusers go free, report warns
Panama Papers: Europol links 3,500 names to suspected criminals
2 Men Die in Apparent Murder-Suicide During Barricade Situation in Philly
Ann Coulter warns Donald Trump of voter backlash if he 'betrays' them
on immigration
Clickbait scores
[0.33, 0.33, 0.67, 0.67, 1.00]
[0.00, 1.00, 1.00, 1.00, 1.00]
[0.00, 0.33, 1.00, 1.00, 1.00]
[0.00, 0.00, 0.00, 0.00, 0.33]
[0.00, 0.00, 0.33, 0.33, 0.67]
[0.00, 0.00, 0.33, 1.00, 1.00]
3. APPROACH
Our approach was to use a committee of classifiers, each trained
on a different class of text features. The entire list of features was
inspired by previous works [2, 4, 7] and is presented in Table 2.
Since the task did not include contextual features, either in the form
of information on the user account that made the post, or in the form
of social media activity around the post (e.g., retweets, replies, etc.),
we had to focus on text features from the post and the target.
The bulk of the features were taken from our own previous work
on fake post detection [2] and was enriched with ideas from [7]
and [4]. All features were extracted from the post text and the
target title. We also considered extracting features from the target
paragraphs and description. However, since not all items in the
dataset had values in these fields we decided not to implement
an approach for missing values but instead to focus on the fields
that were present in all items. Furthermore, we tried to leverage
the media information provided by using visual features related to
them. Three such features were tried: a binary value indicating the
presence or not of media in the post, visual features extracted from
the AlexNet FC6 or FC7 activations to see if there are any patterns in
the visual content of images that may distinguish clickbait posts, and
the presence of ImageNet concepts as detected through GoogleNet
(1000 values) to see if there is any correlation between the presence
of certain semantic concepts and clickbait.
Features from our recent work on tweet verification [2] include the
number of characters, words, question marks, exclamation marks,
negative and positive sentiment words, presence of happy and sad
emoticon, presence of question and exclamation mark, presence
of first, second and third order pronoun, number of slang words,
presence of hashtag, and readability score. Most of these features
are straightforward to extract, while for the most complex of those
instructions can be found in [2]. A second set of features were taken
from [4], using the provided code2. These include the average word
length, longest dependency, presence of determiners and pronouns,
number of common words, presence of punctuations, whether the
text begins with a digit, number of hyperbolic terms, subject of
title, percentage of stop words, and presence of word contractions.
Finally, we wrote our own extraction code for a number of features,
including presence of colon, presence of "please", presence of @.
Number of nouns, number of adjectives, number of verbs, number
of adverbs, text voice, Part-Of-Speech (POS) histogram, Named
Entity histogram, and sentiment were extracted using the Stanford
NER library3. Bag-of-words and n-grams were extracted using
WEKA4. GID categories were extracted using the General Inquirer5.
The post text similarity to the target title, and similarly the post text
2https://github.com/bhargaviparanjape/clickbait
3https://nlp.stanford.edu/software/CRF-NER.shtml
4https://www.cs.waikato.ac.nz/ml/weka/
5http://www.wjh.harvard.edu/~inquirer/homecat.htm
Table 2: A categorization of tested features. Each block was
treated as an entire descriptor through concatenation. The
presence or absence of media was also used as a descriptor, but
since it was a single value, it was concatenated to the other de-
scriptors and not tested on its own
Stylistic (STY)
# slang words
Readability score
has colon (:)
has "please"
begins with digit
has hashtag
has @
has contractions
has punctuations
Grammatical (GRA)
POS histogram
NE histogram
text voice
is passive voice
# adjectives
# verbs
subject of title
% of stop words
Morphological (MOR)
# characters
# words
# question marks
# exclamation marks
# uppercase chars
has question mark
has exclamation mark
has 1st/2nd/3rd person pronoun
average word length
longest dependency
has determiners & pronouns
# common words
text simlarity to target title
text simlarity to target descr.
Bag-of-Words (BoW)
BoW
GID
182 categories
Sentiment (SEN)
# pos/neg words
has happy/sad emoticon
# hyperbolic terms
overall sentiment
Total length: ∼1000
(depends on training dataset)
n-grams (NGR)
1-4 grams
Total length: ∼2000
(depends on training dataset)
Total length: 182
Total length: 6
Vis. Concepts (VIS1)
ImageNet classes
Vis. Content (VIS2)
AlexNet FC6 activations
or FC7 activations
Total length: 1000
Total length: 4096
similarity to the target description were calculated by tokenizing
all texts and counting the percentage of shared words. Finally, the
visual concepts and visual features were extracted using Caffe6.
The classification approach was based on a combination of early
and late fusion with redundancy, where classifiers were trained on a
number of different feature vectors to form a final committee. Text
features from the post text and target title were extracted individually.
We experimented with both individual features and concatenations
of different feature types for the same text source. Figure 1 presents
a visual overview of the proposed classification scheme.
In all
experiments, the features were normalized and -following early
experiments with a number of different classifiers- a Logistic Re-
gression classifier was used to create a classification model. We
further evaluated the impact of feature selection on the concatenated
feature vectors. Since these experiments resulted in multiple models
6http://caffe.berkeleyvision.org/
Figure 1: The proposed two-level classification architecture.
with outputs that do not overlap entirely, for second-level fusion we
tested both majority voting and building a second-level classifier.
The task datasets were not only annotated with binary tags (1/0:
clickbait/non-clickbait) but also with five quantitative scores from
different annotators. As can be seen in Table 1, these scores may
differ significantly between annotators, which makes the task much
more challenging. We decided to approach the task through the
mean of these five values, but it is a consideration that the variance
of the values might also have to be taken into consideration.
Motivated by the non-binary provided annotation, we considered
two training schemes: one based on binary outputs, resulting from
the binarization of the annotation, and another based on a more
nuanced class scheme with four classes (corresponding to mean
scores in the ranges [0, 0.25), [0.25, 0.5), [0.5, 0.75), [0.75, 1].
However, the latter did not produce promising results, thus we
decided to focus on binary classification and indirectly use the
output probability of the logistic regression as a metric of how
clickbaity an item is.
We used the union of the provided training and validation sets
[9] to randomly create three subsets in order to train and evaluate
our classifiers. The entire dataset contained 22,034 items out of
which we selected 18,234 at random to use as the main training
set (Set A). A second set of 2,000 items was used for testing the
first-level classifiers during the preliminary tests, and for training the
second-level classifier during the final model design (Set B). Finally,
the 1,800 remaining items were used for testing the second-level
classifier (Set C). The code of our approach is available on GitHub7.
4. EVALUATION RESULTS
An initial set of experiments assessed the potential of the two
image-based descriptors (concept- and content-based). However,
both approaches led to very poor results. Combined with the fact
7https://github.com/clickbait-challenge/snapper
that many posts did not contain images at all, we decided to only
take into account the presence or absence of images as a binary
feature, concatenated with the text features.
The first set of text-based evaluations concerned the individual
and combined performance of features using a single-level classifier.
The features extracted from the post text and the target title were
used to train a Logistic Regression classifier on Set A and evaluated
on Set B. The results are presented in Tables 3 and 4. A number of
observations can be made from these first results.
First, it is clear that, in most cases individual features on either
source of text are not adequate for classification. The highest F-score
in this case is achieved with grammatical features, reaching 0.54 for
the post text and 0.46 for the target title. All other features perform
significantly poorer when taken in isolation. By looking at the
results from the feature concatenations, another observation is that a
combination of only two features for the post text (morphological
and grammatical) reaches an F-score of 0.58, which is very close
to the highest F-score achieved in this way through a concatenation
of all five feature classes (0.59). Generally, the performance of
grammatical features and all concatenations where it participates is
higher than for the rest of features, highlighting the importance of
grammatical features in detecting clickbait posts. The same applies
for both the post text and the target title, although in the latter case
the performance of the classifier is significantly lower.
Overall, the best performance achieved in this manner is 0.59
for the concatenation of all five features extracted from the post
text. This is admittedly a rather low score for the task, so further
experiments were carried out towards improving the results.
Another run was based on feature selection on the feature set
that worked best, i.e. the five feature concatenation from post text.
We used correlation-based feature subset selection in the hopes of
improving performance, however this led to a decreased F-score of
0.53 (Precision: 0.69, Recall: 0.43).
Post text featuresMORSTYGRAMOR+STYMOR+STY+GRA+SEN+GID...MOR+GRABOWNGRFeat. Selection...Target title featuresMORSTYGRAMOR+STYMOR+STY+GRA+SEN+GID......MOR+GRAFirst level classifiersMORPost textMORTarget titleMOR+STYPost text......MOR+STY+GRA+SEN+GIDPost text...Feat. SelectionPost textMOR+STY+GRA+SEN+GIDTarget titleSecond level features...Second level classifierClickbait score34Descriptors31Descriptors65Models65FeaturesTable 3: The performance of individual features and feature
concatenations extracted from the post text.
Table 4: The performance of individual features and feature
concatenations extracted from the target title.
Features
Morph
Styl
Gram
Sent
GID
Morph_Styl
Morph_Gram
Morph_Sent
Morph_GID
Styl_Gram
Styl_Sent
Styl_GID
Gram_Sent
Gram_GID
Sent_GID
Morph_Styl_Gram
Morph_Styl_Sent
Morph_Styl_GID
Morph_Gram_Sent
Morph_Gram_GID
Morph_Sent_GID
Styl_Gram_Sent
Styl_Gram_GID
Styl_Sent_GID
Gram_Sent_GID
Morph_Styl_Gram_Sent
Morph_Styl_Gram_GID
Morph_Styl_Sent_GID
Morph_Gram_Sent_GID
Styl_Gram_Sent_GID
Morph_Styl_Gram_Sent_GID
F-score
0.47
0.22
0.54
0.03
0.36
0.51
0.58
0.49
0.53
0.57
0.26
0.41
0.55
0.56
0.39
0.59
0.52
0.54
0.58
0.58
0.53
0.57
0.58
0.44
0.57
0.59
0.59
0.55
0.58
0.58
0.59
Precision
0.71
0.67
0.70
0.59
0.66
0.73
0.72
0.72
0.70
0.72
0.65
0.68
0.70
0.71
0.65
0.73
0.72
0.71
0.72
0.71
0.70
0.72
0.72
0.67
0.71
0.73
0.72
0.71
0.71
0.71
0.72
Recall
0.35
0.13
0.44
0.01
0.25
0.40
0.48
0.37
0.42
0.47
0.16
0.29
0.45
0.47
0.28
0.49
0.40
0.44
0.49
0.49
0.43
0.47
0.49
0.33
0.48
0.50
0.50
0.44
0.49
0.49
0.51
Our next set of experiments were run using 10-fold cross-
validation on Set A in order to have a more stable estimate of
the feature performance. We performed these evaluations for the
concatenation of the five features for four variations: extracted from
the post text, extracted from the target title, extracted from both and
concatenated, and concatenated from both followed by feature selec-
tion. The results are shown in Table 5. A clear improvement can be
seen for the concatenation of the two sources (post text and target
title). Again, feature selection led to deterioration of the overall
performance.
Having trained all these different models, we finally designed
a classifier to take advantage of them and evaluated whether we
could exploit their potential complementarity to increase the overall
performance. The final classifier consisted of 65 individual models,
fused in a second-level training scheme. We trained 31 classifiers
on the 31 feature vectors listed in Tables 3 and 4. We used these
features extracted from the post text, and 31 more formed from the
concatenation of those extracted from the post text and the target
title. To these 62 features we added the BoW descriptor extracted
and the n-gram feature, both extracted from the post text, and finally
the feature-selected five-feature vector extracted from the post text.
65 logistic regression classifiers were trained on these features and
a 10-fold cross-validation was run on all 65 models on Set A. Thus,
we acquired an estimate for each item and each model, without
it having participated in the training set. The 65 outputs were
concatenated in a single feature vector, and a second-level logistic
Features
Morph
Styl
Gram
Sent
GID
Morph_Styl
Morph_Gram
Morph_Sent
Morph_GID
Styl_Gram
Styl_Sent
Styl_GID
Gram_Sent
Gram_GID
Sent_GID
Morph_Styl_Gram
Morph_Styl_Sent
Morph_Styl_GID
Morph_Gram_Sent
Morph_Gram_GID
Morph_Sent_GID
Styl_Gram_Sent
Styl_Gram_GID
Styl_Sent_GID
Gram_Sent_GID
Morph_Styl_Gram_Sent
Morph_Styl_Gram_GID
Morph_Styl_Sent_GID
Morph_Gram_Sent_GID
Styl_Gram_Sent_GID
Morph_Styl_Gram_Sent_GID
F-score
0.31
0.25
0.46
0.20
0.31
0.35
0.46
0.33
0.38
0.46
0.31
0.38
0.46
0.48
0.35
0.46
0.36
0.40
0.46
0.48
0.40
0.46
0.48
0.39
0.48
0.46
0.48
0.41
0.48
0.48
0.48
Precision
0.58
0.55
0.57
0.51
0.54
0.59
0.58
0.58
0.56
0.57
0.54
0.54
0.57
0.56
0.53
0.58
0.58
0.56
0.58
0.57
0.56
0.57
0.56
0.54
0.56
0.58
0.56
0.56
0.57
0.56
0.56
Recall
0.21
0.16
0.39
0.13
0.22
0.24
0.38
0.24
0.29
0.38
0.22
0.29
0.39
0.42
0.27
0.38
0.26
0.31
0.38
0.41
0.31
0.38
0.42
0.30
0.42
0.38
0.41
0.32
0.42
0.42
0.42
Table 5: The performance of individual features and feature
concatenations extracted from the target title.
F-score
0.52
0.53
0.62
0.44
Precision
0.92
0.70
0.86
0.58
Source
Post text
Target title
Both
Feature selection
Recall
0.36
0.43
0.49
0.35
regression classifier was trained on all items. Finally, the resulting
2nd-level model was evaluated on Set C. The resulting F-score was
0.63 (Precision: 0.91, Recall: 0.49), and this was the approach we
decided to use in our final submission.
For our final submission we followed the same architecture, but
trained on a broader base: to get the 1st level outputs, we ran a
10-fold cross-validation of all 65 models on Set A, and at each fold
we kept the 65 outputs for all items in the validation set. Then, the
second level classifier was trained on all these estimates from Set
A. The final submission was evaluated through TIRA [6]. However,
there was a significant discrepancy in the performance achieved dur-
ing the classification of our test set, to the one achieved using TIRA.
Although our achieved F-score was 0.63, the model performed much
worse on TIRA, yielding an F-score of 0.43 (Precision: 0.28, Recall:
0.89). There was a very significant bias towards False Positives,
which was the exact opposite behaviour than the one observed in
our own evaluations. Furthermore, the feature extraction process
and the classification using 65+1 classifiers for each item led to a
very slow final model compared to all other submissions.
Admittedly, an F-score of 0.63 is in itself not satisfactory for any
detection task. However, given the final evaluations results, it would
have been average compared to other submissions. This may be
taken to highlight the difficulty of the task itself, especially when
approached with a traditional methodology of extracting text fea-
tures and feeding them to a classifier. However, our final evaluation
output was much lower than that. Barring the presence of an error
in the submitted code from our side, this may be indicative of a
significant difference between the datasets used for training/testing
and the one used for the final evaluation. It may also point to a lack
of generalization ability of our own classifier.
5. CONCLUSION
We presented our submission to the 2017 Clickbait Challenge.
The submission was based almost exclusively on text features. The
approach used established features from similar approaches in the
literature, combined with features from our own experience from
fake post detection, plus a number of features specifically tailored for
the Challenge. The features were fused using both concatenation and
a second-level classifier, in a system which combined features from
the post text only and features from the text post concatenated with
features from the target title. It was shown that features from the text
post gave the best performance (F-score 0.59), and the combination
of all features gave a small improvement (F-score 0.63). Despite this
performance being on par with other submissions in the Challenge,
the final evaluation result on TIRA led to an F-score of 0.43, which
may have been the result of overfitting on our training data, despite
the measures we took (keeping a separate subset for testing, which
did not participate in training).
Overall, our evaluations showed the limitations of our approach,
as even the best F-score of 0.63 is unsuitable for real-world settings.
Our extensive evaluations showed that text features alone or in
complex combinations could not reach satisfactory performance.
In our future efforts, we would like to focus more on specifi-
cally exploiting inconsistencies between the post text and the target
text/title, instead of separately describing both. In our current fea-
ture set, the only features that did that were the similarity percentage
between the post and target, categorized under "grammatical", and
it may be no coincidence that these features were the ones that
performed best. We should also put more effort in finding ways to
exploit the accompanying data provided for each item, such as the
available media and keywords. Our attempts to incorporate visual
information did not contribute to the results, so we should reconsider
the description approach for images or other associated media.
In conclusion, despite the unsatisfactory performance of the sub-
mitted system, there were many lessons learned during this year's
Clickbait Challenge, which may lead to more successful attempts in
future editions of the challenge.
References
[1] A. Anand, T. C. 0002, and N. Park. We used neural networks
to detect clickbaits: You won't believe what happened next!
CoRR, abs/1612.01340, 2016. URL
http://arxiv.org/abs/1612.01340.
[2] C. Boididou, S. E. Middleton, Z. Jin, S. Papadopoulos, D.-T.
Dang-Nguyen, G. Boato, and Y. Kompatsiaris. Verifying
information with multimedia content on twitter. Multimedia
Tools and Applications, Sep 2017. ISSN 1573-7721. . URL
https://doi.org/10.1007/s11042-017-5132-9.
[3] C. Castillo, M. Mendoza, and B. Poblete. Information
credibility on twitter. In Proceedings of the 20th international
conference on World wide web, pages 675–684. ACM, 2011.
[4] A. Chakraborty, B. Paranjape, S. Kakarla, and N. Ganguly.
Stop clickbait: Detecting and preventing clickbaits in online
news media. CoRR, abs/1610.09786, 2016. URL
http://arxiv.org/abs/1610.09786.
[5] Y. Chen, N. J. Conroy, and V. L. Rubin. Misleading online
content: Recognizing clickbait as "false news". In
M. Abouelenien, M. Burzo, R. Mihalcea, and V. Pérez-Rosas,
editors, Proceedings of the 2015 ACM Workshop on
Multimodal Deception Detection, WMDD@ICMI 2015,
Seattle, Washington, USA, November 13, 2015, pages 15–19.
ACM, 2015. ISBN 978-1-4503-3987-2. URL
http://doi.acm.org/10.1145/2823465.
[6] M. Potthast, T. Gollub, F. Rangel, P. Rosso, E. Stamatatos,
and B. Stein. Improving the Reproducibility of PAN's Shared
Tasks: Plagiarism Detection, Author Identification, and
Author Profiling. In CLEF, pages 268–299. Springer, 2014.
[7] M. Potthast, S. Köpsel, B. Stein, and M. Hagen. Clickbait
detection. In N. Ferro, F. Crestani, M.-F. Moens, J. Mothe,
F. Silvestri, G. M. D. Nunzio, C. Hauff, and G. Silvello,
editors, Advances in Information Retrieval - 38th European
Conference on IR Research, ECIR 2016, Padua, Italy, March
20-23, 2016. Proceedings, volume 9626 of Lecture Notes in
Computer Science, pages 810–817. Springer, 2016. ISBN
978-3-319-30670-4.
[8] M. Potthast, T. Gollub, M. Hagen, and B. Stein. The Clickbait
Challenge 2017: Towards a Regression Model for Clickbait
Strength. In Proceddings of the Clickbait Chhallenge, 2017.
[9] M. Potthast, T. Gollub, K. Komlossy, S. Schuster,
M. Wiegmann, E. Garces, M. Hagen, and B. Stein.
Crowdsourcing a Large Corpus of Clickbait on Twitter. In (to
appear), 2017.
[10] M. M. U. Rony, N. Hassan, and M. Yousuf. Diving deep into
clickbaits: Who use them to what extents in which topics with
what effects? CoRR, abs/1703.09400, 2017. URL
http://arxiv.org/abs/1703.09400.
|
1904.07188 | 1 | 1904 | 2019-04-15T17:01:31 | Cyberbullying and Traditional Bullying in Greece: An Empirical Study | [
"cs.SI"
] | The rapid evolution of technology is a preferred method of interacting. A new world was created for young people who are sending emails, visiting websites, using webcams and chat rooms, and instant messaging through social media. In the past years, people used face-to-face communication though, in recent years, people are using internet technology in order to communicate with each other. As a consequence the communication change, created a new type of bullying, cyberbullying, in which bullying is taking place by using internet technology. Cyberbullying is a phenomenon which is increasing day by day over the world. This was one of the reasons that prompted us to do this survey. Furthermore, bullies aggressive reaction is affected by four factors which are conductive during childhood. | cs.SI | cs | Cyberbullying and Traditional Bullying in Greece:
An Empirical Study
Vaggelis Saprikis
Dept. Of Business Administriation
Western Macedonia Univ.
of Applied Sciences,
Kozani, Hellas
George F. Fragulis
Lab. of Web Technologies
& Applied Control Systems
Dept. Of Electrical Engineering
Western Macedonia Univ. of Applied Sciences,
Kozani, Hellas
Maria Papatsimouli,
John Skordas,
Lazaros Lazaridis,
Eleni Michailidi
Lab. of Web Technologies
& Applied Control Systems
Dept. Of Electrical Engineering
Western Macedonia Univ.
of Applied Sciences,
Kozani, Hellas
Abstract -- The rapid evolution of technology is a preferred
method of interacting. A new world was created for young people
who are sending emails, visiting websites, using webcams and
chat rooms, and instant messaging through social media. In the
past years, people used face-to-face communication though, in
recent years, people are using internet technology in order to
communicate with each other. As a consequence the commu-
nication change, created a new type of bullying, cyberbullying,
in which bullying is taking place by using internet technology.
Cyberbullying is a phenomenon which is increasing day by day
over the world. This was one of the reasons that prompted us to
do this survey. Furthermore, bullies aggressive reaction is affected
by four factors which are conductive during childhood.
traditional bullying, victims,
Index Terms -- Cyberbullying,
adolescents, victimization, Bullies.
I. INTRODUCTION
According to [13], and [8] Bullying is described as an
aggressive or intentional act or behavior that is carried out
in a repeatedly way against a victim who cannot defend
himself. By using the previous definition, we can define the
term of cyberbullying such as an aggressive or intentional act
or behavior that is carried out in a repeatedly by using an
electronic form of contact. It can be said that cyberbullying is
the evolution of bullying.
The Internet has become the new Wild West of the 21st
century and has to be explored because it provides excitement
and adventure, thus as Wild West, Internet is full of dangers.
Also, [14] mentioned that "We need to be sheriffs in this new
Wild West -- a cyber -- world buzzing with kids just a few
keystrokes away from harming other people, often for no other
reason than that the sheriffs are sleeping. As anyone who has
ever been a victim of bullying and harassment will tell you
the bullets may not be real, but they can hurt" .
II. BULLYING
According to [6], bullying can be defined as a student is be-
ing bullied or victimized when he or she is exposed, repeatedly
and over time, to negative actions on one or more students. A
negative action, with the aggressive behavior definition, when
someone intentionally inflicts or attempt to inflict, injury upon
another [5]. In bullying, there is the physical contact with bully
and victim, in which negative actions carried out by words
or in other ways, for examples such as making grimaces or
unpleasant gestures, spreading rumors and intentional excluse
him/her from a group.
A. Bullies aggressive reaction
According to [7], there are four factors that affect bullies
aggressive reaction. These factors are the answers to the
question "What kind of rearing and other conditions during
childhood are conductive to the development of an aggressive
reaction pattern?".
The factors that mentioned before are:
1) The basic emotional attitude of the caretaker, who usu-
ally is the mother, to the child during the early years. A
negative emotional attitude can be characterized by the
absence of warmth and involvement.
2) The aggressive behavior level of the child is increasing
when there is a tolerant attitude from the caretaker.
Caretakers have to set clear limits when there is an ag-
gressive behavior towards peers, brothers and sisters, and
other adults. Power-assertive methods which are using
to child upbringings such as physical punishment and
violent emotional outbursts are likely to make children
more aggressive than the average child. In other words,
"violence begets violence".
3) Physical punishment and violent emotional outbreaks
methods are likely to affect children to have an aggres-
sive attitude. When parents use those kinds of methods,
children are more likely to become aggressive. It is
already known that "violence begets violence"
4) The way of treatment to a child is inherited. A child
who has a "short-tempered" temperament is more likely
to be an aggressive youngest than a child with a common
temperament.
9
1
0
2
r
p
A
5
1
]
I
S
.
s
c
[
1
v
8
8
1
7
0
.
4
0
9
1
:
v
i
X
r
a
According to above factors, it can be deduced that the child
who had too little love and care, and too much freedom in
his childhood is more likely to become aggressive. Thus, the
socio-economic conditions of the family are not related to the
aggressive behavior of the child.
victims and found that bullies and bully-victims experienced
less parental responsiveness than victims ([31], [32], [33]).
Both dimensions however co-exist and influence each other
[39], [34]. Figure 1, shows the four parenting styles and the
combination of both dimensions results [3].
III. CYBERBULLYING
Cyberbullying is the evolution of traditional bullying by
using the internet technology. According to researchers, cyber-
bullying refers to bullying of others by using mobile phones
and the internet [9]. Such as bullying, can take part in all
countries, without being relevant to the culture and the religion
of the victim [2].
The anonymity, the invasion of personal life, and the fact
that the victim cannot hide from torturers in the electronic
world are characteristics that make electronic bullying more
painful to the victims [4].
A. Cyberbulling and parenting
The role of parenting in cyberbullying is something new
which cannot provide us a lot of information.
Children exclude their parents from internet activities be-
cause it is considered that their privacy is valued [15]. Thus,
cyberbullying is not as visible as traditional bullying. Further-
more, young people are not telling their parents about the
involvement in cyberbullying because they are afraid of the
punishment, the loss of computer privileges and the isolation
of peers ([16], [17], [4]). These means that parents are often
unaware of their child is a cyberbully or is cyberbullied ([18],
[3]).
There are studies that examined the relationship between
parenting characteristics and cyberbullying. They found that
children who cyberbully experience limited parental monitor-
ing, stronger parental discipline and a weaker emotional bond
with their parents than children who do not cyberbully [10],
[12].
Insufficient parenting reduces the social competence of their
children as an example, the ability to develop positive friend-
ships. On the contrary, parents who oversee their children and
get involved in them, the aggressive behavior of the children
within and without family is more likely to be reduced [19],
[20], [21]. The way that parents interact with their children
affects children to interact with others in the same way. If
parents interact with their children in a hostile and cold
manner, encourage them to use the same manner in their
interactions. This affect children socialization and children are
more likely to be a bully [22].
Anti-social behavior is unlikely to happen in a child who
has grown up with supervision, discipline, and affection ([23],
[24], [25], [26], [20], [27]).
There were a lot of researchers who investigated parental
responsiveness and traditional bullying. A negative association
is the result of these elements relation in which as parents were
less responsive, their children are more likely to have a bully-
ing behavior and victimization is increased ([28], [29], [30]).
Some other researchers compared bullies, bully-victims and
Fig. 1. Parenting styles
Various researches examined the relation between the char-
acteristics of parenting and cyberbullying. The results were
that children with cyberbully experience had limited parental
monitoring, stronger parental discipline and weaker emotional
in contrast
bond with their parents,
to children with no
cyberbully experience [10], [12],[11].
B. Cyberbullying and Traditional Bullying
Traditional bullying and cyberbullying have the same fea-
tures which are repetitiveness, intentionality and power bal-
ance. In the case of cyberbullying, is appeared the risk of
misunderstanding as is bereft of non-verbal cues. This means
that a joke may be misunderstanding and could be perceived as
intentional and hurtful. Further, the cyberbullying perpetrators
may be unknown, contrary to traditional bullying [3], [35],
[36], [10], [38].
IV. SURVEY METHODOLOGY
This section presents the design of the survey, the process of
designing the questionnaire, its structure, the sampling method,
the sample as well as the data analysis techniques used.
Non-probable sampling method was applied. The data was
collected via an electronic questionnaire which was developed
based on extended literature review. Specifically, it was devel-
oped by the use of Google forms and distributed via e-mail
and social media. Our questions based on the sub-scales from
the bully/Victim Questionnaire, and parenting with an adjusted
version of the parenting style Questionnaire.
Regarding the respondents, anyone could complete it anony-
mously with our aim to ensure confidentiality.
In the present survey, the primary data collection method,
which is known as a quantitative method and based on a
sample survey using a standardized questionnaire, was also
selected.
This questionnaire included closed-ended questions. Closed
type questions are the questions that are accompanied by a
series of suggested answers to the respondent from which
to select one. In the present questionnaire, there are "yes-
no" questions, multiple choice questions, and Likert scale
questions. In the Likert scale questions the Likert scale with 5
grades was used, where option 1 does not indicate any option
and option 5 means very high.
A. Questionnaire Structure
The questionnaire consists of six units. The first unit con-
sists of the demographic questions.
In the second, questions about internet use and the reasons
for were applied. The third unit consists of questions about
cyberbullying. In this section, the form, the feelings, the con-
sequences and the way that came up against the cyberbullying
phenomenon were asked to be completed.
The next unit consists of questions about traditional bully-
ing. In this section, the respondents asked to answer questions
about the genre of traditional bullying, if victims had a solution
to this problem and in which way.
The fifth unit consists of questions about cyber bullies. In
this unit, respondents have to answer if they became bullies,
for which the reasons and in each way.
Finally, in the sixth section there was a validation question
in order to verify that a human completed the measurement
item and not a machine.
The questions about cyberbullying and traditional bullying
were adjusted and based on [6] questionnaire, and questions
about
the parenting dimensions were measured by using
adjusted questions of the parenting style questionnaire of [40].
Prior to the study, the questionnaire was pre-tested by 20
students who did not participate in the study. As a result of
the pretest, some questions were adjusted to facilitate clarity,
understanding,and ease in answering the questions.
1) Research Questions:
• To what extent is cyberbullying represented in Greece?
• Which gender is more vulnerable to bullying?
• Which is the family relationship associated with the
cyberbullying victims?
• Is cyberbullying associated with the hours spent on the
• Is there an association between traditional bullying vic-
tims and cyberbullying victims?
• Is there an association between cyberbullying victims and
internet?
bullies?
Data gathering period was from March up to April 2018.
525 responses were collected; but only 466 of them were valid.
Afterwards, data were encoded and analysed using the SPSS
Statistical program.
V. MAIN RESULTS
A. Gender Results
The sample consisted of 466 valid questionnaires.
Of 466 participants, 282 participants (60.5%) were women
and 184 (39.5%) were men.
B. Age results
About the age of the participants we had:
• 128 (27.5%) participants were under the age of 18
• 191 (41%) participants were between 19-25
• 32 (6.9%) participants were between 26-30
• 38 (8.2%) participants were between 36-40
• 53 (11.4%) participants were over the age of 40 years old
C. Hours that spends online results
About the hours that our respondents spend online, we have:
• 193 (41.4%) of our participants spent 1-3 hours online
• 179 (38.4%) of our participants spend 4-6 hours online
• 64 (13.7%) of our participants spend 7-9 hours online
• 30 (6.4%) of our participants spend more than 9 hours
online
D. Gender and cyberbullying victims results
In order to examine which gender is more vulnerable to
cyberbullying, we used cross-tabulation in SPSS. The results
are:
• 61 of our respondents have been cyberbullying victims.
• 18 cyberbullying victims were male (29.5%).
• 42 cyberbullying victims were female (70.5%).
One of the research questions was to identify which gender
is more vulnerable to cyberbullying. The answer to this
question is that women are more vulnerable to cyberbullying
as 70.5% of cyberbullying victims were women, in contrast to
29.5% of men victims.
E. Age and cyberbullying victims
Getting results about the age of cyberbullying victims, SPSS
cross-tabulation was used.
The results were:
• <18 age scale, 14 of our respondents were cyberbullying
• 19-25 age scale, 31 of our respondents were cyberbully-
victims (23%)
ing victims (50.8%).
• 26-30 age scale, 4 of our respondents were cyberbullying
• 31-35 age scale, 4 of our respondents were cyberbullying
• 36-40 age scale, 2 of our respondents were cyberbullying
• >40 age scale, 6 of our respondents were cyberbullying
victims (6.6%).
victims (6.6%).
victims (3.3%).
victims (9.7%).
Our survey showed that
the weakest age group is the
19-25 with 31 participants to be victims of cyberbullying.
Continuing, the age group with the less cyberbullying victims
is the age group of 36-40 with 0.4%.
F. Cyberbullying victims and hours that spend online results
SPSS cross-tabulation was used in order to examine the
hours that cyberbullying victims spend online. Our survey
showed that most of the cyberbullying victims (41%) spend 4-
6 hours online. The next following percentage is 27.9% where
cyberbullying victims spend 1-3 hours online. So the answer
to our research question is that most cyberbullying victims
spend online 4-6 hours.
G. Cyberbullying victims and faced the problem results.
In order to examine if cyberbullying victims faced their
problem, we used cross-tabulation in SPSS. The results that
we have from crosstabulation were:
V in order to compare the strength of the coefficient between
the variables. Phi and Cramer's V are estimated factors of the
intensity (size) of the connection between two quality vari-
ables. In the case of independence between the two variables,
the value of the factors is close to zero (0). In our case, Phi
Coefficient is 0.133 and this means that there is a relationship
between bullies and cyberbullying victims.
• 48 of the cyberbullying victims (78.7%) faced up their
problem.
• 13 of the cyberbullying victims (21.3%) didn't find a
solution to their problem.
H. Cyberbullying victims and traditional bullying victims re-
sults
In order to examine the number of cyberbullying victims
and traditional bullying victims, cross-tabulation was used in
SPSS. The results showed us:
Fig. 3. Cyberbullying victims/bullies
• 291 (62.4%) respondents haven't been cyberbullying vic-
tims and haven't been traditional bullying victims as well.
• 114 (24.5%) respondents haven't been cyberbullying vic-
tims but have been traditional bullying victims.
• 28 (6%) respondents have been cyberrbullying victims
but they haven't been traditional bullying victims.
• 33 (7.1%) respondents have been cyberbullying victims
and traditional bullying victims too.
I. Cyberbullying victims and traditional bullying victims
Figure 2 shows that 13.1% of our respondents were cyber-
bullying victims in contrast to the traditional bullying victims
who were the 31.5%. Also, 5.4% of our participants bullied
other people.
Fig. 4. Chi-Square Tests
Fig. 2. Cyberbullying victims,traditional victims,and bullies
According to Figure 2, the answer to our research inquiry
about the extension of cyberbullying in Greece is that, cyber-
bullying appears in half of the proportion compared to the
traditional bullying.
J. Cyberbullying victims and bullies
According to Figure 2, 61 of our respondents have been
cyberbullying victims and 8 respondents have been bullying
someone else too.
From the Figures 3, 4 and 5, we can see that the significance
value is lower than the "a" value (0.004<0.05) and there is
a statistical dependence between the variables on the level of
significance a=0.05. Statistically significant dependence was
identified and it is following the assessment of its intensity. For
this reason, we used the causation coefficients Phi Cramer's
Fig. 5. Symmetric Measures
Finally, in order to determine the existence of dependence
between bullied other people and cyberbullying victims, the
Chi-square test of independence was used to determine if there
is a significant relationship between the two variables. Also,
Phi and Cramer's V coefficients were calculated. According to
the results, there is a significant relationship on the Level of
significance a=0.05 between the bullied other people and cy-
berbullying victims(x2=8.303, sig=0.004). As Phi dependence
coefficient is 0.133, there is a small dependence between the
bullied other people and the cyberbullying victims.
K. Cyberbullying victims and traditional bullying victims
According to Figures 6, 7 and 8 respondents have been
traditional bullying victims and 33 respondents have been
cyberbullying victims too.
We can see that the sig. value is lower than the "a" value
(0.000<0.05). According to this, the null hypothesis is rejected
and there is a statistical dependence between the variables on
the level of significance a=0.05:
Fig. 6. Traditional and cyber bullying Cross-tabulation
Fig. 8. Symmetric Measures
Fig. 7. Traditional and cyber bullying Chi-Square Tests
Statistically, significant dependence was identified and it is
following the assessment of its intensity.
For this reason, we are using the causation coefficients Phi
Cramer's V in order to compare the strength of the coefficient
between the variables.
Phi Coefficient is 0.188 and this means that there is a
relationship between traditional bullying victims and in cy-
berbullying victims.
Finally, for determining the existence of dependence be-
tween traditional bullying victims and cyberbullying victims,
the Chi-square test of independence was used to determine if
there is a significant relationship between the two variables.
Also, Phi and Cramer's V coefficients were calculated. Ac-
cording to the results, there is a significant relationship in
the Level of significance a=0.05 between the bullied other
people and cyberbullying victims(x2=16.533, sig.=0.004). As
Phi dependence coefficient is 0.188, there is a small depen-
dence between the bullied other people and the cyberbullying
victims. Therefore, we reject the null hypothesis.
According to Figures 9 and 10, we have the following
research hypothesis.
H0: There is no difference between the family relation with
the cyberbullying victims
H1: There is a difference between the family relation with
the cyberbullying victims
Also, we have the following research hypothesis.
H00: Family relation is not related to the cyberbullying
victims
H10: Family relation is related to the cyberbullying victims
Sig value of the Levene's Test for Equality of Variances is
0.139(>0.05). This means that we reject hypothesis H10 and
we accept H10 hypothesis.
Also, we accept the hypothesis H1 because of Sig. (2-tailed)
value is 0.002 (<0.05). This means that there is a correlation
between the cyberbullying victims and the family relation.
Fig. 9. Group Statistics
From Figure 9 we can see that respondents who have been
cyberbullying victims were less well connected with their
family (M=4.07) compared with the respondents who were
cyberbullying victims (M=4.42). Therefore, we can say that
family relation is related to cyberbullying victimization.
VI. CONCLUSIONS
Cyberbullying is based on the bullying by using the technol-
ogy. Also, technology offer opportunities and can be painful
for those who are targets of cyberbullying.
Our survey aimed to explore the extent of bullying and
cyberbullying in Greece. In order to answer the research ques-
tions, we collected data which analyzed by SPSS statistical
program. The important results that we have are:
• Cyberbullying has a small extent in Greece, in contrast
to traditional bullying which has a larger area.
• Girls are more vulnerable to cyberbullying.
• Cyberbullying victims spend 4-6 hours online.
• There is a statistical dependence between cyberbullying
victims and traditional bullying victims.
• There is a correlation between cyberbullying victims and
family relation.
From our research results, it can be said that parents and
schools need to help and prepare children from the hazards of
the new technology as cyberbullying will evolve as technology
continues to evolve. Future studies need to explore a larger
sample size. Also elements such as cyberbullying and bullying
relation and the parenting styles of cyberbullying and bullying
victims need to be explored deeper.
Fig. 10.
Independent Samples Test
[25] Demetriou, L. & Christodoulides, P. (2011). Personality and psycholog-
ical adjustment of Greek-Cypriot youth in the context of the parental
Acceptance-Rejection theory. The Cyprus Review, 23(1), 81-96.
[26] Getachew, K. & Sintayehu, M. (2007). Types, magnitude, predictors and
controlling mechanismes of aggression in secondary schools of Jimma
zone. Ethiopian Journal of Education and Science, 2(2), 51-61
[27] Luyckx, K., Tildesley, E. A., Soenens, B., Andrews, J. A., Hampson,
S. E., Peterson, M., & Duriez, B. (2011). Parenting and trajectories
of childrens maladaptive behaviors: A 12-year prospective community
study. Journal of Clinical Child & Adolescent Psychology, 40(3), 468-
478.
[28] Flouri, E., & Buchanan, A. (2002). Lifesatisfaction in teenage boys:
The moderating role of father involvement and bullying. Aggressive
Behavior, 28, 126-133.
[29] Georgiou, S.N. (2008). Parental style and child bullying and victim-
ization experiences at school. Social Psychology of Education, 11(3),
213-227.
[30] Ok, S. & Aslan, S. (2010). The school bullying and perceived parental
style in adolescents. Procedia-Social and Behavioral Sciences, 5, 536-
540.
[31] Demaray, M.K., & Malecki, C.K. (2003). Perceptions of the frequency
and importance of social support by students classified as victims,
bullies, and bully/victims in an urban middle school. School Psychology
Research, 32(3), 471-489.
[32] Smith, P.K., & Myron-Wilson, R. (1998). Parenting and school bullying.
Clinical Child Psychology and Psychiatry, 3(3), 405-417.
[33] Stevens, V., Bourdeaudhuij, I., de, & Oost, P., van. (2002), Relationship
of the family environment
in bully/victim
problems at school. Journal of Youth and Adolescence, 31(6), 419-429.
[34] Spera, C. (2005). A review of the relationship among parenting prac-
tices, parenting styles, and adolescent school achievement. Educational
Psychology Review, 17(2), 125-146
to childrens involvement
[35] Dempsey, A.G., Sulkowski, M.L., Dempsey, J., & Storch, E.A. (2011).
Has cyber technology produced a new group of peer aggressors?
CyberPsychology, Behavior, and Social Networking, 1(5), 297-302.
[36] Huang, Y., & Chou, C. (2010). An analysis of multiple factors of
cyberbullying among junior high school students in Taiwan. Computers
in Human Behavior, 26, 1581-1590).
[37] Ybarra, M.L., Diener-West, M., & Leaf, P.J. (2007). Examining the
overlap in Internet harassment and school bullying: implications for
school intervention. Journal of Adolescent Health, 41(6), 42-50.
[38] Dehue, F., Bolman, C., Vollink, T., & Pouwelse, M. (2012). Coping with
bullying at work and health related problems. International Journal of
Stress Management, 19(3), 175-197. http://dx.doi.org/10.1037/a0028969
[39] Baumrind, D. (1991). The influence of parenting style on adolescent
competence and substance use. Journal of Early Adolescence, 11(1),
56-95.
[40] Exter Blokland, E.A.W., den, Engels, R.C.M.E., & Finkenauer, C.
(2001). Parenting practices, self-control, and adolescent delinquency.
Aggressive Behavior, 27(3), 216-217.
REFERENCES
[1] Kowalski, R., Limber, S. and Agatston, P. (2012), Cyberbullying,
Malden, MA: Wiley-Blackwell.
[2] Berger, K. S. (2007). Update on bullying at school: Science has
forgotten? Development Review,27,90-126.
[3] Dehue, Francine & Bolman, Catherine & Ullink, Trijntje & Pouwelse,
Mieneke. (2012). Cyberbullying and traditional bullying in relation
to adolescents'perception of parenting. Journal of Cybertherapy and
Rehabilitation. 5. 25-33.
[4] Mishna, F., Saini, M., & Solomon, S. (2009). Ongoing and online:
Children and youth's perceptions of cyberbullying. Children and Youth
Services Review, 31(12), 1222-1228.
[5] Olweus, D. (1973b). Personality and aggression. In J.K. Cole, & D.D.
Jensen (Eds), Nebraska Symposium on Motivation 1972 (pp. 261-321).
Lincoln: University of Nebraska Press.
[6] Olweus, D. (1993a). Bullying at school: What we know and what we
can do. Oxford, UK, and Cambridge, MA, USA: Blackwell Publishers.
[7] Olweus, D. (1996). Bully/victim problems in school. Prospects,26, 331-
359
[8] Olweus, D. (1997). Bully/victim problems in school: Facts and interven-
tion, European Journal of Psychology of EducationUniversity of Bergen,
Norway.
[9] Smith, P.K., Mahdavi, J.,Carvalho, M. &Tippett, N. (2006) . An
investigation into cyberbullying, its forms, awareness and impact, and
the relationship between age and gender in cyberbullying.
Retrieved
Safeguarding/e-Safety/Task-to-Finish-Group/Task-to-Finish-Group-
Documentation/Cyber-Bullying -- Final-Report.pdf
https://www.staffsscb.org.uk/Professionals/Key-
from
[10] Ybarra, M.L., & Mitchell, K.J. (2004). Youth engaging in onlineharass-
ment: Associations with caregiver-child relationships,Internet use, and
personal characteristics.Journal of Adolescence, 27(3), 319-336.
[11] Wong, Y.C. (2010): Cyber-parenting: Internet benefits, risks,and parent-
ing issues, Journal of Technology in HumanServices, 28(4), 252-273.
[12] Wang, J., Iannotti, R. J., & Nansel, T. R. (2010). School bullying among
adolescents in the United States: Physical,Verbal, Relational, and cyber.
Journal of Adolescent Health, 45(4), 368-375.
[13] Whitney, I., & Smith, P.K. (1993). A survey of the nature and extent of
bullying in junior/middle and secondary schools. Educational Research.
[14] Franek, M. (2005/2006). Foiling cyber bullies in the new wild west.
Educational Leadership, 63, 39-43.
[15] Subrahmanyam, K. & Greenfield, P. (2008). Online communication and
adolescent relationships. The Future of Children, 18(1), 119-146.
[16] Bath, C.S. (2008). Cyber bullying: overview and strategies for school
counsellors, guidance officers, and all school personnel. Australian
Journal of Guidance & Counselling, 18(1), 53-66.
[17] Kraft, E.M. & Wang, J. (2009). Effectiveness of cyber bullying preven-
tion strategies: A study on students perspectives. International Journal
of Cyber Criminology, 3(2), 513-535.
[18] Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak,
S., Yilmaz, N., & Memmedov, C. (2008). Cyberbullying among Turkish
adolescents CyberPsychology & Behavior, 11(3), 253-261.
[19] Duman, S., & Margolin, G. (2007). Parents aggressive influences and
childrens aggressive problem solutions with peers. Journal of Clinical
Child and Adolescent Psychology, 36(1), 42-55.
[20] Knutson, J.F., DeGarmo, D.S., & Reid, J.B. (2004). Social disadvantage
and neglectful parenting as precursors to the development of antisocial
and aggressive child behavior: Testing a theoretical model. Aggressive
Behavior, 30(3), 187-205
[21] Mazefsky, C.A., & Farell, A.D. (2005). The role of witnessing violence,
peer provocation, family support, and parenting practices in the aggres-
sive behavior of rural adolescents. Journal of Child and Family Studies,
14(1), 71-85
[22] Pontzer, D. (2010). A theoretical test of bullying behavior: Parenting,
personality, and the bully/victim relationship. Journal of Family Vio-
lence, 25(3), 259273
[23] Bacchini, D., Miranda, M. C., & Affuso, G. (2011). Effects of parental
monitoring and exposure to community violence on antisocial behavior
and anxiety/depression among adolescents. Journal of Interpersonal
Violence, 26(2), 269-292.
[24] Brown, S.A., Arnold, D.H., Dobbs, J., & Doctoroff, G.L. (2007).
Parenting predictors of relational aggression among Puerto Rican and
European American school-age children. Early Childhood Research
Quarterly, 22(1), 147-159.
|
1505.04943 | 1 | 1505 | 2015-05-19T10:24:14 | The User Behavior in Facebook and its Development from 2009 until 2014 | [
"cs.SI"
] | Online Social Networking is a fascinating phenomena, attracting more than one billion people. It supports basic human needs such as communication, socializing with others and reputation building. Thus, an in-depth understanding of user behavior in Online Social Networks (OSNs) can provide major insights into human behavior, and impacts design choices of social platforms and applications. However, researchers have only limited access to behavioral data. As a consequence of this limitation, user behavior in OSNs as well as its development in recent years are still not deeply understood.
In this paper, we present a study about user behavior on the most popular OSN, Facebook, with 2071 participants from 46 countries. We elaborate how Facebookers orchestrate the offered functions to achieve individual benefit in 2014 and evaluate user activity changes from 2009 till 2014 to understand the development of user behavior. Inter alia, we focus on the most important functionality, the newsfeed, to understand content sharing amongst users. We (i) yield a better understanding on content sharing and consumption and (ii) refine behavioral assumptions in the literature to improve the performance of alternative social platforms. Furthermore, we (iii) contribute evidence to the discussion of Facebook to be an aging network. | cs.SI | cs | The User Behavior in Facebook and its
Development from 2009 until 2014
Thomas Paul+, Daniel Puscher+, Thorsten Strufe∗
TU Darmstadt+ and TU Dresden∗
[email protected], [email protected], [email protected]
5
1
0
2
y
a
M
9
1
]
I
S
.
s
c
[
1
v
3
4
9
4
0
.
5
0
5
1
:
v
i
X
r
a
Abstract—Online Social Networking is a fascinating phenom-
ena, attracting more than one billion people. It supports basic
human needs such as communication, socializing with others
and reputation building. Thus, an in-depth understanding of
user behavior in Online Social Networks (OSNs) can provide
major insights into human behavior, and impacts design choices
of social platforms and applications. However, researchers have
only limited access to behavioral data. As a consequence of this
limitation, user behavior in OSNs as well as its development in
recent years are still not deeply understood.
In this paper, we present a study about user behavior on the
most popular OSN, Facebook, with 2071 participants from 46
countries. We elaborate how Facebookers orchestrate the offered
functions to achieve individual benefit in 2014 and evaluate
user activity changes from 2009 till 2014 to understand the
development of user behavior. Inter alia, we focus on the most
important functionality, the newsfeed, to understand content
sharing amongst users. We (i) yield a better understanding
on content sharing and consumption and (ii) refine behavioral
assumptions in the literature to improve the performance of
alternative social platforms. Furthermore, we (iii) contribute
evidence to the discussion of Facebook to be an aging network.
Index Terms—Online Social Network, Facebook, Timeline,
Content Sharing
I. INTRODUCTION
Online Social Networks (OSNs) offer a rich set of different
communication and content sharing functionalities to their
users and change the way how people interact. They support
basic human needs such as communication, socializing with
others and reputation building. Facebook1 is the dominating
social networking service in the world that attracts more
than one billion people2. Because of their importance for
both, the individual users and the modern society, OSNs are
subject in many research areas. Inter alia, researchers examine
user interactions [11], the information diffusion [3] or novel
social networking architectures e.g. [8], [5], [18]. An in-depth
understanding of user behavior in OSNs can provide major
insights into human behavior, and impacts design choices in
social platforms and applications. However, user behavior in
OSNs is still not deeply understood, because researchers have
only limited access to behavioral data.
To this end, we present a study to understand how users
orchestrate Facebook’s functions to gain benefit for themselves
as well as to understand the benefit that the most important
function (Figure 4), the newsfeed, provides to Facebook users.
1https://facebook.com/; Accessed 2015-05-06
2http://allfacebook.de/userdata/; Accessed 2015-05-06
We also take the changes of user behavior from 2009 till
2014 into account to understand the success and aging process
of Facebook, and compare our findings with user behavior
assumptions in the literature.
Our study is based on data, which is collected at the client-
side. We gathered it from 2,071 users via web-browser plug-in
to overcome limitations of crawled datasets ([7], [16], [12],
[10]), click streams [21] or social network aggregator data
[4]. Our plug-in is able to measure client-side activity such as
scrolling or deactivating tabs to estimate the time that users
invest to examine newsfeed posts. The plug-in has access to
profile details endowed with user’s rights and is able to read
activity logs that encompass historical actions regardless of
their origin from mobile or stationary devices.
To find volunteers for this study who are eager to install
our plug-in, we sent a solicitation to join this study to users
of our previous work [20] where we created a new interface
to simplify audience selection. This interface is based on a
color coding and minimizes the effort as well as error rates
when changing the visibility of content items. We published
a browser extension (plug-in) for Firefox and Chrome, called
Facebook Privacy Watcher (FPW), which implements this new
type of interface on purpose to yield benefit to people. Both
versions (Chrome and Firefox) of the FPW have together been
installed by more than 44,000 Facebook users.
We asked the FPW users to join a user study about user
behavior in Facebook by installing a second browser extension
that anonymously collects the data for the study which is pre-
sented in this paper. 2,071 FPW users allowed us to evaluate
their user behavior in detail. We collected basic demographical
data such as gender and age, data on usage patterns with
respect to functionalities, data about communication partners
w.r.t. to the social graph distance as well as metadata about
the content which is shared. This metadata consists of the type
of content, the time when it has been created or watched as
well as its size in bytes (if available). We respect the privacy
of all probands by not storing or evaluating any content or
identifier!
To understand the user behavior on Facebook, we evaluate
the dataset with focus on the questions: How do people or-
chestrate the vast variety of functions? Who produces content
in Facebook? How much and which kind of information do
people share on Facebook? Who consumes which content?
How old is the shared content until it is viewed and how
long is it commonly consumed? How does the observed user
behavior change over time?
The main findings are that Facebook sessions are very
short, compared with assumptions in the literature and users’
content contributions are extremely disparate in type and
quantity. A major share of newsfeed stories is posted by a
minority of users and consists of reshared, liked or commented
issues rather than original user-generated content. Facebook
manages to compensate this lack of high quality content by
transforming commercial posts into regular newsfeed content
that is accepted by FPA users equally beside user-generated
content. Evaluating the history of user actions from 2009 till
2014, we show that users tend to befriend with less other
users. Also, actions that cause little effort, such as reshares
and likes, recently became more popular than status updates
and comments.
With this work, we contribute to better understand the usage
of Facebook with respect to churn, content contribution and
consumption, as well as communication patterns. We also help
authors of alternative (e.g. P2P-based) OSN architectures to
make well-founded design choices and provide evidence for
Facebook to be an aging network by analyzing dynamics of
user behavior over time.
The remainder of the paper is structured as follows: We dis-
cuss related works in Section II and describe the experimental
setup in Section III. We examine the attention that users pay to
Facebook by evaluating the session durations and frequencies
(churn) in Section IV, and evaluate the popularity of different
functionalities in Facebook in Section V. We elaborate the
newsfeed with respect to content creation, composition and
consumption in Section VI, evaluate communication patterns
of FPA users in Section VII and examine dynamics in user
behavior in Section VIII. In Section IX, we summarize our
work and draw major conclusions.
II. RELATED WORK
A vast amount of related work in the field of user behavior
in OSNs has been done by now. Prior work can be classified by
the research discipline (e.g. computer science and psychology),
the data collection method as well as the social network that
has been analyzed (e.g. Twitter, Facebook, Google+).
We aim to understand what is the technical core of Face-
book’s success. In the remainder of this section, we thus focus
on related work in computer science about Facebook that
evaluates functionality rather than e.g. the social graph. Unlike
works in the field of psychology or sociology, we do not aim
to contribute in exploring OSN user’s individual properties or
any relation between OSNs and societies. We take the system’s
point of view and want to know how users use Facebook’s
functionality and how to build excellent systems that support
user’s needs. Since capturing functionality usage causes strin-
gent requirements on the data collection process, we examined
related work based on this criteria in the remainder of this
Section.
Many works on user behavior are based on crawler-gathered
data [7], [16], [12], [10]. Datasets which are acquired by
employing crawlers contain static elements of user profiles.
Dynamics can be estimated by frequently crawling the same
information to detect changes. Also activity counters such as
page view counters can detect some types of dynamics [24].
Page view counters have been also used by Lin et al. [14].
They crawled Renren and Sina which offer pageview counters
and allow to crawl a list of the last nine visitors. This type
of information allows insights into profile visits by building
directed and weighted graphs. However, datasets which are
acquired by employing crawlers are not sufficient for our
purpose to understand how users use Facebook since they
neither reflect the use of all kinds of functionality (such as
messaging, likes or the ’Timeline’ usage) or their interplay
nor do they allow to evaluate exact timings.
Schneider et al. [21] analyzed passively monitored click
streams of Facebook, MySpace, LinkedIn, Hi5, and StudiVZ.
They analyzed feature and service popularity (churn), click
sequences and profile usage but do not evaluate information
about the newsfeed and profile page compositions or historical
data. We can confirm the finding that users are trapped
when using a specific functionality. If users view pictures,
the likelihood is extremely high that the next action is again
to view pictures. However, Schneider et al. did not evaluate
content consumption nor content contribution habits of users.
Benvenuto et al. [4] elaborated click stream data from
37,024 users of Orkut, MySpace, Hi5, and LinkedIn in a
twelve days period, collected by a Brazil social network
aggregator. They additionally analyzed crawler data which
was collected at Orkut. The main results of this work are
session descriptions containing information such as how long
and how often users use which function of the system. With the
help of the crawler data on Orkut, Benvenuto et al. analyzed
function usage with respect to friend relations. In contrast to
this work, we focus on Facebook in 2014. Due to client-side
data collection, we know timing issues such as pre-click times,
can distinguish between stranger profiles and professional sites
and are able to do long-term evaluations based on activity
log data. Another aggregator study in the middle east that
measures session properties such as session durations can be
found in [22].
To overcome these dataset
implicated downsides in un-
derstanding Facebook usage, Facebook-internal applications
and client-side data collection methods have been developed.
Mondal et al. [17] leveraged a Facebook app to examine
Social Access Control Lists and Luarn et al. [15] developed a
Facebook app to test and confirm the hypothesis that people’s
network degree is positively correlated with the the frequency
of information dissemination. Client-side data collection can
be found at [26], [25]. However, these works do not analyze
OSNs but web surfing behavior in general.
The allocation of attention amongst friends has been ana-
lyzed by Facebook [2]. The main findings are that Facebook
users concentrate their attention on a small fraction of friends
while messaging is much more focused on few individuals
than profile page views. Backstrom et al. observed a gender
homophily: “We find that females send 68% of their messages
to females, while males send only 53% of their messages to
females. This distinction is consistent with gender homophily
— in which each gender has a bias toward within-gender
communication — modulated by the overall distribution of
Facebook messages. On the other hand, we see much smaller
differences in viewing: for typical activity levels, both females
and males direct roughly 60% of their profile viewing activity
to female users.” In contrast
to Backstrom et al. [2], we
evaluate user behavior patterns more detailed with respect
to timings and content contribution and consumption. We
further evaluate historical and device usage independent data
to understand the development of user behavior over time.
III. EXPERIMENTAL SETUP
In this Section, we describe our ethical considerations
regarding this study, the data collection process, the amount
and the composition of the data that we collected. We further
describe the bias of the data with respect to the differences to
the complete set of Facebook users.
A. Ethical Considerations
We acquired our participants by asking FPW users to par-
ticipate in this study. Before installing the FPA, we explained
the reason for collecting the data to our study participants and
allowed users to access and verify all data before sending it
to our server with consent. We further did not violate any rule
on Facebook since we directly gathered our data from our
participant’s browser.
All data that we used for this study is anonymized and en-
crypted for transmission with state-of-the-art technology. We
did not collect or store any content or messages but metadata
about the user behavior such as content types, time stamps and
hashes of ids to be able to distinguish amongst actors without
being able to identify individuals. Nevertheless, we keep the
collected data confidential to protect all study participants from
deanonymization attempts and do only publish aggregated
data.
B. Sample Generation
We published the browser extension (FPW) to simplify
audience selection for posts on Facebook. Enclosed into an
FPW update, we asked our users whether they would be
willing to help us with a user behavior study and thus share
the necessary data with us. 11,572 FPW users filled out the
questionnaire: 11.8% of the users answered “yes” 21.3% of
the user “maybe” and the rest answered with “no”. This
questionnaire was intended to be a risk reducing pre-test before
developing the data collection plug-in to make sure that a
reasonable number users are willing to help us.
Subsequently to this successful pretest, the development of
the data collection plug-in started as a statistic module of
the Facebook Privacy Watcher and was thus called Facebook
Privacy Analyzer. However, we decided the FPA to be a stand-
alone plug-in.
The FPA version for the Chrome browser was published at
Chrome web store on 24th of November 2013. After fixing
several bugs, the Firefox Version was published on 16th of
January 2014. FPW users who have previously agreed to join
the study have immediately been asked to install the plug-in
by showing a pop-up window in FPW. All other FPW users
were asked a second time again two weeks later. To incentivise
study participation, the data collecting plug-in FPA provided
statistics to users about their own behavior. The statistics also
could be shared on Facebook and compared with friends.
C. Sample Bias
Since we cannot force any randomly chosen person to
join our study, we only studied persons which were eager to
help us in doing research. The data that we collected is thus
neither a result of a random sampling process nor the complete
Facebook dataset. We thus suffer from a bias that is evaluated
in this Section.
The majority of our participants joined us by following an
invitation via pop-up message in the FPW. The FPW became
popular by newspaper articles and radio station broadcasts that
reached even less technology-savvy people of all ages. Beside
some international media such as “golem” or “Der Standard”,
the center of FPW news coverage was in Germany. Hence,
the overwhelming majority of the FPA users are originated
from Germany (84.87%), too. The rest of the participants are
- according to the information in their profiles - from 45 other
countries.
Fig. 1. Friend relations amongst FPA users; singletons are excluded
The heterogeneity of our sample is illustrated by Figure 1. It
shows the friendship relations amongst 621 FPA users. Study
participants without friends who also use the FPA (singletons;
68.02%) are not part of this graph. Only 3 bigger clusters of
31, 11 and 8 users exist. We assume the biggest clusters to
consist of persons acquainted with one of the authors.
To further estimate the sample bias, we recorded the gender
and the year of birth of our participants from their user profiles.
77.6% of the participants are male, 21.13% are female and the
rest did not share this information with us. Some users claimed
to be born before 1925 or after 2010. However, we assume the
majority of age information to be correct. The majority of our
participants are born between 1960 and 1985. Our median
participant is a 44 years old male Facebook user. Compared
with average Facebook users, our participants are older and
males are overrepresented.
data that has been collected after 1st of January 2014. During
our observation period of 123 days, 2071 users installed the
FPA. However, not every study participant joined at the first
day and not every participant stayed the whole rest of the time.
We thus observed our participants on average 34 days.
D. Details on Collected Data
F. Mobile Device Usage
To understand the Facebook usage, we require data that
describes both components of interaction together with the
respective timing information: the actions performed by users
as well as the information flow from Facebook to the users.
We mainly collected four data types, using the FPA:
the
performed actions of users, the friend lists of users, activity
logs and basic demographic information about the FPA users.
Furthermore, we measured exact session durations by storing
the time when activating and deactivating browser tabs in case
of active Facebook sessions. In the remainder of this section,
we explain the four main types of collected information and
their necessity for our study.
a) Performed Actions: Every action that a user per-
formed in Facebook has been recorded in the database, to-
gether with a timestamp and the browser tab ID. We recorded
further metadata about
the actions such as the hashes of
persons who are involved in those actions.
b) Friend Lists: We recorded the friend list as set of
UIN hashes. We needed this information for several reasons:
We checked whether two-sided actions such as messaging
or profile views are performed amongst friends or strangers,
we counted the number of friends of each FPA user to
calculate the node degree within the ego-graph and we checked
newsfeed posts whether they are originated from friends.
c) Activity Logs: The FPA is a powerful tool. However, it
can only gather data in case the user uses a web browser based
Facebook access. Facebook maintains an activity log as a part
of the user profiles. This activity log contains activity records
back till the time of registration at Facebook independent from
the access channel (e.g. mobile app or browser).
These records contain almost all actions which have been
performed on Facebook together with the timestamp and some
metadata such as communication partners. Private messaging
e.g. is not included in the activity logs. Nevertheless, it is a
very valuable data source for our analysis since it allows us
to estimate the fraction of actions that we can observe in the
browser. We can thus bridge the gap that would appear in case
of only evaluating data from Firefox or Chrome browsers.
Furthermore, due to the activity log’s long term records, we
can evaluate changes in user behavior during time. We can thus
trace the learning process of new users joining Facebook.
d) User Demographics: Based on ethical considerations
to protect user’s privacy, we only stored basic user data such
as age and gender. We need this data to estimate the bias of
our sample.
E. Data Quantification
Since we changed parts of the code basis through updates
after the first publication of the plug-in, we decided to use only
As explained above, the activity logs contain even those
actions which have been performed on mobiles devices or
stationary devices without an installed FPA instance. Further-
more, the information flow from Facebook to users (e.g. the
newsfeed) is independent from the devices that have been used
to create and post the original content. We thus can include
mobile actions in the majority of our analysis. However, we
can neither evaluate content consumption nor churn on mobile
devices.
IV. CHURN
Churn denotes in this work the behavior of users starting
and ending Facebook sessions. In this Section, we describe
the churn behavior that we observed to provide insights into
the importance of Facebook for the FPA user’s daily life.
Caused by the properties of web-based systems in which
communication is triggered by user activity (events), different
methods exist to measure churn. The related work (e.g. [21])
use inter alia the absence of activity (timeouts) as an indicator
for users to leave the system. In contrast
to the related
work, the browser plug-in FPA has access to more precise
information such as whether a tab is activated or not. To
ensure comparability, we include four different measurements
instead of only presenting the most precise measurements. We
distinguish amongst the following four measurement methods:
• Basic: A session always starts with the login on Face-
book and ends with either a logout or with closing the
last open browser tab with an open Facebook session.
However, this session definition leads to extreme cases
of sessions lengths lasting several days. It does not
realistically reflect the user’s attention. We thus included
a timeout of three hours starting after the last action was
performed by the user.
• Timeout: The timeout measurements are conform to the
previous measurements, using a more aggressive timeout
of 5 minutes. We ague that this short timeout reflects user
attention better than previous.
• Basic without timeout: We included the previous mea-
surements without timeout to quantify the effect of the
timeouts on our basic measurements. Comparing ’basic’
and ’basic without timeout’ indicates how many users log
themselves off or close Facebook tabs while leaving.
• Precise: Since the FPA notices tabs to be activated and
deactivated, the most precise measurement is to count
a session to start as soon as either a users performs a
login action on Facebook or a browser tab on Facebook
is activated. The session ends in case the browser (or the
tab) is either closed or deactivated or a logout action is
performed.
tures is very popular,
too. Surprisingly, users spend more
time with topic-related interest groups (named ’groups’ in
Figure 4) and the enclosed newsfeeds (’list newsfeed’) than
with exchanging messages with others. The median FPA user
spends more time with maintaining the own profile than with
running apps on Facebook. However, running apps is not
unpopular in general. A minority of users spends a big fraction
of their time with apps.
The page transition matrix in Figure 5 shows relations
between different functions in Facebook by depicting page
type transitions. Two main findings can be quickly realized:
Users tend to repeat actions several times (e.g. view a picture
after viewing a picture) and the newsfeed is the dominating
functionality getting the most page hits from other transition
sources.
A. Third Party Applications
In this section, we evaluate the usage of third party appli-
cations (apps) which are completely integrated into Facebook
itself and leverage the Facebook platform to provide benefit to
their users. For these evaluations, we only included data from
users who never accessed their newsfeed to exclude strangers
and those who joined our experiment for less than one week.
We thus only used the data of 1,068 users.
The mutual benefit of the app creator and Facebook are
that Facebook’s functionality is extended by third parties and
the third parties can leverage Facebook platform functionality.
Based on the platform functionality, the App instances of
different users can communicate with each other and the
platform allows the apps to receive information about the
users, such as the friendship connections or interests, in case
of user’s consent. The apps can thus leverage the social graph
to fortify collaboration amongst friends and to establish or
support a feeling of togetherness.
29.96% of the FPA users used at least one app and 50,88
% of all app users used exactly one app. On average, app
Fig. 4.
functionalities
Fraction of time that FPA users spent using different Facebook
Fig. 2.
measurement methods on a logarithmic scale
Distribution of session durations with respect to four different
Figure 2 shows the duration of sessions. The ’precise’ and
’timeout’ measurements depict very short Facebook sessions
of 2:16 minutes on average (median: 0:17) for ’precise’
and an average of 5:32 (median 2:21) for ’timeout’. The
average results of the ’basic’ measurements (31:40 minutes)
are roughly in line with the results of Schneider et al. [21] and
the measurements without timeout show unrealistic lengths of
240:01 minutes.
Fig. 3. Average number of sessions per day
Beside the session duration, the average number of sessions
is important, too. Figure 3 shows the distribution of average
session numbers. The ’precise’ measurement
indicates an
average of 2.97 sessions, the ’timeout’ method 1.28 and the
’basic’ indicates an average of 0.79 sessions per day.
The observed session duration as well as the total online
duration per day (average session duration × average number
of sessions) are shorter than those in the evaluation assump-
tions of many Peer-to-Peer based decentralized OSNs (e.g.
[18], [13], [23]). Our dataset provides evidence that assuming
shorter session durations, the absence of stable nodes as well
as an average of less than three sessions per day may be more
realistic.
V. FUNCTION POPULARITY
Beside its third-party app ecosystem, Facebook itself com-
prises a rich compilation of functions which characterize the
service. Figure 4 contains box-whisker plots which show the
relative fraction of time that users spend with each function.
The box-whisker plots are ordered by the median time that
users spend with each function.
The newsfeed, called ’Timeline’, dominates Facebook us-
age, followed by viewing other user’s profiles. Viewing pic-
lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0.000.250.500.751.00NewsfeedForeign profilePhotoList−NewsfeedGroupMessagesOwn profileAppFind groupsEventSettingsRelative retention timemainly a gaming platform. This result is in line with our
session duration observations in Section IV. However, a few
third-party applications are used by roughly 30% of the users.
VI. THE FACEBOOK NEWSFEED
Being the core of Facebook, we dedicate this Section to the
Timeline. Attracting users to generate and contribute content
to the Timeline, such as pictures, videos status updates and
text messages, is crucial for the success of social networking
platforms like Facebook. However, the platform operator needs
to solve a chicken-and-egg problem: content contributors need
to be incentivised to contribute content by the existence of an
audience that is interested in their submissions and the crucial
incentive for a potential audience to spend their attention to
the platform is the existence of interesting content.
Thus, Facebook’s role is to be an information mediator that
manages two scarce resources: valuable and interesting content
as well as attention of the audience. “The goal of News Feed
is to deliver the right content to the right people at the right
time so they don’t miss the stories that are important to them.
Ideally, we want News Feed to show all the posts people want
to see in the order they want to read them.“ [1]
The straightforward way to only leverage friendship connec-
tions as communication channels while respecting restrictions
arising from privacy settings is not sufficient
to find an
interested audience for content. The matchmaking is a hard
task to solve for two reasons: a minority of users posts a lot
of content which is not interesting for all of their friends and
the amount of posts quickly becomes too high to be read by
others [1]. Facebook thus decides which content to place in
which user’s Timeline to provide the most interesting news to
the users during their period of attention.
This matchmaking can be improved by understanding two
determinants: the interests of users in content as well as by
understanding the meaning of content. In the remainder of
this Section, we first examine user’s content contribution to
understand Facebook’s initial situation for placing content in
timelines. We then explain the newsfeed arrangement which
reflects Facebook’s assumptions and wishes which content
to view. The consumption of presented content is evaluated
thereafter. Finally, we show the impact of the provided content
based on the measured user reactions such as comments and
likes. The following Timeline related evaluations are based on
the subset of 774 users who viewed at least 100 posts (788938
in total) to avoid outliers to affect our results.
A. Content Generation
The Timeline contains not only user generated content.
Facebook itself is creating a big portion of posts that appear in
the Timeline e.g. to inform users about status or profile picture
updates of their friends. Companies (add pages) can also post
regular newsfeed messages. However, in the remainder of this
Section (VI-A), we focus on user-generated content rather than
content generated from Facebook itself or commercial pages.
Users can create different types of content: status updates
which only consist of pure text messages, shared links to
Fig. 5. Page transition matrix; the row values sum up to 100 %
Fig. 6. Box-whisker-plots: distributions of the number of apps FPA users
are using and the time they are spending with apps
users use a total number of 2.55 apps and spend 14.97 % of
their time on Facebook with running apps. Figure 6 shows
the distributions of the number of apps the users from the
evaluation set are using as well as the distribution of the
fraction of time they spend.
Unfortunately, because of our privacy limitations, we
recorded the hash values of app IDs rather than their name. We
hence cannot evaluate which application is the most popular
one. In spite of this limitation, Figure 7 shows the popularity
distribution of apps amongst users. We can learn from that
figure that the overwhelming portion of app usage concentrates
on very few apps. The most popular two applications each are
used by 20% of all FPA users and the 3rd popular application
is only use by roughly half that many users.
Fig. 7.
the names of the apps and thus numbered them
Popularity of apps; caused by privacy limitations, we do not know
Evaluating the app usage suggests that Facebook is not
00071000120079003011453102400118021015120412101180010015206125035111210112363413101901000510468190120011930214403100273600412101430120030084465126014000005004080217900023193051390170165703002029110002319305139017011027712238152302100210630310100EventNoteNewsfeedMessagesLists newsfeedGroupForeign profilePhotoSettingsOwn profilePostLogged outApp CenterAppAppApp CenterLogged outPostOwn profileSettingsPhotoForeign profileGroupLists newsfeedMessagesNewsfeedNoteEventToFrom0204060Problllllllllllllllllllllllll05101520Apps per Userllllllllllllllllllllllllllllllllllllllllllllllllllll0.000.250.500.751.00Fraction of their time users spend with apps0.000.050.100.150.20123456789101112131415AppFraction of usersusing a certain appfriend’s profiles whereof 36.42% of them have been directly
posted via the sidebar of birthday congratulation pages.
B. Newsfeed Composition
In this Section, we evaluate the composition of the news-
feed. We examine who authors the newsfeed content to depict
the nature of the service and we evaluate which fraction of
friends contributes to the newsfeed to scrutinize Facebook’s
eligibility as a tool to keep in touch with friends.
Facebook was initially planned for students to establish and
maintain connections between friends. Figure 10 shows the
distribution of newsfeed entries with respect to the authorship.
Nowadays, the average fraction of friend-generated content
dropped to 49.5%. While introducing professional pages as
a tool for companies to communicate with their customers,
Facebook became an important advertising platform that now
reaches an average fraction of 41.4% of commercial newsfeed
entries. Only a very small fraction of content was initially
posted by strangers (9.1%). Content from strangers may appear
in the personal newsfeed in case that friends interact with it
(e.g. attach likes or comments).
Fig. 8. Content type
internal or external pages as well as media such as photos
or videos. In general, publishing content is not very popular.
36.37% of the users who viewed at least 100 posts during the
observation period did not post anything. We excluded them
from further content generation evaluations.
Fig. 9. Content posting targets
Fig. 10. Authors of newsfeed entries; red dots mark the averages
Figure 8 shows the popularity of the three kinds of content
uploads. The main finding is that the average number of posts
per week is extremely diverse with respect to different users.
The relative frequency of sharing content can be represented
by a long tailed distribution. For example, we observed users
to share more than 200 links per week on average.
However, the overwhelming majority only posts very few
items. Our FPA users created on average 4.36 posts per week.
Most frequently, they shared already existing content amongst
others (2.43 times per week). Status updates and photo and
video uploads happen less often. On average, 1.57 Status
updates and 0.35 photos have been posted.
Beside the own profile, users can also leverage other chan-
nels to post content. Figure 9 shows what type of content
is posted on the own profile, at a friend’s profile or on a
group’s newsfeed. The overwhelming majority of Links are
shared on the own Timeline and most photos and videos are
published there as well. However, elaborating details regarding
status update posts depict different patterns. Facebook invites
users to send birthday congratulations via e-mail notification
and provides a dedicated page for this purpose. The the result
is that the majority of status updates has been published on
The fraction of friends appearing in the newsfeed is critical
for Facebook as a service that allows users to stay in touch
with the whole set of friends. The intuitive assumption is that
the fraction of friends that contributes to the newsfeed of users
decreases with an increasing set of friends. This assumption
is based on the facts that an increasing set of friends means
a bigger set of stories for Facebook to choose for including
into the Timeline while users only spend a limited amount of
attention to the newsfeed.
Figure 11 shows the linear regression on the size of the set
of friends versus the fraction of friends in the newsfeed. It
shows both: that the decreasing assumption holds as well as
that the relation is not very strong (-0.32). Our interpretation
is that Facebook tries to include as many friends as possible
into the Timeline.
Some users with the huge set of more than 700 friends
still see content of more than 50% of their contacts in their
newsfeed. This leads to a huge amount of newsfeed entries and
suggests that Facebook scales the number of content items in
the newsfeed according to the attention that it receives.
Most newsfeed entries are very fresh until they are displayed
(Figure 12): 84.79% are not older than 24 hours and 25.77%
0.000.050.100.150.100.250.501.002.005.0010.0025.0050.00100.00200.00Mean number of actions per weekFraction of usersAction Photo/video upload Status update ShareStatus update Share Photo/video upload0.000.250.500.751.00Target Friend Group Own profilellllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllPageFriendStranger0.000.250.500.751.00Fraction of viewed newsfeed entriesType of authorFig. 11. Relation between the total number of friends and the fraction of
friends appearing in the newsfeed (linear regression)
Fig. 13. The time that newsfeed entries stay in the browser viewport with
respect to the authors of entries
diverse checking time than others. While there is a peak at
1.5 seconds, there are is also a higher value at 60 seconds
compared with posts from friends or pages.
Fig. 12. Age of newsfeed posts until being displayed in hours
are created less than one hour before. However, a small
fraction of entries is very old: 4.02% are older than 7 days
1.73% are older than 30 days. One reason for very old content
to appear or reappear in the newsfeed are friends liking or
commenting old content.
C. Content Consumption
In this Section, we provide insights into the content con-
sumption habits of the FPA users. We first evaluate how long
different types of newsfeed entries stay in the viewport of the
browser before being clicked. This gives an idea about how
much effort FPA users invest into the decision which content
they view. We then evaluate how many newsfeed entries have
been viewed on average per day to estimate the amount of
attention a user pays to the newsfeed. Finally, we examine the
types of accessed content to allow comparing the posted with
the viewed content.
Figure 13 shows the time a newsfeed entry stays in the
browser viewport before being clicked. This information il-
lustrates the time investments of users to check a certain
entry. Most users invest between one and ten seconds (average
9.5s) to decide whether to click on an entry or not. This is
valid for all types of entries independent from the authorship.
Very interesting is that posts from commercial pages receive
a similar attention than posts from friends or strangers (9.8s
vs. 9.1s). However, posts from strangers cause a slightly more
Fig. 14. Distribution (Histogram) of the average number of newsfeed entries
that have been viewed by FPA users during the observation period; each bar
indicates the fraction of users viewing the respective average number of posts
Fig. 15. Number and fraction of newsfeed entries that are viewed by FPA
users
On average, users view 43 posts per day. A histogram that
allows to estimate the distribution can be found in Figure
14. Figure 15 shows the composition of newsfeed entry
views. The biggest fraction of viewed posts consists of shared
links (41.76%), photos (27.34%) and status updates (16.77%).
0.000.250.500.751.00101001000Number of friendsFraction of friends in newsfeed0.00.20.40.60,1125103060120300Viewing time [s]DensityTypeStrangersFriendsPages0.000.020.040.060.081025501002505001000Average number of read newsfeed−entries / dayFraction of users1.3%27.34%0.91%41.76%1.11%16.77%4.18%4.14%0.04%1.71%0.75%Suggested postOthersAdded photos to albumPost to wallFacebook Graph APIYoutubeVideoEventStatus updatePhotoShared link0e+002e+054e+056e+05Number of viewed entriesType of entryConsidering the authorship of posts, it is surprising for us that
the clicked shares of commercial posts roughly equal those
of friends or strangers. FPA users seem to accept commercial
newsfeed posts equally as regular news beside user-generated
content.
pages that represent companies or prominent persons such
as actors or musicians. In Figure 17, we further distinguish
amongst friend’s, friend-of-friend’s and stranger’s profiles as
well as between liked and unliked professional pages. FPA
users visit on average 33.51% pages of friends, 30.19 % ’un-
liked’ professional pages 15.32% pages of friend-of-friends,
11.22 % stranger’s pages and 9.76 % liked professional pages.
B. Communication with Friends
Facebook is widely known as a tool to communicate with
friends. To understand this communication amongst friends,
we elaborate the two-sided functionalities. Figure 18 shows
the percentages of friends that have been communicated with
during the observation period by using a certain communica-
tion function. Since this analysis is affected by a too short
observation time, we only included data from 714 users who
participated for more than four weeks in our study.
Fig. 16. Number of comments and likes of newsfeed entries
Figure 16 shows the long tailed distributions of the number
of comments, attached to newsfeed entries. This long tailed
distribution shows the number of comments and likes to be
extremely disparate amongst FPA users. On average, they like
roughly 4% and comment 1% of all newsfeed posts.
VII. COMMUNICATION PATTERNS
In this Section, we provide insights into communication
patterns of FPA users. We first separately evaluate the user
profile views as such representing the most popular two-sided
communication functionality. In case of viewing user profiles,
the profile owners are information sender and the user who is
accessing the profile is the information receiver.
A. User Profile Access
Fig. 17.
distinguish professional pages in liked and not liked (unliked) pages
Profile page access with respect to the social graph distance; we
Profiles in Facebook can be classified into two major
categories: profiles of individuals and profiles of professional
Fig. 18. Percentage of friends with whom the FPA users communicate with
respect to the communication function; red dots mark averages
With outstanding advance, the most popular type of commu-
nication between friends is viewing newsfeed entries of each
other, followed by clicking on shared links, viewing profiles
and liking content. On the other side of the spectrum, least
popular communication functions are poking, timeline posts
and commenting. Excluding the extreme cases of poking and
viewing newsfeed entries, the most popular functions are those
which imply the lowest commitment of the acting user.
Both poking and viewing newsfeed entries are exceptional
cases for different reasons. Poking is exceptional because it
is only intensively used by a very small fraction of users and
the newsfeed is arranged by Facebook’s algorithms without an
explicit choice of the users. Facebook shows newsfeed entries
of friends in case of communicating with them using any
other function. The set of friends, appearing in the newsfeed,
contains all other sets in Figure 18 almost completely (98%).
Thus the majority of FPA users communicates with only a
minority of friends. This is especially true for users with more
than 80 friends (Figure 11: more dots are below the 50%
marker than above).
VIII. DYNAMICS IN USER BEHAVIOR ON FACEBOOK
The social networking phenomena has recently appeared
and the idea still disseminates amongst world’s population.
0.000.050.100.151e+011e+031e+05# Comments/likesFraction of entriesType: CommentsLikesllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0.000.250.500.751.00FriendFriend of friendStrangerLiked pageUnliked pageShow newsfeed-entryShow timeline-entryCommentVisit profileLikeClick shared linkPokePost to timelineSend message0,05%0,1%0,25%0,5%1%2,5%5%10%20%40%65%100%Percentage of friends that was communicated withType of communicationThe establishment of best practices as well as the process of
users to learn how to use social networking tools like Facebook
is an ongoing process. Furthermore, Facebook is permanently
working hard to improve the service. Thus, usage patterns
evolve over time and examining user behavior in the field of
social networking means to examine a quickly moving target.
Fortunately for us, Facebook encloses an activity log into
user profiles. It contains all actions of many categories that
users have performed, starting from the day when a user is
registering her account at Facebook. Our tool, FPA, is able
to read this information. To show the development of usage
patterns, we compare the popularity of the seven most popular
activities on Facebook per year in Figure 19.
The evaluation of our dataset yielded several different
findings. We summarize them in as follows:
• Sessions in Facebook are shorter and less frequent than
assumed in the literature. In particular, very long sessions
are missing.
• The newsfeed is the most intensively used function of
Facebook.
• Content contribution is very disparate. A few users con-
tribute a major share of content.
• FPA users consume many items in a short time per day
(average: 43 items in 6:44 minutes).
• Shared content in Facebook is very fresh. 84.79% of all
posts are not older than 24 hours until being shown to
the recipients.
• The probability of a commercial newsfeed entry to be
viewed roughly equals those of friend’s posts in average.
• User behavior in Facebook is changing at the scale of
years. While low effort actions, such as likes and reshares,
recently became more popular, the contribution of photos,
status updates and comments is decreasing.
• Facebook became mature and stable. This is reflected
not only by decreasing user growth rate but also by
decreasing establishment of new connections amongst the
existing set of users. Users discover fewer new people to
add as friend.
Fig. 19. Comparison of Facebook usage from 2009 till 2014
This plot strikingly showcases the maturity of Facebook
and its decreased growth rates. The fraction of friend-adding
actions dropped from year to year. This indicates that the
process of new friends joining the network as well as the es-
tablishment of friendship connections converged to the natural
social dynamics in the society.
Also noticeable is that the share of actions which require
little effort from users increases: Likes and sharing of content
recently became much more popular than in 2009. The fraction
of sharing actions increased by factor 4.62 from 2009 till 2014.
Accordingly, the fraction of comment, status update actions
and photo uploads decreased.
IX. SUMMARY AND CONCLUSION
In this paper, we presented a study on user behavior in
Facebook, based on data from 2,071 participants. We elabo-
rated the session durations, the average number of sessions
per day and the function usage. The goal was to examine how
intensive users use Facebook and to determine which is the
dominating function of Facebook. We further evaluated the
newsfeed and depicted what kind and how much information
is shared amongst which actors. Since Facebook is widely
known as a tool to communicate with friends, we checked
this assumption by explicitly elaborating how often the study
participants communicated with their friends using a certain
functionality. Finally, we elaborated the user behavior from
2009 till 2014 to understand the recent development.
We conclude from these observations that users recently
seem to use Facebook with a higher speed and lower effort
than before, preferring quick actions with low commitment
(e.g. likes and reshares). Also, users prefer extremely fresh
content. As a consequence, alternative OSN architectures, such
as P2P-based OSNs (e.g. [9], [18], [23], [6], [19]), could be de-
signed in a lightweight way without the burden to persistently
store stale content in large user profiles. Because of their low
storage overhead, the large fraction of shared (external) links
in the newsfeeds supports the idea of small user profiles, too.
Furthermore, focus of alternative OSN architectures should be
brought on dynamic environments, caused by short session
durations.
This work has also highlighted the dynamics in user behav-
ior at a scale of years. We assume both technological influ-
ences, such as advances in the sector of mobile computing, as
well as the social reasons, e.g. learning curves of users and
privacy discussions, to be drivers of dynamics in user behavior.
User behavior in OSNs thus should be studied while being
aware of dynamics and old user models should be carefully
used to evaluate novel systems.
Surprisingly for us, users spend a major share of their
attention and time with commercial pages. The probability of
a commercial newsfeed entries to be viewed roughly equals
those of friend’s posts (does not hold for a small set of close
friends). Thus, Facebook seems to be successful to target
the recipients of commercial news and it seems to insert a
compatible amount of commercial content into the newsfeed.
n = 1428n = 960n = 2597n = 1574n = 2668n = 4962009201020112012201320140.000.250.500.751.00Share of the action in the activity logYearActionCommentLikeNew friendPhotoShareStatus−UpdatePost to timeline[24] Thorsten Strufe. Profile popularity in a business-oriented online social
network. In SNS, 2010.
[25] Ganesan Velayathan and Seiji Yamada.
Investigating user browsing
behavior. In WI-IAT. IEEE, 2007.
[26] Harald Weinreich, Hartmut Obendorf, Eelco Herder, and Matthias
Mayer. Off the beaten tracks: exploring three aspects of web navigation.
In WWW, 2006.
X. ACKNOWLEDGEMENTS
This work has been co-funded by the German Research
Foundation (DFG) in the Collaborative Research Center (SFB)
1053 ’MAKI – Multi-Mechanisms-Adaptation for the Future
Internet.
REFERENCES
[1] News Feed FYI: A Window Into News Feed. https://www.facebook.com/
business/news/News-Feed-FYI-A-Window-Into-News-Feed. Accessed:
2014-11-23.
[2] Lars Backstrom, Eytan Bakshy, Jon M Kleinberg, Thomas M Lento,
and Itamar Rosenn. Center of attention: How facebook users allocate
attention across friends. ICWSM, 2011.
[3] Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. The
role of social networks in information diffusion. In WWW. ACM, 2012.
[4] F. Benvenuto, T. Rordrigues, M. Cha, and V. Almeida. Characterizing
user behavior in online social network. IMC, 2009.
[5] S. Buchegger, D. Schioberg, L. Vu, and A. Datta. Peerson: P2p social
networking - early experiences and insights. SNS, 2009.
[6] Sonja Buchegger, Doris Schiöberg, Le Hung Vu, and Anwitaman Datta.
PeerSoN: P2P Social Networking - Early Experiences and Insights. In
Proceedings of the Second ACM Workshop on Social Network Systems
Social Network Systems 2009, co-located with Eurosys 2009, Nürnberg,
Germany, March 31, 2009.
[7] Salvatore A. Catanese, Pasquale De Meo, Emilio Ferrara, Giacomo
Fiumara, and Alessandro Provetti. Crawling facebook for social network
analysis purposes. In WIMS, 2011.
[8] A. Cutillo, R. Molva, and T. Strufe. Safebook: Feasibility of transitive
cooperation for privacy on a decentralized social network. In WoWMoM,
2009.
[9] Leucio-Antonio Cutillo, Refik Molva, and Thorsten Strufe. Safebook:
a Privacy Preserving Online Social Network Leveraging on Real-Life
Trust. IEEE Communications Magazine, 2009.
[10] L. Gyarmati and T.A. Trinh. Measuring user behavior in online social
networks. Network, IEEE, 2010.
[11] J. Jiang, C. Wilson nad X. Wang, P. Huang, W. Sha, Y. Dai, and
B. Y. Zhao. Understanding latent interactions in online social network.
IMC’10, 2010.
[12] Jing Jiang, Christo Wilson, Xiao Wang, Wenpeng Sha, Peng Huang,
Yafei Dai, and Ben Y Zhao. Understanding latent interactions in online
social networks. ACM Transactions on the Web (TWEB), 2013.
[13] David Koll, Jun Li, and Xiaoming Fu. Soup: An online social network
by the people, for the people. In Middleware, 2014.
[14] Jiali Lin, Zhenyu Li, Dong Wang, Kavé Salamatian, and Gaogang Xie.
Analysis and comparison of interaction patterns in online social network
and social media. In ICCCN, 2012.
[15] Pin Luarn, Jen-Chieh Yang, and Yu-Ping Chiu. The network effect on
information dissemination on social network sites. Computers in Human
Behavior, 2014.
[16] Pasquale de Meo, Emilio Ferrara, Fabian Abel, Lora Aroyo, and Geert-
Jan Houben. Analyzing user behavior across social sharing environ-
ments. ACM Trans. Intell. Syst. Technol., 5(1), January 2014.
[17] Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P Gummadi,
and Alan Mislove. Understanding and specifying social access control
lists. In SOUPS, 2014.
[18] Rammohan Narendula, Thanasis G Papaioannou, and Karl Aberer. A
decentralized online social network with efficient user-driven replication.
In PASSAT. IEEE, 2012.
[19] Thomas Paul, Antonino Famulari, and Thorsten Strufe. A survey on
decentralized online social networks. Computer Networks, 2014.
[20] Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer,
and Thorsten Strufe. C4ps-helping facebookers manage their privacy
settings. In Social Informatics. Springer, 2012.
[21] F. Schneider, A. Feldmann, B. Krishnmurthy, and W. Willinger. Un-
derstanding online social network usage from a network perspective.
IMC’09, 2009.
[22] Mehrdad Zaker Shahrak, Shahriar Mohammadi, and Hamid Safarpour.
Middle east user navigation in online social networks and interactions
in e-commerce, an analogy. Advances in Computer Science, 2014.
[23] Nashid Shahriar, Shihabur Rahman Chowdhury, Mahfuza Sharmin,
Reaz Ahmed, Raouf Boutaba, and Bertrand Mathieu. Ensuring beta-
availability in p2p social networks. In ICDCSW, 2013.
|
1308.1746 | 3 | 1308 | 2013-11-26T20:12:51 | Online Decision Making in Crowdsourcing Markets: Theoretical Challenges (Position Paper) | [
"cs.SI",
"cs.CY",
"cs.HC"
] | Over the past decade, crowdsourcing has emerged as a cheap and efficient method of obtaining solutions to simple tasks that are difficult for computers to solve but possible for humans. The popularity and promise of crowdsourcing markets has led to both empirical and theoretical research on the design of algorithms to optimize various aspects of these markets, such as the pricing and assignment of tasks. Much of the existing theoretical work on crowdsourcing markets has focused on problems that fall into the broad category of online decision making; task requesters or the crowdsourcing platform itself make repeated decisions about prices to set, workers to filter out, problems to assign to specific workers, or other things. Often these decisions are complex, requiring algorithms that learn about the distribution of available tasks or workers over time and take into account the strategic (or sometimes irrational) behavior of workers.
As human computation grows into its own field, the time is ripe to address these challenges in a principled way. However, it appears very difficult to capture all pertinent aspects of crowdsourcing markets in a single coherent model. In this paper, we reflect on the modeling issues that inhibit theoretical research on online decision making for crowdsourcing, and identify some steps forward. This paper grew out of the authors' own frustration with these issues, and we hope it will encourage the community to attempt to understand, debate, and ultimately address them.
The authors welcome feedback for future revisions of this paper. | cs.SI | cs |
PO S I T ION PA P E R
Online Decision Making in Crowdsourcing Markets:
Theoretical Challenges
Aleksandrs Slivkins∗
Jennifer Wortman Vaughan†
May 2013
This version: November 2013
Abstract
Over the past decade, crowdsourcing has emerged as a cheap and efficient method of obtaining
solutions to simple tasks that are difficult for computers to solve but possible for humans. The popularity
and promise of crowdsourcing markets has led to both empirical and theoretical research on the design
of algorithms to optimize various aspects of these markets, such as the pricing and assignment of tasks.
Much of the existing theoretical work on crowdsourcing markets has focused on problems that fall into
the broad category of online decision making; task requesters or the crowdsourcing platform itself make
repeated decisions about prices to set, workers to filter out , problems to assign to specific workers, or
other things. Often these decisions are complex, requiring algorithms that learn about the distribution of
available tasks or workers over time and take into account the strategic (or sometimes irrational) behavior
of workers.
to address these challenges in a
As human computation grows into its own field, the time is ripe
principled way. However, it appears very difficult to captur e all pertinent aspects of crowdsourcing
markets in a single coherent model. In this paper, we re flect o n the modeling issues that inhibit theoretical
research on online decision making for crowdsourcing, and identify some steps forward. This paper grew
out of the authors’ own frustration with these issues, and we hope it will encourage the community to
attempt to understand, debate, and ultimately address them.
1 Introduction
Crowdsourcing markets have emerged as a tool for bringing together requesters, who have tasks they need
accomplished, and workers, who are willing to perform these tasks in a timely manner in exchange for
payment. Some crowdsourcing platforms, such as Amazon Mechanical Turk, focus on small “microtasks”
such as labeling an image or filling out a survey, with payment s on the order of ten cents, while other
platforms, such as oDesk, focus on larger jobs like designing websites, for significantly larger payments,
but most share the common feature of repeated interaction. In these markets, workers, requesters, and the
platform itself can all adjust their behavior over time to adapt to the environment. For example, requesters
can choose which workers to target (or filter out) for their ta sks and which prices to offer, and can update
these choices as they learn more about salient features of the environment, such as workers’ skill levels,
∗Microsoft Research. Email: [email protected].
†Microsoft Research. Email: [email protected].
1
the difficulty of their tasks, and workers’ willingness to ac cept their tasks at given prices. In principle, the
platform could also make smarter decisions over time as it learns more about the quality of both requesters
and workers.
Naturally, as crowdsourcing has gained popularity and human computation has grown into its own field,
researchers have taken an interest in modeling and analyzing the problem of online decision making in
crowdsourcing markets. There is plenty of prior work on which to build. Online decision algorithms have a
rich literature in operations research, economics, and several areas of computer science including machine
learning, theory of algorithms, artificial intelligence, a nd algorithmic mechanism design. A large portion
of this literature is concerned with the tradeoff between exploration (obtaining new information, perhaps
by sacrificing near-term gains) and exploitation (making optimal decisions based on the currently available
information). This tradeoff is often studied under the name multi-armed bandits; a reader can refer to Cesa-
Bianchi and Lugosi [14], Bergemann and V alim aki [7], Gittins et al. [26], and Bubeck and Cesa-Bianchi [11]
for background and various perspectives on the problem space. Another (somewhat overlapping) stream of
work concerns dynamic pricing and, more generally, revenue management problems; see Besbes and Zeevi
[8] for an overview of this work in operations research, and Babaioff et al. [3] for a theory-of-algorithms
perspective. Further, there is extensive literature on online decision problems in which all information per-
tinent to a given round is revealed, either before or after the algorithm makes its decision for this round; see
Borodin and El-Yaniv [10], Buchbinder and Naor [13], and Cesa-Bianchi and Lugosi [14] for background.
Despite the vast scope of this existing work, crowdsourcing brings an array of domain-specific chal-
lenges that require novel solutions. To address these challenges in a principled way, one would like to
formulate a unified collection of well-defined algorithmic q
uestions with well-specified objectives, allowing
researchers to propose novel solutions and techniques that can be easily compared, leading to a deeper un-
derstanding of the underlying issues. However, it appears very difficult to capture all of the pertinent aspects
of crowdsourcing in a coherent model. As a result, many of the existing theoretical papers on crowdsourcing
propose their own new models. This makes it difficult to compa re techniques across papers, and leads to
uncertainty about which parameters or features matter most when designing new platforms or algorithms.
There are several reasons why developing a unified model of cr owdsourcing is difficult. First, there is
a tension between the desire to study models based on existing platforms, such as Mechanical Turk, which
would allow algorithms to be implemented and tested immediately, and the desire to look ahead and model
alternative platforms with novel features that could potentially lead to improved crowdsourcing markets
further down the line. A plethora of different platform designs are possible, and different designs lead to
both different models and different algorithmic questions.
Second, even after a model of the platform has been determined, one must take into account the diversity
of tasks and workers that use the platform. Some workers may be better at some tasks than others, and may
find some tasks harder than others. It is natural to take this d iversity into account when designing algorithms
(especially for a problem like task assignment), but the way in which this diversity is modeled may impact
the choice of algorithm and the theoretical guarantees that are attainable.
Third, crowdsourcing workers are human beings, not algorithmic agents (with the possible exception of
spambots, which bring their own problems). They may act strategically, maximizing their own welfare in
response to the incentives provided by the requesters and the platform. Taking into account this strategic
behavior is essential. Moreover, workers also may act in ways that are even less predictable and seemingly
irrational. As just one example, empirical studies have shown that workers may not know their own costs of
completing a task, and are susceptible to the anchoring effect in which they judge the value of a task based
on the first price they see (see Mason and Watts [43], Mason and Suri [42], Yin et al. [65] and the literature
reviews therein). One must be aware of these nuances when modeling worker behavior.
This paper offers a detailed reflection on the modeling issue s that inhibit theoretical research on repeated
decision making in crowdsourcing. Our goal is not to offer a single unified model, but to raise awareness of
2
the issues and spark a discussion in the community about the best ways to move forward. To this end, we
identify a multitude of modeling choices that exist, and describe a few specific models that appear promising
in that they potentially capture salient aspects of the problem.
A note on our scope. There have been some recent empirical or applied research projects aimed at devel-
oping online decision making algorithms that work well in practice on existing crowdsourcing platforms,
primarily for the problems of task assignment and label aggregation (see, for example, Chen et al. [16],
Ipeirotis et al. [31], and Wang et al. [62]). While it is of course valuable for anyone interested in theoretical
models of crowdsourcing to be aware of related empirical advances, we do not attempt to provide a complete
survey of this work here.
A similar attempt has been made to categorize future directions of crowdsourcing research within the
human-computer interaction and computer-supportive cooperative work communities [36]. While their pa-
per discusses many of the same broad problems as ours (such as quality control, platform design, and
reputation), the research agenda they lay out is heavily focused on the high-level design of the technical and
organizational mechanisms surrounding future crowd work systems, while we focus more specifically on
low-level modeling and algorithmic challenges for online decision making.
2 Informal problem statement
Let us start with an informal and very general description of the class of problems that fall under the umbrella
of online decision making in crowdsourcing markets. There are three parties: workers, requesters, and the
crowdsourcing platform. Over time, requesters submit tasks to the platform. Workers get matched with
requesters, perform tasks, and receive payments. Workers and requesters may arrive to the platform and
leave over time. Some workers may be better than others at some tasks; some tasks may be more difficult
than others for some workers. Some workers may enjoy some tasks more than others. All parties make
repeated decisions over time. All parties can learn over time, which may help them in their decision
making. All decision makers receive partial feedback: they see the consequences of their decisions, but
typically they do not know what would have happened if they had made different decisions. Workers and
requesters can behave strategically, so their incentives need to be taken into account. The problem is
to design algorithms for decision making, on behalf of the platform, the requesters, or perhaps even the
workers.
We can think about this setting from the point of view of each of the three parties, who face their own
choices and have differing motivations and goals:
• Requesters can choose the maximal price they are willing to offer for a given task, and specify any
budget constraints that they have. They may also be able to choose which prices to offer to given
(categories of) workers for given (categories of) tasks. Further, they may be able to choose which
(categories of) workers they are willing to interact with, and which instances of tasks to assign to each
(category of) worker. The utility of the requester is typically (an increasing function of) the value that
he obtains from completed work minus the price that he has to pay for this work.
• The platform may match (subsets of) requesters to (subsets of) workers. In principle, the platform
may also be able to modify the offered prices, within constraints specified by the requesters, and to
determine how to charge requesters and/or workers for their use of the platform. In the long run,
the platform cares about maximizing long-term revenue. In the short term, the platform may care
about keeping workers and requesters happy to attract more business, especially in the presence of
competing platforms.
3
• Workers can decide whether to accept a task at a given price, and how much effort to put into it. They
may be able to choose between (categories of) tasks, and may be asked to provide some information
such as their interests, qualifications, and asking prices. Workers care about the amount of money that
they earn, the cost of their labor (in terms of time or effort), and perhaps the amount of enjoyment
they receive from completing tasks.
As parties interact over time, they may be able to learn or estimate workers’ skill levels, how much
workers value their effort and time, the difficulty of tasks,
and the quality level of particular workers on
particular tasks.
We focus on two natural versions of the problem: requester-side and platform-side.1 The requester-side
problem is to design a mechanism which makes repeated decisions for a specific requester. The platform-
side problem is to design a mechanism which makes repeated decisions for the platform. Both versions
should take into account realistic constraints and incentives of workers and requesters.
3 Possible modeling choices
To study and understand any particular aspect of repeated decision making for crowdsourcing markets,
one must first determine a model or framework in which to work.
To date, most theoretical papers on
crowdsourcing have proposed their own models, which are often hard to compare, and with good reason;
one could come up with any number of valid models, and each has its own appeal. However, we would
argue that in order to extract and solve the fundamental issues that are present in any crowdsourcing market,
one must be keenly aware of the (implicit or explicit) modeling choices they make, and the extent to which
their algorithmic ideas and provable guarantees are sensitive to their modeling assumptions — essentially
how robust results are to modifications in the model.
In this section, we identify a variety of modeling choices for repeated decision making in crowdsourcing,
some of which have been discussed in prior work and some of which have not. We break these choices
roughly into five categories: task design, platform design, quality of work, incentives and human factors,
and performance objectives, though other categorizations are possible.
Task design. A wide variety of tasks can be crowdsourced. In many tasks, such as translation [66], audio
transcription [40], image/video analysis [61, 46], or trip planning [67], the workers’ output is unstructured.
On the other hand, in many applications currently deployed in the Internet industry, the workers’ output
has a very specific, simple structure such as a multiple-choi ce question or a free-form labeling question. In
particular, most tasks that the assess relevance of web search results are structured as multiple-choice ques-
tions. The output structure (or lack thereof) determines whether and how workers’ output can be aggregated.
Below we survey some possibilities in more detail.
• Multiple-choice questions. The simplest structure is a binary question (Is this a correct answer? Is
this spam?). Alternatively, a question can include more than two options (Which of these web search results
is more appropriate for a given query? Which of these categories is more appropriate for this website?)
or allow workers to submit more than one answer when appropriate. Further, the possible answers may be
numeric or otherwise ordered (What age group does this person belong to?), in which case the similarity
between the answers should be taken into account.
• Free-form labeling. In image labeling and various classification tasks, a worker may be allowed to
submit arbitrary labels or categories. A worker may be allowed to submit more than one label for the same
task. Some task designs may include a list of prohibited labels so as to obtain more diverse results.
1 In principle, one could also consider the decision making problems faced by workers. This area is still largely unexplored and
could be a source of interesting research questions. However, we do not consider it here.
4
• Rankings and weights. Some tasks strive to compute more complex structures such as rankings or
relative weights for a given pool of alternatives [47, 41]. Each worker may be asked to provide either a full
ranking or weight vector or only a comparison between a given pair of alternatives.
Platform design. All interaction between workers and requesters takes place in the context of a particular
crowdsourcing platform. The platform designer controls the way in which requesters and workers may
interact. In modeling crowdsourcing markets, one may wish to model the features of a specific existing
platform (such as Amazon Mechanical Turk, oDesk, or TaskRabbit) or explore alternative platform designs
that may lead to improved crowdsourcing markets in the future.
In either case, one must consider the
following modeling issues.
• Selection of workers. Does the platform allow requesters to limit their tasks to specific (categories of)
workers, and if so, how? Possibilities range from coarse platform-defined categories of workers (e.g., fil-
tering by demographic information or feedback rating/reputation) to allowing requesters to specify arbitrary
workers by worker ID.
• Selection of tasks. How does the platform allow workers to select tasks? Does a worker see all
offerings that are currently in the market? If so, how are they sorted? Alternatively, the platform could limit
the options presented to a given worker. When the task(s) from a given requester are offered to a given
worker, does the platform allow the requester to restrict which offerings from other requesters this worker is
exposed to?
• Feedback to the requester. What is the granularity of feedback provided to a given requester by
the platform? In particular, does the platform expose the workers’ performance by individual IDs or only
coarse categories? Does the platform expose some or all of the workers’ attributes? Does the platform
expose workers’ performance for other requesters? If a worker views a task but ultimately does not decide
to complete it, does the requester of that task learn that it was viewed?
• Temporal granularity. How often does the platform allow a requester to adjust its selection prefer-
ences? How frequently does the platform provide feedback to requesters? When is it reasonable to assume
that workers complete a given task sequentially, one at a time, and when is it necessary for a model to allow
multiple tasks to be accepted or completed simultaneously?
• Price negotiation. How do requesters negotiate prices with workers? Typically it is assumed that
requesters post one take-it-or-leave-it price, but this is not the only possibility. Can a requester post different
prices to different workers depending on the workers’ attributes? Can the requester update the price over
time? Alternatively, one could imagine a crowdsourcing platform on which workers communicate minimal
asking prices to the requesters and prices are determined via an auction.
• Payments. How do payments happen? The simplest version is that each worker, upon completion of
a task, receives the posted price for that task. Can a requester specify a payment that depends on the quality
of submitted work? If so, must he declare the exact payment rule up front? In particular, must he commit to
a specific way of determining the quality of submitted work?
• Persistent identities. Does a platform ensure persistent worker identities? How difficult or expensive
is it for a worker to abandon his old identity and create a new one, or to create multiple identities?
• Platform-wide reputation. Does the platform maintain a platform-wide reputation score for each
worker and/or requester? If so, then how exactly is this score defined? What properties of this score are
guaranteed? How are reputations used? How are workers and requesters prevented from manipulating their
own reputations and the reputations of others?
• Qualifying tests. Does the platform allow requesters to require workers to pass a qualification test
5
before being allowed to work for money?
The quality of work. In crowdsourcing environments, both tasks and workers are highly diverse. Naturally
certain workers will be able to complete certain tasks more proficiently than others, yielding higher quality
results, possibly for less effort. Although the difficulty o f a task and the skills of each worker are generally
not known to the platform or requester a priori, they can be learned and refined over time, though this is
made more difficult when the quality of a completed task is not observable or easily measured, or when the
users of the market are themselves changing over time.
• Worker skills and task difficulty levels. Some workers may be better than others at some tasks, and
worse than others at other tasks.
Ideally, an online algorithm should learn estimates of workers’ skills
for various tasks over time. However, if each worker has an arbitrary skill level for each task, it will be
impossible to generalize based on observed performance. Therefore, it is desirable to model some type of
structure on tasks or workers. Can the inherent skill level of a given worker be summarized by a single
number? Can the inherent difficulty of a task be summarized by a single number? More generally, how
should one model a given worker’s proficiency at a given task?
• Effort. The quality of a worker’s output may also depend on the amount of effort that the worker puts
into the task. How can one model the effect of varying levels of effort on the quality of completed work?
• Time dependence. Workers’ skills and the quality of their completed work may change over time,
either because of learning (perhaps after completing the same task several times) or changes in effort level.
Additionally, properties of the population of workers (such as the size of the population or their average
quality) may change over time, for example based on time of day.
• Measurable vs. unmeasurable quality. Some tasks, such as labeling an image as containing a face or
not, or answering a multiple-choice question, have objective measures of quality; either the provided answer
is correct, or it is not. For other tasks, such as translating a paragraph from one language to another or
drawing a picture, the quality of the work is more difficult to quantify. For tasks without objective measures
of quality, it is necessary to clearly define criteria on whic h a task will be judged.
• Observable vs. unobservable quality. Even if the response to a task is objectively right or wrong, as is
the case in the image labeling task above, the quality of submitted work may not be immediately observable;
if the requester already knew the correct label, he wouldn’t need the worker to provide it. For many tasks
of this form, it is possible for the requester to assign the same question to multiple workers and estimate the
correct answer by consensus; if a statistically significant
(weighted) majority agrees on some answer, it may
be safe to assume it is correct.
• Availability of gold standard tasks. In some cases in which task quality is not observable, a requester
may have access to a set of “gold standard” tasks for which the
correct answer is known a priori. He can
then use these tasks to bootstrap the process of learning workers’ skill levels (possibly as part of a separate
qualifying test, if allowed).
Incentives and other human factors. Perhaps the most difficult and controversial aspect of forma lizing
the repeated decision making problem in a crowdsourcing environment is modeling the incentives of par-
ticipants. In the economics literature, it is standard to model agents as self-interested and rational utility
maximizers. Empirical research studying the behavior of workers on Mechanical Turk suggests that there
may be difficulties applying such models in crowdsourcing se ttings in which workers do not have a good
sense of their own costs of completing a task and may choose particular tasks based on intangible qualities
such as fun. This leads to another set of modeling issues.
• Rationality. Do workers behave rationally when choosing tasks to complete at particular prices? The
6
standard model from economics is that each worker maximizes a simple well-defined notion of “utility,”
(an increasing function of) payment received minus production cost. However, workers may also take into
account other factors, such as perceived value to society and personal enjoyment. The significance of these
intangible factors in crowdsourcing environments is not well-understood.
• Effort levels. Can the workers strategically alter the amount of effort that they put into a given task,
or is it assumed that workers complete each task to the best of their ability?
• Costs. How do the workers evaluate their internal costs for completing a given task or putting forth
a given level of effort? Is this internal cost even a well-defi ned quantity? It may, in principle, depend on
subjective perceptions (such as value to society and personal enjoyment), and also on the offered prices (the
so-called anchoring effect [59, 43]). Even if the internal cost is a well-defined quantit y, do workers know it?
• Fair price. Workers may have a perception of a “fair price” which is separ ate from their internal costs,
and may be reluctant to accept a task at a lower price [43, 65].
In some cases, workers may be motivated by task-specific fact ors. For
• Task-specific motivations.
example, if a task involves creating content to be posted on the web, workers may be motivated by the
possibility of receiving attention [25].
• Myopia vs. long term strategies. How myopic are the workers? When making a decision about a
particular task, do they take into account the effects of this decision on their future? For example, a worker
may be reluctant to accept highly priced tasks that she is not suitable for, because her bad performance on
these tasks would impact her reputation score with the platform and/or the requester, and therefore affect
what she is offered in the future. For a similar reason, a worker may accept an easy but low paying task, or
exert additional effort. More generally, workers may be able to strategically alter their behavior in order to
affect the long-term behavior of a particular requester or the platform.
• Strategic timing. Can the workers strategically choose the time intervals during which they are online?
If a requester is using an online learning algorithm, some phases of this algorithm may be more beneficial
for workers than others. For example, if a requester starts out with a low price for a given category of tasks,
and then gradually adjusts it upwards, then workers may want to arrive later rather than sooner.
Performance objectives. The statement of an algorithmic problem should include a specific performance
objective to be optimized, perhaps under some constraints.
A requester-side decision making algorithm typically maximizes the utility of this requester, i.e., the
value of completed tasks minus the payment to the workers. If the requester has a pre-specified budget,
the algorithm may instead maximize the value of completed tasks subject to budget constraints. In some
settings it may be feasible to take into account the workers’ happiness, so as to encourage them to stay with
this requester in the future. Specifically, in incentive-co mpatible mechanisms that elicit workers’ production
costs one may wish to optimize the social welfare – the utility of the requester plus the total utility of the
workers – or some other weighted sum of these two quantities.
For platform-side algorithms, the performance objective might take into account the utility of requesters,
workers, and the platform itself. Assuming the platform receives a fixed percentage of every transaction, the
platform’s revenue is simply a fixed fraction of the total pay ment from requesters to workers. One reasonable
objective is a weighted sum of the platform’s revenue and the total utility of the requesters; the choice of
weights is up to the platform. Moreover, the platform may wish to ensure some form of fairness, so that no
requesters are starved out. Further, the platform may have additional forward-looking objectives that are not
immediately comparable with the platform revenue and requesters’ utility, such as the market share and the
workers’ happiness (to encourage workers to stay with the platform in the future).
7
4 Specific directions
Given the abundance of modeling choices identified, it appea rs hopeless to seek out a single unified model
that attempts to capture all aspects of repeated decision making in crowdsourcing markets. Nevertheless,
it may be possible to study, understand, and solve the fundamental issues that arise in this problem space
by carefully choosing specific (families of) models that enc apsulate specific salient features — especially if
we, as a community, keep generalizability and robustness in mind as we make our modeling and algorithmic
choices.
Below we identify and discuss several directions in the problem space that appear ripe for near-term
progress. As it happens, these directions encompass most existing work of which we are aware.
4.1 Adaptive task assignment
One problem of interest is assigning tasks to workers with the goal of maximizing the quality of completed
tasks at a low price or subject to budget constraints. In this task assignment problem, strategic issues are
ignored in order to gain analytical tractability; the model typically does not touch on the way in which
prices are set, and does not include workers’ strategic responses to these prices. It can be studied in settings
in which the quality of work performed is immediately observable or settings in which it is not.
Much of the existing work on task assignment focuses on classification tasks , in which workers are
asked multiple-choice questions to provide labels for images, websites, web search results, or other types
of queries. Then it is natural to assume that the quality of performed work (i.e., the correct label) is not
immediately observable; instead, the requester may have a limited supply of gold standard tasks that can
be used to learn more about workers’ skills. While the problem of inferring the solutions to classification
problems using labels from multiple sources has been studied for decades in various forms [20, 53, 18, 19,
21, 63], here we focus on the problem of choosing workers in an online fashion to provide the labels; this
problem is relatively new.
Existing research on task assignment typically focuses on the problem faced by a single requester. Each
worker charges a fixed and known cost per task completed (whic h may or may not be the same for all
workers), and each task may be assigned to multiple workers in order to the improve the quality of the final
result (as is necessary for classification tasks). The objec tive is to optimize a tradeoff between the total cost
and the quality of the completed tasks, for example, minimizing the total cost of work subject to the quality
being above a given threshold. Partial information on the task difficulty and the workers’ skills may or may
not be known, e.g., in the form of reputation scores or Bayesian priors.
In the most common variant of this problem, workers arrive online and the requester must assign a
task (or sequence of tasks) to each new worker as she arrives. Karger et al. [34, 35] introduced one such
model for classification tasks and proposed a non-adaptive a ssignment algorithm based on random graph
generation along with a message-passing inference algorithm inspired by belief propagation for inferring
the correct solution to each task. They proved that their technique is order-optimal in terms of budget when
each worker finds all tasks equally difficult. Other models of
this form have been studied both for tasks with
observable quality [27] and for classification tasks with un observable quality but access to gold standard
tasks [29]. In these papers, the authors utilize online primal-dual techniques [13, 23] and show that adaptive
task assignment yields an improvement over non-adaptive assignment when the pool of available workers
and set of tasks are diverse.
Alternatively, one might consider a model in which the requester may choose a particular worker or
category of workers to assign to a particular task rather than choosing a task to assign to a particular worker.
This setting already encompasses a variety of specific model s of varying levels of difficulty, but even a
version with a single task assigned multiple times is quite challenging [1].
8
It is worth noting that the models described above are not covered by prior work on multi-armed bandits
(where an algorithm observes a reward after each round and the goal is to maximize the total reward over
time). Essentially, this is because in adaptive task assignment each rounds brings information rather than
reward; the value of this information is not immediately known, and in any case the goal is not to maximize
the total value of collected information but to arrive at high-quality solutions for the tasks.
On the other hand, multi-armed bandit formulations are more directly applicable to versions of adaptive
task assignment in which the quality or utility of each completed task is immediately observable, and the
goal is to maximize the total utility over time. The basic version in which the tasks are homogeneous and
the algorithm chooses among workers has been studied in Tran-Thanh et al. [58]; the novelty here is that
one needs to incorporate budget constraints. This version falls under the general framework that was later
defined and optimally solved in Badanidiyuru et al. [6].
The problem formulations surveyed above are quite different from one another, and the algorithms and
theoretical guarantees are therefore incomparable. There is a lot of room for further work extracting the key
features of the task assignment problem and take-away messages that generalize to a wider range of models
and assumptions.
4.2 Dynamic procurement
Dynamic procurement focuses on repeated posted pricing, as applied to hiring workers in a crowdsourc-
ing market.2 Each interaction between the requester and the workers follows a very simple protocol: the
requester posts a price (for a given task) which can be either accepted or rejected by the workers.
The basic model of dynamic procurement is as follows. In each round, the requester posts a task and a
price for this task, and waits until either some worker accepts the task or the offer times out. The objective is
to maximize the number of completed tasks under fixed constra ints on budget and waiting time. A standard
model of workers’ rationality is assumed. In particular, each worker has a fixed “internal cost” which is
known to the worker but not to the mechanism. A worker accepts a task only if the posted price for this task
matches or exceeds her internal cost. If multiple such tasks are offered at the same time, the worker picks
the one which maximizes her utility (offered price minus the internal cost). The requester typically has a
very limited knowledge of the supply curve, the distribution of workers’ internal costs. However, the supply
curve may be learned over time.
The basic model described above assumes several significant
simplifications as compared to the discus-
sion in Section 3. First, workers cannot strategically manipulate their effort level in response to the offered
prices. Second, workers are myopic, in the sense that they do not take into account the effects of their de-
cision in a given round on the future rounds. A standard way to model myopic workers is to assume that
the requester interacts with a new worker in each round. Third, the supply curve does not change over time.
Finally, the issues of (explicit) task assignment are completely ignored.
Despite all the simplifications, this basic model is very non -trivial. Considerable progress has been
made in a recent line of work [4, 6, 5, 55], but it is not clear whether the current results are optimal. Further,
multiple extensions are possible within the basic model. For instance, the requester may be interested
in multiple categories of tasks, and may offer more complicated “menus” that allow workers to perform
multiple tasks of the same type.3
One can also consider a platform-side version of dynamic procurement, in which the platform is in
charge of setting posted prices for all requesters, under budget constraints submitted by the requesters or
imposed by the platform. The most basic goal would be to maximize the total number of completed tasks
2The term “dynamic procurement ” is from Badanidiyuru et al. [ 4, 6, 5].
3The general result in Badanidiyuru et al. [6, 5] applies to some of these extensions, but the particular guarantees are likely to
be suboptimal.
9
over all requesters, perhaps under some fairness constraints.
It is worth noting that dynamic procurement is closely related to dynamic pricing: repeated posted
pricing for selling items. In particular, dynamic procurement on a budget with unknown supply curve has a
natural “dual” problem about selling items: dynamic pricin g with limited inventory and unknown demand
curve. The latter problem has received some attention (e.g., [8, 3, 9, 6]). Moreover, Badanidiyuru et al. [6]
consider a general framework which subsumes both problems.
Dynamic procurement can be compared to a more general class of game-theoretic mechanisms in which
workers are required to explicitly submit their preferences (see, e.g., Singer and Mittal [54]). Dynamic
procurement is appealing for several reasons (as discussed, for example, in Babaioff et al. [3] and Chawla
et al. [15]). First, a worker only needs to evaluate a given offer rather than exactly determine her internal
costs and preferences; humans tend to find the former task to b e much easier than the latter. Second, a
worker reveals very little information about themselves: only whether she is willing to accept a particular
offer. Third, posted pricing tends to rule out the possibility that workers may strategically alter their behavior
in order to manipulate the requester. However, it is possible that more general mechanisms may achieve
better guarantees in some scenarios.
Behavioral effects.
In order to ensure that results are applicable to real-world markets, apart from ad-
dressing dynamic procurement under the traditional assumptions on workers’ rationality, it is desirable to
incorporate more complicated behaviors, such as perceived fair prices and the anchoring effect. Then the
prices offered by the requester may influence the properties of the worker population, namely change work-
ers’ perception of fair prices and/or production costs. The challenge here is to model such influence in a
sufficiently quantitative way, and design dynamic pricing a lgorithms that take this influence into account.
However, the existing empirical evidence [43, 65] appears insufficient to suggest a particular model to design
algorithms for; further, even surveying the potentially relevant models is not easy. To make progress, there
needs to be a convergence of empirical work on modeling that is geared towards algorithmic applications,
and algorithm design work that is fully aware of the modeling issues.
One can draw upon a considerable amount of prior work on reference prices [60, 49, 32, 57], and some
recent work on dynamic pricing with reference price effects [48, 45]. However, all of this work is usually
in the context of selling items to consumers, and therefore may not be directly applicable to crowdsourcing.
Moreover, Popescu and Wu [48] and Nasiry and Popescu [45] assume a known demand distribution.
In view of the above, one wonders how significant the behavior al effects are in real-life crowdsourcing
markets, and whether it is safe to ignore them in the context of dynamic procurement. To the best of our
understanding, this issue is currently unresolved; while significant behavioral effects have been observed in
specifically designed, very short-term experiments, it is n ot clear whether the significance is preserved in
longer-running systems.
4.3 Repeated principal-agent problem
Consider an extension of dynamic procurement to a scenario in which the workers can strategically change
their effort level depending on the price or contract that they are offered. The chosen effort level probabilisti-
cally affects the quality of completed work, determining a distribution over the possible quality levels. Each
worker is characterized by a mapping from effort levels to costs and distributions over the quality levels; this
mapping, called worker’s type, is known to the worker but not to the mechanism. Crucially, the choice of
effort level is not directly observable by the requester, and cannot (in general) be predicted or inferred from
the observed output. The single-round version of this setting is precisely the principal-agent problem [39],
the central model in contract theory, a branch of Economics.4
4 In the language of contract theory, the requester is the “pri ncipal ” and workers are “agents.”
10
Posted pricing is not adequate to incentivize workers to produce high-quality work in this setting since
workers could exert the minimal amount of effort without any loss of payment. Instead, requesters may
want to use more complicated contracts in which the payment may depend on the quality of the completed
work. Note that contracts cannot directly depend on the worker’s effort level, as the latter is not known to
the requester. The mechanism may adjust the offered contract over time, as it learns more about the worker
population.
To make the problem more tractable, it would probably help to assume that workers are myopic, and
that the quality of completed tasks is immediately observable. As in dynamic procurement, the issues of
task assignment are completely ignored.
Even with these simplifications, the
repeated principal-agent setting described above is significantly
more challenging than dynamic procurement. Essentially, this because the principal-agent problem is a
vast generalization of the simple accept/reject interaction in dynamic procurement. The space of possible
contracts and the space of possible types are much richer than their counterparts in dynamic procurement,
and the mapping from an action to requester’s expected utility is more difficult to characterize and analyze.
In particular, contracts are not limited to mappings from observed outcomes to payments. In principle, the
requester can specify a menu of several such mappings, and allow a worker to choose among them. (It is
well-known that using such “menus” one can maximize the requ ester’s expected utility among all possible
interaction protocols between a single requester and a single worker [39].)
A notable additional complication is that it may be advantageous to reduce the action space – the class of
contracts that an algorithm considers. While reducing the action space may decrease the quality of the best
feasible contract, it may improve the speed of convergence to this contract, and make the platform more user-
friendly for workers. For example, one may want to reduce the number of items in the “menu” described
above (perhaps all the way to single-item menus), reduce the granularity of the quality levels considered,
or restrict attention to human-friendly “monotone” contra cts, in which higher quality levels always result in
higher payments to the workers.
Perhaps surprisingly, the rich literature in contract theory sheds little light on this setting. Most work
focuses on a single interaction with an agent whose type is either known or sampled from a known distri-
bution, see Laffont and Martimort [39] for background. Some papers [2, 44] have studied settings in which
the principal interacts with multiple agents, but makes all its decisions at a single time point. In Sannikov
[51], Williams [64], and Sannikov [52], the principal makes repeated decisions over time, but the requester
interacts with only a single agent who optimizes the long-term utility. The agent’s type is sampled from a
known prior.
Conitzer and Garera [17] consider the basic version of the repeated principal-agent problem — with
single-item “menus” and no budget constraints — adapt sever
al algorithms from prior work to this setting,
and empirically compare their performance. In an ongoing project, Ho et al. [30] design algorithms with
(strong) provable guarantees for the same basic version, drawing on the connection with some prior work
[38, 12, 56] on multi-armed bandit problems. However, their guarantees make significant restrictions on the
action space. We are not aware of any other directly relevant work (beyond the work on dynamic pricing,
which does not capture the unobservable choice of worker’s effort level).
Progress on repeated principal-agent problems might suggest improvements in the design of crowd-
sourcing platforms. In particular, it may inform the platform’s choice of the action space. Currently even
the basic version of the repeated principal-agent problem is not well-understood.
4.4 Reputation systems
Persistent reputation scores for workers may help limit spam and encourage high quality work. Likewise,
persistent reputation scores for requesters may encourage requesters to be more considerate towards the
11
workers. Thus, one may want to design a stand-alone “reputat ion system ” which defines and maintains such
scores (perhaps with the associated confidence levels), as a tool which can be used in different applications
and in conjunction with different higher-level algorithms. Reputation systems may be designed to address
issues related to either moral hazard (when workers’ effort is desirable but not immediately observable) or
adverse selection (when similar-looking workers may be different from one another, and it is desirable to
attract workers who are more skilled or competent), or a combination of the two.
There is already a rich literature on reputation systems for online commerce, peer-to-peer networks,
and other domains; see, for example, Friedman et al. [24], Resnick et al. [50], or the seminal paper of
Dellarocas [22]. However, the basic models for reputation systems have several limitations when applied
to crowdsourcing markets. First, there may be domain-specific design goals that depend on a particular
application or (even worse) on a particular algorithm which uses the reputation scores. Then it may be
necessary to design the reputation system and the platform’s or requesters’ algorithms in parallel, as one
inter-related problem. Second, reputation systems are typically designed separately from task assignment,
which artificially restricts the possibilities and can ther efore lead to sup-optimal designs. Third, whenever
the properties of the worker population are not fully known, there is an issue of exploration: essentially, it
may be desirable to give the benefit of a doubt to some low-rate d workers, so as to obtain more information
about them.
Zhang and van der Schaar [68] and Ho et al. [28] examine the problem of designing a reputation system
specific to crowdsourcing markets, building on the idea of
social norms first proposed by Kandori [33]. So-
cial norms consist of a set of prescribed rules that market participants are asked to follow, and a mechanism
for updating reputations based on whether or not they do. They pair reputation systems with differential
service schemes that allocate more resources or better treatment to those with higher reputation in such a
way that market participants have the incentive to follow the prescribed rules of the market. The social
norms designed by Zhang and van der Schaar [68] and Ho et al. [28] address only the moral hazard prob-
lem, ignoring issues related to adverse selection by making assumptions about known types, and do so on
greatly simplified models that capture some salient feature s of crowdsourcing systems (such as the difficulty
of perfectly evaluating the quality of work and the fact that the population may be changing over time) but
ignore many others (such as the vast diversity of workers and requesters in real systems and the fact that
workers may be learning over time).
There is significant room for further research studying more
realistic models, looking simultaneously
at moral hazard and adverse selection, and better defining wh at an “optimal” reputation system means in
general.
4.5 One common theme: The exploration-exploitation tradeoff
Most models surveyed in this section exhibit a tradeoff between exploration and exploitation, i.e., between
obtaining new information and making optimal per-round decisions based on the information available so
far [14, 7, 11]. This tradeoff is present in any setting with repeated decisions and partial, action-dependent
feedback, i.e., whenever the feedback received by an algorithm in a given round depends on the algorithm’s
action in this round. The explore-exploit tradeoff occurs in many areas, including the design of medical
trials, pay-per-click ad auctions, and adaptive network routing; numerous substantially different models
have been studied in the literature, to address the peculiarities of the various application domains.
An issue which cuts across most settings with explore-exploit tradeoff, including those arising in crowd-
sourcing markets, is whether to use a fixed schedule for explo ration, or to adapt this schedule as new ob-
servations come in.
In the former case, one usually allocates each round to exploration or exploitation
(either randomly or deterministically, but without looking at the data), chooses uniformly at random among
the available alternatives in exploration rounds, and maximizes per-round performance in each exploitation
12
round given the current estimates for the unknown quantities. In the latter case, which we call adaptive ex-
ploration, exploration is geared towards more promising actions, without sacrificing too much in short-term
performance. Often there is no explicit separation between exploration and exploitation, so that in each
round the algorithm does a little of both. Adaptive exploration tends to be better at taking advantage of
the “niceness” of the problem instance (where the particula r notion of “niceness” depends on the model),
whereas non-adaptive exploration often suffices to achieve the optimal worst-case performance.
For a concrete example, consider a simple, stylized model in which an algorithm chooses among two
actions in each round, each action x brings a 0-1 reward sampled independently from a fixed distri bution
with unknown expectation µx , and the goal is to maximize the total reward over a given time horizon of 100
rounds. One algorithm involving non-adaptive exploration would be to try each action 10 times, pick the
one with the best empirical reward, and stick with this action from then on. (However, while in this example
choosing the best action in each exploitation round is trivial, in some settings this choice can be the crux
of the solution [29].) On the other hand, one standard approach for adaptive exploration is to maintain a
numerical score (index or upper confidence bound) for each ac tion, which reflects both the average empirical
reward and the sampling uncertainty, and in each round to pick an action with the highest score.
A closely related issue, endemic to all work on dynamic procurement (and dynamic pricing), is dis-
cretization of the action space (in this case, the price space). Essentially, it is complicated to consider all
possible prices or price vectors, and instead one often focuses on a small but representative subset of thereof.
For example, one may focus on prices that are integer multiples of some a priori chosen ǫ ∈ (0, 1). While
optimizing among the remaining prices is very simple in the most basic setting of dynamic procurement
without budget constraints [37], it can be very difficult in m ore advanced settings [6, 5, 55]. Prior work on
related, but technically different explore-exploit problems [38, 12, 56] suggests that it may be advantageous
to choose the discretization adaptively, depending on the previous observations, so that the algorithm zooms
in faster on the more promising regions of the action space.
Understanding these issues is crucial to the design of algorithms for repeated decision making in crowd-
sourcing systems. At the same time, models designed specific ally for the crowdsourcing domain often
present new algorithmic challenges in explore-exploit learning (as is the case for most work on adaptive
task assignment and dynamic procurement). Techniques designed to address these challenges may be appli-
cable more broadly in other scenarios in which the exploration-exploitation tradeoff arises. (For example,
dynamic procurement for crowdsourcing markets is one of the major motivating examples behind the general
framework in Badanidiyuru et al. [6].)
5 Conclusions
Crowdsourcing is a new application domain for online decision making algorithms, opening up a rich and
exciting problem space in which the relevant problem formulations vary significantly along multiple model-
ing “dimensions.” This richness presents several challeng es. Most notably, it is difficult for the community
to converge on any particular collection of models, and as a result, it is difficult to compare results and
techniques across papers. Additionally, any particular modeling choices have inherent limitations that are
sometimes hard to see. It is not clear a priori which limitations will impact the practical performance of
algorithms, making claims about robustness difficult to ach ieve.
In this paper, we attempt to raise awareness of these issues. Towards this goal, we identify a multitude
of possible modeling choices, and discuss several specific d irections in which progress can be made in the
near future. We hope that this will spark discussion and aide the community as it moves forward.
13
Acknowledgements
We are grateful to Ashwinkumar Badanidiyuru, Yiling Chen, Chien-Ju Ho, Robert Kleinberg, and Ariel
Procaccia for enlightening conversations, pointers to relevant literature, and useful feedback on earlier drafts
of this paper. We thank Yiling Chen, Winter Mason, and Duncan Watts for sharing their thoughts on the
anchoring effect and other behavioral considerations that are often ignored. Additionally, Slivkins wishes to
thank Ittai Abraham, Omar Alonso, Vasilis Kandylas, Rajesh Patel, Steven Shelford, and Hai Wu for many
conversations regarding the practical aspects of crowdsourcing markets.
References
[1] Ittai Abraham, Omar Alonso, Vasilis Kandylas, and Aleksandrs Slivkins. Adaptive crowdsourcing algorithms
for the bandit survey problem. In 26th Conf. on Learning Theory (COLT), 2013.
[2] Moshe Babaioff, Michal Feldman, and Noam Nisan. Combinatorial agency. In 7th ACM Conf. on Electronic
Commerce (EC), 2006.
[3] Moshe Babaioff, Shaddin Dughmi, Robert Kleinberg, and Aleksandrs Slivkins. Dynamic pricing with limited
supply. In 13th ACM Conf. on Electronic Commerce (EC), 2012.
[4] Ashwinkumar Badanidiyuru, Robert Kleinberg, and Yaron Singer. Learning on a budget: posted price mecha-
nisms for online procurement. In 13th ACM Conf. on Electronic Commerce (EC), pages 128 –145, 2012.
[5] Ashwinkumar Badanidiyuru, Robert Kleinberg, and Aleksandrs Slivkins. Bandits with knapsacks: Dynamic
procurement for crowdsourcing. In The 3rd Workshop on Social Computing and User Generated Content, co-
located with ACM EC 2013, 2013.
[6] Ashwinkumar Badanidiyuru, Robert Kleinberg, and Aleksandrs Slivkins. Bandits with knapsacks. In 54th IEEE
Symp. on Foundations of Computer Science (FOCS), 2013.
[7] Dirk Bergemann and Juuso V alim aki. Bandit Problems. In Steven Durlauf and Larry Blume, editors, The New
Palgrave Dictionary of Economics, 2nd ed. Macmillan Press, 2006.
[8] Omar Besbes and Assaf Zeevi. Dynamic pricing without knowing the demand function: Risk bounds and near-
optimal algorithms. Operations Research, 57:1407 –1420, 2009.
[9] Omar Besbes and Assaf J. Zeevi. Blind network revenue management. Operations Research, 60(6):1537 –1550,
2012.
[10] Allan Borodin and Ran El-Yaniv. Online computation and competitive analysis. Cambridge University Press,
1998.
[11] S ´ebastien Bubeck and Nicolo Cesa-Bianchi. Regret Ana lysis of Stochastic and Nonstochastic Multi-armed
Bandit Problems. Foundations and Trends in Machine Learning, 5(1):1 –122, 2012.
[12] S ´ebastien Bubeck, R ´emi Munos, Gilles Stoltz, and Csa ba Szepesvari. Online Optimization in X-Armed Bandits.
J. of Machine Learning Research (JMLR), 12:1587 –1627, 2011.
[13] Niv Buchbinder and Joseph Naor. The design of competitive online algorithms via a primal-dual approach.
Foundations and Trends in Theoretical Computer Science, 3(2-3):93 –263, 2009.
[14] Nicol `o Cesa-Bianchi and G ´abor Lugosi. Prediction, learning, and games. Cambridge Univ. Press, 2006.
[15] Shuchi Chawla, Jason D. Hartline, David L. Malec, and Balasubramanian Sivan. Multi-parameter mechanism
design and sequential posted pricing. In ACM Symp. on Theory of Computing (STOC), pages 311 –320, 2010.
14
[16] Xi Chen, Qihang Lin, and Dengyong Zhou. Optimistic knowledge gradient for optimal budget allocation in
crowdsourcing. In 30th Intl. Conf. on Machine Learning (ICML), 2013.
[17] Vincent Conitzer and Nikesh Garera. Online learning algorithms for online principal-agent problems (and selling
goods online). In 23rd Intl. Conf. on Machine Learning (ICML), 2006.
[18] Koby Crammer, Michael Kearns, and Jennifer Wortman. Learning from data of variable quality. In 19th Advances
in Neural Information Processing Systems (NIPS), 2005.
[19] Koby Crammer, Michael Kearns, and Jennifer Wortman. Learning from multiple sources. Journal of Machine
Learning Research, 9:1757 –1774, 2008.
[20] Philip Dawid and Allan Skene. Maximum likelihood estimation of observer error-rates using the EM algorithm.
Journal of the Royal Statistical Society, Series C (Applied Statistics), 28(1):20 –28, 1979.
[21] Ofer Dekel and Ohad Shamir. Vox populi: Collecting high-quality labels from a crowd.
Learning Theory (COLT), 2009.
In 22nd Conf. on
[22] Chrysanthos Dellarocas. Reputation mechanism design in online trading environments with pure moral hazard.
Information Systems Research, 16(2):209 –230, 2005.
[23] Nikhil Devanur, Kamal Jain, Balasubramanian Sivan, and Christopher Wilkens. Near optimal online algorithms
and fast approximation algorithms for resource allocation problems. In 12th ACM Conf. on Electronic Commerce
(EC), 2011.
[24] Eric Friedman, Paul Resnick, and Rahul Sami. Manipulation-resistant reputation systems. In Noam Nisan, Tim
Roughgarden, Eva Tardos, and Vijay Vazirani, editors, Algorithmic Game Theory. Cambridge University Press,
2007.
[25] Arpita Ghosh and Patrick Hummel. Learning and incentives in user-generated content: Multi-armed bandits with
endogenous arms. In 4th Innovations in Theoretical Computer Science Conference (ITCS), 2013.
[26] John Gittins, Kevin Glazebrook, and Richard Weber. Multi-Armed Bandit Allocation Indices. John Wiley &
Sons, 2011.
[27] Chien-Ju Ho and Jennifer Wortman Vaughan. Online task assignment in crowdsourcing markets. In 26th AAAI
Conference on Artificial Intelligence (AAAI) , 2012.
[28] Chien-Ju Ho, Yu Zhang, Jennifer Wortman Vaughan, and Mihaela van der Schaar. Towards social norm design
for crowdsourcing markets. In 4th Human Computation Workshop (HCOMP), 2012.
[29] Chien-Ju Ho, Shahin Jabbari, and Jennifer Wortman Vaughan. Adaptive task assignment for crowdsourced
classification. In 30th Intl. Conf. on Machine Learning (ICML), 2013.
[30] Chien-Ju Ho, Aleksandrs Slivkins, and Jennifer Wortman Vaughan. Adaptive contract design for crowdsourcing,
2013. Working Paper. Preliminary version to appear in the NIPS ’13 Workshop on Crowdsourcing: Theory,
Algorithms, and Applications.
[31] Panagiotis G. Ipeirotis, Foster Provost, Victor S. Sheng, and Jing Wang. Repeated labeling using multiple noisy
labelers. Data Mining and Knowledge Discovery, 2013.
[32] Gurumurthy Kalyanaram and Russell S. Winer. Empirical generalizations from reference price research. Mar-
keting Science, 14(3), 1995.
[33] Michihiro Kandori. Social norms and community enforcement. The Review of Economic Studies, 59(1):63 –80,
1992.
[34] David Karger, Sewoong Oh, and Devavrat Shah. Iterative learning for reliable crowdsourcing systems. In 25th
Advances in Neural Information Processing Systems (NIPS), 2011.
15
[35] David Karger, Sewoong Oh, and Devavrat Shah. Budget-optimal task allocation for reliable crowdsourcing
systems. To appear, 2013.
[36] Aniket Kittur, Jeffrey V. Nickerson, Michael S. Bernstein, Elizabeth M. Gerber, Aaron Shaw, John Zimmerman,
Matthew Lease, and John J. Horton. The future of crowd work. In 16th ACM Conference on Computer-Supported
Cooperative Work and Social Computing (CSCW), 2013.
[37] Robert Kleinberg and Tom Leighton. The value of knowing a demand curve: Bounds on regret for online
posted-price auctions. In 44th IEEE Symp. on Foundations of Computer Science (FOCS), pages 594 –605, 2003.
[38] Robert Kleinberg, Aleksandrs Slivkins, and Eli Upfal. Multi-Armed Bandits in Metric Spaces. In 40th ACM
Symp. on Theory of Computing (STOC), pages 681 –690, 2008.
[39] Jean-Jacques Laffont and David Martimort. The Theory of Incentives: The Principal-Agent Model. Princeton
University Press, 2002.
[40] Walter S. Lasecki, Christopher D. Miller, Raja S. Kushalnagar, and Jeffrey P. Bigham. Legion scribe: real-time
captioning by the non-experts. In Intl. Cross-Disciplinary Conf. on Web Accessibility (W4A), page 22, 2013.
[41] Andrew Mao, Ariel D. Procaccia, and Yiling Chen. Better human computation through principled voting. In
27th AAAI Conference on Artificial Intelligence (AAAI) , 2013.
[42] Winter Mason and Siddharth Suri. Conducting behavioral research on Amazon’s Mechanical Turk. Behavior
Research Methods, 2012. To appear.
[43] Winter Mason and Duncan J. Watts. Financial incentives and the ”performance of crowds”.
Computation Workshop (HCOMP), 2009.
In
1st Human
[44] Sanjog Misra, Harikesh S. Nair, and Oystein Daljord. Homogenous contracts for heterogeneous agents: Aligning
salesforce composition and compensation. Working Paper, 2012.
[45] Javad Nasiry and Ioana Popescu. Dynamic pricing with loss averse consumers and peak-end anchoring. Opera-
tions Research, 59(6):1361 –1368, 2011.
[46] Jon Noronha, Eric Hysen, Haoqi Zhang, and Krzysztof Z. Gajos. Platemate: crowdsourcing nutritional analysis
from food photographs. In 24th ACM Symp. on User Interface Software and Technology (UIST), pages 1 –12,
2011.
[47] Thomas Pfeiffer, Xi Alice Gao, Yiling Chen, Andrew Mao, and David G. Rand. Adaptive polling for information
aggregation. In 26th AAAI Conference on Artificial Intelligence (AAAI) , 2012.
[48] Ioana Popescu and Yaozhong Wu. Dynamic pricing strategies with reference effects. Operations Research, 55
(3):413 –429, 2007.
[49] Daniel S. Putler. Incorporating reference price effects into a theory of consumer choice. Marketing Science, 11
(3):287 –309, 1992.
[50] Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara. Reputation systems. 43(12):45 –48, 2000.
[51] Yuliy Sannikov. A continuous-time version of the principal-agent problem. In The Review of Economics Studies,
2008.
[52] Yuliy Sannikov. Contracts: The theory of dynamic principal-agent relationships and the continuous-time ap-
proach. In 10th World Congress of the Econometric Society, 2012.
[53] Victor Sheng, Foster Provost, and Panagiotis Ipeirotis. Get another label? Improving data quality using multiple,
noisy labelers. In KDD, 2008.
16
[54] Yaron Singer and Manas Mittal. Pricing mechanisms for crowdsourcing markets. In Intl. World Wide Web Conf.
(WWW), 2013.
[55] Adish Singla and Andreas Krause. Truthful incentives in crowdsourcing tasks using regret minimization mech-
anisms. In 22nd Intl. World Wide Web Conf. (WWW), pages 1167 –1178, 2013.
[56] Aleksandrs Slivkins. Contextual Bandits with Similarity Information. In 24th Conf. on Learning Theory (COLT),
2011. To appear in J. of Machine Learning Research (JMLR), 2013.
[57] Richard H. Thaler. Mental accounting and consumer choice. Marketing Science, 27(1):15 –25, 2008.
[58] Long Tran-Thanh, Sebastian Stein, Alex Rogers, and Nicholas R. Jennings. Efficient crowdsourcing of unknown
experts using multi-armed bandits. In 20th European Conf. on Artificial Intelligence (ECAI) , pages 768 –773,
2012.
[59] Amos Tversky and Daniel Kahneman. Judgment under uncertainty: Heuristics and biases. Science, 185(4157):
1124 –1131, 1974.
[60] Amos Tversky and Daniel Kahneman. Loss aversion in riskless choice: A reference-dependent model. The
Quarterly J. of Economics, 106(4):1039 –1061, 1991.
[61] VizWiz. vizwiz.org: crowdsourcing to answer visual questions for the visually impaired.
[62] Jing Wang, Panagiotis G. Ipeirotis, and Foster Provost. Quality-based pricing for crowdsourced workers. NYU-
CBA Working Paper CBA-13-06, 2013.
[63] Peter Welinder, Steve Branson, Serge Belongie, and Pietro Perona. The multidimensional wisdom of crowds. In
24th Advances in Neural Information Processing Systems (NIPS), pages 2424 –2432, 2010.
[64] Noah Williams. On dynamic principal-agent problems in continuous time. Working Paper, 2009.
[65] Ming Yin, Yiling Chen, and Yu-An Sun. The effects of performance-contingent financial incentives in online
labor markets. In 27th AAAI Conference on Artificial Intelligence (AAAI) , 2013.
[66] Omar Zaidan and Chris Callison-Burch. Crowdsourcing translation: Professional quality from non-professionals.
In 49th Annual Meeting of the Assn. for Computational Linguistics: Human Language Technologies (ACL-HLT),
pages 1220 –1229, 2011.
[67] Haoqi Zhang, Edith Law, Rob Miller, Krzysztof Gajos, David C. Parkes, and Eric Horvitz. Human computation
tasks with global constraints. In CHI, pages 217 –226, 2012.
[68] Yu Zhang and Mihaela van der Schaar. Reputation-based incentive protocols in crowdsourcing applications. In
31st IEEE International Conference on Computer Communications (IEEE Infocom), 2012.
17
|
1204.3799 | 2 | 1204 | 2012-07-04T14:11:12 | Biographical Social Networks on Wikipedia - A cross-cultural study of links that made history | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | It is arguable whether history is made by great men and women or vice versa, but undoubtably social connections shape history. Analysing Wikipedia, a global collective memory place, we aim to understand how social links are recorded across cultures. Starting with the set of biographies in the English Wikipedia we focus on the networks of links between these biographical articles on the 15 largest language Wikipedias. We detect the most central characters in these networks and point out culture-related peculiarities. Furthermore, we reveal remarkable similarities between distinct groups of language Wikipedias and highlight the shared knowledge about connections between persons across cultures. | cs.SI | cs | Biographical Social Networks on Wikipedia
A cross-cultural study of links that made history
Pablo Aragon
David Laniado
Andreas Kaltenbrunner
Yana Volkovich
Barcelona Media Foundation, Barcelona, Spain
{name.surname}@barcelonamedia.org
2
1
0
2
l
u
J
4
]
I
S
.
s
c
[
2
v
9
9
7
3
.
4
0
2
1
:
v
i
X
r
a
ABSTRACT
It is arguable whether history is made by great men and
women or vice versa, but undoubtably social connections
shape history. Analysing Wikipedia, a global collective
memory place, we aim to understand how social links are
recorded across cultures. Starting with the set of biogra-
phies in the English Wikipedia we focus on the networks of
links between these biographical articles on the 15 largest
language Wikipedias. We detect the most central charac-
ters in these networks and point out culture-related pecu-
liarities. Furthermore, we reveal remarkable similarities be-
tween distinct groups of language Wikipedias and highlight
the shared knowledge about connections between persons
across cultures.
Categories and Subject Descriptors
J.4 [Computer Applications]: Social and Behavioural
Sciences—Sociology; G.2.2 [Mathematics of Computing]:
Graph Theory—Network problems
Keywords
Wikipedia, social network analysis, cross language studies
1.
INTRODUCTION
Social network analysis, one of the most studied subjects
in the last decade, has been applied in very different contexts
ranging from online social networks [11], over networks of
fictitious comic characters [1] to animal social networks [5].
Here we present a study about connections of a different
form. We use neither self-reported nor observed relations
nor interactions inferred from activity logs. We focus on the
links between notable humans as they are recorded in col-
lective memory. To extract these connections and build the
corresponding networks we use different language versions of
Wikipedia, which can be seen as global memory place [12].
We exploit direct links between biographic articles as ev-
idence of relations between the corresponding persons, and
.
build biographical social networks for the 15 largest language
versions of Wikipedia. We investigate these networks sepa-
rately and analyse their similarity. We furthermore extract
the most important persons according to several centrality
metrics in these networks. This allows us to analyse and
compare the different language communities over their per-
ception and reporting of connections between notable per-
sons. The visualisation of the shared links present in most
of the different language networks highlights the connections
commonly known across language and culture barriers.
2. RELATED WORK
Social networks analysis on Wikipedia has mainly
exploited editor interactions, either via generating co-
authorship networks [8] or analysing social interactions on
article and user talk-pages [9]. Additionally, co-authorship
has been used to create networks of similar articles [4].
The link structure of Wikipedia articles has been studied
extensively: common features have been found in the net-
work topology of several language versions of Wikipedia [14],
and rankings of the most central entries in the English Wi-
kipedia have been presented [3]. The idea of restricting the
network to articles representing entities of a given type has
been followed in [2], introducing a framework for visualising
links between philosophers in the English Wikipedia.
Different language versions of Wikipedia have been com-
pared to study cultural differences among their communi-
ties [13]. While this has been done mostly by analysing the
behaviour of the editors, here we propose to study differences
and similarities as they emerge from the link structure of the
artifacts created by different communities.
3. DATA EXTRACTION
To obtain a list of articles about persons on the English
Wikipedia, we relied on a dataset from DBpedia1. The
dataset contains links to 296 511 existing English articles,
which we parsed to identify the names of the corresponding
articles in the other 14 language versions of Wikipedia with
the largest number of articles at the moment we extracted
the data (September 8 to 13, 2011).
For each language version we generated a directed network
where nodes represent persons with a biographical Wikipe-
dia article and a node i links to node j if the article of the
person i is linking to the article about person j.
As many Wikipedia articles have alternative names which
redirect to the same article, we had to track these redirects
1
http://downloads.dbpedia.org/3.7/en/persondata_en.nt.bz2
N
K
dmax
Table 1: Properties of the language networks or-
dered by network size: number of (not isolated)
nodes N and edges K, average clustering coefficient
(cid:104)C(cid:105), percentage of nodes in the giant component GC,
average path-length between nodes (cid:104)d(cid:105), reciprocity
r and maximal distance dmax between two nodes in
the network.
lang
en
de
fr
it
es
ja
nl
pt
sv
pl
fi
no
ru
zh
ca
(cid:104)C(cid:105) % GC
0.03
0.05
0.06
0.06
0.06
0.08
0.08
0.07
0.07
0.08
0.07
0.09
0.06
0.17
0.09
(cid:104)d(cid:105)
95% 6.53
94% 6.83
96% 6.11
95% 6.28
97% 6.29
96% 6.47
94% 7.91
94% 6.98
91% 8.27
85% 8.94
87% 7.80
83% 8.31
87% 9.10
91% 7.20
93% 7.14
928 339
260 889
283 453
190 867
169 302
109 081
76 651
85 295
60 745
50 050
44 941
49 303
34 436
44 739
42 321
198 190
62 402
51 811
35 756
34 828
26 155
24 496
23 705
23 085
22 438
18 594
18 423
16 403
11 715
11 027
r
0.17
0.14
0.15
0.14
0.16
0.20
0.18
0.18
0.20
0.16
0.17
0.22
0.10
0.20
0.17
43
33
36
42
36
26
37
45
46
43
30
48
35
32
32
Table 2: The top 25 persons in the English Wiki-
pedia ranked by in-degree. Ranks for out-degree,
betweenness and PageRank in parenthesis.
person
George W. Bush
Barack Obama
Bill Clinton
Ronald Reagan
Adolf Hitler
Richard Nixon
William Shakespeare
John F. Kennedy
Franklin D. Roosevelt
Lyndon B. Johnson
Jimmy Carter
Elvis Presley
Pope John Paul II
Dwight D. Eisenhower
Frank Sinatra
George H. W. Bush
Abraham Lincoln
Bob Dylan
Winston Churchill
Harry S. Truman
Joseph Stalin
Michael Jackson
Elizabeth II
Jesus
Hillary Rodham Clinton
PageRank
(1)
0.00209
(2)
0.00162
(4)
0.00156
(3)
0.00156
(5)
0.00149
(6)
0.00136
(9)
0.00113
(8)
0.00123
0.00131
(7)
0.00108 (11)
0.00113 (10)
0.00063 (24)
0.00083 (18)
0.00095 (14)
0.00056 (28)
0.00096 (13)
0.00089 (16)
0.00055 (30)
0.00092 (15)
0.00099 (12)
0.00089 (17)
0.00042 (51)
0.00074 (19)
0.00068 (20)
0.00063 (25)
out-degree
(107)
89
(710)
51
(205)
74
(103)
90
(26)
119
86
(127)
25 (4203)
(53)
104
(237)
71
(50)
106
(158)
80
(142)
82
(444)
59
(564)
55
(47)
108
(118)
87
(593)
54
(11)
151
(136)
84
(145)
81
(265)
69
(237)
71
52
(665)
38 (1595)
87
(118)
in-
2123
1677
1660
1652
1407
1299
1229
1208
1052
1000
953
948
941
891
882
878
846
835
748
743
723
663
653
572
554
btw.
(1)
(8)
(4)
(2)
(3)
(7)
(63)
(5)
(15)
(12)
(9)
(27)
(11)
(22)
(18)
(19)
(40)
(14)
(10)
(24)
(43)
(34)
(6)
(51)
(32)
Finally, we also analyse the in- and out-degree distribu-
tions and observe heavy-tails, as found in many real-life net-
works, for all language Wikipedias (data not shown).
4.2 Most central persons
In this section we focus on centrality metrics for the above
In Table 2 we present the
defined biographical networks.
top-ranked persons according to the degree centrality for
the English Wikipedia. We also provide results for other
centrality measures together with the corresponding rank-
ings. Betweenness measures the fraction of shortest paths
between other pairs of nodes passing through a given node,
while PageRank gives a measure of the global importance
of nodes, computed recursively putting a larger weight on
incoming connections from central nodes.
Figure 1: Distribution of the number of redirects
per biographical article for the English Wikipedia.
for every person and every language with a script provided
by the Wikimedia Toolserver.2 The number of redirects per
page follows a heavy tailed distribution as can be observed
in Figure 1. The table embedded in the figure lists the 13
persons with the largest number of redirects in the English
Wikipedia. The article about Muammar al-Gaddafi leads
the ranking with 251 different ways of linking towards it,
more than doubling the redirects of Osama bin Laden, the
second ranked person.
4. RESULTS
In this section we study global metrics calculated for the
biographical networks of different languages. We also dis-
cuss rankings based on various definitions of centrality. In
particular, we present the most central (linked) persons in
the different language Wikipedia. Finally, we compare the
similarities between the different language networks.
4.1 Global network statistics
A brief overview of the principal social network measures
for the different language networks is given in Table 1. The
largest network corresponds to the English Wikipedia with
nearly 200, 000 nodes. The second largest, extracted from
the German Wikipedia, is only about one-third as large.
All language networks show very low clustering. The only
outstanding network is the Chinese with a clustering coeffi-
cient of 0.17, which indicates an important structural differ-
ence of the link structure in this language version.
By looking at the link reciprocities we find that it is quite
rare that two persons are mutually connected. One of the
possible causes of this observation may be the presence of
parasocial interactions [6], i.e. one-sided interpersonal rela-
tionships in which one part knows a great deal about the
other, but the other does not. E.g., when a person is influ-
enced by the works of somebody who died decades before.
We see that all networks are well connected, as the per-
centage of nodes in the giant component (GC)3 lies between
85% (Polish) and 96% (French and Japanese).
When calculating the average path length between two
persons in the GC we observe that the largest average dis-
tances are found for the Polish and Russian networks.
2
http://toolserver.org/~dispenser/sources/rdcheck.py
3The GC corresponds here to the largest weakly connected
component. Weakly connected means that there exists at
least a path in one direction between any pair of nodes.
100101102100101102103104105# redirects# articles # redirects per articlePersons with most redirects:Muammar al−Gaddafi 251Osama bin Laden 117Barack Obama 114Jesus 109Elizabeth II 101Eminem 96Joseph Stalin 88Omar al−Bashir 87Genghis Khan 84Pyotr Ilyich Tchaikovsky 84Athelred the Unready 83George W. Bush 80Mary (mother of Jesus) 80Table 3: Top 5 most central persons in the 15 analysed language versions of Wikipedia ranked by betweenness.
lang
en
de
fr
it
es
ja
nl
pt
sv
pl
fi
no
ru
zh
ca
#1
George W. Bush
Adolf Hitler
Adolf Hitler
Frank Sinatra
Michael Jackson
Adolf Hitler
Elvis Presley
Michael Jackson
George W. Bush
Elizabeth II
Barack Obama
Marilyn Monroe
William Shakespeare
#2
Ronald Reagan
George W. Bush
George W. Bush
George W. Bush
Fidel Castro
Michael Jackson
Adolf Hitler
Richard Wagner
Winston Churchill
Pope John Paul II
Adolf Hitler
Adolf Hitler
Napoleon II
Chiang Kai-Shek
William Shakespeare
Adolf Hitler
Che Guevara
#3
Adolf Hitler
Martin Luther King, Jr
William Shakespeare
Pope John Paul II
William Shakespeare
Ronald Reagan
Bill Clinton
Adolf Hitler
Elizabeth II
Margaret Thatcher
Michael Jackson
John F. Kennedy
Kenneth Branagh
Barack Obama
Juan Carlos I
#4
Bill Clinton
Barack Obama
Barack Obama
Michael Jackson
Che Guevara
Yukio Mishima
Joseph Stalin
Ronald Reagan
Michael Jackson
George W. Bush
George W. Bush
Bob Dylan
Elton John
Deng Xiaoping
#5
John F. Kennedy
Frank Sinatra
Jacques Chirac
Elton John
Adolf Hitler
Barack Obama
William Shakespeare
David Bowie
Adolf Hitler
Ronald Reagan
Benito Mussolini
Bill Clinton
Joseph Stalin
Adolf Hitler
Michael Schumacher
Juan Manuel Fangio
We find many American presidents, iconic American musi-
cians, and European leaders during the WW2 period among
the most linked. Interestingly, we observe that Pope John
Paul II appears to be a more central figure than Jesus.
Comparing the number of incoming and outgoing links, we
observe that in-degrees are of an order of magnitude greater
than out-degrees. We explain this phenomenon again by the
presence of the parasocial relations. For betweenness and
PageRank we do not find large differences in the rankings.
The only exception is Shakespeare, whose low betweenness
value can be caused by the low number of out-going links.
Interestingly, Shakespeare’s page is one of the most central
for several languages (see Table 3), but not for English.
In Table 3 we show the most central characters in Wikipe-
dia for the 15 analysed languages ranked by the betweenness
centrality. We observe that most of the presented persons
are known to be (or have been) highly influential in many
aspects. Thus, in these lists we find political leaders, revo-
lutionaries, famous musicians, writers and actors. We note
that political figures such as Adolf Hitler, George W. Bush
or Barack Obama dominate in almost all top rankings. In-
terestingly, William Shakespeare and Michael Jackson are
also among the central figures for several languages.
For many languages we find, however, that the top ranked
persons reflect country specific issues. Thus, for example,
Pope John Paul II is only present in the top five list of the
Italian and Polish Wikipedia, two countries which have a
special tie with this figure.
In the English Wikipedia the
most central figures are former US presidents, while the
Spanish-speaking Wikipedia community marks out Latin
American revolutionaries. The Russian version surprisingly
highlights William Shakespeare and also Kenneth Branagh,
known for several film adaptations of Shakespeare’s plays.
Only the Japanese Wikipedia rankes the author Mishima
prominently, while two Chinese leaders, Chiang Kai-Shek
and Deng Xiaopin, are in the top-5 in the Chinese version.
When looking at these results, it should be taken into ac-
count that there is an Anglo-Saxon bias in the dataset, as
we relied on a list of notable persons extracted from the En-
glish Wikipedia, and persons from other cultures not know
internationally might be missing. In that sense the above
list reflects centrality among persons with at least limited
international notoriety.
4.3 Similarity between languages
In this section we focus on similarities between the net-
works emerging from the different language Wikipedias. We
Table 4: Similarities between the biographical net-
works of different language Wikipedias.
-
-
-
-
-
fr
it
ja
nl no pl pt
fi
ca de en es
-
ru sv zh
.05 .03 .12 .09 .07 .08 .07 .10 .08 .06 .10 .06 .09 .06
.11 .11 .07 .13 .12 .08 .09 .06 .06 .08 .04 .08 .03
.09 .03 .10 .08 .05 .05 .03 .03 .05 .02 .04 .02
.09 .13 .14 .10 .12 .07 .07 .14 .06 .09 .05
.06 .08 .09 .11 .10 .09 .10 .07 .13 .06
.15 .08 .09 .06 .06 .09 .04 .07 .03
.09 .10 .07 .07 .11 .05 .08 .04
.10 .08 .07 .09 .05 .09 .08
.10 .09 .13 .07 .12 .05
.08 .09 .05 .13 .06
.09 .08 .09 .05
.07 .11 .06
.06 .05
.06
ca
de .05
en .03 .11 -
es .12 .11 .09
fi .09 .07 .03 .09
fr .07 .13 .10 .13 .06
it .08 .12 .08 .14 .08 .15 -
ja .07 .08 .05 .10 .09 .08 .09
nl
no .08 .06 .03 .07 .10 .06 .07 .08 .10
pl
pt .10 .08 .05 .14 .10 .09 .11 .09 .13 .09 .09
ru .06 .04 .02 .06 .07 .04 .05 .05 .07 .05 .08 .07
sv .09 .08 .04 .09 .13 .07 .08 .09 .12 .13 .09 .11 .06
zh .06 .03 .02 .05 .06 .03 .04 .08 .05 .06 .05 .06 .05 .06
.06 .06 .03 .07 .09 .06 .07 .07 .09 .08
.10 .09 .05 .12 .11 .09 .10 .10
-
-
-
-
-
-
-
Figure 2: Languages similarity network: every lan-
guage links to the two languages with the largest
similarities according to Table 4.
calculate the similarity for every pair of networks as their
Jaccard coefficient, i.e.
the ratio between the number of
links present in both networks (their intersection) and the
number of links existing in their union. Table 4 shows the
obtained similarity results. For every language row we high-
light the two languages with the largest similarities. The
most similar language is also underlined.
Figure 2 further illustrates these similarities by drawing a
language similarity network. In this network a language A
is connected to another language B if language B is one of
the two most similar to A. Applying the Louvain method,
we divide this graph into three clusters.
In agreement
with [10], we observe that most of the links can be explained
by language-family relations (e.g Romance and Slavic lan-
guages) and geographic or historical ties (e.g. Scandinavian
group, or Russia and Finland). We also find a number of less
obvious connections, e.g. Japanese to Spanish and Finnish
connections which can be found in most of the analysed lan-
guage Wikipedias. Knowledge about these social connec-
tions trespasses cultural barriers and represents part of the
shared global collective memory of our civilisation.
Possible directions for future work include the applica-
tion of the methodology to generate subnetworks of other
kinds of article categories, and a specific study of links
present in most networks but missing only in a few language
Wikipedias.
Finally, the gender gap among Wikipedia editors is a se-
rious concern for the community, and has been related to
the topics covered in the encyclopedia [7]. Our results point
out a very small presence of females also among the most
central persons in the encyclopedic content, suggesting the
link between these two phenomena as an intriguing subject
for future investigation.
Acknowledgements
This work was partially supported by the Spanish Centre for
the Development of Industrial Technology under the CENIT pro-
gram, project CEN-20101037, “Social Media”. Yana Volkovich
acknowledges support from the Torres Quevedo Program from
the Spanish Ministry of Science and Innovation, co-funded by the
European Social Fund.
6. REFERENCES
[1] R. Alberich, J. Miro-Julia, and F. Rossello. Marvel
Universe looks almost like a real social network.
cond-mat/0202174, 2002.
[2] S. Athenikos and X. Lin. The WikiPhil Portal: visualizing
meaningful philosophical connections. J. of the Chicago
Colloq. on Digital Humanities and Comp. Sci., 1(1), 2009.
[3] F. Bellomi and R. Bonato. Network analysis for Wikipedia.
In Proc. of Wikimania, 2005.
[4] R. Biuk-Aghai. Visualizing co-authorship networks in
online Wikipedia. In Proc. of ISCIT’06, 2006.
[5] P. I. Chiyo, C. J. Moss, and S. C. Alberts. The influence of
life history milestones and association networks on
crop-raiding behavior in male african elephants. PLoS
ONE, 7(2):e31382, 2012.
[6] D. Horton and R. Wohl. Mass communication and
para-social interaction: Observations on intimacy at a
distance. Psychiatry, 19(3):215–229, 1956.
[7] D. Laniado, C. Castillo, A. Kaltenbrunner and
M. Fuster-Morell. Emotions and dialogue in a large
peer-production community: the case of Wikipedia. In
Proc. of WikiSym, 2012.
[8] D. Laniado and R. Tasso. Co-authorship 2.0: Patterns of
collaboration in Wikipedia. In Proc. of Hypertext, 2011.
[9] D. Laniado, R. Tasso, Y. Volkovich, and A. Kaltenbrunner.
When the Wikipedians talk: Network and tree structure of
Wikipedia discussion pages. In Proc. of ICWSM, 2011.
[10] H. Liao and T. Petzold. Analysing geo-linguistic dynamics
of the world wide web: The use of cartograms and network
analysis to understand linguistic development in Wikipedia.
Cultural Science, 3(2), 2011.
[11] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and
B. Bhattacharjee. Measurement and analysis of online
social networks. In Proc. of IMC, 2007.
[12] C. Pentzold. Fixing the floating gap: The online
encyclopaedia Wikipedia as a global memory place.
Memory Studies, 2(2):255–272, 2009.
[13] U. Pfeil, P. Zaphiris, and C. Ang. Cultural differences in
collaborative authoring of Wikipedia. JCMC, 12(1):88–113,
2006.
[14] V. Zlati´c, M. Bozicevi´c, H. Stefanci´c, and M. Domazet.
Wikipedias: Collaborative web-based encyclopedias as
complex networks. Physical Review E, 74(1):016115, 2006.
Figure 3: Biographical network of the connections
in at least 13 of the 15 analysed language versions.
Larger version available at http://goo.gl/Lc2Xl.
to Dutch. In fact, Dutch seems to serve as a bridge between
different language and culture groups.
4.4 Links present in most language networks
Finally, Figure 3 depicts the network of connections which
are present in at least 13 of the 15 language Wikipedias4.
The network is relatively small, containing 1663 nodes and
1738 links, but allows to visualise the quintessence of knowl-
edge about biographical connections present in most of the
analysed language communities.
The largest connected component in Figure 3 corresponds
to a cluster of US Presidents which connects over Ronald
Reagan to a cluster of British Premier Ministers. This group
is related through Winston Churchill to a cluster of persons
from WW2’s axis powers. The second largest component
is compound of several clusters related to the music and
entertainment business, and the third one of two clusters of
male and female tennis players connected through Dinara
and Marat Safin. Other large isolated clusters can be found
around such diverse groups as Russian and Chinese political
figures, French presidents, Israeli and Palestinian politicians,
Formula One pilots, World Chess Champions or actresses.
5. CONCLUSIONS
Our results show that biographical connections are record-
ed differently in the distinct language versions of Wikipedia.
Although the global social network measures are largely sim-
ilar for all these networks, the most central persons unveil
interesting peculiarities about the language communities. A
study of similarity reveals that networks are more similar
for geographically or linguistically closer communities. Nev-
ertheless, there also exists a great number of biographical
4The choice of 13 is arbitrary and taken mainly for visual-
ization reasons.
|
1802.05287 | 2 | 1802 | 2018-03-13T14:41:27 | What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? | [
"cs.SI",
"cs.CY"
] | Over the past few years, a number of new "fringe" communities, like 4chan or certain subreddits, have gained traction on the Web at a rapid pace. However, more often than not, little is known about how they evolve or what kind of activities they attract, despite recent research has shown that they influence how false information reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web's information ecosystem. In August 2016, a new social network called Gab was created as an alternative to Twitter. It positions itself as putting "people and free speech first'", welcoming users banned or suspended from other social networks. In this paper, we provide, to the best of our knowledge, the first characterization of Gab. We collect and analyze 22M posts produced by 336K users between August 2016 and January 2018, finding that Gab is predominantly used for the dissemination and discussion of news and world events, and that it attracts alt-right users, conspiracy theorists, and other trolls. We also measure the prevalence of hate speech on the platform, finding it to be much higher than Twitter, but lower than 4chan's Politically Incorrect board. | cs.SI | cs | What is Gab? A Bastion of Free Speech or
an Alt-Right Echo Chamber?
Savvas Zannettou(cid:63), Barry Bradlyn#, Emiliano De Cristofaro†,
Haewoon Kwak+, Michael Sirivianos(cid:63), Gianluca Stringhini†, Jeremy Blackburn‡
(cid:63)Cyprus University of Technology, #Princeton Center for Theoretical Science,†University College London,
+Qatar Computing Research Institute & Hamad Bin Khalifa University, ‡University of Alabama at Birmingham
[email protected], [email protected], {e.decristofaro,g.stringhini}@ucl.ac.uk
[email protected], [email protected], [email protected]
8
1
0
2
r
a
M
3
1
]
I
S
.
s
c
[
2
v
7
8
2
5
0
.
2
0
8
1
:
v
i
X
r
a
Abstract
Over the past few years, a number of new "fringe" communi-
ties, like 4chan or certain subreddits, have gained traction on
the Web at a rapid pace. However, more often than not, little
is known about how they evolve or what kind of activities they
attract, despite recent research has shown that they influence
how false information reaches mainstream communities. This
motivates the need to monitor these communities and analyze
their impact on the Web's information ecosystem.
In August 2016, a new social network called Gab was cre-
ated as an alternative to Twitter. It positions itself as putting
"people and free speech first", welcoming users banned or sus-
pended from other social networks. In this paper, we provide,
to the best of our knowledge, the first characterization of Gab.
We collect and analyze 22M posts produced by 336K users be-
tween August 2016 and January 2018, finding that Gab is pre-
dominantly used for the dissemination and discussion of news
and world events, and that it attracts alt-right users, conspiracy
theorists, and other trolls. We also measure the prevalence of
hate speech on the platform, finding it to be much higher than
Twitter, but lower than 4chan's Politically Incorrect board.
Introduction
1
The Web's information ecosystem is composed of multiple
communities with varying influence [24]. As mainstream on-
line social networks become less novel, users have begun to
join smaller, more focused platforms. In particular, as the for-
mer have begun to reject fringe communities identified with
racist and aggressive behavior, a number of alt-right focused
services have been created. Among these emerging commu-
nities, the Gab social network has attracted the interest of a
large number of users since its creation in 2016 [8], a few
months before the US Presidential Election. Gab was created,
ostensibly as a censorship-free platform, aiming to protect free
speech above anything else. From the very beginning, site op-
erators have welcomed users banned or suspended from plat-
forms like Twitter for violating terms of service, often for abu-
sive and/or hateful behavior. In fact, there is extensive anecdo-
tal evidence that the platform has become the alt-right's new
hub [23] and that it exhibits a high volume of hate speech [13]
and racism [5]. As a result, in 2017, both Google and Ap-
ple rejected Gab's mobile apps from their stores because of
hate speech [13] and non-compliance to pornographic content
guidelines [1].
In this paper, we provide, to the best of our knowledge, the
first characterization of the Gab social network. We crawl the
Gab platform and acquire 22M posts by 336K users over a 1.5
year period (August 2016 to January 2018). Overall, the main
findings of our analysis include:
1. Gab attracts a wide variety of users, ranging from well-
known alt-right personalities like Milo Yiannopoulos to
conspiracy theorists like Alex Jones. We also find a num-
ber of "troll" accounts that have migrated over from other
platforms like 4chan, or that have been heavily inspired
by them.
2. Gab is predominantly used for the dissemination and dis-
cussion of world events, news, as well as conspiracy the-
ories. Interestingly, we note that Gab reacts strongly to
events related to white nationalism and Donald Trump.
3. Hate speech is extensively present on the platform, as we
find that 5.4% of the posts include hate words. This is 2.4
times higher than on Twitter, but 2.2 times lower than on
4chan's Politically Incorrect board (/pol/) [9].
4. There are several accounts making coordinated efforts to-
wards recruiting millennials to the alt-right.
In summary, our analysis highlights that Gab appears to be
positioned at the border of mainstream social networks like
Twitter and "fringe" Web communities like 4chan's /pol/. We
find that, while Gab claims to be all about free speech, this
seems to be merely a shield behind which its alt-right users
hide.
Paper Organization. In the next section, we review the re-
lated work. Then, in Section 3, we provide an overview of the
Gab platform, while in Section 4 we present our analysis on
Gab's user base and the content that gets shared. Finally, the
paper concludes in Section 5.
1
2 Related Work
In this section, we review previous work on social network
analysis and in particular on fringe communities.
Kwak et al. [11] are among the first to study Twitter, aim-
ing to understand its role on the Web. They show that Twitter
is a powerful network that can be exploited to assess human
behavior on the Web. However, the Web's information ecosys-
tem does not naturally build on a single or a few Web commu-
nities; with this motivation in mind, Zannettou et al. [24] study
how mainstream and alternative news propagate across multi-
ple Web communities, measuring the influence that each com-
munity have on each other. Using a statistical model known
as Hawkes Processes, they highlight that small "fringe" Web
communities within Reddit and 4chan can have a substantial
impact on large mainstream Web communities like Twitter.
With the same multi-platform point of view, Chandrasekha-
ran et al. [6] propose an approach, called Bag of Communi-
ties, which aims to identify abusive content within a commu-
nity. Using training data from nine communities within 4chan,
Reddit, Voat, and Metafilter, they outperform approaches that
focus only on in-community data.
Other work also focuses on characterizing relatively small
alt-right Web communities. Specifically, Hine et al. [9] study
4chan's Politically Incorrect board (/pol/), and show that it at-
tracts a high volume of hate speech. They also find evidence of
organized campaigns, called raids, that aim to disrupt the regu-
lar operation of other Web communities on the Web; e.g., they
show how 4chan users raid YouTube videos by posting large
numbers of abusive comments in a relatively small period of
time.
Overall, our work is, to the best of our knowledge, the first
to study the Gab social network, analyzing what kind of users
it attracts, what are the main topics of discussions, and to what
extent Gab users share hateful content.
3 Gab
Gab is a new social network, launched in August 2016, that
"champions free speech, individual liberty, and the free flow of
information online.1" It combines social networking features
that exist in popular social platforms like Reddit and Twitter.
A user can broadcast 300-character messages, called "gabs,"
to their followers (akin to Twitter). From Reddit, Gab takes a
modified voting system (which we discuss later). Gab allows
the posting of pornographic and obscene content, as long as
users label it as Not-Safe-For-Work (NSFW).2 Posts can be
reposted, quoted, and used as replies to other gabs. Similar
to Twitter, Gab supports hashtags, which allow indexing and
querying for gabs, as well as mentions, which allow users to
refer to other users in their gabs.
Topics and Categories. Gab posts can be assigned to a spe-
cific topic or category. Topics focus on a particular event or
timely topic of discussion and can be created by Gab users
themselves; all topics are publicly available and other users
can post gabs related to topics. Categories on the other hand,
are defined by Gab itself, with 15 categories defined at the time
of this writing. Note that assigning a gab to a category and/or
topic is optional, and Gab moderates topics, removing any that
do not comply with the platform's guidelines.
Voting system. Gab posts can get up- and down-voted; a fea-
ture that determines the popularity of the content in the plat-
form (akin to Reddit). Additionally, each user has its own
score, which is the sum of up-votes minus the sum of down-
votes that it received to all his posts (similar to Reddit's user
karma score [3]). This user-level score determines the popu-
larity of the user and is used in a way unique to Gab: a user
must have a score of at least 250 points to be able to down-vote
other users' content, and every time a user down-votes a post
a point from his user-level score is deducted. In other words, a
user's score is used as a form of currency expended to down-
vote content.
Moderation. Gab has a lax moderation policy that allows
most things to be posted, with a few exceptions. Specifically,
it only forbids posts that contain "illegal pornography" (legal
pornography is permitted), posts that promote terrorist acts,
threats to other users, and doxing other users' personal infor-
mation [18].3
Monetization. Gab is ad-free and relies on direct user support.
On October 4, 2016 Gab's CEO Andrew Torba announced that
users were able to donate to Gab [19]. Later, Gab added "pro"
accounts as well. "Pro" users pay a per-month fee granting
additional features like live-stream broadcasts, account verifi-
cation, extended character count (up to 3K characters per gab),
special formatting in posts (e.g., italics, bold, etc.), as well as
premium content creation. The latter allows users to create
"premium" content that can only be seen by subscribers of the
user, which are users that pay a monthly fee to the content cre-
ator to be able to view his posts. The premium content model
allows for crowdfunding particular Gab users, similar to the
way that Twitch and Patreon work. Finally, Gab is in the pro-
cess of raising money through an Initial Coin Offering (ICO)
with the goal to offer a "censorship-proof" peer-to-peer social
network that developers can build application on top [2].
Dataset. Using Gab's API, we crawl the social network using
a snowball methodology. Specifically, we obtain data for the
most popular users as returned by Gab's API and iteratively
collect data from all their followers as well as their followings.
We collect three types of information: 1) basic details about
Gab accounts, including username, score, date of account cre-
ation; 2) all the posts for each Gab user in our dataset; and
3) all the followers and followings of each user that allow us
to build the following/followers network. Overall, we collect
22,112,812 posts from 336,752 users, between August 2016
and January 2018.
1http://gab.ai
2What constitutes NSFW material is not well defined.
3For more information on Gab's guidelines,
guidelines.
see https://gab.ai/about/
2
PageRank
Username
John Rivers
[omitted]
[omitted]
[omitted]
Followers
Scores
Username
Name
Jared Wyand
[omitted]
Name
PR score
Milo Yiannopoulos m
0.013655
PrisonPlanet
0.012818
0.011762
Andrew Torba
Ricky Vaughn
0.006549
Mike Cernovich
0.006143
0.005823
Stefan Molyneux
Brittany Pettibone
0.005104
Jebs
0.004830
0.004218
[omitted]
0.003972
[omitted]
Vox Day
0.003345
0.002984
[omitted]
Alex Jones
0.002895
Jared Wyand
0.002824
0.002648
Ann Coulter
Lift
0.002599
Survivor Medic
0.002599
0.002504
[omitted]
Proud Deplorable
0.002400
Lauren Southern
0.002292
Table 1: Top 20 popular users on Gab according to the number of followers, their score, and their ranking based on PageRank in the follow-
ers/followings network. We omit the "screen names" of certain accounts for ethical reasons.
Username
#
a
45,060 Andrew Torba
JohnRivers
45,059
Ricky Vaughn99
38,101 Ricky Vaughn
Don
30,870 Don
JaredWyand
29,081
TukkRivers
26,337
BrittPettibone
24,799 Brittany Pettibone
USMC-Devildog
22,659 Tony Jackson
causticbob
20,079
20,042 Constitutional Drunk USSANews
truthwhisper
19,454 Truth Whisper
18,080 Andrew Anglin
AndrewAnglin
Kek Magician
17,613 Kek Magician
shorty
16,975
SergeiDimitrovicIvanov
16,605
KoljaBonke
16,544 Kolja Bonke
CuckShamer
16,382
16,124
PrisonPlanet
voxday
15,036 Vox Day
14,827 W.O. Cassity
wocassity
PrisonPlanet
a
Ricky Vaughn99
Cernovich
stefanmolyneux
BrittPettibone
DeadNotSleeping
TexasYankee4
RightSmarts
voxday
d seaman
RealAlexJones
JaredWyand
AnnCoulter
lift
SurvivorMed
SalguodNos
luther
LaurenSouthern
Party On Weimerica
PrisonPlanet
Name
PrisonPlanet
#
819,363 Milo Yiannopoulos m
a
606,623 Andrew Torba
PrisonPlanet
496,962
Cernovich
368,698 Mike Cernovich
Ricky Vaughn99
281,798 Ricky Vaughn
Sargon of Akkad
Sargonofakkad100
253,781
[omitted]
244,025
d seaman
stefanmolyneux
228,370
Stefan Molyneux
BrittPettibone
228,316 Brittany Pettibone
voxday
224,261 Vox Day
RealAlexJones
206,516 Alex Jones
203,437 Lauren Southern
LaurenSouthern
realdonaldtrump
193,819 Donald J Trump
DaveCullen
169,167 Dave Cullen
e
169,091
Chuckcjohnson
160,246 Chuck C Johnson
AndrewAnglin
155,021 Andrew Anglin
Jared Wyand
154,829
JaredWyand
pax
150,930
Pax Dickinson
144,875 Baked Alaska
apple
[omitted]
Figure 1: Correlation of the rankings for each pair of rankings: (a) Followers - Score; (b) PageRank - Score; and (c) PageRank - Followers.
(a)
(b)
(c)
4 Analysis
In this section, we provide our analysis on the Gab platform.
Specifically, we analyze Gab's user base and posts that get
shared across several axes.
4.1 Ranking of users
To get a better handle on the interests of Gab users, we first
examine the most popular users using three metrics: 1) the
number of followers; 2) user account score; and 3) user PageR-
ank. These three metrics provide us a good overview of things
in terms of "reach," appreciation of content production, and
importance in terms of position within the social network. We
report the top 20 users for each metric in Table 1. Although
we believe that their existence in Table 1 is arguably indicative
of their public figure status, for ethical reasons, we omit the
"screen names" for accounts in cases where a potential link
between the screen name and the user's real life names existed
and it was unclear to us whether or not the user is a public
figure. While Twitter has many celebrities in the most popular
users [11], Gab seems to have what can at best be described
as alt-right celebrities like Milo Yiannopoulos and Mike Cer-
novich.
Number of followers. The number of followers that each ac-
count has can be regarded as a metric of impact on the plat-
form, as a user with many followers can share its posts to a
large number of other users. We observe a wide variety of dif-
ferent users; 1) popular alt-right users like Milo Yiannopoulos,
Mike Cernovich, Stefan Molyneux, and Brittany Pettibone;
2) Gab's founder Andrew Torba; and 3) popular conspiracy
theorists like Alex Jones. Notably lacking are users we might
consider as counter-points to the alt-right right, an indication
of Gab's heavily right-skewed user-base.
Score. The score of each account is a metric of content popu-
larity, as it determines the number of up-votes and down-votes
that they receive from other users. In other words, is the de-
gree of appreciation from other users. By looking at the rank-
ing using the score, we observe two new additional categories
of users: 1) users purporting to be news outlets, likely pushing
false or controversial information on the network like Prison-
Planet and USSANews; and 2) troll users that seem to have mi-
grated from or been inspired by other platforms (e.g., 4chan)
like Kek Magician and CuckShamer.
PageRank. We also compute PageRank on the follow-
ers/followings network and we rank the users according to the
obtained score. We use this metric as it quantifies the structural
importance of nodes within a network according to its connec-
3
0100101102103104105Followers0100101102103104105Score0100101102103104105PageRank0100101102103104105Score0100101102103104105PageRank0100101102103104105FollowersWord
maga
twitter
trump
conservative
free
love
people
life
like
man
truth
god
world
freedom
right
american
want
one
christian
time
Bigram
(%)
4.35% free speech
3.62% trump supporter
3.53% night area
3.47% area wanna
3.08% husband father
3.03% check link
2.76% freedom speech
2.70% hey guys
2.67% donald trump
2.49% man right
2.46% america great
2.45% link contracts
2.44% wanna check
2.29% make america
2.27% need man
2.25% guys need
2.23% president trump
2.20% guy sex
2.17% click link
2.14% link login
(%)
1.24%
0.74%
0.49%
0.48%
0.45%
0.42%
0.41%
0.40%
0.40%
0.39%
0.39%
0.35%
0.34%
0.34%
0.34%
0.33%
0.32%
0.31%
0.30%
0.30%
Table 2: Top 20 words and bigrams found in the descriptions of Gab
users.
Figure 2: Percentage of accounts created per month.
tions. Here, we observe some interesting differences from the
other two rankings. For example, the account with username
"realdonaldtrump," an account reserved for Donald Trump, ap-
pears in the top users mainly because of the extremely high
number of users that follow this account, despite the fact that
it has no posts or score.
Comparison of rankings. To compare the three aforemen-
tioned rankings, we plot the ranking of all the users for each
pair of rankings in Fig. 1. We observe that the pair with the
most agreement is PageRank-Followers (Fig. 1(c)), followed
by the pair Followers-Score (Fig, 1(a)), while the pair with
the least agreement is PageRank - Score (Fig 1(b). Over-
all, for all pairs we find a varying degree of rank correlation.
Specifically, we calculate the Spearman's correlation coeffi-
cient for each pair of rankings; finding 0.53, 0.42, 0.26 for
PageRank-Followers, Followers-Score, and PageRank-Score,
respectively. While these correlations are not terribly strong,
they are significant (p < 0.01) for the two general classes of
users: those that play an important structural role in the net-
work, perhaps encouraging the diffusion of information, and
those that produce content the community finds valuable.
4
4.2 User account analysis
User descriptions. To further assess the type of users that
the platform attracts we analyze the description of each cre-
ated account in our dataset. Note that by default Gab adds
a quote from a famous person as the description of each ac-
count and a user can later change it. Although not perfect,
we look for any user description enclosed in quotes with a "–"
followed by a name, and assume it is a default quote. Us-
ing this heuristic, we find that only 20% of the users actively
change their description from the default. Table 2 reports the
top words and bigrams found in customized descriptions (we
remove stop words for more meaningful results). Examining
the list, it is apparent that Gab users are conservative Amer-
icans, religious, and supporters of Donald Trump and "free
speech." We also find some accounts that are likely bots and
trying to deceive users with their descriptions; among the top
bigrams there some that nudge users to click on URLs, pos-
sibly malicious, with the promise that they will get sex. For
example, we find many descriptions similar to the following:
"Do you wanna get sex tonight? One step is left ! Click the link
- < url >." It is also worth noting that our account (created
for crawling the platform) was followed by 12 suspected bot
accounts between December 2017 and January 2018 without
making any interactions with the platform (i.e., our account
has never made a post or followed any user).
User account creation. We also look when users joined the
Gab platform. Fig. 2 reports the percentage of accounts cre-
ated for each month of our dataset. Interestingly, we observe
that we have peaks for account creation on November 2016
and August 2017. These findings highlight the fact that Gab
became popular during notable world and politics events like
the 2016 US elections as well as the Charlottesville Unite the
Right rally [22]. Finally, only a small percentage of Gab's
users are either pro or verified, 0.75% and 0.5%, respectively,
while 1.7% of the users have a private account (i.e., only their
followers can see their gabs).
Followers/Followings. Fig. 3 reports our analysis based on
the number of followers and followings for each user. From
Fig. 3(a) we observe that in general Gab users have a larger
number of followers when compared with following users. In-
terestingly, 43% of users are following zero other users, while
only 4% of users have zero followers. I.e., although counter-
intuitive, most users have more followers than users they fol-
low. Figs. 3(b) and 3(c) show the number of followers and
following in conjunction with the number of posts for each
Gab user. We bin the data in log-scale bins and we report the
mean and median value for each bin. We observe that in both
cases, that there is a near linear relationship with the number
of posts and followers/followings up until around 10 follow-
ers/followings. After this point, we see this relationship di-
verge, with a substantial number of users with huge numbers of
posts, some over 77K. This demonstrates the extremely heavy
tail in terms of content production on Gab, as is typical of most
social medial platforms.
Reciprocity. From the followers/followings network we find
a low level of reciprocity: specifically, only 29.5% of the node
Aug 16Sep 16Oct 16Nov 16Dec 16Jan 17Feb 17Mar 17Apr 17May 17Jun 17Jul 17Aug 17Sep 17Oct 17Nov 17Dec 17Jan 180246810121416% of accounts created(a)
(b)
(c)
Figure 3: Followers and Following analysis (a) CDF of number of followers and following (b) number of followers and number of posts and
(c) number of following and number of posts.
pairs in the network are connected both ways, while the re-
maining 71.5% are connected one way. When compared with
the corresponding metric on Twitter [11], these results high-
light that Gab has a larger degree of network reciprocity in-
dicating that the community is more tightly-knit, which is ex-
pected when considering that Gab mostly attracts users from
the same ideology (i.e., alt-right community).
4.3 Posts Analysis
Basic Statistics. First, we note that 63% of the posts in our
dataset are original posts while 37% are reposts. Interestingly,
only 0.14% of the posts are marked as NSFW. This is surpris-
ing given the fact that one of the reasons that Apple rejected
Gab's mobile app is due to the share of NSFW content [1].
From browsing the Gab platform, we also can anecdotally con-
firm the existence of NSFW posts that are not marked as such,
raising questions about how Gab moderates and enforces the
use of NSFW tags by users. When looking a bit closer at their
policies, Gab notes that they use a 1964 United States Supreme
Court Ruling [21] on pornography that provides the famous
"I'll known it when I see it" test. In any case, it would seem
that Gab's social norms are relatively lenient with respect to
what is considered NSFW.
We also look into the languages of the posts, as returned by
Gab's API. We find that Gab's API does not return a language
code for 56% of posts. By looking at the dataset, we find that
all posts before June 2016 do not have an associated language;
possibly indicating that Gab added the language field after-
wards. Nevertheless, we find that the most popular languages
are English (40%), Deutsch (3.3%), and French (0.14%); pos-
sibly shedding light to Gab's users locations which are mainly
the US, the UK, and Germany.
URLs. Next , we assess the use of URLs in Gab; overall
we find 3.5M unique URLs from 81K domains. Table 3 re-
ports the top 20 domains according to their percentage of in-
clusion in all posts. We observe that the most popular domain
is YouTube with almost 7% of all posts, followed by Twitter
with 2%. Interestingly, we note the extensive use of alterna-
tive news sources like Breitbart (1.4%), The Gateway Pundit
(0.7%), and Infowars (0.5%), while mainstream news outlets
like Fox News (0.4%) and Daily Mail (0.4%) are further be-
low. Also, we note the use of image hosting services like Imgur
(0.6%), sli.mg (0.6%), and kek.gg (0.7%) and URL shorteners
(%)
Domain
(%)
Domain
4.22% zerohedge.com 0.53%
youtube.com
2.67% twimg.com
0.53%
youtu.be
1.96% dailycaller.com 0.49%
twitter.com
0.47%
1.44% t.co
breitbart.com
0.46%
bit.ly
0.82% ussanews.com
thegatewaypundit.com 0.74% dailymail.co.uk
0.46%
0.69% tinyurl.com
kek.gg
0.44%
0.68% wordpress.com 0.43%
imgur.com
0.41%
0.61% foxnews.com
sli.mg
infowars.com
0.56% blogspot.com
0.32%
Table 3: Top 20 domains in posts and their respective percentage over
all posts.
like bit.ly (0.8%) and tinyurl.com (0.4%). Finally, it is worth
mentioning that The Daily Stormer, a well known neo-Nazi
web community is five ranks ahead of the most popular main-
stream news source, The Hill.
Hashtags & Mentions As discussed in Section 3, Gab sup-
ports the use of hashtags and mentions similar to Twitter. Ta-
ble 4 reports the top 20 hashtags/mentions that we find in our
dataset. We observe that the majority of the hashtags are used
in posts about Trump, news, and politics. We note that among
the top hashtags are "AltRight", indicating that Gab users are
followers of the alt-right movement or they discuss topics re-
lated to the alt-right; "Pizzagate", which denotes discussions
around the notorious conspiracy theory [20]; and "BanIslam",
which indicate that Gab users are sharing their islamophobic
views. It is also worth noting the use of hashtags for the dis-
semination of popular memes, like the Drain the Swamp meme
that is popular among Trump's supporters [14]. When looking
at the most popular users that get mentioned, we find popular
users related to the Gab platform like Andrew Torba (Gab's
CEO with username @a).
We also note users that are popular with respect to mentions,
but do not appear in Table 1's lists of popular users. For ex-
ample, Amy is an account purporting to be Andrew Torba's
mother. The user Stargirlx, who we note changed usernames
three times during our collection period, appears to be an ac-
count presenting itself as a millennial "GenZ" young woman.
Interestingly, it seems that Amy and Stargirlx have been orga-
nizing Gab "chats," which are private groups of users, for 18
to 29 year olds to discuss politics; possibly indicating efforts
5
0100101102103104105106# of followers/followings0.00.20.40.60.81.0CDFFollowersFollowings0100101102103104105# of followers0100101102103104105# of postsMeanMedian0100101102103104105# of followings0100101102103104105# of postsMeanMedianHashtag
MAGA
GabFam
Trump
SpeakFreely
News
Gab
DrainTheSwamp
AltRight
Pizzagate
Politics
PresidentTrump
FakeNews
BritFam
2A
maga
NewGabber
CanFam
BanIslam
MSM
1A
Mention
(%)
6.06% a
4.22% TexasYankee4
3.01% Stargirlx
2.28% YouTube
2.00% support
0.88% Amy
0.71% RaviCrux
0.61% u
0.57% BlueGood
0.53% HorrorQueen
0.47% Sockalexis
0.41% Don
0.37% BrittPettibone
0.35% TukkRivers
0.32% CurryPanda
0.28% Gee
0.27% e
0.25% careyetta
0.22% PrisonPlanet
0.21% JoshC
(%)
0.69%
0.31%
0.26%
0.24%
0.23%
0.22%
0.20%
0.19%
0.18%
0.17%
0.17%
0.17%
0.16%
0.15%
0.15%
0.15%
0.14%
0.14%
0.14%
0.12%
Table 4: Top 20 hashtags and mentions found in Gab. We report their
percentage over all posts.
to recruit millennials to the alt-right community.
Categories & Topics. As discussed in Section 3 gabs may
be part of a topic or category. By analyzing the data, we
find that this happens for 12% and 42% of the posts for top-
ics and categories, respectively. Table 5 reports the percent-
age of posts for each category as well as for the top 15 top-
ics. For topics, we observe that the most popular are general
"Ask Me Anything" (AMA) topics like Deutsch (2.29%, for
German users), BritFam (0.73%, for British users), and Intro-
duce Yourself (0.59%). Furthermore, other popular topics in-
clude world events and news like International News (0.59%),
Las Vegas shooting (0.27%), and conspiracy theories like Seth
Rich's Murder (0.11%). When looking at the top categories we
find that by far the most popular categories are News (15.91%)
and Politics (10.30%). Other popular categories include AMA
4.46%), Humor (3.50%), and Technology (1.44%).
These findings highlight that Gab is heavily used for the dis-
semination and discussion of world events and news. There-
fore, its role and influence on the Web's information ecosystem
should be assessed in the near future. Also, this categorization
of posts can be of great importance for the research community
as it provides labeled ground truth about discussions around a
particular topic and category.
Hate speech assessment. As previously discussed, Gab was
openly accused of allowing the dissemination of hate speech.
In fact, Google removed Gab's mobile app from its Play Store
because it violates their hate speech policy [13]. Due to this,
we aim to assess the extent of hate speech in our dataset. Using
the modified Hatebase [4] dictionary used by the authors of [9],
we find that 5.4% of all Gab posts include a hate word. In com-
parison, Gab has 2.4 times the rate of hate words when com-
pared to Twitter, but less than halve the rate of hate words com-
pared to 4chan's Politically Incorrect board (/pol/) [9]. These
6
(%)
2.29% News
0.73% Politics
0.59% AMA
0.19% Humor
0.17% Technology
0.16% Philosophy
0.16% Entertainment
0.13% Art
0.12% Faith
Topic
Deutsch
BritFam
Introduce Yourself
International News
DACA
Las Vegas Terror Attack
Hurricane Harvey
Gab Polls
London
2017 Meme Year in Review 0.12% Science
Twitter Purge
Seth Rich
Memes
Vegas Shooting
Judge Roy Moore
Table 5: Top 15 categories and topics found in the Gab dataset
(%)
15.91%
10.30%
4.46%
3.50%
1.44%
1.06%
1.01%
0.72%
0.69%
0.56%
0.52%
0.39%
0.37%
0.31%
0.16%
Category
0.12% Music
0.11% Sports
0.11% Photography
0.11% Finance
0.09% Cuisine
findings indicate that Gab resides on the border of mainstream
social networks like Twitter and fringe Web communities like
4chan's Politically Incorrect (/pol/) board.
Temporal Analysis. Finally, we study the posting behavior of
Gab users from a temporal point of view. Fig. 4 shows the dis-
tribution of the Gab posts in our dataset according to each day
of our dataset, as well as per hour of day and week (in UTC).
We observe that the general trend is that the number of Gab's
posts increase over time (Fig. 4(a)); this indicates an increase
in Gab's popularity. Furthermore, we note that Gab users posts
most of their gabs during the afternoon and late night (after
3 PM UTC) while they rarely post during the morning hours
(Fig. 4(b)). Also, the aforementioned posting behavior follow
a diurnal weekly pattern as we show in Fig. 4(c).
To isolate significant days in the time series in Fig. 4(a), we
perform a changepoint analysis using the Pruned Exact Lin-
ear Time (PELT) method [10]. First, we use our knowledge of
the weekly variation in average post numbers from Fig. 4(c)
to subtract from our timeseries the mean number of posts for
each day. This leaves us with a mean-zero timeseries of the de-
viation of the number of posts per day from the daily average.
We assume that this timeseries is drawn from a normal distri-
bution, with mean and variance that can change at a discrete
number of changepoints. We then use the PELT algorithm to
maximize the log-likelihood function for the mean(s) and vari-
ance(s) of this distribution, with a penalty for the number of
changepoints. By ramping down the penalty function, we pro-
duce a ranking of the changepoints.
Examining current events around these changepoints pro-
vides insight into they dynamics that drive Gab behavior. First,
we note that there is a general increase in activity up to the
Trump inauguration, at which point activity begins to decline.
When looking later down the timeline, we see an increase in
activity after the changepoint marked 1 in Fig. 4(a). Change-
point 1 coincides with James Comey's firing from the FBI,
and the relative acceleration of the Trump-Russian collusion
probe [16].
The next changepoint (2) coincides with the so-called
"March Against Sharia" [12] organized by the alt-right, with
(a) Date
(b) Hour of Day
(c) Hour of Week
Figure 4: Temporal analysis of the Gab posts (a) each day; (b) based on hour of day and (c) based on hour of week.
the event marked 4 corresponding to Trump's "blame on both
sides" response to violence at the Unite the Right Rally in
Charlottesville [15]. Similarly, we see a meaningful response
to Twitter's banning of abusive users [7] marked as change-
point 5.
Changepoint 3, occurring on July 12, 2017 is of particular
interest, since it is the most extreme reduction in activity rec-
ognized as a changepoint. From what we can tell, this is a
reaction to Donald Trump Jr. releasing emails that seemingly
evidenced his meeting with a Russian lawyer to receive com-
promising intelligence on Hillary Clinton's campaign [17].
I.e., the disclosure of evidence of collusion with Russia cor-
responded to the single largest drop in posting activity on Gab.
5 Conclusion
In this work. we have provided the first characterization of a
new social network called Gab. We analyzed 22M posts from
336K users, finding that Gab attracts the interest of users rang-
ing from alt-right supporters and conspiracy theorists to trolls.
We showed that Gab is extensively used for the discussion of
news, world events, and politics-related topics, further moti-
vating the need take it into account when studying information
cascades on the Web. By looking at the posts for hate words,
we also found that 5.4% of the posts include hate words. Fi-
nally, using changepoint analysis, we highlighted how Gab re-
acts very strongly to real-world events focused around white
nationalism and support of Donald Trump.
Acknowledgments. This project has received funding from
the European Union's Horizon 2020 Research and Innovation
program under the Marie Skłodowska-Curie ENCASE project
(Grant Agreement No. 691025). The work reflects only the
authors' views; the Agency and the Commission are not re-
sponsible for any use that may be made of the information it
contains.
References
[1] Apple's Double Standards Against Gab.
https:
//medium.com/@getongab/apples-double-standards-
against-gab-1bffa2c09115, 2016.
[2] A Censorship-Proof P2P Social Media Protocol. https:
//www.startengine.com/gab-select, 2017.
7
[3] Reddit FAQ - Karma. https://www.reddit.com/wiki/faq,
2017.
[4] Hatebase API. https://www.hatebase.org/, 2018.
[5] T. Benson.
Inside the "Twitter for racists": Gab – the
site where Milo Yiannopoulos goes to troll now. https:
//goo.gl/Yqv4Ue, 2016.
[6] E. Chandrasekharan, M. Samory, A. Srinivasan, and
E. Gilbert. The Bag of Communities: Identifying Abu-
sive Behavior Online with Preexisting Internet Data. In
CHI, 2017.
[7] K. Donaldson and J. Brustein.
Twitter Bans
Some White Supremacists and Other Extremists.
https://www.bloomberg.com/news/articles/2017-12-
19/twitter-bans-some-white-supremacists-and-other-
extremists, 2017.
[8] Gab. Gab site. https://gab.ai, 2017.
[9] G. E. Hine, J. Onaolapo, E. D. Cristofaro, N. Kourtellis,
I. Leontiadis, R. Samaras, G. Stringhini, and J. Black-
burn. Kek, Cucks, and God Emperor Trump: A Measure-
ment Study of 4chan's Politically Incorrect Forum and Its
Effects on the Web. In ICWSM, 2017.
[10] R. Killick, P. Fearnhead, and I. A. Eckley. Optimal
detection of changepoints with a linear computational
Journal of the American Statistical Association,
cost.
107(500):1590–1598, 2012.
[11] H. Kwak, C. Lee, H. Park, and S. B. Moon. What is
In WWW,
Twitter, a social network or a news media?
2010.
The
'March Against
[12] C. Mathias.
Protests Are
lims.
march-against-sharia-anti-muslim-act-for-
america us 5939576ee4b0b13f2c67d50c, 2017.
Sharia'
Really Marches Against Mus-
https://www.huffingtonpost.com/entry/
[13] R. Price.
Google's app store has banned Gab,
a social network popular with the far-right,
for
'hate speech'. http://uk.businessinsider.com/google-app-
store-gab-ban-hate-speech-2017-8, 2017.
[14] A. Romano. The 2016 culture war, as illustrated by
https://www.vox.com/culture/2016/12/
the alt-right.
30/13572256/2016-trump-culture-war-alt-right-meme,
2016.
[15] M. Shear and M. Haberman. Trump Defends Initial
09/1612/1603/1706/1709/1712/170.000.050.100.150.200.250.300.350.40% of posts12345051015202.02.53.03.54.04.55.05.5% of posts204060801001201401600.30.40.50.60.70.8% of postsRemarks on Charlottesville; Again Blames 'Both Sides'.
https://www.nytimes.com/2017/08/15/us/politics/trump-
press-conference-charlottesville.html, 2017.
[20] M. Wendling. The saga of 'Pizzagate': The fake story
that shows how conspiracy theories spread. http://www.
bbc.com/news/blogs-trending-38156985, 2016.
[16] D. Smith.
Trump fires FBI director Comey,
ing questions over Russia investigation.
//www.theguardian.com/us-news/2017/may/09/james-
comey-fbi-fired-donald-trump, 2017.
rais-
https:
[17] D. Smith and S. Siddiqui.
'I love it': Donald Trump
Jr posts emails from Russia offering material on Clin-
ton.
https://www.theguardian.com/us-news/2017/jul/
11/donald-trump-jr-email-chain-russia-hillary-clinton,
2017.
[18] P. Snyder, P. Doerfler, C. Kanich, and D. McCoy. Fifteen
minutes of unwanted fame: detecting and characterizing
doxing. In IMC, 2017.
[19] A. Torba.
How You Can Help Support Gab.
https://medium.com/@Torbahax/gab-donations-
9ca2a5c0557e, 2016.
[21] Wikipedia. Jacobellis v. Ohio. https://en.wikipedia.org/
wiki/Jacobellis v. Ohio, 1964.
[22] Wikipedia. Unite the Right rally. https://en.wikipedia.
org/wiki/Unite the Right rally, 2017.
[23] J. Wilson.
Gab:
alt-right's
attracts
users
ternative
https://www.theguardian.com/media/2016/nov/17/gab-
alt-right-social-media-twitter, 2016.
banned
social media al-
from Twitter.
[24] S. Zannettou, T. Caulfield, E. D. Cristofaro, N. Kourtellis,
I. Leontiadis, M. Sirivianos, G. Stringhini, and J. Black-
burn. The Web Centipede: Understanding How Web
Communities Influence Each Other Through the Lens
of Mainstream and Alternative News Sources. In IMC,
2017.
8
|
1903.06367 | 1 | 1903 | 2019-03-15T05:24:38 | Fast influencers in complex networks | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | Influential nodes in complex networks are typically defined as those nodes that maximize the asymptotic reach of a spreading process of interest. However, for practical applications such as viral marketing and online information spreading, one is often interested in maximizing the reach of the process in a short amount of time. The traditional definition of influencers in network-related studies from diverse research fields narrows down the focus to the late-time state of the spreading processes, leaving the following question unsolved: which nodes are able to initiate large-scale spreading processes, in a limited amount of time? Here, we find that there is a fundamental difference between the nodes -- which we call "fast influencers" -- that initiate the largest-reach processes in a short amount of time, and the traditional, "late-time" influencers. Stimulated by this observation, we provide an extensive benchmarking of centrality metrics with respect to their ability to identify both the fast and late-time influencers. We find that local network properties can be used to uncover the fast influencers. In particular, a parsimonious, local centrality metric (which we call social capital) achieves optimal or nearly-optimal performance in the fast influencer identification for all the analyzed empirical networks. Local metrics tend to be also competitive in the traditional, late-time influencer identification task. | cs.SI | cs | Fast influencers in complex networks
Fang Zhou
Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, PR China
Linyuan Lu
Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, PR China
Alibaba Research Center for Complexity Sciences, Hangzhou Normal University, Hangzhou 311121, China
Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, PR China
URPP Social Networks, Universitat Zurich, Switzerland
Manuel Sebastian Mariani
9
1
0
2
r
a
M
5
1
]
I
S
.
s
c
[
1
v
7
6
3
6
0
.
3
0
9
1
:
v
i
X
r
a
Abstract
Influential nodes in complex networks are typically defined as those nodes that maximize the asymptotic reach of
a spreading process of interest. However, for practical applications such as viral marketing and online information
spreading, one is often interested in maximizing the reach of the process in a short amount of time. The traditional
definition of influencers in network-related studies from diverse research fields narrows down the focus to the late-time
state of the spreading processes, leaving the following question unsolved: which nodes are able to initiate large-scale
spreading processes, in a limited amount of time? Here, we find that there is a fundamental difference between the
nodes -- which we call "fast influencers" -- that initiate the largest-reach processes in a short amount of time, and
the traditional, "late-time" influencers. Stimulated by this observation, we provide an extensive benchmarking of
centrality metrics with respect to their ability to identify both the fast and late-time influencers. We find that local
network properties can be used to uncover the fast influencers. In particular, a parsimonious, local centrality metric
(which we call social capital) achieves optimal or nearly-optimal performance in the fast influencer identification for
all the analyzed empirical networks. Local metrics tend to be also competitive in the traditional, late-time influencer
identification task.
1. Introduction
Diffusion processes on networks can describe phenomena as diverse as the spreading of infectious diseases [1], the
life cycle of products and services [2], the spreading of behaviors [3], among others. A long-standing idea in social
sciences and marketing research is that in a social network, a minority of individuals have the possibility to dispro-
portionately impact on the diffusion of an innovation [4, 5]. While marketing researchers have investigated various
categories and traits of such influential individuals -- including domain expertise [6, 7], wide market information [8],
and opinion leadership [4] -- the physics and network science literature have mostly focused on the individuals' ability
to reach a large number of individuals by benefiting from their favorable position in the network of contacts [9].
In this context, the "influencers" [10] (or "influentials" [5], or "influential spreaders" [11]) are typically defined
as those nodes who, once they initiate a spreading process on a network of contacts, can reach and "infect" a
Email addresses: [email protected] (Linyuan Lu), [email protected] (Manuel Sebastian Mariani)
Preprint submitted to Communications in Nonlinear Science and Numerical Simulation
March 18, 2019
large portion of the system. Following the seminal works by Kempe et al. [12] and Kitsak et al. [11], a large
number of papers have attempted to identify the influencers based on network structural analysis and centrality
metrics [9, 11, 13, 14, 15, 16, 17, 18, 19] (see [9] for a review). In this stream of works, the ground-truth influence of a
given "seed" node (or equivalently, its spreading ability) is defined as the average number of nodes that are eventually
reached by independent diffusion processes initiated by that seed node [9]. In the following, we refer to this property
as node late-time influence, and we refer to nodes with large late-time influence as late-time influencers.
Based on this framework, scholars evaluated the performance of network centrality metrics according to their
ability to reproduce the ranking of the nodes by their late-time influence. The results have fostered the debate [9, 18,
20] on whether local centrality metrics [14, 15, 20, 21, 22, 23] (i.e., metrics that infer nodes' centrality based purely
on local information) or global metrics [11, 16, 19, 24, 25] (i.e., centrality metrics that take into account the whole
network structure) should be preferred for the influencer identification. Local metrics are faster to be computed and
can provide optimal or nearly optimal performance [9, 15, 20], yet more computationally-expensive global metrics
might provide a more accurate quantification of node influence at the critical point [16] and above [19].
However, the definition of node ground-truth influence adopted so far implicitly narrows down the problem's focus
to the stationary state of the dynamics. On the other hand, for marketing applications, it is vital for companies to
accumulate customers or adopters as rapidly as possible [26]. Besides, the early stage of spreading processes plays
an essential role in the dissemination of low-credibility content in online social platforms [27]; therefore, to design
effective prevention strategies, it becomes critical to gauge the nodes' ability to disseminate information in a small
amount of time. Previous studies have addressed the impact of network topology and temporal effects on diffusion
speed [28, 29], the design of local strategies specifically aimed at fast spreading [30], and the identification of nodes
that tend to be infected earlier than the others [31]. However, they did not address the fundamental question whether
strategies that are effective in maximizing the late-time impact of a process are also effective at early times, and they
did not investigate whether well-performing centrality metrics are only competitive at specific timescales.
To fill these gaps, we introduce here the time-dependent influence of a given "seed" node as the average number of
nodes that have been infected during a finite number t of diffusion steps, by independent diffusion processes initiated
by that seed node. We refer to the time-dependent influence after few steps of the dynamics as the early-time influence
of the nodes, and to the nodes with large early-time influence as fast influencers.
We find that the nodes' late-time and early-time influence are positively correlated, yet this correlation is far
from perfect. The noisy relation between the two types of influence reveals that strategies that aim at maximizing
the late-time impact of a spreading process (i.e., those typically considered in the literature) can be suboptimal for
maximizing its early-time impact. The late-time influencers may indeed initiate large-scale processes that take a long
time to diffuse, whereas nodes with a lower late-time influence might initiate faster processes.
A previously unexplored question, therefore, emerges: how to best identify the fast influencers? We find that local
network information can be used to accurately quantify the early-time influence of the nodes. In particular, a simple
combination of node degree and neighbors' degrees is optimal or nearly optimal in quantifying the early-time influence
of the nodes. Our extensive comparative analysis reveals that other local metrics (including LocalRank [21] and the
Dynamics Sensitive Centrality [32]) can be similarly competitive at early times. On the other hand, global metrics
(such as the k-core centrality [11] and the closeness centrality [33]) can be only competitive in the late-time influencer
identification, yet for some datasets and dynamics parameter values, local metrics outperform global metrics also in
the late-time influencer identification.
2
Our findings shed light on the fundamental difference between nodes' early-time and late-time influence. Impor-
tantly, they suggest that compared to global metrics, local metrics for the influential nodes identification might be
competitive for a broader range of dynamical processes.
The rest of the paper is organized as follows: Section 2 introduces the traditional late-time influencer identification
problem together with relevant centrality metrics and the datasets analyzed here; Section 3 presents the fundamental
difference between fast and late-time influencers; Section 4 presents the results of an extensive benchmarking of
centrality metrics with respect to their ability to single out fast and influential spreaders. Finally, Section 5 summarizes
our main results and outlines open directions.
2. Theory and methods
The goal of this Section is to introduce the traditional definition of influencers based on epidemic spreading
processes (Section 2.1), the centrality metrics that have been studied to identify the influencers (Section 2.2), and
the empirical networks analyzed in this paper (Section 2.3).
2.1. The traditional definition of influencers based on spreading models
The problem of identifying influential nodes (hereafter, "influencers" [10]) in a network generally refers to the
problem of identifying a small set of nodes, S ⊂ V (where V denotes the set of all nodes, and S (cid:28) V), that
maximizes a certain target function, f (S). Such a function could be a function of the topology of the network
("structural influence maximization"), or a function that depends on the interplay between network topology and
a given dynamical process on the network ("functional influence maximization") [9]. In this work, we consider the
functional influence maximization problem, where the influencers are traditionally defined as the nodes that maximize
the late-time reach of the dynamic process in exam.
Given a network, the late-time influence of the nodes depends on the target dynamics under consideration. In
line with a popular stream of physics literature [9, 11, 15, 16, 19, 20, 32], we focus here on the Susceptible-Infected-
Recovered dynamics (SIR). The SIR dynamics on a given network starts from an initial configuration where some
of the nodes (typically referred to as "seed nodes") are in the infected (I) state. At each time step, each infected
node can infect each of its susceptible (S) neighbors with probability β. In addition, each infected node can recover
with probability µ. The dynamics ends when all the nodes are in the recovered (R) state. For convenience, in the
following, we fix µ = 1, and express the results in terms of the ratio λ/λc between the spreading rate λ = β/µ and
its critical value λc. In line with previous studies [9], to compute λc, we use the analytic result obtained with a
degree-based mean-field approximation [1]: λc = (cid:104)k(cid:105) /((cid:104)k2(cid:105) − (cid:104)k(cid:105)), where (cid:104)k(cid:105) and (cid:104)k2(cid:105) denote the average degree and
the average squared degree, respectively.
Importantly, only a portion of the nodes end up in the recovered state. We focus here on processes with one
single seed node at time zero; clearly, the number of nodes in the recovered state depends on the chosen seed node.
For each node i, its late-time influence qi(∞) is defined as the average asymptotic fraction of nodes in the recovered
state for processes initiated with node i as the seed node. The influential spreaders (here, late-time influencers) are
defined as the nodes with the largest influence q(∞). Accordingly, network centrality metrics are typically compared
with respect to their ability to single out the high-q(∞) nodes [9].
2.2. Centrality metrics
Centrality metrics generally aim to identify the most "important" nodes in a network [34]. Their performance
in the influencer identification task is traditionally evaluated according to their ability to identify the late-time
3
influencers defined in the previous Section [9]. We describe here the metrics analyzed in this paper. We denote as A
the adjacency matrix of the undirected network: Aij = 1 if a link between node i and j exists.
Degree. The degree of a node is defined as its total number of neighbors.
In terms of the adjacency matrix, we
have [35]
ki =
N(cid:88)
Aij.
(1)
j=1
H-index. The H-index centrality was recently validated as an effective metric for the influencer identification [15].
To define the H-index, let us denote by ki,1,ki,2,ki,3,...,ki,ki the degrees of the neighbors of a given node i. Then, the
H-index of node i is hi if and only if hi is the largest integer number such hi neighbors of node i have degree larger
than or equal to hi. The construction of the H-index can be generalized to construct higher-order centrality metrics,
which leads to an iterative procedure to construct the k-core centrality (see below) starting from degree [15].
LocalRank. The LocalRank score Li of node i is defined as [21]
N(cid:88)
N(cid:88)
Li =
Aji
Alj Nl,
(2)
where Nl is the number of the nearest and the next nearest neighbors of node l. In practice, the LocalRank score
takes into account local information up to distance four from the focal node.
j=1
l=1
Dynamics Sensitive Centrality. The Dynamics Sensitive Centrality (DSC) [32] aims to estimate analytically the
time-dependent influence of the nodes. Denoting as si(t) the estimated influence of node i at time t, by analytically
estimating the fraction of newly infected nodes at each time step, one finds analytically that [32]
s(t) = (β A + β A H + . . . + β A Ht)T e,
(3)
where H = β A + (1 − µ) I, I denotes the N × N identity matrix, and e denotes the vector whose N components are
all equal to one. The metric presents the disadvantage that in order to be applied, one needs to know the values of
β and µ, which is typically not the case in real applications. However, we found that its performance is not strongly
dependent on the value of β; for this reason, we set µ = 1 and β = λc.
k-core. In an undirected unweighted graph, the k-core score of the nodes is defined in terms of a network pruning
process [11]. One starts by removing all nodes with a degree equal to one. After this step is completed, some nodes
that had k > 1 may end up with a degree equal to one: these nodes are removed as well. One keeps removing the
nodes that end up with k = 1 iteratively until no node with k = 1 is left in the network. All the nodes removed
throughout this process are assigned a k-core score equal to one. One performs an analogous procedure for the nodes
with k = 2, 3, . . ., thereby identifying all the nodes with a k-core score equal to 2, 3, . . .. The calculation ends when
all the nodes have been assigned a k-core score.
Eigenvector centrality. The vector of eigenvector-centrality scores is defined as the eigenvector of the adjacency matrix
A associated with A's largest eigenvalue λmax [36]. In formulas,
A x = λmax x
(4)
where λmax is the biggest eigenvalue of matrix A, and x is the corresponding eigenvector.
4
Dataset name
N
L
λc
URL
Amazon
Cond-mat
Email-Enron
Facebook
arenas-email
arenas-pgp
Route views
ca-AstroPh
Human protein
petster-hamster
reactome
Stelzl
vidal
Yeast
334863
27519
36692
63731
1133
10680
6474
18771
3023
2426
6229
1615
2783
2375
925872
116181
183831
817035
5451
24316
12572
198050
6149
16631
146160
3106
6007
11693
(cid:104)k(cid:105)
5.5
8.4
10.0
25.6
9.6
4.5
3.9
21.1
4.06
13.7
43.71
3.8
4.3
9.8
(cid:104)k2(cid:105)
63.7
188.1
1402
2256.5
179.8
85.9
640
1379
62.8
582.9
6708.3
65.6
68.1
336.9
0.094
0.047
0.0071
0.011
0.0564
0.0553
0.006
0.015
0.069
0.024
0.007
0.061
0.067
0.030
http://konect.uni-koblenz.de/networks/com-amazon
http://networkscience.cn/index.php/data/
http://networkscience.cn/index.php/data/
http://networkscience.cn/index.php/data/
http://konect.uni-koblenz.de/networks/arenas-email
http://konect.uni-koblenz.de/networks/arenas-pgp
http://konect.uni-koblenz.de/networks/as20000102
http://konect.uni-koblenz.de/networks/ca-AstroPh
http://konect.uni-koblenz.de/networks/maayan-vidal
http://konect.uni-koblenz.de/networks/petster-hamster
http://konect.uni-koblenz.de/networks/reactome
http://networkrepository.com/maayan-Stelzl.php
http://www.linkprediction.org/index.php/link/resource/data
Table 1: Details of the analyzed empirical networks: number of nodes N ; number of links L; average degree (cid:104)k(cid:105); average square degree
(cid:104)k2(cid:105); critical value λc of the SIR model parameters' ratio λ = β/µ; URL where the dataset can be downloaded.
(cid:88)
s(cid:54)=i(cid:54)=t
N(cid:88)
j=1
(cid:88)
j∈Gi
Betweenness. The betweenness centrality score Bi of node i is defined as the average ratio between the number ni
st
of shortest paths between two nodes s and t that pass through a focal node i, and the total number gst of shortest
paths between node s and t [37]. In formulas,
Bi =
ni
st
gst
.
(5)
Closeness. In a connected network, the closeness centrality score [33] of node i is defined as the reciprocal of its
average distance from the other nodes in the network, where the distance is determined by the shortest-path length.
In formulas,
di =
1
N − 1
dij,
(6)
where dij is the length of the shortest paths that connect node i and j; the closeness centrality score of node i is
defined as
Ci = di
−1.
(7)
If the network is disconnected, one first computes the average distance di of node i from the nodes that belong to
the same network component Gi ⊂ G. In formulas,
di =
1
Gi − 1
dij,
(8)
where Gi denotes the number of nodes that belong to Gi. Then, one computes the closeness centrality score of node
i as [33]
Gi − 1
(N − 1)
.d−1
i
.
(9)
2.3. Empirical datasets
Ci =
We analyze here the same four networks that were analyzed in the review article [9], plus 10 smaller networks.
We denote the four largest networks as Amazon, Cond-mat, Email-Enron, Facebook. Amazon [38] is the co-purchase
network from the Amazon website. Its nodes represent products and the links between two nodes indicate that the
two products have been frequently bought together. Cond-mat [39] is a collaboration network of scientists. Its nodes
represent scientists and a link between two nodes means that the two scientists have co-authorized at least one paper.
Email-Enron [40] is a communication network. Its nodes represent email address; there exists a link between two
5
Figure 1: A comparison between node late-time influence q(∞) and node time-dependent influence q(t), for the four largest empirical
networks considered here and different values of the dynamics probability λ. While positively correlated, the Pearson's linear correlation
r(q(∞), q(t)) between q(∞) and q(t) is substantially smaller than one at early times (intuitively, t < 10). The discrepancy between q(∞)
and q(t) tends to increase as λ increases.
addresses if the two addresses have exchanged at least one email. Facebook [41] is a friendship network from the
Facebook social network.
Its nodes represent users, and a link between two nodes means that the two users are
friends. We refer to Table 1 for all the details about these four networks and the smaller networks.
3. The fundamental difference between fast and late-time influencers
In Section 2.1, we have seen that the traditional definition of influencers relies on the asymptotic state of the
spreading process in exam. To uncover the fundamental difference between fast and late-time influencers, we introduce
the more general problem of finding the optimal influential spreaders at a given finite time t. We define the time-
dependent influence qi(t) of node i at time t as the average fraction of nodes in the recovered state for processes
initiated by node i, after t steps of the diffusion dynamics. Formally, we recover the traditional definition of (late-time)
node influence [9] for1 t → ∞: q(∞) := limt→∞ q(t).
3.1. Correlation between early-time and late-time node influence
Fig. 1 shows that while q(∞) and q(t) are positively correlated, the Pearson's linear correlation r(q(∞), q(t))
between q(∞) and q(t) is substantially smaller than one at early times (intuitively, t < 10). The discrepancy between
q and q(t) increases as λ increases: smaller values of β correspond indeed to processes that take less time to reach
the final state where there is no infected node left, which results in a better agreement between the early-time and
the late-time influence of the nodes. For example, at time t = 5, in Amazon, the correlation r(q(5), q(∞)) is still
relatively large for λ = λc [r(q(5), q(∞)) = 0.77], but it drops to 0.21 for λ = 10 λc. Generally, the larger λ, the
weaker the correlation between node late-time and early-time influence.
1As the SIR dynamics halts when no infected nodes are left, in numerical simulations, it is sufficient to wait a finite, system-dependent
and parameter-dependent computational time in order to measure q(∞).
6
Figure 2: The impact of hubs' social capital on their early-term influence, for the four main datasets analyzed here. The nodes are colored
according to their ranking by influence; only the top-5% nodes by degree k are displayed. Differently from t = 2 (Panels A -- D) and t = ∞
(Panels J -- L), at t = 5 (Panels E -- H), the most influencer hubs are characterized by a larger social capital s: the dark-blue dots (top-50
spreaders) tend to accumulate to the right of the panels. By contrast, local clustering does not have a significant impact on node influence.
Importantly, at a given finite time t, targeting the fast influencers (i.e., the nodes with the largest q(t) values)
generally leads to a substantial gain in the reach of the process as compared to targeting the traditional, late-time
influencers (i.e., the nodes with the largest q(∞) values). To illustrate this point, we define the relative gain RG(t)
from targeting the time-dependent optimal influencers at time t as the difference between the average time-dependent
influence Q(tt) of the top-0.5% nodes by q(t) and the average time-dependent influence Q(t∞) of the top 0.5 % nodes
by q(∞), normalized by Q(t∞). In formulas, RG(t) := (Q(tt) − Q(t∞))/Q(t∞). Essentially, RG(t) quantifies
how larger, at time t, are the outbreaks originated by the optimal influencers for time t as compared to the optimal
late-time influencers. The relative gain is, by definition, larger than or equal to zero, and RG(t) → 0 as t → ∞. The
observed values of RG(t) (see Fig. 3) indicate that the gains from targeting the optimal influencers for a given time
are not marginal; for instance, at time t = 5 and for λ = 5 λc, we observed values of RG(t) as large as 4.41, 0.49,
0.03, and 0.83 in Amazon, Cond-mat, Email-Enron, and Facebook, respectively.
Taken together, the results above demonstrate that when seeking to maximize the reach of a spreading process,
one faces a trade-off: maximizing the long-term influence of the process (i.e., choosing the seed node with the largest
q(∞)) does not provide the optimal influence maximization at a finite time. This property sets also time-dependent
bounds to the performance of influencer identification metrics [9]: an ideal centrality metric that correlates perfectly
with node late-time influence -- i.e., a metric with optimal performance according to the standard benchmarking of
influencer identification methods [9] -- is only weakly correlated with node influence at early times.
3.2. Not all the hubs are fast influencers: the role of neighborhood structure
After two steps of the dynamics, the degree of the nodes is the most relevant property to infer nodes' influence:
indeed, we expect qi(2) = βki/N . The accurate correspondence is lost at longer times, when the local structure
around the node of interest plays a non-negligible role, which results in a decreasing correlation between k and q(t)
as a function of t (see Fig. 4). How to exploit network structure to quantify node influence at a time t > 2 such that
7
Figure 3: Relative gain RG(t) from targeting the top-0.5% nodes by q(t) as compared to targeting the top-0.5% nodes by q(∞), for the
first 10 steps of the dynamics and the four largest networks analyzed here. By definition, the relative gain is always larger than or equal
to zero (RG(t) → 0 for t → ∞). Importantly, at early times, we observe a relative gain that is substantially larger than one, which
demonstrates that the processes initiated by the top-nodes by q(t) attain a substantially larger reach (improvement by 100%), at time t,
than the processes initiated by the top-nodes by q(∞).
the process has not yet reached its final state? In other words, which is the most accurate metric to estimate nodes'
early-time influence?
One would expect that at early times, it is sufficient to analyze local properties around the focal node. However,
there are many structural properties that one could consider, and it is not clear a priori which is the most parsimonious
way to accurately gauge node influence. Based on numerical simulations, previous studies [42, 43] have pointed out
high local clustering as a detrimental property for the influence of a node. Analytically, one can estimate the expected
influence of the nodes, which led to the Dynamics-Sensitive Centrality (DSC, see Methods) [32]; however, in principle,
its computation requires a detailed knowledge of the parameters of the dynamics.
On the other hand, here, we find that a parsimonious local property that determines node early-time influence is
the sum of a node's degree and neighbors' degree:
si = ki +
(cid:88)
j
Aij kj.
(10)
We interpret this property as a centrality metric, which we refer to as social capital : according to it, a node is
central if it has many connections (i.e., large degree), and if its contacts have many connections as well (i.e., large
(cid:80)
j Aij kj). Such a social capital function has been used in the context of strategic network formation model [44, 45],
where it turns out that a social interaction dynamics where the agents seek to maximize their social capital s leads
to highly-centralized network topologies [44]. The metric can be also interpreted as a special case of the Dynamics
Sensitive Centrality [32] and of the Neighborhood-based centrality [23].
For t > 2, at early times, a temporal regime emerges where the time-dependent influence of the hubs can be
accurately quantified by their social capital (see Fig. 2E-H for an illustration). The nodes with large social capital tend
to achieve high early-time influence, regardless of their local clustering coefficient. At late times, the correspondence
between node influence and social capital is either lost (see Fig. 2I,J,L) or, to some extent, maintained (see Fig. 2K).
8
Figure 4: Correlation between degree k and q(t) for the four largest networks analyzed here. The correlation tends to decrease with time.
This set of observations suggests that social capital can be an effective method for the identification of fast influencers,
a hypothesis that we validate below.
4. Fast and late-time influencer identification: benchmarking centrality metrics
The goal of this Section is to benchmark the centrality metrics introduced in Section 2.2 with respect to their
ability to single out the fast influencers (Section 4.1) and the late-time influencers (Section 4.2). Finally, we discuss
the complementary nature of local and global centrality metrics (Section 4.3).
4.1. Identification of fast influencers
In the following, we investigate the performance of different metrics for the vital nodes identification [9] at early
times. We consider nine centrality metrics: degree, social capital (defined above), H-index, LocalRank, Dynamics
Sensitive Centrality (DSC), k-core, eigenvector centrality, betweenness centrality, closeness centrality. We refer to
the Methods section for all the definitions. To evaluate the metrics, we measure both the precision P0.5%(s, q(t)) of
the ranking by the score s that they produce in identifying the top-0.5% nodes by influence q(t), and the Pearson's
linear correlation coefficient r(s, q(t)) between their score s and node influence. In the following, we always normalize
the observed values of correlations and precision by the correlation and precision values, respectively, achieved by the
best-performing metric. In this Section, we focus on the identification of fast influencers, whereas Section 4.2 focuses
on the identification of late-time influencers.
Fig. 5 compares the correlation r(·, q(5)) between node influence at time 5 and node score achieved by the various
centrality metrics, for the four largest analyzed networks. Social capital turns out to be always either the best
performing metric or relatively close to the best. The DSC and the LocalRank centrality perform similarly well,
yet they are marginally outperformed by the Social Capital centrality in Amazon. By contrast, the correlation
values achieved by the other eight metrics are, at least once, smaller than half of the correlation achieved by the
best-performing metric. Overall, local metrics substantially outperform global metrics -- the only exception is the
9
Figure 5: Metrics' ability to identify the fast influencers, as measured by the linear correlation between node influence q(5) after 5 steps
of the dynamics and node score as determined by the nine centrality metrics considered here. The color scale ranges from dark red (zero
correlation) to dark blue (correlation achieved by the best-performing metrics); the white color denotes half of the correlation achieved
by the best-performing metric. For all the analyzed datasets and parameter values, the correlation achieved by Social Capital is always
the largest one or close to the largest one.
nearly-optimal performance of the eigenvector centrality in Email-Enron. Qualitatively similar results hold for the
precision metric (see Appendix A).
While Fig. 5 looked at a specific point in time (t = 5) for four empirical networks, two extensions of the analysis
are essential. First, it is important to investigate the stability of the relative metrics' performance at early times. This
aspect is the main topic of Section 4.3. Second, one can consider more datasets. We analyzed ten more networks,
ending up with a total of 14 analyzed networks (the networks' details are reported in Table 1). We aggregated the
performance of each metric over the 14 networks according to the following procedure. For each network D and metric
m, we normalized the metric's correlation with node influence q(t), r(m, t;D), by the correlation rbest(t;D) achieved by
the best-performing metric. Then, we averaged the metrics relative performance as D−1(cid:80)D r(m, t;D)/rbest(t;D),
where D is the number of analyzed datasets. The results of this analysis (shown in Appendix B) are in qualitative
agreement with our results in Fig. 5: at early times (t = 5), social capital, LocalRank and the DSC are, on average,
the best performing metrics.
4.2. Identification of late-time influencers through centrality metrics
At late times, the identification of the best-performing metric is strongly dataset-dependent and parameter-
dependent. At the critical point, λ = λc, Social Capital, LocalRank the Dynamics Sensitive Centrality tend to be
the best-performing metrics according to both precision (see Appendix A) and correlation (see Fig. 6). On the other
hand, if λ is sufficiently large (e.g., λ = 5 λc), all metrics' precision sharply decreases after a sufficiently long time
due to the fact that most nodes become infected, regardless of the seed node (see Appendix A). Even when this
happens, it remains possible to discriminate the metrics' performance based on the correlation metric (see Fig. 6).
The k-core's performance is maximal or nearly maximal for λ ≥ 5 λc; for both Cond-mat and Facebook, the closeness
centrality performs optimally or nearly optimally for λ ≥ 5, which supports the competitiveness of distance-based
centrality metrics for processes that are sufficiently far from the critical point [19].
Again, to obtain a broader understanding of the metrics' performance, one needs to consider more datasets. As
a result of an analogous analysis to the one described in the last paragraph of Section 4.1, by analyzing 14 networks
10
Figure 6: Metrics' ability to identify the late-time influencers, as measured by the linear correlation between node late-time influence
q(∞) and node score as determined by the nine centrality metrics considered here. The color scale ranges from dark red (zero correlation)
to dark blue (correlation achieved by the best-performing metrics); the white color denotes half of the correlation achieved by the best-
performing metric. k-core turns out to be competitive for a broad range of parameter values, yet it fails at the critical point λ = λc
in Amazon. Despite its local nature, social capital is the only metric whose correlation did not fall below half of the best-performing
correlation for any of the considered parameter values.
in total, we find that at t → ∞, k-core and H-index are the most competitive metrics according to the average
correlation (see Appendix B). The same does not hold for precision, where the metrics' performance is impaired
by the fact that the late-time influence of most nodes approaches one. Again, closeness can only be competitive for
sufficiently large values of λ.
4.3. The complementarity of local and global metrics
In the previous results, we quantified the nodes' early-time influence through their influence at step t = 5, q(5).
Yet, it is important to investigate the performance of the centrality metrics in the full (λ, t) plane. The results (shown
in Figs. 7, C.11-C.12 in Appendix C) indicate the complementary nature of (well-performing) local and global metrics
in quantifying node influence. While local metrics (degree, social capital, H-index, and LocalRank) achieve optimal
or nearly optimal performance for small t and small λ, global metrics (k-core and closeness centrality) emerge as
optimal or nearly optimal metrics in the parameter region that corresponds to large t and large λ.
This scenario changes qualitatively for the precision metric. However, for the precision metric, the evaluation
in the full parameter space is impaired by the fact that for some datasets, as node influence becomes close to one
for most metrics, the precision of all the considered metrics is relatively low. This is evident in Figs. C.13-C.15
in Appendix C, where we use a black color to mark the parameter values where all the metrics achieve a precision
value smaller than 10%. For the remaining parameter values (i.e., those where at least one metric is able to achieve
a precision larger than 10%), local metrics (social capital, H-index, LocalRank) typically outperform global metrics
(k-core, eigenvector, and closeness centrality).
5. Conclusions
We have investigated the impact of time on the long-standing influence maximization problem, and performed
an extensive benchmarking of centrality metrics based on their performance in the identification of both fast and
late-time influencer nodes. Our results revealed that the early-time and late-time influence of a node can differ
11
Figure 7: Metrics' performance in the Cond-mat network as measured by their correlation with node influence at different times t and
for different λ values. Local metrics like Social Capital and H-index tend to perform better in the lower-left corner of the heatmap (early
time, processes close to the critical point), whereas global metrics like the k-core and closeness centrality tend to perform better in the
upper-right corner of the heatmap (late time, processes sufficiently far from the critical point). A similar qualitative picture holds for
other datasets (see Appendix C).
substantially. Besides, a simple local metric -- which we referred to as social capital -- allows us to identify the fast
influencers substantially better than global metrics, by using less information compared to existing local metrics (such
as LocalRank [21] and Dynamics-Sensitive Centrality [32]).
In the debate on the relative usefulness of local and global centralities [9, 20], our results indicate that local metrics
generally outperform global metrics at early times and for processes with a small spreading rate, whereas global metrics
may still outperform local metrics at late-times or for processes with a large spreading rate. Beyond epidemiological
models, it remains open to investigate the fast influencer identification problem in complex contagion [12] and rumor
spreading models [13, 46]. Nevertheless, the main message of our paper still holds: when assessing the performance
of metrics for the influencer identification, nodes' early- and late-time influence can be only weakly correlated, which
makes it critical to assess how the metrics' relative performance depends on the considered timescale.
To conclude, our work investigated the essential role of time in the vital nodes identification problem. Our
findings point out that given a complex network, the optimal late-time influencers might be suboptimal if we are
interested maximizing the reach of a spreading process within a limited amount of time. An important future
direction is the extension of these results to temporal networks [47], where metrics for node influence can be biased
by temporal effects [34, 48], and memory effects have a fundamental impact on diffusion processes [29, 49] and
epidemic spreading [47].
12
Appendix A. Results for the precision metric
Figure A.8: Metrics' ability to identify the fast influentials, as measured by the metrics' precision in identifying the top-0.5% nodes by
short-time influence q(5). The color scale ranges from dark red (zero precision) to dark blue (precision achieved by the best-performing
metrics); the white color denotes half of the precision achieved by the best-performing metric. All the metrics but Social Capital,
LocalRank, and the DSC have at least one white or red box, which indicates that Social Capital is a parsimonious and effective method
to identify the fast influentials.
13
Figure A.9: Metrics' ability to identify the late-time influentials, as measured by the metrics' precision in identifying the top-0.5% nodes
by late-time influence q(∞). The color scale ranges from dark red (zero precision) to dark blue (precision achieved by the best-performing
metrics); the white color denotes half of the precision achieved by the best-performing metric. We marked in black those parameter values
for which no metric achieves a precision larger than 10%. k-core turns out to be competitive for a broad range of parameter values, yet it
fails at the critical point λ = λc in Amazon. Despite its local nature, social capital is the only metric whose correlation did not fall below
half of the best-performing correlation, for the considered parameter values.
14
Appendix B. Metrics' aggregate performance over 14 networks
We follow the procedure described in the main text: For each dataset D and each metric m, we normalize the met-
ric's correlation (with node influence) r(m;D) by the correlation rbest(D) achieved by the best-performing metric for
that dataset. For each pair (λ, t), we obtain the average relative performance of the metric as D−1(cid:80)
d∈D r(m;D)/rbest(D).
We follow an analogous procedure for the metrics' precision. The results are shown and commented in Fig. B.10.
Figure B.10: Average relative metrics' performance over all the datasets in Table 1. At early times (t = 5), social capital, LocalRank and
the DSC emerge as the best performing metrics. At late times (t = ∞), k-core and H-index are the most competitive metrics according
to correlation, whereas degree, Social Capital and H-index perform similarly well according to precision. The closeness centrality is only
competitive for λ = 10 λc.
15
Appendix C. The complementarity of local and global metrics: Additional results
Figure C.11: Metrics' performance in the Email-Enron network as measured by their correlation with node influence at different times t
and for different λ values. Local metrics like Social Capital and H-index tend to perform better in the lower-left corner of the heatmap
(early time, processes close to the critical point), whereas global metrics like the k-core and closeness centrality tend to perform better in
the upper-right corner of the heatmap (late time, processes sufficiently far from the critical point).
Figure C.12: Metrics' performance in the Facebook network as measured by their correlation with node influence at different times t and
for different λ values. Local metrics like Social Capital and H-index tend to perform better in the lower-left corner of the heatmap (early
time, processes close to the critical point), whereas global metrics like the k-core centrality tend to perform better in the upper-right
corner of the heatmap (late time, processes sufficiently far from the critical point).
16
Figure C.13: Metrics' performance in the Cond-mat network as measured by their precision in identifying the top-0.5% nodes by influence
at different times t and for different λ values. The block color marks boxes that correspond to (λ, t) values where all the metrics' precision
is below 0.1.
Figure C.14: Metrics' performance in the Email-Enron network as measured by their precision in identifying the top-0.5% nodes by
influence at different times t and for different λ values. The block color marks boxes that correspond to (λ, t) values where all the metrics'
precision is below 0.1.
17
Figure C.15: Metrics' performance in the Facebook network as measured by their precision in identifying the top-0.5% nodes by influence
at different times t and for different λ values. The block color marks boxes that correspond to (λ, t) values where all the metrics' precision
is below 0.1.
18
Acknowledgments
We thank Flavio Iannelli for many enlightening discussions on the topic, and his feedback on an early version of
the manuscript. This work has been supported by the National Natural Science Foundation of China (Grants Nos.
61673150, 11622538), the Science Strength Promotion Program of the UESTC, and the Zhejiang Provincial Natural
Science Foundation of China (Grant no. LR16A050001). MSM acknowledges the University of Zurich for support
through the URPP Social Networks.
References
[1] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, A. Vespignani, Epidemic processes in complex networks,
Reviews of Modern Physics 87 (3) (2015) 925.
[2] R. Peres, E. Muller, V. Mahajan, Innovation diffusion and new product growth models: A critical review and
research directions, International Journal of Research in Marketing 27 (2) (2010) 91 -- 106.
[3] D. Centola, The spread of behavior in an online social network experiment, Science 329 (5996) (2010) 1194 -- 1197.
[4] E. Katz, P. F. Lazarsfeld, Personal influence: the part played by people in the flow of mass communications,
Glencoe, IL: Free Press, (1955).
[5] D. J. Watts, P. S. Dodds, Influentials, networks, and public opinion formation, Journal of Consumer Research
34 (4) (2007) 441 -- 458.
[6] C. W. King, J. O. Summers, Overlap of opinion leadership across consumer product categories, Journal of
Marketing Research (1970) 43 -- 50.
[7] R. Tanase, C. J. Tessone, R. Algesheimer, Identification of influencers through the wisdom of crowds, PLOS
ONE 13 (7) (2018) e0200109.
[8] M. G. Nejad, D. L. Sherrell, E. Babakus, Influentials and influence mechanisms in new product diffusion: an
integrative review, Journal of Marketing Theory and Practice 22 (2) (2014) 185 -- 208.
[9] L. Lu, D. Chen, X.-L. Ren, Q.-M. Zhang, Y.-C. Zhang, T. Zhou, Vital nodes identification in complex networks,
Physics Reports 650 (2016) 1 -- 63.
[10] S. Pei, F. Morone, H. A. Makse, Theories for influencer identification in complex networks, in: Complex Spreading
Phenomena in Social Systems, Springer (2018) 125 -- 148.
[11] M. Kitsak, L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, H. A. Makse, Identification of
influential spreaders in complex networks, Nature Physics 6 (11) (2010) 888 -- 893.
[12] D. Kempe, J. Kleinberg, ´E. Tardos, Maximizing the spread of influence through a social network, Proceedings
of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM (2003)
137 -- 146.
[13] J. Borge-Holthoefer, Y. Moreno, Absence of influential spreaders in rumor dynamics, Physical Review E 85 (2)
(2012) 026116.
19
[14] F. Morone, H. A. Makse, Influence maximization in complex networks through optimal percolation, Nature
524 (7563) (2015) 65.
[15] L. Lu, T. Zhou, Q.-M. Zhang, H. E. Stanley, The h-index of a network node and its relation to degree and
coreness, Nature Communications 7 (2016) 10168.
[16] F. Radicchi, C. Castellano, Leveraging percolation theory to single out influential spreaders in networks, Physical
Review E 93 (6) (2016) 062314.
[17] F. Radicchi, C. Castellano, Fundamental difference between superblockers and superspreaders in networks, Phys-
ical Review E 95 (1) (2017) 012318.
[18] R. Pastor-Satorras, C. Castellano, Topological structure and the h index in complex networks, Physical Review
E 95 (2) (2017) 022301.
[19] F. Iannelli, M. S. Mariani, I. M. Sokolov, Influencers identification in complex networks through reaction-diffusion
dynamics, Physical Review E 98 (6) (2018) 062302.
[20] Y. Hu, S. Ji, Y. Jin, L. Feng, H. E. Stanley, S. Havlin, Local structure can identify and quantify influential global
spreaders in large scale social networks, Proceedings of the National Academy of Sciences (2018) 201710547.
[21] D. Chen, L. Lu, M.-S. Shang, Y.-C. Zhang, T. Zhou, Identifying influential nodes in complex networks, Physica
A: Statistical Mechanics and its Applications 391 (4) (2012) 1777 -- 1787.
[22] D.-B. Chen, R. Xiao, A. Zeng, Y.-C. Zhang, Path diversity improves the identification of influential spreaders,
EPL (Europhysics Letters) 104 (6) (2014) 68006.
[23] Y. Liu, M. Tang, T. Zhou, Y. Do, Identify influential spreaders in complex networks, the role of neighborhood,
Physica A: Statistical Mechanics and its Applications 452 (2016) 289 -- 298.
[24] G. F. De Arruda, A. L. Barbieri, P. M. Rodr´ıguez, F. A. Rodrigues, Y. Moreno, L. da Fontoura Costa, Role of
centrality for the identification of influential spreaders in complex networks, Physical Review E 90 (3) (2014)
032812.
[25] Z.-M. Ren, A. Zeng, D.-B. Chen, H. Liao, J.-G. Liu, Iterative resource allocation for ranking spreaders in complex
networks, EPL (Europhysics Letters) 106 (4) (2014) 48005.
[26] S. Helm, Viral marketing-establishing customer relationships by 'word-of-mouse', Electronic Markets 10 (3)
(2000) 158 -- 161.
[27] C. Shao, G. L. Ciampaglia, O. Varol, K.-C. Yang, A. Flammini, F. Menczer, The spread of low-credibility content
by social bots, Nature Communications 9 (1) (2018) 4787.
[28] M. Karsai, M. Kivela, R. K. Pan, K. Kaski, J. Kert´esz, A.-L. Barab´asi, J. Saramaki, Small but slow world: How
network topology and burstiness slow down spreading, Physical Review E 83 (2) (2011) 025102.
[29] I. Scholtes, N. Wider, R. Pfitzner, A. Garas, C. J. Tessone, F. Schweitzer, Causality-driven slow-down and
speed-up of diffusion in non-markovian temporal networks, Nature Communications 5 (2014) 5024.
20
[30] T. Zhou, J.-G. Liu, W.-J. Bai, G. Chen, B.-H. Wang, Behaviors of susceptible-infected epidemics on scale-free
networks with identical infectivity, Physical Review E 74 (5) (2006) 056109.
[31] N. A. Christakis, J. H. Fowler, Social network sensors for early detection of contagious outbreaks, PLOS ONE
5 (9) (2010) e12948.
[32] J.-G. Liu, J.-H. Lin, Q. Guo, T. Zhou, Locating influential nodes via dynamics-sensitive centrality, Scientific
Reports 6 (2016).
[33] L. C. Freeman, Centrality in social networks conceptual clarification, Social Networks 1 (3) (1978) 215 -- 239.
[34] H. Liao, M. S. Mariani, M. Medo, Y.-C. Zhang, M.-Y. Zhou, Ranking in evolving complex networks, Physics
Reports 689 (2017) 1 -- 54.
[35] M. Newman, Networks, Oxford University Press, (2018).
[36] P. Bonacich, P. Lloyd, Eigenvector-like measures of centrality for asymmetric relations, Social networks 23 (2001)
193 -- 194.
[37] U. Brandes, A faster algorithm for betweenness centrality, Journal of Mathematical Sociology 25 (2001).
[38] http://konect.uni-koblenz.de/networks/com-amazon, accessed: 2018-10-01.
[39] http://networkscience.cn/index.php/data/, accessed: 2018-10-01.
[40] http://networkscience.cn/index.php/data/, accessed: 2018-10-01.
[41] http://konect.uni-koblenz.de/networks/facebook-wosn-links, accessed: 2018-10-01.
[42] D.-B. Chen, H. Gao, L. Lu, T. Zhou, Identifying influential nodes in large-scale directed networks: the role of
clustering, PloS one 8 (10) (2013) e77455.
[43] R. Peres, The impact of network characteristics on the diffusion of innovations, Physica A: Statistical Mechanics
and Its Applications 402 (2014) 330 -- 343.
[44] M. Bardoscia, G. De Luca, G. Livan, M. Marsili, C. J. Tessone, The social climbing game, Journal of statistical
physics 151 (3-4) (2013) 440 -- 457.
[45] M. D. Konig, C. J. Tessone, Y. Zenou, Nestedness in networks: A theoretical model and some applications,
Theoretical Economics 9 (3) (2014) 695 -- 752.
[46] J. Borge-Holthoefer, S. Meloni, B. Gon¸calves, Y. Moreno, Emergence of influential spreaders in modified rumor
models, Journal of Statistical Physics 151 (1-2) (2013) 383 -- 393.
[47] P. Holme, Temporal network structures controlling disease spreading, Physical Review E 94 (2) (2016) 022305.
[48] M. S. Mariani, M. Medo, Y.-C. Zhang, Ranking nodes in growing networks: When pagerank fails, Scientific
Reports 5 (2015) 16181.
[49] J. Xu, T. L. Wickramarathne, N. V. Chawla, Representing higher-order dependencies in networks, Science
advances 2 (5) (2016) e1600028.
21
|
1611.01890 | 5 | 1611 | 2017-07-10T19:20:02 | OSMnx: New Methods for Acquiring, Constructing, Analyzing, and Visualizing Complex Street Networks | [
"cs.SI",
"physics.soc-ph"
] | Urban scholars have studied street networks in various ways, but there are data availability and consistency limitations to the current urban planning/street network analysis literature. To address these challenges, this article presents OSMnx, a new tool to make the collection of data and creation and analysis of street networks simple, consistent, automatable and sound from the perspectives of graph theory, transportation, and urban design. OSMnx contributes five significant capabilities for researchers and practitioners: first, the automated downloading of political boundaries and building footprints; second, the tailored and automated downloading and constructing of street network data from OpenStreetMap; third, the algorithmic correction of network topology; fourth, the ability to save street networks to disk as shapefiles, GraphML, or SVG files; and fifth, the ability to analyze street networks, including calculating routes, projecting and visualizing networks, and calculating metric and topological measures. These measures include those common in urban design and transportation studies, as well as advanced measures of the structure and topology of the network. Finally, this article presents a simple case study using OSMnx to construct and analyze street networks in Portland, Oregon. | cs.SI | cs | OSMnx: New Methods for Acquiring, Constructing, Analyzing, and
Visualizing Complex Street Networks
Geoff Boeing
Email: [email protected]
Department of City and Regional Planning
University of California, Berkeley
May 2017
Abstract
five significant capabilities
Urban scholars have studied street networks in various ways, but there are
data availability and consistency
limitations to the current urban
planning/street network analysis literature. To address these challenges,
this article presents OSMnx, a new tool to make the collection of data and
creation and analysis of street networks simple, consistent, automatable
and sound from the perspectives of graph theory, transportation, and
urban design. OSMnx contributes
for
researchers and practitioners: first, the automated downloading of political
boundaries and building footprints; second, the tailored and automated
downloading
from
OpenStreetMap; third, the algorithmic correction of network topology;
fourth, the ability to save street networks to disk as shapefiles, GraphML,
or SVG files; and fifth, the ability to analyze street networks, including
calculating routes, projecting and visualizing networks, and calculating
metric and topological measures. These measures include those common
in urban design and transportation studies, as well as advanced measures
of the structure and topology of the network. Finally, this article presents a
simple case study using OSMnx to construct and analyze street networks
in Portland, Oregon.
street network data
and
constructing of
This is a preprint. Download the published article at: http://geoffboeing.com/publications/osmnx-complex-
street-networks/
Cite as: Boeing, G. 2017. "OSMnx: New Methods for Acquiring, Constructing, Analyzing, and Visualizing
Complex Street Networks." Computers, Environment and Urban Systems 65, 126-139.
doi:10.1016/j.compenvurbsys.2017.05.004
BOEING
1. Introduction
Urban scholars and planners have studied street networks in numerous ways. Some studies focus
on the urban form (e.g., Southworth and Ben-Joseph 1997; Strano et al. 2013), others on
transportation (e.g., Marshall and Garrick 2010; Parthasarathi et al. 2013), and others on the
topology, complexity, and resilience of street networks (e.g., Jiang and Claramunt 2004; Porta et
al. 2006). This article argues that current limitations of data availability, consistency, and
technology have made researchers' work gratuitously difficult. In turn, this empirical literature
often suffers from four shortcomings which this article examines: small sample sizes, excessive
network simplification, difficult reproducibility, and the lack of consistent, easy-to-use research
tools. These shortcomings are by no means fatal, but their presence limits the scalability,
generalizability, and interpretability of empirical street network research.
To address these challenges, this article presents OSMnx, a new tool that easily downloads and
analyzes street networks for anywhere in the world. OSMnx contributes five primary capabilities
for researchers and practitioners. First, it enables automated and on-demand downloading of
political boundary geometries, building footprints, and elevations. Second, it can automate and
customize the downloading of street networks from OpenStreetMap and construct them into
multidigraphs. Third, it can correct and simplify network topology. Fourth, it can save/load
street networks to/from disk in various file formats. Fifth and finally, OSMnx has built-in
functions to analyze street networks, calculate routes, project and visualize networks, and quickly
and consistently calculate various metric and topological measures. These measures include
those common in urban design and transportation studies, as well as advanced measures of the
structure and topology of the network.
This article is organized as follows. First, it introduces the background of networks, street
network analysis and representation, and the current landscape of tools for this type of research.
Then it discusses shortcomings and current challenges, situated in the empirical literature. Next,
it introduces OSMnx and its methodological contributions. Finally, it presents a simple
illustrative case study using OSMnx to construct and analyze street networks in Portland,
Oregon, before concluding with a discussion.
2. Background
Street network analysis has been central to network science since its nascence: its mathematical
foundation, graph theory, was born in the 18th century when Leonhard Euler presented his
famous Seven Bridges of Königsberg problem. Here we briefly trace the fundamentals of modern
street network research from graphs to networks to the present landscape of research toolkits, in
order to identify current limitations.
2.1. Graphs and networks
Network science is built upon the foundation of graph theory, a branch of discrete mathematics.
A graph is an abstract representation of a set of elements and the connections between them
(Trudeau 1994). The elements are interchangeably called vertices or nodes, and the connections
between them are called links or edges. For consistency, this article uses the terms nodes and
edges. The number of nodes in the graph (called the degree of the graph) is commonly
represented as n and the number of edges as m. Two nodes are adjacent if an edge connects them,
2
BOEING
two edges are adjacent if they share the same node, and a node and an edge are incident if the
edge connects the node to another node. A node's degree is the number of edges incident to the
node, and its neighbors are all those nodes to which the node is connected by edges.
An undirected graph's edges point mutually in both directions, but a directed graph, or digraph,
has directed edges (i.e., edge uv points from node u to node v, but there is not necessarily a
reciprocal edge vu). A self-loop is an edge that connects a single node to itself. Graphs can also
have parallel (i.e., multiple) edges between the same two nodes. Such graphs are called
multigraphs, or multidigraphs if they are directed.
An undirected graph is connected if each of its nodes can be reached from any other node. A
digraph is weakly connected if the undirected representation of the graph is connected, and
strongly connected if each of its nodes can be reached from any other node. A path is an ordered
sequence of edges that connects some ordered sequence of nodes. Two paths are internally node-
disjoint if they have no nodes in common, besides end points. A weighted graph's edges have a
weight attribute to quantify some value, such as importance or impedance, between connected
nodes. The distance between two nodes is the number of edges in the path between them, while
the weighted distance is the sum of the weight attributes of the edges in the path.
While a graph is an abstract mathematical representation of elements and their connections, a
network may be thought of as a real-world graph. Networks inherit the terminology of graph
theory. Familiar examples include social networks (where the nodes are humans and the edges
are their interpersonal relationships) and the World Wide Web (where the nodes are web pages
and the edges are hyperlinks that point from one to another). A complex network is one with a
nontrivial topology (the configuration and structure of its nodes and edges) – that is, the topology
is neither fully regular nor fully random. Most large real-world networks are complex (Newman
2010). Of particular interest to this study are complex spatial networks – that is, complex
networks with nodes and/or edges embedded in space (O'Sullivan 2014). A street network is an
example of a complex spatial network with both nodes and edges embedded in space, as are
railways, power grids, and water and sewage networks (Barthélemy 2011).
2.2. Representation of street networks
A spatial network is planar if it can be represented in two dimensions with its edges intersecting
only at nodes. A street network, for instance, may be planar (particularly at certain small scales),
but most street networks are non-planar due to grade-separated expressways, overpasses, bridges,
and tunnels. Despite this, most quantitative studies of urban street networks represent them as
planar (e.g., Buhl et al. 2006; Cardillo et al. 2006; Barthélemy and Flammini 2008; Masucci et al.
2009; Strano et al. 2013) for tractability because bridges and tunnels are reasonably uncommon
(in certain places) – thus the networks are approximately planar. However, this over-
simplification to planarity for tractability may be unnecessary and can cause analytical problems,
as we discuss shortly.
The street networks discussed so far are primal: the graphs represent intersections as nodes and
street segments as edges. In contrast, a dual graph (namely, the edge-to-node dual graph, also
called the line graph) inverts this topology: it represents a city's streets as nodes and intersections
as edges (Porta et al. 2006). Such a representation may seem a bit odd but provides certain
advantages in analyzing the network topology based on named streets (Crucitti et al. 2006). Dual
graphs form the foundation of space syntax, a method of analyzing urban networks and
3
BOEING
configuration via axial street lines and the depth from one edge to others (Hillier et al. 1976; cf.
Ratti 2004). Jiang and Claramunt (2002) integrate an adapted space syntax – compensating for
difficulties with axial lines – into computational GIS. Space syntax has formed the basis of
various other adapted approaches to analytical urban design (e.g., Karimi 2012).
This present article, however, focuses on primal graphs because they retain all the geographic,
spatial, metric information essential to urban form and design that dual representations discard:
all the geographic, experiential traits of the street (such as its length, shape, circuity, width, etc.)
are lost in a dual graph. A primal graph, by contrast, can faithfully represent all the spatial
characteristics of a street. Primal may be a better approach for analyzing spatial networks when
geography matters, because the physical space underlying the network contains relevant
information that cannot exist in the network's topology alone (Ratti 2004).
2.3. Street network analysis
Street networks – considered here as primal, non-planar, weighted multidigraphs with self-loops
– can be characterized and described by metric and topological measures. Extended definitions
and algorithms can be found in, e.g., Newman (2010) and Barthélemy (2011).
Metric structure can be measured in terms of length and area and represents common
transportation/design variables (e.g., Cervero and Kockelman 1997; Ewing and Cervero 2010).
Average street length, the mean edge length (in spatial units such as meters) in the undirected
representation of the graph, serves as a linear proxy for block size and indicates how fine-grained
or coarse-grained the network is. Node density is the number of nodes divided by the area
covered by the network. Intersection density is the node density of the set of nodes with more
than one street emanating from them (thus excluding dead-ends). The edge density is the sum of
all edge lengths divided by the area, and the physical street density is the sum of all edges in the
undirected representation of the graph divided by the area. These density measures all provide
further indication of how fine-grained the network is. Finally, the average circuity divides the
sum of all edge lengths by the sum of the great-circle distances between the nodes incident to
each edge (cf. Giacomin and Levinson 2015). This is the average ratio between an edge length
and the straight-line distance between the two nodes it links.
The eccentricity of a node is the maximum of the shortest-path weighted distances between it and
each other node in the network. This represents how far the node is from the node that is furthest
from it. The diameter of a network is the maximum eccentricity of any node in the network and
the radius of a network is the minimum eccentricity of any node in the network. The center of a
network is the node or set of nodes whose eccentricity equals the radius and the periphery of a
network is the node or set of nodes whose eccentricity equals the diameter. When weighted by
length, these distances indicate network size and shape in units such as meters.
Topological measures of street network structure indicate the configuration, connectedness, and
robustness of the network – and how these characteristics are distributed. The average node
degree, or mean number of edges incident to each node, quantifies how well the nodes are
connected on average. Similarly, but more concretely, the average streets per node measures the
mean number of physical streets (i.e., edges in the undirected representation of the graph) that
emanate from each intersection and dead-end. This adapts the average node degree for physical
form rather than directed circulation. The statistical and spatial distributions of number of streets
4
BOEING
per intersection characterize the type, prevalence, and dispersion of intersection connectedness
in the network.
Connectivity measures the minimum number of nodes or edges that must be removed from a
connected graph to disconnect it. This is a measure of resilience as complex networks with high
connectivity provide more routing choices to agents and are more robust against failure.
However, node and edge connectivity is less useful for approximately planar networks like street
networks: most street networks will have connectivity of 1, because the presence of a single dead-
end means the removal of just one node or edge can disconnect the network. More usefully, the
average node connectivity of a network – the mean number of internally node-disjoint paths
between each pair of nodes in the graph – represents the expected number of nodes that must be
removed to disconnect a randomly selected pair of non-adjacent nodes (Beineke et al. 2002).
As O'Sullivan (2014) discusses, network distances, degrees, and connectivity are significantly
constrained by spatial embeddedness and approximate planarity. Other measures of
connectedness – such as intersection density, node degree distribution, and centrality/clustering
(discussed below) – may better capture the nature of a street network's connectedness than node
or edge connectivity can. Networks with low connectedness may have multiple single points of
failure, leaving the system particularly vulnerable to perturbation. This can be seen in urban
design through permeability and choke points: if circulation is forced through single points of
failure, traffic jams can ensue and circulation networks can fail. Connectedness has also been
linked to street network pedestrian volume (Hajrashouliha and Yin 2015).
Clustering measures also reveal topological structure and its distribution. The clustering
coefficient of a node is the ratio of the number of edges between its neighbors to the maximum
possible number of edges that could exist between these neighbors. The weighted clustering
coefficient weights this ratio by edge length and the average clustering coefficient is the mean of
the clustering coefficients of all the nodes in the network. These measure connectedness and
complexity by how thoroughly the neighborhood of some node is linked together. Jiang and
Claramunt (2004) extend this coefficient to neighborhoods within an arbitrary distance to make
it more applicable to urban street networks.
Centrality indicates the importance of nodes in a network. Betweenness centrality evaluates the
number of shortest paths that pass through each node or edge (Barthélemy 2004). The maximum
betweenness centrality in a network specifies the proportion of shortest paths that pass through
the most important node/edge. This is an indicator of resilience: networks with a high maximum
betweenness centrality are more prone to failure or inefficiency should this single choke point
fail. The average betweenness centrality is the mean of all the betweenness centralities in the
network (Barthélemy 2011). Barthélemy et al. (2013) use betweenness centrality to identify top-
down interventions versus bottom-up self-organization and evolution of Paris's urban fabric.
Closeness centrality represents, for each node, the reciprocal of the sum of the distance from this
node to all others in the network: that is, nodes rank as more central if they are on average closer
to all other nodes. Finally, PageRank – the algorithm Google uses to rank web pages – is a variant
of network centrality, namely eigenvector centrality (Brin and Page 1998). PageRank ranks nodes
based on the structure of incoming links and the rank of the source node, and may also be
applied to street networks (Agryzkov et al. 2012; Chin and Wen 2015).
5
BOEING
2.4. Current tool landscape
Several tools exist to study street networks. ESRI provides an ArcGIS Network Analyst extension,
for which Sevtsuk and Mekonnen (2012) developed the Urban Network Analysis Toolkit plug-in.
QGIS, an open-source alternative, also provides limited capabilities through built-in plug-ins.
GIS tools generally provide very few network analysis capabilities, such as shortest path
calculations. In contrast, network analysis software – such as Gephi, igraph, and graph-tool –
provides minimal GIS functionality to study spatial networks. Pandana is a Python package that
performs accessibility queries over a spatial network, but does not support other graph-theoretic
network analyses (Foti 2014). NetworkX is a Python package for general network analysis,
developed by researchers at Los Alamos National Laboratory. It is free, open-source, and able to
analyze networks with millions of nodes and edges (Hagberg and Conway 2010).
Street network data comes from many sources – including city, state, and national data
repositories – and typically in shapefile format. Expensive proprietary data sources such as HERE
NAVSTREETS and TomTom MultiNet also exist. In the US, the census bureau provides free
TIGER/Line (Topologically Integrated Geographic Encoding and Referencing) shapefiles of
geographic data such as cities, census tracts, roads, buildings, and certain natural features.
However, TIGER/Line roads shapefiles suffer from inaccuracies (Frizelle et al. 2009), contain
quite coarse-grained classifiers (e.g., classifying parking lots as alleys), and topologically depict
bollarded intersections as through-streets, which problematizes routing. Furthermore, there is no
central repository of worldwide street network data, which can be inconsistent, difficult, or
impossible for researchers to obtain in many countries.
OpenStreetMap – a collaborative mapping project that provides a free and publicly editable map
of the world – has emerged in recent years as a major player both for mapping and for acquiring
spatial data (Corcoran et al. 2013; Jokar Arsanjani 2015). Inspired by Wikipedia's mass-
collaboration model, the project started in 2004 and has grown to over two million users today.
Its data quality is generally quite high (Girres and Touya 2010; Haklay 2010; Barron et al. 2014)
and although data coverage varies worldwide, it is generally good when compared to
corresponding estimates from the CIA World Factbook (Maron 2015). In the US,
OpenStreetMap imported the 2005 TIGER/Line roads in 2007 as a foundational data source
(Zielstra et al. 2013). Since then, numerous corrections and improvements have been made. But
more importantly, many additions have been made beyond what TIGER/Line captures,
including pedestrian paths through parks, passageways between buildings, bike lanes and routes,
and richer attribute data describing the characteristics of features, such as finer-grained codes for
classifying arterial roads, collector streets, residential streets, alleys, parking lots, etc.
There are several methods of acquiring street network data from OpenStreetMap. First,
OpenStreetMap provides an API, called Overpass, which can be queried programmatically to
retrieve any data in the database: streets and otherwise. However, its usage and syntax are
notoriously challenging and several services have sprung up to simplify the process. Mapzen
extracts chunks of OpenStreetMap data constrained to bounding boxes around 200 metropolitan
areas worldwide. They also provide custom extracts, which can take up to an hour to run.
Mapzen works well for simple bounding boxes around popular cities, but otherwise does not
provide an easily scalable or customizable solution. Geofabrik similarly provides data extracts,
generally at the national or sub-national scale, but provides shapefiles as a paid service.
6
BOEING
Finally, GISF2E is a tool (compatible with ArcGIS and an outdated version of Python) that can
convert shapefiles (such as Mapzen or Geofabrik extracts) into graph-theoretic network data sets
(Karduni et al. 2016). Its creators provide processed shapefiles for several cities online but with
some limitations. While GISF2E shapefiles' roads have a flag denoting one-way streets, it discards
to and from nodes, thus making it unclear in which direction the one-way goes. It also can treat
nodes inconsistently due to arbitrary break points between OpenStreetMap IDs or line
digitization. OpenStreetMap IDs sometimes map 1-to-1 with a named street, but other times a
named street might comprise multiple OpenStreetMap IDs. Further, some streets have arbitrary
"nodes" in the middle of a segment because the OpenStreetMap ID is different on either side.
2.5. Research problem
Due to the preceding limitations of street network data availability, consistency, and technology,
the empirical literature often suffers from four shortcomings. First, the sample sizes in cross-
sectional studies tend to be quite small due to clear challenges in acquiring large data sets. Most
cross-sectional studies tend to analyze somewhere between 10 and 50 or so networks for
tractability at the city or neighborhood scale (e.g., Buhl et al. 2006; Cardillo et al. 2006; Jiang
2007; Marshall and Garrick 2010; Strano et al. 2013; Giacomin and Levinson 2015). Acquiring
and assembling large numbers of street networks consistently from data sources spread across
various governmental entities can be extremely difficult and time-consuming. However, small
sample sizes can limit the representativeness and reliability of findings.
Second, studies usually simplify the representation of the street network to a planar or undirected
graph for tractability (e.g., Buhl et al. 2006; Cardillo et al. 2006; Barthélemy and Flammini 2008;
Masucci et al. 2009). Typically, researchers assemble street networks into some sort of graph-
theoretic object from GIS data, for instance by splitting the centerlines of all the streets in a study
area wherever they cross in two dimensions. These split lines become edges and the splitting
points become nodes. However, this method presumes a planar graph: bridges and tunnels
become splitting points (and thus nodes) even if the streets do not actually intersect in three
dimensions. Unless the street network is truly planar, a planar simplification is thus a less-than-
ideal representation that potentially yields inaccurate metrics, underestimates the lengths of
edges, and overestimates the number of nodes. This may reasonably represent a street network in
a European medieval city center, but poorly represents the street network in a city like Los
Angeles with numerous grade-separated expressways, bridges, and tunnels in a truly non-planar
network. Karduni et al. (2016) suggest the importance of using GIS attribute data to identify such
non-planar features to create a correct topology.
The third problem is replicability. The dozens of decisions that go into analysis – such as spatial
extents, topological simplification and correction, definitions of nodes and edges, etc. – are often
ad hoc or only partially reported, making reproducibility challenging. Some studies gloss over the
precise details of how their street networks were constructed (frequently due to some
combination of methodological complexity and journal word limits), yet numerous unreported
decisions had to be made in the process. For example, various studies examine cities out to the
urban periphery, but do not explain precisely how and where this periphery is defined (e.g.,
Strano et al. 2013). Some studies do not report if their networks are directed or undirected (e.g.,
Porta et al. 2006; Strano et al. 2013). Directedness may not matter for pedestrian studies but
substantially impacts the interpretation of various network statistics when directedness does
matter (e.g., for drivable networks). Further, what are edges in the street network? Drivable
streets? Pedestrian paths? What is a node in the street network? Is it where at least two different
7
BOEING
named streets come together? Does it denote any junction of routes? What about dead-ends?
Different studies make different but perfectly valid decisions with these various questions (e.g.,
Frizelle et al. 2009; Marshall and Garrick 2010; Sevtsuk and Mekonnen 2012). Their definitions
impact how we interpret various calculated features like degrees or intersection densities, and
any research design decisions that go unreported can problematize replicability, interpretation,
and generalizability.
Fourth, as discussed, the current landscape of tools and methods offers no ideal technique that
balances usability, customizability, reproducibility, and scalability in acquiring, constructing, and
analyzing network data. Taken together, these limitations make street network researchers' work
difficult and can circumscribe the conclusions that may be drawn from the effort.
3. OSMnx: Functionality and comparison to existing tools
To address these challenges, this article presents a new tool to make the collection of data and
creation and analysis of street networks simple, consistent, automatable, and sound from the
perspectives of graph theory, transportation, and urban design. OSMnx is a free, open-source
Python package that downloads political/administrative boundary geometries, building
footprints, and street networks from OpenStreetMap. It enables researchers to easily construct,
project, visualize, and analyze non-planar complex street networks consistently by constructing a
city's or neighborhood's walking, driving, or biking network with a single line of Python code –
including node elevations and street grades. Python was chosen because the language is popular,
easy for beginners, powerful, fast, free, and open-source. OSMnx is built on top of Python's
NetworkX, matplotlib, and geopandas libraries for rich network analytic capabilities, beautiful
and simple visualizations, and fast spatial queries with R-tree indexing. This section discusses
OSMnx's primary features in order.
3.1. Acquire political boundaries and building footprints
To acquire place boundary GIS data, researchers typically must locate and download shapefiles
online. However, bulk or automated acquisition (such as that required to analyze hundreds or
thousands of separate geographies) requires clicking through numerous web pages to download
shapefiles one at a time. With OSMnx, one can download place geometries from OpenStreetMap
for anywhere in the world with a single line of Python code, and project and visualize in one
more line of code (Figure 1). To project, OSMnx calculates UTM zones algorithmically based on
the centroid of the geometry. One can easily acquire geometries for multiple place types, such as
neighborhoods, boroughs, counties, states, or nations – any place geometry available in
OpenStreetMap. Or, one can pass multiple places in a single query to construct multiple features
of cities, states, counties, nations, or any other geographic entities, and the results can be saved as
shapefiles to a hard drive. Similarly, building footprints can be retrieved for anywhere that
OpenStreetMap has such data.
3.2. Download and construct street networks
The primary use of OSMnx is the easy downloading and construction of street networks. To
acquire street network GIS data, one must typically track down TIGER/Line roads from the US
census bureau – or individual data sets from other countries or cities, as TIGER/Line provides no
street network data for geographies outside the US – then convert the data to graph-theoretic
8
BOEING
objects. However, this becomes preventively burdensome for large numbers of separate street
networks as it does not lend itself to bulk, automated analysis. Further, it ignores informal paths
and pedestrian circulation that TIGER/Line lacks. In contrast, OSMnx handles all of these use
cases.
OSMnx downloads street network data and builds topologically-corrected street networks,
projects and plots the networks, and saves them as SVGs, GraphML files, or shapefiles for later
use. The street networks are primal, non-planar, weighted multidigraphs with self-loops and they
preserve one-way directionality. One can download a street network by providing OSMnx any of
the following queries (Figure 2):
bounding box
latitude-longitude point plus distance in meters (either a distance along the network or a
distance in each cardinal direction from the point)
address plus distance in meters (either a distance along the network or a distance in each
cardinal direction from the point)
polygon of the desired street network's boundaries
place name or list of place names
One can also specify different network types to clarify what is an edge in the network:
drive: get drivable public streets (but not service roads)
drive_service: get drivable public streets including service roads
walk: get all streets and paths that pedestrians can use (this network type ignores one-way
directionality by always connecting adjacent nodes with reciprocal directed edges)
bike: get all streets and paths that cyclists can use
all: download all (non-private) OpenStreetMap streets and paths
all_private: download all OpenStreetMap streets and paths, including private-access
When passed a place name (as in Figure 3), OSMnx geocodes it using OpenStreetMap's
Nominatim API and constructs a polygon from its boundary geometry. It then buffers this
polygon by 500 meters and downloads the street network data within this buffer from
OpenStreetMap's Overpass API. Next it constructs the street network from this data. For one-
way streets, directed edges are added from the origin node to the destination node. For
bidirectional streets, reciprocal directed edges are added in both directions between nodes. Then
OSMnx corrects the topology (discussed below), calculates accurate degrees and node types, then
truncates the network to the original, desired polygon. This ensures that intersections are not
considered dead-ends simply because an incident edge connects to a node outside the desired
polygon. Finally, node elevation data and street grades may be added to the network from the
Google Maps Elevation API in one more line of code.
Researchers can request a street network within a borough, county, state, or other geographic
entity – or pass a list of places, such as several neighboring cities, to create a unified street
network within the union of their geometries. In general, US roads GIS data is fairly easy to
acquire, thanks to TIGER/Line shapefiles. OSMnx makes it easier by downloading it and turning
it into a graph with a single line of code, and better by supplementing it with all the additional
data (both attributes and non-road routes) from OpenStreetMap. With OSMnx, researchers can
just as easily acquire street networks from anywhere in the world – including places in the Global
South where such data might otherwise be inconsistent or difficult to acquire (Figure 4).
9
BOEING
Figure 1. Administrative boundary vector geometries retrieved for A) the city of Berkeley, California and B) the
nations of Zambia, Zimbabwe, and Botswana.
Figure 2. Three graphs from the same street network at the same scale, created by address and network distance
(left), bounding box (center), and neighborhood polygon (right).
10
BOEING
Figure 3. The drivable street network for municipal Los Angeles, created by simply passing the query phrase "Los
Angeles, CA, USA" into OSMnx.
11
BOEING
Figure 4. OSMnx street networks automatically downloaded and visualized for A) Modena, Italy, B) Belgrade,
Serbia, C) central Maputo, Mozambique, and D) central Tunis, Tunisia.
3.3. Correct and simplify network topology
OSMnx performs topological correction and simplification automatically under the hood, but it
is useful to inspect how it works. Simplification is essential for a correct topology because
OpenStreetMap nodes are inconsistent: they comprise intersections, dead-ends, and all the
points along a single street segment where the street curves (see also Neis et al. 2011 for a
discussion of other topological errors). The latter are not nodes in the graph-theoretic sense, so
we remove them algorithmically and consolidate each resulting set of sub-edges between "true"
network nodes (i.e., intersections and dead-ends) into single unified edges. These unified edges
between intersections retain the full spatial geometry of the consolidated sub-edges and their
relevant attributes, such as the length of the street segment.
12
BOEING
OSMnx provides different simplification modes that offer fine-grained control to define nodes
rigorously and reproducibly. In strict simplification mode, a node is either:
1. where an edge dead-ends, or
2. the point from which an edge self-loops, or
3. the intersection of multiple streets where at least one of the streets continues through
the intersection (i.e., if two streets dead-end at the same point, creating an elbow, the
point is not considered a node, but rather just a turn in a path)
In non-strict mode, the first two conditions remain the same, but the third is relaxed to allow
nodes at the intersection of two streets, even if both streets dead-end there, as long as the streets
have different OpenStreetMap IDs. A node is always retained at any point where a street changes
from one-way to two-way.
Figure 5. A) the original network, B) non-graph-theoretic nodes highlighted in red and true nodes in blue, C) strictly
simplified network, with self-loops noted in magenta, D) non-strictly simplified network.
Figure 5 illustrates the topological simplification process. When we first download and assemble
the street network from OpenStreetMap, it appears as depicted in Figure 5a. Then OSMnx
automatically simplifies this network to only retain the nodes that represent the junction of
multiple routes. First, it identifies all non-intersection nodes (i.e., all those that simply form an
expansion graph), as depicted in Figure 5b. Then it removes them, but faithfully maintains the
spatial geometry and attributes of the street segment between the true intersection nodes. In
13
BOEING
Figure 5c, all the non-intersection nodes have been removed, all the true nodes (dead-ends and
junctions of multiple streets) remain in blue, and self-loop nodes are in magenta. In strict mode,
OSMnx considers two-way intersections to be topologically identical to a single street that bends
around a curve. Conversely, to retain these intersections when the incident edges have different
OSM IDs, we use non-strict mode as depicted in Figure 5d.
3.4. Save street networks to disk
OSMnx can save a street network to disk as a GraphML file (an open, standard format for
serializing graphs) to work with later in software such as Gephi or NetworkX. It can also save the
network as shapefiles of nodes and edges to work with in any GIS. When saving as shapefiles, the
network is simplified to an undirected representation, but one-way directionality and
origin/destination nodes are preserved as edge attributes for GIS routing applications. OSMnx
can also save street networks as scalable vector graphics (SVG) files for design work in Adobe
Illustrator (Figure 6). OSMnx can also load preexisting GraphML files, so it is not limited to
acquiring network data exclusively from OpenStreetMap.
Figure 6. Street network for metropolitan New York from OSMnx saved and loaded in QGIS as a shapefile (above)
and in Adobe Illustrator as SVG (below).
14
BOEING
3.5. Analyze street networks
OSMnx analyzes networks and calculates network statistics, including spatial metrics based on
geographic area or weighted by distance (Table 1). With a single command, OSMnx calculates
the individual nodes' average neighborhood degrees (weighted and unweighted), betweenness
centralities, closeness centralities, degree centralities, clustering coefficients (weighted and
unweighted), PageRanks, and the entire network's intersection count, intersection density,
average betweenness centrality, average closeness centrality, average degree centrality,
eccentricity, diameter, radius, center, periphery, node connectivity, average node connectivity,
edge connectivity, average circuity, edge density, total edge length, average edge length, average
degree, number of edges, number of nodes, node density, maximum and minimum PageRank
values and corresponding nodes, the proportion of edges that self-loop, linear street density, total
street length, average street length, number of street segments, average number of street segments
per node, and the counts and proportions of node types (i.e., dead-ends, 3-way intersections, 4-
way intersections, etc.).
OSMnx can calculate and plot shortest-path routes between points or addresses, taking one-way
streets into account (Figure 7). These shortest paths can be weighted by distance, travel time
(assuming the availability of speed data), or any other impedance. For example, since OSMnx can
automatically calculate street grades, shortest paths can minimize elevation change rather than
trip distance. Moreover, the ability to calculate origin-destination distance matrices is built into
NetworkX. OSMnx can also visualize street segments by length to provide a sense of where a
city's longest and shortest blocks are distributed, or one-way versus two-way edges to provide a
sense of where a city's one-way streets and divided roads are distributed. Researchers can quickly
visualize the spatial distribution of dead-ends (or intersections of any type) in a city to get a sense
of these points of network disconnectivity (Figure 8). Jacobs (1995) compared several cities'
urban forms through figure-ground diagrams of one square mile of each's street network. We
can re-create this automatically and computationally with OSMnx (Figure 9). These figure-
ground diagrams are created completely with OSMnx and its network plotting function.
To summarize, OSMnx allows researchers and planners to download spatial geometries and
construct, project, visualize, and analyze complex street networks. It automates the collection and
computational analysis of street networks for powerful and consistent research, transportation
engineering, and urban design. The following section illustrates its functionality with a simple
case study.
Measure
n
m
average node degree
intersection count
average streets per node
counts of streets per node
proportions of streets per node
total edge length
average edge length
total street length
average street length
Definition
number of nodes in network
number of edges in network
mean number of inbound and outbound edges incident to the nodes
number of intersections in network
mean number of physical streets that emanate from each node (intersections
and dead-ends)
a dictionary with keys = the number of streets emanating from the node, and
values = the number of nodes with this number
a dictionary, same as above, but represents a proportion of the total, rather
than raw counts
sum of edge lengths in network (meters)
mean edge length in network (meters)
sum of edge lengths in undirected representation of network
mean edge length in undirected representation of network (meters)
15
BOEING
number of edges in undirected representation of network
n divided by area in square kilometers
total edge length divided by area in square kilometers
total street length divided by area in square kilometers
total edge length divided by sum of great circle distances between the nodes
incident to each edge
proportion of edges that have a single incident node (i.e., the edge links
nodes u and v, and u=v)
mean degree of nodes in the neighborhood of each node
mean degree of nodes in the neighborhood of each node, weighted by edge
length
mean of all weighted average neighborhood degrees in network
average neighborhood degree
mean average neighborhood degree mean of all average neighborhood degrees in network
average weighted neighborhood
degree
mean average weighted
neighborhood degree
degree centrality
average degree centrality
clustering coefficient
weighted clustering coefficient
fraction of nodes that each node is connected to
mean of all degree centralities in network
extent to which node's neighborhood forms a complete graph
extent to which node's neighborhood forms a complete graph, weighted by
edge length
mean of weighted clustering coefficients of all nodes in network
count of street segments
node density
edge density
street density
average circuity
self-loop proportion
average weighted clustering
coefficient
PageRank
maximum PageRank
maximum PageRank node
minimum PageRank
minimum PageRank node
node connectivity
average node connectivity
edge connectivity
eccentricity
diameter
radius
center
periphery
closeness centrality
ranking of nodes based on structure of incoming edges
highest PageRank value of any node in the graph
node with the maximum PageRank
lowest PageRank value of any node in the graph
node with the minimum PageRank
minimum number of nodes that must be removed to disconnect network
expected number of nodes that must be removed to disconnect randomly
selected pair of non-adjacent nodes
minimum number of edges that must be removed to disconnect network
for each node, the maximum distance from it to all other nodes, weighted by
length
maximum eccentricity of any node in network
minimum eccentricity of any node in network
set of all nodes whose eccentricity equals the radius
set of all nodes whose eccentricity equals the diameter
for each node, the reciprocal of the sum of the distance from the node to all
other nodes in the graph, weighted by length
mean of all the closeness centralities of all the nodes in network
for each node, the fraction of all shortest paths that pass through the node
mean of all the betweenness centralities of all the nodes in network
average closeness centrality
betweenness centrality
average betweenness centrality
Table 1. Descriptions of network measures automatically calculated by OSMnx.
16
BOEING
Figure 7. OSMnx calculates the shortest network path (weighted by edge length) between two points in Los Angeles,
accounting for one-way routes, and plots it.
Figure 8. OSMnx visualizes the spatial distribution of dead-ends in Piedmont, California.
17
BOEING
Figure 9. One square mile of each city, created and plotted automatically by OSMnx.
4. Case study: Portland, Oregon
To demonstrate OSMnx, we analyze three neighborhoods in Portland, Oregon. First, we define
three square bounding boxes of 0.5 km2 in the city's Downtown, Laurelhurst, and Northwest
Heights neighborhoods. These study sites are small and do not conform to complete definitions
of the local neighborhood boundaries, but are useful for visual comparison across sites at a small
spatial scale (Snyder 1979). Next, OSMnx downloads the drivable, directed street networks for
each, projects the networks to UTM (zone 10 calculated automatically), and plots them as seen in
Figure 10. OSMnx calculates correct numbers of streets emanating from each node, even for
peripheral intersections whose streets were cut off by the bounding box. In the network of
Northwest Heights in Figure 10, some nodes appear to exist in the middle of a street segment,
and thus should have been removed during simplification. However, these are actual
intersections that OSMnx properly retained: they simply intersect a street that connects to a node
outside the edge of the bounding box.
18
BOEING
Figure 10. Three 0.5 km2 sections of the street network in Portland, Oregon.
The different histories and designs of these street networks represent different historical eras,
planning regimes, design paradigms, and topographies (Guzowski 1990; Grammenos and Pollard
2009; Works 2016). Several quantitative measures can describe these differences as well (Table 2).
In terms of density metrics, Downtown has 164 intersections/km2, Laurelhurst has 110, and
Northwest Heights has 28. Downtown has 21 linear km of physical street/km2, Laurelhurst has
16, and Northwest Heights has 5. In the Downtown network, the total street length equals the
total edge length, because every edge is one-way. This differs in the other two networks because
of the presence of two-way streets. As a proxy for block size, the average street segment length is
76 m in downtown, 92 m in Laurelhurst, and 117 m in Northwest Heights. These metrics
quantify what we can see qualitatively by visually inspecting the street networks: Downtown's is
fine-grained and dense, Laurelhurst's is moderate, and Northwest Heights' is coarse-grained and
sparse.
Area (km2)
Avg of the avg neighborhood degree
Avg of the avg weighted neighborhood degree
Avg betweenness centrality
Avg circuity
Avg closeness centrality
Avg clustering coefficient
Avg weighted clustering coefficient
Intersection count
Avg degree centrality
Diameter (m)
Edge connectivity
Edge density (km/km2)
Avg edge length (m)
Total edge length (km)
Intersection density (per km2)
Average node degree
Laurelhurst
0.5
2.98
0.059
0.077
1.007
0.002
0.108
0.023
55
0.102
1021
1
29.55
97.4
14.80
109.8
5.53
NW Heights
0.5
2.75
0.030
0.137
1.090
0.002
<0.001
<0.001
14
0.219
898
1
10.71
116.6
5.36
28.0
4.38
Downtown
0.5
1.64
0.024
0.070
1.001
0.002
<0.001
<0.001
82
0.042
1278
1
21.32
76.3
10.68
163.7
3.42
19
BOEING
m
152
n
55
1
Node connectivity
2.107
Avg node connectivity
2.496
Avg node connectivity (undirected)
109.8
Node density (per km2)
0.029
Max PageRank value
0.004
Min PageRank value
537.1
Radius (m)
0
Self-loop proportion
15.6
Street density (km/km2)
91.8
Average street segment length (m)
7.8
Total street length (km)
85
Street segment count
Average streets per node
3.58
Table 2. Descriptive statistics for three street network sections in Portland, Oregon.
140
82
1
1.326
2.868
163.7
0.030
0.002
742.9
0
21.3
76.3
10.7
140
3.93
46
21
1
1.443
1.443
41.9
0.106
0.017
561.8
0
5.4
116.6
2.7
23
2.38
Topological measures can tell us more about complexity, connectedness, and resilience. On
average, nodes in Downtown have 3.9 streets emanating from them, in Laurelhurst they have 3.6,
and in Northwest Heights they have 2.4. This is seen in Figure 10 as most intersections
downtown are 4-way, whereas Laurelhurst features a mix of mostly 3-way and 4-way
intersections, and Northwest Heights has mostly 3-way intersections and dead-ends. In fact, one-
third of its nodes are the latter.
Unsurprisingly, as discussed earlier, the node and edge connectivity of each network is 1. More
revealing is the average node connectivity. Recall that this represents the average number of
nodes that must be removed to disconnect a randomly selected pair of non-adjacent nodes. In
other words, this is how many non-overlapping paths exist on average between two randomly
selected nodes. On average, 1.3 nodes must fail for two nodes to be disconnected in Downtown,
2.1 in Laurelhurst, and 1.4 in Northwest Heights (Table 2). These values may initially seem
surprising: Downtown has the least resilient network despite its density and fine grain. However,
this is explained by the fact that every edge in downtown is one-way, greatly circumscribing the
number of paths between nodes. If we instead examine the undirected average node connectivity,
it is 2.9 in Downtown, 2.5 in Laurelhurst, and 1.4 in Northwest Heights. Thus, were all edges in
all three networks undirected, Downtown's average node connectivity would more than double
and it would have the most robust network (by this measure). This finding suggests that there
could be considerable complexity and resilience benefits in converting Downtown's streets from
one-way to two-way – for the transportation modes that must obey directionality.
Finally, the average betweenness centrality indicates that 7% of all shortest paths pass through an
average node in Downtown, 8% in Laurelhurst, and 14% in Northwest Heights. The spatial
distribution of betweenness centralities in these three networks shows the relative importance of
each node (Figure 11). In Downtown, important nodes are concentrated at the center of the
network due to its grid-like orthogonality. In Northwest Heights, the two most important nodes
are critical chokepoints connecting one side of the network to the other. In fact, the most
important node in Northwest Heights has 43% of shortest paths running through it. By contrast,
the most important node in Downtown has only 15%. The street network in this section of
20
Northwest Heights is far more prone to disruption if its most important node fails (e.g., due to a
traffic jam, flood, or earthquake) than Downtown is if its most important node fails.
BOEING
Figure 11. Three 0.5 km2 sections of the street network in Portland, Oregon. Nodes colored by betweenness
centrality from lowest (dark) to highest (light).
5. Discussion
Street network analysis currently suffers from challenges of usability, planarity, reproducibility,
and sample sizes. This article presented a new open-source tool, OSMnx, to make the collection
of data and creation and analysis of street networks easy, consistent, scalable, and automatable
for any study site in the world. OSMnx contributes five capabilities for researchers and
practitioners: downloading place boundaries and building footprints; downloading and
constructing street networks from OpenStreetMap; correcting network topology; saving street
networks to disk as ESRI shapefiles, GraphML, or SVG files; and analyzing street networks,
including calculating routes, visualizing networks, and calculating metric and topological
measures of the network. It addresses the usability and sample size challenges by enabling the
easy acquisition and analysis of hundreds or thousands of street networks for anywhere in the
world. This analysis natively blends graph-theoretic analysis with spatial analysis, and addresses
the planarity challenge by using nonplanar directed graphs. Finally OSMnx enhances
reproducibility by clearly defining spatial extents and topologies while serving as a free open
source tool for anyone to re-run analyses.
In the simple case study of Portland, Oregon, we saw how to assess the street network from both
metric and topological perspectives using OSMnx. The quantitative analysis corresponded with
the qualitative assessment of the networks' visualizations. In particular, we found these networks
differed substantially in density, connectedness, centrality, and resilience. As it is limited by its
sample size, this small case study primarily serves illustrative purposes. Nevertheless, it
demonstrates how to nearly instantaneously acquire, analyze, and visualize networks in just two
or three lines of code with OSMnx. The small spatial scale of the analysis provides a succinct
opportunity for clear visualization of the phenomena as well as neighborhood-scale
interpretation of street network measures and their implications. However, these network subsets
demonstrate peripheral edge effects in that they only consider flows within the subset, ignoring
the rest of the city. A recent project addresses these limitations by using OSMnx to analyze
27,000 street networks at various scales across the United States (Boeing 2017; see appendix).
21
BOEING
While these data provide various features about the built environment, they cannot tell us about
the quality of the streetscape or pedestrian environment. OpenStreetMap is increasingly
addressing this with richer attribute data about street width, lanes, speed limits, sidewalk
presence, and street trees, but a general limitation of OSMnx is that it is dependent on what data
exists in OpenStreetMap. While coverage is very good across the United States and Europe,
developing countries have less thorough, but still quite adequate, street network coverage –
especially in cities. Moreover, any researcher can digitize and add streets, building footprints, or
other spatial data to OpenStreetMap at any time to serve as a public data repository for their own
study, as well as anyone else's. In turn, OSMnx makes the acquisition, construction, and analysis
of urban street networks easy, consistent, and reproducible while opening up a new world of
public data to researchers and practitioners.
OSMnx is freely available on GitHub at https://github.com/gboeing/osmnx
6. References
Agryzkov, T., Oliver, J. L., Tortosa, L., & Vicent, J. F. (2012). An algorithm for ranking the nodes
of an urban network based on the concept of PageRank vector. Applied Mathematics and
Computation, 219(4), 2186–2193. doi:10.1016/j.amc.2012.08.064
Barron, C., Neis, P., & Zipf, A. (2014). A Comprehensive Framework for Intrinsic
OpenStreetMap Quality Analysis. Transactions in GIS, 18(6), 877–895.
doi:10.1111/tgis.12073
Barthélemy, M. (2004). Betweenness centrality in large complex networks. The European Physical
Journal B, 38(2), 163–168. doi:10.1140/epjb/e2004-00111-4
Barthélemy, M. (2011). Spatial networks. Physics Reports, 499(1–3), 1–101.
doi:10.1016/j.physrep.2010.11.002
Barthélemy, M., Bordin, P., Berestycki, H., & Gribaudi, M. (2013). Self-organization versus top-
down planning in the evolution of a city. Scientific Reports, 3. doi:10.1038/srep02153
Barthélemy, M., & Flammini, A. (2008). Modeling Urban Street Patterns. Physical Review Letters,
100(13). doi:10.1103/PhysRevLett.100.138702
Beineke, L. W., Oellermann, O. R., & Pippert, R. E. (2002). The Average Connectivity of a Graph.
Discrete Mathematics, 252(1), 31–45. doi:10.1016/S0012-365X(01)00180-7
Boeing, G. (2017). A Multi-Scale Analysis of 27,000 Urban Street Networks. Manuscript
submitted for publication. doi:10.2139/ssrn.2943038
Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engine.
Computer Networks and ISDN Systems, 30(1–7), 107–117. doi:10.1016/S0169-
7552(98)00110-X
Buhl, J., Gautrais, J., Reeves, N., Solé, R. V., Valverde, S., Kuntz, P., & Theraulaz, G. (2006).
Topological patterns in street networks of self-organized urban settlements. The
European Physical Journal B, 49(4), 513–522. doi:10.1140/epjb/e2006-00085-1
Cardillo, A., Scellato, S., Latora, V., & Porta, S. (2006). Structural properties of planar graphs of
urban street patterns. Physical Review E, 73(6). doi:10.1103/PhysRevE.73.066107
Cervero, R., & Kockelman, K. (1997). Travel Demand and the 3 Ds: Density, Diversity, and
Design. Transportation Research Part D, 2(3), 199–219. doi:10.1016/S1361-
9209(97)00009-6
Chin, W.-C.-B., & Wen, T.-H. (2015). Geographically Modified PageRank Algorithms. PLoS
ONE, 10(10), e0139509. doi:10.1371/journal.pone.0139509
22
BOEING
Corcoran, P., Mooney, P., & Bertolotto, M. (2013). Analysing the growth of OpenStreetMap
networks. Spatial Statistics, 3, 21–32. doi:10.1016/j.spasta.2013.01.002
Crucitti, P., Latora, V., & Porta, S. (2006). Centrality measures in spatial networks of urban
streets. Physical Review E, 73(3), 036125. doi:10.1103/PhysRevE.73.036125
Ewing, R., & Cervero, R. (2010). Travel and the Built Environment: A Meta-Analysis. Journal of
the American Planning Association, 76(3), 265–294. doi:10.1080/01944361003766766
Foti, F. (2014). Behavioral Framework for Measuring Walkability and its Impact on Home Values
and Residential Location Choices (Dissertation). University of California, Berkeley, CA.
Frizzelle, B., Evenson, K., Rodriguez, D., & Laraia, B. (2009). The importance of accurate road
data for spatial applications in public health: customizing a road network. International
Journal of Health Geographics, 8(24). doi:10.1186/1476-072X-8-24
Giacomin, D. J., & Levinson, D. M. (2015). Road network circuity in metropolitan areas.
Environment and Planning B, 42(6), 1040–1053. doi:10.1068/b130131p
Girres, J.-F., & Touya, G. (2010). Quality Assessment of the French OpenStreetMap Dataset.
Transactions in GIS, 14(4), 435–459. doi:10.1111/j.1467-9671.2010.01203.x
Grammenos, F., & Pollard, D. (2009, October 19). Beloved and Abandoned: A Platting Named
Portland. Planetizen.
Eugene, OR.
Guzowski, K. J. (1990). Portland's Olmsted Vision (1897-1915) (Thesis). University of Oregon,
Hagberg, A., & Conway, D. (2010). Hacking social networks using the Python programming
language. Presented at the Sunbelt 2010, Riva del Garda, Italy.
Hajrasouliha, A., & Yin, L. (2015). The impact of street network connectivity on pedestrian
volume. Urban Studies, 52(13), 2483–2497. doi:10.1177/0042098014544763
Haklay, M. (2010). How Good is Volunteered Geographical Information? A Comparative Study
of OpenStreetMap and Ordnance Survey Datasets. Environment and Planning B, 37(4),
682–703. doi:10.1068/b35097
Hillier, B., Leaman, A., Stansall, P., & Bedford, M. (1976). Space Syntax. Environment and
Planning B, 3(2), 147–185. doi:10.1068/b030147
Jacobs, A. (1995). Great Streets. Cambridge, MA: MIT Press.
Jiang, B. (2007). A Topological Pattern of Urban Street Networks: Universality and Peculiarity.
Physica A, 384(2), 647–655. doi:10.1016/j.physa.2007.05.064
Jiang, B., & Claramunt, C. (2002). Integration of space syntax into GIS: new perspectives for
urban morphology. Transactions in GIS, 6(3), 295–309. doi:10.1111/1467-9671.00112
Jiang, B., & Claramunt, C. (2004). Topological Analysis of Urban Street Networks. Environment
and Planning B, 31(1), 151–162. doi:10.1068/b306
Jokar Arsanjani, J., Zipf, A., Mooney, P., & Helbich, M. (Eds.). (2015). OpenStreetMap in
GIScience. Cham, Switzerland: Springer.
Karduni, A., Kermanshah, A., & Derrible, S. (2016). A protocol to convert spatial polyline data to
network formats and applications to world urban road networks. Scientific Data, 3,
160046. doi:10.1038/sdata.2016.46
Karimi, K. (2012). A configurational approach to analytical urban design: "Space syntax"
methodology. Urban Design International, 17(4), 297–318. doi:10.1057/udi.2012.19
Maron, M. (2015, November 19). How complete is OpenStreetMap? Mapbox.
Marshall, W., & Garrick, N. (2010). Street network types and road safety: A study of 24 California
cities. Urban Design International, 15(3), 133–147. doi:10.1057/udi.2009.31
Masucci, A. P., Smith, D., Crooks, A., & Batty, M. (2009). Random planar graphs and the London
street network. The European Physical Journal B, 71(2), 259–271. doi:10.1140/epjb/e2009-
00290-4
23
BOEING
Neis, P., Zielstra, D., & Zipf, A. (2011). The Street Network Evolution of Crowdsourced Maps:
OpenStreetMap in Germany 2007–2011. Future Internet, 4(1), 1–21.
doi:10.3390/fi4010001
Newman, M. E. J. (2010). Networks: An Introduction. Oxford, England: Oxford University Press.
O'Sullivan, D. (2014). Spatial Network Analysis. In M. M. Fischer & P. Nijkamp (Eds.),
Handbook of Regional Science (pp. 1253–1273). Berlin: Springer. doi:10.1007/978-3-642-
23430-9_67
Parthasarathi, P., Levinson, D., & Hochmair, H. (2013). Network Structure and Travel Time
Perception. PLoS ONE, 8(10), e77718. doi:10.1371/journal.pone.0077718
Porta, S., Crucitti, P., & Latora, V. (2006). The network analysis of urban streets: a primal
approach. Environment and Planning B, 33(5), 705–725. doi:10.1068/b32045
Ratti, C. (2004). Space syntax: some inconsistencies. Environment and Planning B, 31(4), 487–
499. doi:10.1068/b3019
Sevtsuk, A., & Mekonnen, M. (2012). Urban network analysis. A new toolbox for ArcGIS. Revue
Internationale de Géomatique, 22(2), 287–305. doi:10.3166/rig.22.287-305
Snyder, E. E. (1979). Portland Names and Neighborhoods: Their Historic Origins. Portland, OR:
Southworth, M., & Ben-Joseph, E. (1997). Streets and the Shaping of Towns and Cities. New York,
Strano, E., Viana, M., da Fontoura Costa, L., Cardillo, A., Porta, S., & Latora, V. (2013). Urban
Street Networks, a Comparative Analysis of Ten European Cities. Environment and
Planning B, 40(6), 1071–1086. doi:10.1068/b38216
Trudeau, R. J. (1994). Introduction to Graph Theory (2nd ed.). New York, NY: Dover
Works, M. (2016). Laurelhurst. In The Oregon Encyclopedia. Portland, OR: The Oregon
Zielstra, D., Hochmair, H. H., & Neis, P. (2013). Assessing the Effect of Data Imports on the
Completeness of OpenStreetMap – A United States Case Study. Transactions in GIS,
17(3), 315–334. doi:10.1111/tgis.12037
Binford & Mort.
NY: McGraw-Hill.
Publications.
Historical Society.
24
BOEING
Appendix: Code and Data
This appendix demonstrates some simple code examples for working with OSMnx and describes
a large repository of street network data and measures created with it. OSMnx itself is freely
available online at https://github.com/gboeing/osmnx
6.1. Code examples
First we import OSMnx into the Python environment:
import osmnx as ox
Then we download, construct, correct, project, and plot the Los Angeles street network:
G = ox.graph_from_place('Los Angeles, California', network_type='drive')
ox.plot_graph(ox.project_graph(G))
If we want to get the walkable street network of Modena, Italy instead:
G = ox.graph_from_place('Modena, Italy', network_type='walk')
In the preceding examples, we use the graph_from_place function because OpenStreetMap has
polygon boundaries for these places. However, it lacks polygon boundaries for some cities. In
such cases, we can use the graph_from_address function to geocode the place name to a point,
then get the network within some distance (in meters) of that point. If we want to get the street
network of central Tunis:
G = ox.graph_from_address('Medina, Tunis, Tunisia', distance=1000)
We can similarly download networks by passing in shapefiles or latitude-longitude points. Once
we have downloaded a network, we can calculate its measures:
stats = ox.basic_stats(G)
To download building footprints (wherever data is available):
buildings = ox.buildings_from_place('Piedmont, California')
6.2. Data repository
A recent study (Boeing 2017) used OSMnx to download and analyze 27,000 U.S. street networks
at metropolitan, municipal, and neighborhood scales. This analysis comprises every U.S. city and
town, census urbanized area, and Zillow-defined neighborhood. These street networks
(shapefiles and GraphML files) and their measures have been shared in a public repository for
other researchers to use at https://dataverse.harvard.edu/dataverse/osmnx-street-networks
25
|
1706.05406 | 2 | 1706 | 2017-08-02T14:44:17 | Mining Social Media to Inform Peatland Fire and Haze Disaster Management | [
"cs.SI"
] | Peatland fires and haze events are disasters with national, regional and international implications. The phenomena lead to direct damage to local assets, as well as broader economic and environmental losses. Satellite imagery is still the main and often the only available source of information for disaster management. In this article, we test the potential of social media to assist disaster management. To this end, we compare insights from two datasets: fire hotspots detected via NASA satellite imagery and almost all GPS-stamped tweets from Sumatra Island, Indonesia, posted during 2014. Sumatra Island is chosen as it regularly experiences a significant number of haze events, which affect citizens in Indonesia as well as in nearby countries including Malaysia and Singapore. We analyse temporal correlations between the datasets and their geo-spatial interdependence. Furthermore, we show how Twitter data reveals changes in users' behavior during severe haze events. Overall, we demonstrate that social media is a valuable source of complementary and supplementary information for haze disaster management. Based on our methodology and findings, an analytics tool to improve peatland fire and haze disaster management by the Indonesian authorities is under development. | cs.SI | cs |
The final publication is available at link.springer.com
Springer Nature SharedIt: http://rdcu.be/udmt
Mining Social Media to Inform Peatland Fire and Haze
Disaster Management
Mark Kibanov · Gerd Stumme ·
Imaduddin Amin · Jong Gun Lee
Abstract Peatland fires and haze events are disasters with national, regional, and
international implications. The phenomena lead to direct damage to local assets, as
well as broader economic and environmental losses. Satellite imagery is still the main
and often the only available source of information for disaster management. In this
article, we test the potential of social media to assist disaster management. To this
end, we compare insights from two datasets: fire hotspots detected via NASA satel-
lite imagery and almost all GPS-stamped tweets from Sumatra Island, Indonesia,
posted during 2014. Sumatra Island is chosen as it regularly experiences a significant
number of haze events, which affect citizens in Indonesia as well as in nearby coun-
tries including Malaysia and Singapore. We analyse temporal correlations between
the datasets and their geo-spatial interdependence. Furthermore, we show how Twit-
ter data reveals changes in users' behavior during severe haze events. Overall, we
demonstrate that social media are a valuable source of complementary and supple-
mentary information for haze disaster management. Based on our methodology and
findings, an analytics tool to improve peatland fire and haze disaster management by
the Indonesian authorities is under development.
M. Kibanov, G. Stumme
Knowledge & Data Engineering Group
ITeG Research Center
University of Kassel, Germany
E-mail: kibanov, [email protected]
I. Amin, J.G. Lee
Pulse Lab Jakarta
UN Global Pulse
United Nations
E-mail: imaduddin.amin, [email protected]
2
1 Introduction
Mark Kibanov et al.
Peatland fires and their associated haze events are slow onset but medium impact
disasters. At times the fires occur when several environmental conditions meet, but
most fires are man-made disasters resulting from – predominantly illegal – agricul-
tural practices, e. g., conversion often forests and peatland into palm oil plantations
through slash-and-burn techniques [17]. The impact of these activities span environ-
mental (e. g., accelerated deforestation by up to 62% [23]) and economic losses, but
the associated haze events also seriously affect local residents' health. When such
fires, in particular peat fires, produce haze, wide areas can be affected within a rel-
atively short period of time. If the haze severity level is low, the Government of In-
donesia advises its citizens to reduce their outdoor activities. If the level is high,
residents are asked to evacuate the affected area, because haze generated by peatland
fires may lead to various health issues [1],[14]. Dense haze, including a case in In-
donesia on October 20, 2015 as shown in the image below reduces the visibility to
less than 100 meters (and in rare instances to less than 20-30 meters) and leads the
closure of airports and schools. Haze is not only a national issue for Indonesia, but
also an international issue, as it affects Singapore and Malaysia.
"Riau extends haze emergency status'' (Source - Jakarta Post1)
In order to respond to a fire or haze event, a disaster management authority needs
fire hotspot information along with (static) baseline information, including an es-
timate of the affected population and data on the available facilities. Fire hotspots
(henceforth referred to as 'hotspot' or 'hotspots') are identified relatively efficiently
from satellite imagery using a classification algorithm. Due to the limited resources
available to public authorities, more efficient and effective approaches to disaster
management are welcome, including through the generation of new information.
In this article, we investigate the opportunities that social media offer for im-
proved management of peatland fire and haze disasters. Specifically we analyse Twit-
ter as the primary data source and use hotspot and air quality data to further interpret
and verify the results of our analysis. Our objective is not the evaluation of informa-
1http://www.thejakartapost.com/news/2015/10/20/riau- extends-haze-emergency-status.html
(accessed on Jan 12, 2016)
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
3
Fig. 1: The three islands in Indonesia (Sumatra, Kalimantan, and Papua) with
the largest numbers of hotspots in 2014
tion offered by other channels, such as hotspots identified from satellite imagery, but
the provision of 'complementary' situational information. We concentrate our analy-
sis on peatland fires on Sumatra Island as the haze situation in this region is the most
critical in terms of geographic coverage and severity – as explained in Figure 1, and,
in doing so, analyse (almost) all geotagged tweets from Sumatra Island posted during
2014.
We aim to explore two research themes concerning the utility of social media for
haze disaster management.
1. How do peat fires/haze events and social media conversations about haze-related
topics relate to each other? If such a (temporal and geo-spatial) relationship exists,
how can it be described and quantified?
2. How do social media capture situational information on affected populations,
such as mobility patterns, which can be useful in managing disaster response?
The contribution of our work with regard to haze disaster response on Sumatra
Island can be summarized as follows:
1. We find strong temporal and geo-spatial correlations between hotspots and haze-
related conversations on Twitter.
2. We investigate the mobility patterns of haze-affected populations as captured in
social media data and confirm that they reflect movement patterns during haze
situations in the real-world.
These insights can significantly contribute to the prioritisation of haze disaster re-
sponse activities, conducted by national and local public authorities in Indonesia, by
raising real-time awareness of the social impact of the phenomenon, as opposed to
current practice which uses hotspot and population data in isolation.
The rest of this article is structured as follows. In Section 2 we explain related
work. Section 3 discusses the data we use for our analysis, covering both insights and
limitations. Section 4 presents how different online conversations reflect real-world
haze disasters. Section 5 shows what kind of information on population mobility can
be developed from social media with respect to haze disasters. We close this article
with a discussion on research issues in Section 6 and a conclusion in Section 7.
4
2 Related Work
Mark Kibanov et al.
We focus on two groups of related work – studies of how social media can be used to
assist disaster management and research about data mining studies on forest fires.
Social Media and Disasters: A vast body of research exists on social media and its
potential reflection of real-world phenomena. We consider the literature that demon-
strates how social media relate to different disasters.
Carley et al. [12] discuss the usage of Twitter for disaster management in In-
donesia. This work makes two important contributions relevant for the current arti-
cle. First, the viability of using Twitter data for disaster management is demonstrated;
second, the paper provides a baseline for Twitter use to support disaster management.
The potential application of social media to disaster and crisis management is
attracting the research community's attention either as a tool or as a source of data,
e.g., for the creation of crisis maps. Oz and Bisgin [30] made a social-media based re-
search about attribution of responsibility (e.g., how users assign political responsibil-
ity) regarding Flint water crisis. Gao et al. [15] consider social-media-based crowd-
sourced maps with data from external sources as a powerful tool in humanitarian
assistance and disaster relief. Goolsby [16] describes how social media can be used
as crisis management platform to create crisis maps for different agencies. Middle-
ton et al. [28] propose a social media crisis-mapping platform, where real-time crisis
maps are generated based on statistical analysis of tweet streams matched to areas at
risk. Cresci et al. [13] propose a crisis mapping system that overcomes some limi-
tations of other systems: they introduce an SVM-based damage detection approach,
and describe a new geoparsing technique to perform a better geolocation of social
media messages.
Imran et al. [19] provide an overview of existing and proposed methods and sys-
tems to retrieve information about emergencies from social media, such as Crisis-
Tracker [33] and TweetTracker [26]. Furthermore, Imran et al. suggest a platform
to collect human annotations in order to maintain automatic supervised classifiers
for social media messages [20] and describe automatic methods for extracting brief,
self-contained information items from social media, which are relevant to disaster re-
sponse [21]. Abel et al. [7] propose the 'Twitcident', a system for filtering, searching
and analyzing information about real-world incidents or crises. A number of systems
are implemented and deployed for special kinds of disasters: Avvenuti et al. [9][10]
describe the design, implementation and deployment of social media based system
for detection and damage assessment of earthquakes in Italy. The system is able to
detect outbraking seismic events with low occurrences of false positives. Cameron et
al. [11] describe ESA-AWTM – a system deployed for trial by the Australian Gov-
ernment. This tool formalises the usage of Twitter by the Crisis Coordination Center,
replacing an ad-hoc fashion monitoring of social media.
Following studies focus rather on algorithmical aspects of social media for dis-
aster management, rather than on system architecture or implementation. Rogsta-
dius [32] discusses different aspects of possibilities for enhanced disaster situational
awareness using social media. Sakaki et al. [34] present how social media can be
utilised as an early warning system with regard to earthquake events. Krstajic et
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
5
al. [24] show not only how natural disasters and man-made catastrophes can be de-
tected using Twitter, but also how semantic aspects of such events can be represented.
Schulz et al. [36] explore the possibilities of detection of small scale incidents using
microblogs. Mandel et al. [27] made a demographic analysis of online sentiment dur-
ing a hurricane, particularly focusing on the level of concern disaggregated by gender.
Morstatter et al. [29] address the problem of finding (non-geotagged) tweets that orig-
inate from a crisis region. Zhang and Vucetic [38] propose an improved method to
identify disaster-related tweets using a semi-supervised approach with an unlabeled
corpus of tweets.
Disaster damage assessment is another important topic in context of disaster man-
agement: Kryvasheyeu et al. [25] examine the online activity of different areas before,
during and after Hurricane Sandy. They demonstrate that per-capita Twitter activity
strongly correlates with the per-capita economic damage inflicted by the hurricane.
Forest Fires/Haze and Data Mining: The following works contribute to the forest
fires issue, applying data mining methods to different aspects of this emergency. We
do not address in detail the topic of forest fire detection using satellite imagery as this
topic is not in focus of current work, but we note that usage of satellite imagery for
forest fires detection is pretty well studied; e.g., Jaiswal et al. [22] describe how forest
fire risk zones can be mapped using satellite imagery and geographic information
systems.
A number of studies present novel data mining methods for haze-related issues.
Sakr et al. [35] presents a model to predict forest fires risks using data on previous
weather conditions with the best results having been achieved using support vector
machines and a Gaussian kernel function. Iliadis [18] introduce a decision support
system for long-term forest fire risk estimation, based on fuzzy algebra. The system
was applied in Greece but, according to authors, can be used on a global basis. Si-
tanggang and Ismail [37] suggest a classification model for hotspot occurrences using
a decision tree model C4.5 algorithm, which achieves an accuracy of 63%. The forest
fire data from the Rokan Hilir district on Sumatra Island, Indonesia was used in that
research.
Prasetyo et al. [31] used Twitter and Foursquare data to analyze public percep-
tions of haze in Singapore. In particular, their analysis showed that (1) social media
users focus significantly on the haze problem and (2) the problem has a substantial
emotional and behavioral impact. The UN presented the first feasibility study [5] for
supporting peat fire and haze disaster management using social media.
Overall, there are a lot of publications describing different aspects of social media
as an assistance tool for disaster management at different scales. Some researchers
applied data analysis and mining techniques to forest and peatland fires data.
In this article, we concentrate on peatland fires in Indonesia. This disaster occurs
periodically and has a huge impact on environment and lives of millions of people. In
contrast to previous works, we consider the dataset of (almost) all geotagged tweets
and all hotspots during one year on Sumatra Island. We created four rich taxonomies
for identification of different topics related to haze and peatland fires. Furthermore,
one of the main focuses of our work is to estimate whether social media can be
6
Mark Kibanov et al.
used for estimation of users' behaviour w.r.t. Twitter and mobility. To the best of the
authors' knowledge, those aspects were not covered in previous works.
3 Data Set
We use two main datasets: twitter data from Sumatra Island and hotspots on Sumatra
Island detected by National Aeronautics and Space Administration (NASA) satellites.
In this section, we describe the data, its basic characteristics and its limitations.
3.1 Fire Hotspots and Twitter Data
Fire Hotspots in Sumatra in 2014: We use hotspot information that is first identified
by the NASA from imagery, captured by Terra and Aqua satellites[4], and further
refined and augmented by GLOBAL FOREST WATCH2 [3]. Based on consultations with and
recommendations by a domain expert from the UN Office for REDD+ Coordination
in Indonesia (UNORCID)3, we filter hotspots classified as 'peatland hotspot' and
'high confidence-level' between two confidence levels (i.e., high and low) and use
7,892 hotspots for our analyses after the filtering process, among the 38,723 hotspots
in Sumatra in 2014 discovered by GLOBAL FOREST WATCH, cf. Table 1.
Table 1: Size of hotspot and Twitter datasets
Area
Sumatra Island
Riau Province
Fire Hotspot
Peatfire
Only
27,060
19,191
Peatfire &
High Conf.
7,892
5,463
Twitter
Tweet
29,528,786
3,509,849
All
38,723
21,563
(Almost) All GPS-stamped tweets posted in Sumatra during 2014: Indonesia has
a large number of Twitter users, which stands at approximately 12 million in 2014 [2].
Originally we attempt to collect the entire GPS-stamped tweets posted within Suma-
tra Island between January 1 and December 31, 2014 but for unexpected technical
reasons, we failed to collect tweets during two time frames:
– about half of all tweets posted during January 2014
– no tweets collected between April 16 and 30 2014
Overall, we analyse more than 29 million tweets with exact locational information,
which includes longitude and latitude. The tweets are posted by 575,295 users, equiv-
alent to 1% of the population of Sumatra Island.
2http://www.globalforestwatch.org
3UN REDD Programme is United Nations Collaboration for Reducing Emissions from Deforestation and Forest
Degradation in Developing Countries
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
7
(a)
(c)
(b)
(d)
Fig. 2: Basic characteristics of hotspot and tweet datasets - (a) Monthly hotspots,
by province, on Sumatra in 2014, (b) weekly hotspots on Sumatra in 2014, (c)
daily hotspots on Sumatra island and in Riau province in March 2014, and (d)
monthly tweets by province of Sumatra in 2014 (a) and (d) are best viewed in
color)
3.2 Basic characteristics
Background: Sumatra Island is an area heavily affected by peatland fire and haze
events, as shown in Figure 1. The central and southern parts of the island experience
more haze than other areas and in particular, Riau province is recognised as the most
haze prone area, not only based on the total yearly hotspots, as shown in Figure 2(a),
but also based on the number of haze situations reported in the media.
Hotspots: Among other interesting observations, about 5,500 high confidence peat
fire hotspots are detected in Riau Province during 2014, while the number of high
confidence peat fire hotspots across Sumatra stands at 7,892 in 2014, which means
almost 70% of high confidence peat fires take place on less than 19% of the island
North Sumatra
South Sumatra
West Sumatra
Riau
Lampung
Riau Islands
Bangka−Belitung
Jambi
Bengkulu
Aceh
800010000
6000
4000
2000
Number of Hotspots
0
Jan Feb Mar Apr May Jun
Jul Aug Sep Oct Nov Dec
Months
Jan Feb Mar Apr May Jun
Jul Aug Sep Oct Nov Dec
Weeks
200
0
10001200
800
Number of Hotspots
600
400
Sumatra Island
(incl. Riau Province)
Riau Province
1
3
5
7
9
11 13 15 17 19 21 23 25 27 29 31
Days
100200300400500600700
Number of Hotspots
0
North Sumatra
South Sumatra
West Sumatra
Riau
Lampung
Riau Islands
Bangka−Belitung
Jambi
Bengkulu
Aceh
4000
Number of Tweets (in thousands)
2000
3000
1000
0
Jan Feb Mar Apr May Jun
Jul Aug Sep Oct Nov Dec
Months
8
Mark Kibanov et al.
area, namely Riau province. This leads us to a further investigation, namely of the
effects of haze on the behaviors of people who live in Riau province, the results of
which will be discussed in Section 5. It is worth mentioning that there are two main
fire periods on Sumatra Island in 2014: between February and March, and between
June and November as shown in Figures 2(a) and 2(b). In particular, Figure 2(b), the
weekly hotspot dynamics shows a similar pattern to the monthly pattern provided in
Figure 2(a). However, we can find it is similar to monthly dynamics, but there are
some less severely affected weeks in June, July and October and strong irregularity
in different scales. Moreover, when we have a close look at hotspots dynamic in
March, the worst month in 2014 (c.f. Figure 2(c), we find that the hotspots almost
disappeared after evacuation announcement but then emerged again after one week.
Tweets: Comparing Figure 2(d) and Figure 2(a) highlight that the dynamics pattern
from Twitter use in general is different from the patterns of hotspots. The usage of
Twitter on Sumatra Island decreases towards the end of 2014, and the distribution of
tweets among the different provinces remains stable during the year.
3.3 Data limitations
This section briefly elaborates four limitations of social media data, the first two
concern inherent limitations of social media and the other two concern the limitations
of our data in particular. First, the digital divide may introduce a limitation, in that
social media data connected to urban areas are considerably denser compared with
rural areas and in that the cost of smart phones limits the participation of less affluent
cohorts of society. Secondly, there may be some bias connected to the characteristics
of users of social media in that we largely 'hear' the opinions of younger or more
extrovert users. Thirdly, the number of unique users from our dataset (about 500,000
users) equates to approximately 1% of the entire population of Sumatra island; it thus
may also limit our ability to abstract or generalise based on our findings. Fourthly,
due to technical issues, our data are incomplete, specifically in January and April
2014.
It is, however, worth noting that a key objective of this work is to test the potential
of social media as a complementary data source which can be used to inform human-
itarian efforts. The aim is not to produce statistics solely from social media but to
sense in near real-time signals on the behaviors of affected populations, which could
better inform decision-making and improve the targeting of humanitarian response.
We expect that the missing data will not affect the validity of our analysis because
the missing periods are predominantly outside of the observed haze seasons.
4 Temporal and spatial analysis
In this section, we investigate the temporal and spatial characteristics of tweets related
to haze and for that, prepare four different datasets by developing four taxonomies re-
lated to haze to identify four different haze-related topics, i.e., haze-general, haze-hashtag,
haze-impact, and haze-health. We extend a simple taxonomy used for a feasibility
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
9
Table 2: Four types of conversations related to peat fires and haze in 2014 on
Sumatra Island and filtering rules for the identification of corresponding tweets
- haze-general (43), haze-hashtags (5), haze-health (39), and haze-impact (39)
Conversations about forest and peat fires and haze, detected primarily by the keywords -
9,707 tweets (e.g., "When the haze problem will be solved?"):
( (bencanabadaipolusiparahtebalkabut) && (asapkabut) )
OR ( (awasberbahayadaruratpekatlebat) && (asapkabut) )
OR ( kabut asaptitik apisumber apititik panaspolusi udarahaze )
OR ( forest fire ) OR ( (kerusakanpembalakanpembukaankebakaran
penggundulanpenebangan) && (hutanladanglahangambut) )
Conversations which contain one of identified hashtags - 3,024 tweets
general
haze-
(e.g., "Let's participate in #melawanasap movement."):
( #saveriau#prayforriau#melawanasap#prayforasap#hentikanasap )
Conversations about happenings in a negative way due to haze, such as flight delay
or school closing - 6,994 tweets (e.g., "Day #3 off because of Haze."):
( (tutupbataldibatalkantertundadelaycancelditutup)
&& (penerbanganbandara) ) OR ( jarak pandang )
OR ( (sekolahkampuskuliah) && (tutupditutupliburdiliburkan) )
OR ( (ekonomidampakakibatmerugilumpuhresiko) && (asapkabut) )
Conversations with keywords indicating haze-related or derivable diseases -
46,241 tweets (e.g., Welcome to Pekanbaru; do not forget to wear mask!"):
( (infeksisesak) && (pernapasannapaspernafasan) )
OR ( (iritasiradang) && (matakulitenggorokanhidungparu) )
OR ( batukpusingmualispamaskerasmaasthmaparu-paru )
OR ( (asapkabut) && (kesehatansehatpernafasanhamilanak
orang tua) ) OR ( mata && (pedihperihsakit) )
hashtag
haze-
impact
haze-
health
haze-
study [5] in this work in order to capture broader contexts related to haze crises. Over-
all, we establish 126 filtering rules, combinations of Indonesian words and boolean
operators as presented in Table 2, which identify 64,383 tweets posted by 33,127
users out of 29,528,786 tweets across four topics, while allowing for overlapping
topics. For ease of understanding, even though we use both and OR in different
places, both operators have one meaning, namely OR. For instance, the following rule
will collect a tweet if its content contains both A and C or both B and C, [Rule] - "(
A B ) && C ".
4.1 Temporal Dynamics of Tweet Topics and Hotspots
Users, inherently, engage in more intensive discussions on haze not only offline but
also online, when the haze situation deteriorates, which is quantitatively measured by
the number of hotspots.
In order to visualize any correlation between two quantities of haze-relevant con-
versations and haze situations, we present the weekly numbers of tweets from four
datasets as well as the number of hotspots on Sumatra island in Figure 3. Although
our data are incomplete in January and April due to technical issues, as explained in
the previous section, the figure shows that Twitter users respond to haze events on the
ground by discussing on social media the four topics of interest.
10
Mark Kibanov et al.
Table 3: Values of correlation coefficients between the weekly number of
hotspots and the number of tweets on Sumatra Island and in Riau Province
Area
Sumatra
Riau
haze-
haze-
general
hashtag
haze-
impact
haze-
health
0.89
0.89
0.71
0.72
0.83
0.85
0.79
0.91
To easily quantify such correlations, we calculate Pearson's correlation between
tweet dynamics and hotspot dynamics in Sumatra and it reveals strong correlation co-
efficient values as shown in Table 3. Among the four conversation topics, haze-general
has the strongest coefficient. When we conduct the same calculation with tweets and
hotspots in Riau, it also shows strong correlation coefficients but in this instance
haze-health is strongest, which is understandable because Riau is one of the most
haze-affected provinces in Sumatra island.
The high values of correlation coefficients confirm that four identified conversa-
tions are relevant for haze problems. This is a confirmation of relevancy of chosen
taxonomies, Table 2.
Fig. 3: Correlation between the weekly number of hotspots and the weekly con-
versations about different topics on Sumatra Island
In Figure 4, per topic we plot weekly tweet volume and hotspot volume in x and
y axes, respectively, while all y axes are presented in a logarithm scale. As already
shown in Figure 3 and Table 3, we find positive correlations from four subfigures
but confirm an interesting phenomenon that people discuss the studied topics except
haze-hashtag during haze-free periods. The conversations classified by haze-hashtag
happened only during haze periods. This behaviour is explained by the observation
that specific hashtags are commonly used in connection to a specific event.
4.2 Spatial Characteristics of Different Topical Conversations
This section discusses the spatial relationships between hotspots and tweets. For in-
stance, if one can identify hotspots (not areas) from social media, it would be useful
for the prioritisation of disaster response and humanitarian action during haze disas-
ters. It is still challenging to understand to which hotspot a user refers in a tweet for
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
11
(a) haze-general
(b) haze-hashtag
(c) haze-impact
(d) haze-health
Fig. 4: Number of detected hotspots per week vs. number of conversations (log-
scaled)
many reasons. We investigate spatial characteristics using a simple mapping process
based on the distance between the position of a tweet and a hotspot. This still allows
for interesting insights on spatial characteristics.
We start with an analysis of the corresponding or nearest hotspot of each tweet.
The users usually discuss haze and its derived problems such as impact, rather than
hotspots themselves, as hotspots exist far away and are invisible. However, those
hotspots are the origin of the problem. Since people who live closer to a hotspot will
be affected by haze than ones who live farther, we use a simple model that consid-
ers the distance from tweets to their nearest hotspot and analyse the corresponding
or nearest hotspot of each tweet. Let us say that, given a hotspot h, its popularity
popularity(h) denotes the number of tweets correspondent to h when the hotspot and
tweets are identified and posted at the same day, respectively.
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
200
400
600
800
1000 1200
Number of Hotspots
●
●
●
● ●
●
●
●
●
●
●
●●●
●●●
● ●
●●●
●●
●
●
●
●
●
●
0
Number of Converstaions (log)
50
510
1000
200
at
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
200
400
600
800
1000 1200
Number of Hotspots
●
●
●
●●
●●
0
500
50
Number of Converstaions (log)
at
5
1
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
200
400
600
800
1000 1200
Number of Hotspots
●●●●
●
●
●
●
●
● ●●
●
●
●●
●
●
● ●
0
500
100
50
Number of Converstaions (log)
200
at
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
200
400
Number of Hotspots
600
800
1000 1200
●
● ●
●
● ● ●
●●
●●●
●●●
●
●
●
●
●
●
●
●
●
●
● ●
0
2500
Number of Converstaions (log)
1500
at
1000
500
12
Mark Kibanov et al.
(a) haze-general
(b) haze-hashtag
(c) haze-impact
(d) haze-health
Fig. 5: Popularity distribution of hotspots considering different taxonomies
Figure 5 shows the frequency of popularity(H') where H' is a set of hotspots satis-
fying popularity(h) ≥ 1.The figure shows that (a) there are highly referenced hotspots
from haze-general and haze-hashtag, such as 700-800 tweets per hotspot in some in-
stances, while many other hotspots are referred to by only a small number of tweets
from the two datasets, and (b) haze-impact and haze-health do not display as skewed
distributions as the other two datasets but they still contain such characteristics.
Such an analysis is useful for a disaster management, particularly by helping
prioritise hotspots based on an understanding on which hotspots are more discussed
by affected people.
In the following, we ground our exploration in two sets of cascading research
questions.
0
200
400
600
Popularity
800
1000
100150200250300
Frequency
50
0
0
200
400
600
Popularity
800
1000
80
60
40
Frequency
20
0
0
50
100
150
200
Popularity
150
100
Frequency
50
0
0
100
200
300
Popularity
400
500
40
20
0
100120140
80
60
Frequency
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
13
(a) haze-general / -hashtag
(b) haze-impact / -health
Fig. 6: Probability Density Functions of the distance from conversations of given
types to the nearest relevant hotspots
(1) What insights can be generated when we observe the locations of haze-related
tweets? What is the likelihood of hotspots nearby when we observe such tweets
by their known locations?
For every tweet from the entire dataset, regardless of its haze-topic, we calculate the
shortest distance between it and its corresponding (nearest) hotspot from the same
day. We present its empirical probability density function of the whole distance val-
ues with straight lines in Figure 6. This is a basis from which to determine whether
another distance distribution from a haze-specific topic has similar or different char-
acteristics. Then we conduct the same process for each of the four haze datasets,
represented with dotted lines in the figure.
The two distributions from haze-general and haze-hashtag are significantly dif-
ferent from the ones from haze-impact and haze-health, while the latter two distribu-
tions are relatively similar to the distance distribution from the entire data. Notable
spikes are present in Figure 6(a) around x=100km. These imply that haze-hashtag
and haze-general are likely posted with relatively close proximity, of up to 100km, to
hotspots as local issues that attract the attention of populations living near hotspots,
but haze-impact and haze-health are topics of relevance to many residents across
Sumatra island. Also, a close look at the four subject-matter distributions, comparing
them with the global distribution, highlights that haze-hashtag is the topic with the
closest proximity to real world hotspots, followed by haze-general, haze-impact, and
haze-health in a decreasing order, getting toward general topics.
(2) What insights can be generated when we know the locations of hotspots?
Could we guess what topics would be more likely to be discussed nearby?
For this, on a given day, for every hotspot, we identify its corresponding tweet for
haze-general, haze-hashtag, haze-impact, or haze-health by identifying the nearest
All Tweets
haze−general
haze−hashtag
0
500
Distance (in km)
1000
1500
2x10-64x10-66x10-68x10-610-5
Probability
0
All Tweets
haze−impact
haze−health
0
500
Distance (in km)
1000
1500
2x10-64x10-66x10-68x10-610-5
Probability
0
14
Mark Kibanov et al.
(a) haze-general
(b) haze-hashtag
(c) haze-impact
(d) haze-health
Fig. 7: Probability Density Functions of the distance from relevant hotspots to
the nearest conversations of given types
tweet. We present the distance distribution between each hotspot and corresponding
tweet along with null models in Figure 7 presented in Probability Density Functions.
Note that this differs from the previous section where we investigated, given a tweet,
how far it is located to its nearest hotspot.
As a null model for a haze-specific topic (for instance haze-general), for each
date we randomly select a number of tweets, of the same magnitude as the size of the
haze-specific topic compared to the total tweets posted at the same date. For instance,
if n tweets from given category (e. g.,haze-general) and m hotspots were detected
on a given day, we choose n random tweets T from the whole dataset and compute
distances from the hotspots to the nearest tweets from T . The final null model for a
topic is built from multiple random processes (1,000 times). Numbers of tweets of
each category is different on different days, so each haze-specific topic may have its
own null model.
haze−general
Null Model
1.5x10-5
1x10-5
5x10-6
Probability
0
0
200
600
400
Distance (in km)
800
1000 1200
haze−hashtag
Null Model
8x10-6
6x10-6
4x10-6
Probability
2x10-6
0
0
500
1000
Distance (in km)
1500
haze−impact
Null Model
0
200
400
600
800
Distance (in km)
10-5
2x10-64x10-66x10-68x10-6
Probability
0
haze−health
Null Model
150
100
Distance (in km)
200
250
300
0
50
1.5x10-5
1x10-5
Probability
5x10-6
0
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
15
Table 4: Parameters of probability distribution of the distance from hotspots to
the nearest conversations of given types
Average
Real
Null
Data Model
109.2
77.1
161.6
159.3
104.8
121.4
61.7
59.5
Median
Real
Null
Data Model
87.5
51.5
118.7
111.8
85.6
106.9
61.1
55.0
St.Dev.
Real
Null
Data Model
88.4
81.5
144.7
111.8
88.3
90.9
32.7
34.9
haze-general
haze-hashtag
haze-impact
haze-health
As expected from the previous two figures, the four distributions from the four
different topic datasets are dissimilar. In a general sense, for all haze-specific topics
(possibly except haze-general), the real distribution and the distribution from its null
model are generally similar to one another. This implies that the creation of a hotspot
is not a trigger for haze-related discussions, regardless of its geographical location.
A detailed look at the distributions, however, along with a reexamination of Table
4 showing mean, median and standard deviation values, reveals a set of insights,
including (a) the increased likelihood of tweets on topics including haze-general and
haze-impact closer to a hotspot compared to their null models and (b) the greater
density of tweet locations on haze-hashtag of a given hotspot, compared to a null
model.
It is worth noting that the two research questions and their results we discuss
in Section 4.2 are complement each other and useful in different aspects in disaster
management. First, we showed that haze-general or haze-hashtag conversations can
be indication of a nearby hotspot. Health and haze impact issues are discussed all
over Sumatra Island, not necessary near hotspots. In the second question, we tried to
identify relevant tweets near the hotspots. There are only few "popular" hotspots with
many tweets near them. The reason may be that many hotspots are detected in rural
areas.
5 Change of Mobility Analysis
Peat fires and haze incidents have an impact on people's behaviour, especially their
mobility patterns. Some residents move to haze-free areas, while others stay at home
but limit their outdoor activities. In rare cases, the government advises an evacuation
due to severe haze and the need to protect affected and vulnerable populations. In this
section, we investigate mobility patterns, which is of practical importance as often
this information but is not available in a (near) real-time fashion which would be
preferable for disaster management. We tackle this by looking at the spatial-temporal
information available from social media and investigate how patterns of mobility
artuculated by social media can be quantified. For this, we analyse all the tweets with
GPS information posted by users who spend most of their time in Riau Province, one
of the most haze-affected regions, as explained by Figure 2(a).
16
5.1 Mobility in General
Mark Kibanov et al.
For this part of the study we first classify all weeks in 2014 into three categories
based on the weekly number of hotspots in Sumatra as shown in Table 5, with the
exception of weeks which see large population movements such as over new year,
school holidays, and religious celebrations. Then we add a special week, W E, during
which an evacuation was advised by a local government (the Week of March 13,
2014). This classification is easily extended to the level of users, W NH
u , W HS
u ,
and W E
u , by only examining a week when the number of tweets during the week
posted by User u > a threshold τ ∈ N. We use τ = 4, but when using different
threshold values, we have similar results.
u , W H
Table 5: Four types of weeks by the number of weekly hotspots (#w.h.) in
Sumatra
W NH
W H
W SH
W E
Description
no-haze
haze
severe-haze
evacuation
Condition
#w.h.¡100
100¡#w.h.¡400
400¡#w.h.
−
Week
2, 18–24, 33–36, 43, 46–51
5, 6, 12, 37–42, 44, 45
7–10, 11, 13
11
Now we define four notations as presented in Table 6 with specific reference to
all users C w, Sw, D(w1,w2), and RS(w1,w2).
Table 6: Four notations to analyse mobility patterns
Cw
u
D(w1,w2)
u
Sw
u
RS(w1,w2)
u
CENTROID (average latitude and
average longitude) of all GPS-stamped
tweets posted by User u in the Week w
Euclidean DISTANCE between
two centroids, Cw1
u and Cw2
u
SPREAD, the average distance between Cw
tweets posted by u in Week w
RELATIVE SPREAD between two weeks
calculated by Sw2
u / Sw1
u
u and
(1) Mobility Patterns by Situation (Analysing DISTANCE)
During a slow onset disaster situation, an affected person can change her or his mo-
bility pattern. The individual has two options to (significantly) increase her or his
movements due to an evacuation or to (significantly) decrease her or his mobility by
staying at home. In order to quantify changes in mobility, we calculate the distribu-
tions of DISTANCE D(w1,w2)
u and w2 ∈ {W N H , W H , W SH , W E}
as shown in Figure 8.
when w1 ∈ W NH
u
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
17
(a) CDF
(b) Histogram when Distance ≤ 10km
(c) CCDF when Distance ≥ 100km
Fig. 8: Distributions of the numbers of users classified by the distance between
two centroid positions per situation
Figure 8(a) shows the overall distriburion of D(w1,w2)
using Cumulative Density
Functions (CDFs) for three cases except w2 ∈ W E. Overall people tend to move
further during a severe haze period, while mobility patterns during periods of (light)
haze and no haze are very similar, as implied by the observation that the two distri-
u
1000
WNH − No Haze
WH − Haze
WSH − Severe Haze
WSH
WNH
0.1
1
10
100
Distance (km, log scale)
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
Cumulative Density Function (CDF)
WNH − No Haze
WH − Haze
WSH − Severe Haze
0.2
0.3 0.40.5
1
Distance (km)
2
3
4 5
10
5%
4%
3%
2%
1%
0
0.1
Probability
WE
WSH
WNH − No Haze
WH − Haze
WSH − Severe Haze
WE − Severe Haze & Evacuation
100
200
300
400
500
WH
WH
900 1,000
Distance between two centroid positions (km)
600
700
800
10%
1%
0.1%
0.01%
Density Function (CCDF)
Complimentary Cumulative
18
Mark Kibanov et al.
butions, W N H and W H, are similar to each other while the distribution for W SH is
stretched toward the x-axis in the positive direction.
Considering smaller order mobility of up to 10km, shown in Figure 8(b), we see
that during the haze free weeks (w2 ∈ W N H) residents make more short-distance
movements than during the weeks with haze, w2 ∈ {W H , W SH}.
From the tails of the distance distributions in Figure 8(c), an investigation of long
distance movement patterns shows a tendency that some people significantly increase
their mobility by hundreds of kilometers during evacuation periods and severe haze
w2 ∈ {W SH , W E}, while there is no significant difference between the (light) haze
and no haze periods, w2 ∈ {W N H , W H}.
(2) Mobility Reduction by Situation (Analysing DISTANCE and RELATIVE SPREAD)
Now we focus on the reduction of mobility. Examining a week from among haze-
free weeks (say w1 ∈ W N H), we interpret that a user (say u) reduces her or his
mobility in another week (say w2) when u's RELATIVE SPREAD is smaller than 1
or RS(w1,w2)
< 1. In this article, we specifically say that u does reduce her or his
mobility if RS(w1,w2) < 1/3 which means she or he reduced her or his SPREAD more
than three times 4.
u
Fig. 9: Proportions of users who reduce mobility compared to no-haze weeks
with respect to haze situation and the distance people moved away
Additionally, the information on where people currently reside is important to
understand movement patterns. For instance, during a period with severe haze, people
4We tried different threshold values (e. g., 1/5), but the results were similar.
Share of Users who extremely reduce their mobility
Users who moved not further than 50 km
Users who moved between 50km and 500km
Users who moved further than 500km
No Haze
Haze
Severe Haze
Evacuation
0.8
0.6
0.4
0.2
0.0
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
19
who stay in an affected area may display a different pattern of mobility reduction
when compared to people who have already evacuated from the area.
Figure 9 summarises people's mobility behavior changes given two different
weeks in different circumstances, classified by DISTANCE D(w1,w2) and our haze/non-
haze scenarios. Of note, the baseline weeks remain as the haze-free week scenario
(i.e., w1 ∈ W N H). In other words, we measure, for a given user, to what extent she
reduces her mobility in a haze-free week, a haze week and a severe haze week, com-
pared to a baseline haze-free week. For instance, the very first bar shows that about
20% of users, out of the users who move less than 50km in two haze-free weeks,
reduce their mobility, although their mobility patterns are studied in two haze-free
weeks. It means that overall about 20% of users exhibit their mobility patterns within
a wide range of variation, even when they still remain in a city (e.g. within a 50km
radius).
This figure shows a couple of interesting points. First, considering people who
do not move far from their previous location, the probability that they noticeably de-
crease their mobility (i.e. by a factor of three) is higher during severe haze weeks
and evacuation periods (about 25% and 27%, respectively) than during haze free
and moderate haze weeks (about 21%). A similar result will be discussed in Sec-
tion 5.2-(2). Second, people that move far away, similar to the above, also reduce
their mobility in the haze and evacuation periods (about 51.4% and 50.6%, respec-
tively) compared to the no haze or moderate haze periods (about 38-39%) but the
proportion is much larger. The above may imply that although some people move far
away (e.g., more than 500km), expecting fresh air, their movement patterns in their
new location are decreased. One possible explanation is that moving to an new area
naturally reduces mobility due to the unfamiliarity of the surroundings.
5.2 Mobility Patterns with Ground-truth Situational Data in Riau
The importance of this section is based on a close interpretation of mobility-related
information revealed from social media and real-world situations including air qual-
ity, local context such as infrastructure-based connectivity, and people's custom be-
haviors, to qualitatively assess the potential of social media as a complementary data
source. With this purpose, we analyse mobility patterns, taking into account the ad-
ministrative boundaries in Riau province, of a set of users (838 users) whose home
locations are identified as Pekanbaru, the capital city of Riau province and the city
with the largest populations in Riau province5 , as well as their tweets (109,096 GPS-
stamped tweets).
Riau consists of 12 cities and regencies, each of which is identified by a 4-digit
post code; a regency or a city consists of sub-districts. For a detailed study, in this
section, we limit the timespan to include February 26 and March 23, which is exactly
when the information on air quality, officially published by the Indonesian National
Board for Disaster Management [6], is available6. Based on the air quality informa-
5Indonesian Central Bureau of Statistics
http://riau.bps.go.id/linkTabelStatis/view/id/210
6http://www.menlh.go.id/DATA/ispu riau.PDF
20
Mark Kibanov et al.
Table 7: Air quality of different regencies in Pekanbaru between February 26
and March 23
March
–
–
–
–
–
–
–
–
–
–
–
–
February
– – – – – – – – –
– – – – – – – – –
– – – – – – – – –
– – – – – – – – –
Postal
23
Code 26 27 28 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
–
–
–
1401
–
–
–
1402
–
–
–
1403
–
–
1404
–
– B – B – B B B B B B B B B B B B R Y BL BL Y Y Y BL BL
1405
–
– – – – – – – – – R Y Y B B Y G G – G BL G G BL
1406
1407
–
– – – – – – – – –
–
1408 B B R B B B R Y R Y B B B R B B B B Y BL BL BL BL G BL BL
– B B B B B B B B B B B B B B B B BL BL BL Y Y – Y BL
1409
1410
–
–
1471 Y Y Y Y Y Y Y Y Y Y R B R R B B B B Y BL BL G BL G G BL
1473 B Y B Y R B B B R B B B B R Y B B B G BL BL BL Y BL BL G
– – – – – – – – –
– B Y –
18
–
–
–
–
20
–
–
–
–
22
–
–
–
–
17
–
–
–
–
19
–
–
–
–
21
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–
Fig. 10: Map of Riau province with postal codes
tion, each day in each regency (identified by 4-digit post code) can be associated with
one of the classes of air quality: {'G'reen, 'BL'ue, 'Y'ellow, 'R'ed, 'B'lack}, where
'G'reen means the best air quality, and 'B'lack signifies the worst air quality. Table 7
shows daily air quality in 12 different regencies between February 26 and March 23.
Figure 10 shows the locations of those regencies.
(1) Diversity of Users' Mobility
First, we try to estimate the overall mobility of citizens of Pekanbaru, the capital
of Riau Province. Table 8 consists of three parts. The header contains the information
about air quality in Pekanbaru. The second part, Table 8[1], contains daily numbers
of regencies that citizens of Pekanbaru visit. The third part, Table 8[2], shows how
users move inside of different regencies – particularly, how many sud-districts were
visited in each regency or city. Figure 10 shows the locations of the regencies in Riau
Province.
We use the number of cities and regencies visited by them as a measure of their
movement diversity. Table 8[1] shows how many different cities and sub-districts in-
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
21
Table 8: Distribution of regencies and sub-districts, visited by Pekanbaru resi-
dents between Feb 26 and Mar 23 (best viewed in color):
[1] (a-b) Number of regencies and cities visited by Pekanbaru citizens out-
side (a) and inside (b) Riau
[2] Number of sub-districts visited by Pekanbaru residents in each regency
Date
February
26 27 28 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
Air Quality
(Pekanbaru) Y Y Y Y Y Y Y Y Y Y R B R R B B B B Y BL BL G BL G BL BL
4
1
3
7 8 5 3 2 3 2 3 5 4
1 3 1 1 0 1 1 1 1 2
6 5 4 2 2 2 1 2 4 2
March
4
0
4
6
2
4
5
2
3
2
0
2
3
0
3
3
0
3
5
1
4
[1]
2
1
1
1
3
2
1
1
3
1
2
2
1
1
1
1
1
1
1
1
1
2
4
4
3
3
3
(a+b)
(a)
(b)
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1471
1408
6
2
4
1
1
1
3
2
1
4
[2]
1
1 1
1 1
1 2
1 1 1
1 1 1
1
1 1
1 1 2
1
5 5 2 4 4 2 2 2 4 3
4
0
4
1
1
1
2
6
0
6
1
1
1
1
1
2
4
0
4
1
2
2
1
9
2
7
1
1
1
10 10 12
5
4
7
6
1
1
2
1
1
9
2
2
2
1
1
1
1
3
2
2
1
4
5
4
1
4
1
side and outside of Riau were visited by those users. The diversity of visited regencies
is consistent most of the time, except during the period following an evacuation rec-
ommendation by the local government. In that period users visit many more areas,
possibly trying to escape the haze. This type of information, namely whether citizens
listen to and act on evacuation advice, is not currently captured by the government in
a real-time manner.
(2) Mobility Behaviors of Pekanbaru Citizens
Next, we demonstrate how social media enables us to recognise the behavioral
patterns of users. We use air quality data and other information to try to interpret the
identified patterns. This enables us find different insights in social media data. Table
8[2] shows the daily number of sub-districts that Pekanbaru residents visit, based on
tweet locational information. For instance, no one who live in Pekanbaru tweets (or
visits) in regency 1410 during the period of the study.
- 'Moving to Areas with Cleaner Air': During the severe haze situation in Pekanbaru,
from March 8 till March 15, users tend to visit regencies in the South (1401, 1402, 1403)
and the West (1406, 1407). Southern and western regencies had better air quality than
other regencies in Riau, according to information from the media. We also observe
more activity in the regency 1408 although the air quality in 1408 is similarly bad to
that of Pekanbaru. An investigation confirms that they were present only on the main
road of Sumatra island in 1408 which connects to western regencies.
- 'Avoiding Areas with Bad Air Quality': The citizens of Pekanbaru avoided visiting
the regency 1405 until the air quality improved. Another example of how people avoid
22
Mark Kibanov et al.
areas affected by haze are the regencies 1409 and 1473. These regencies were affected
by haze during the recommended evacuation period, and users also avoid these areas
during that period of time.
Fig. 11: Number of users who visit one, two, three, or over four sub-districts per
day in Pekanbaru
- 'Limited Mobility in Pekanbaru': According to the Table 8[2], regency 1471 has
not shown an outstanding dynamical change of the number of sub-districts, while a
tendency is observed that people limited mobility before and during the severe haze
period. For a closer look, we count the number of users who posted in one, two, three,
and more than four sub-districts in regency 1471. In Figure 11, we find a tendency
that the number of users who visit one sub-district per day increases and the number
of users who visit two more sub-districts slightly decreases during the severe haze
period, and especially after the evacuation order.
5.3 Additional Information related to Mobility Patterns
In this section, we study mobility patterns by analyzing tweets posted by the users
used in previous section, from two different angles, what (possibly) people say and
what (possibly) people do. Concerning what people say, we collect and analyze the
dynamics of tweets over time mentioning two words, 'home' (rumah) and 'evacua-
tion' (evakuasi, ngungsi). Regarding what people do, we identify two lists of tweets
posted (i) by Foursquare7 and (ii) using web browsers, instead of via a mobile appli-
cation, which is part of the meta-information of a tweet, and present its dynamics in
Figure 12. Again similar to the results discussed in Section 5, this does not aim to
quantify the exact number of people who stay in or evacuate from affected areas but
aims to understand whether this information could show any tendency or behaviour
change.
First, two thin lines, depicted in red, show what people say. There are peaks
around March 13 when the government advised residents to evacuate. The two thicker
7http://foursquare.com
1 sub−district
2 sub−districts
3 sub−districts
4+ sub−districts
Evacua&on
Yellow
R B R R B B B B Y BLUEG BL
gggg
G
BLUE
500
400
300
200
100
0
2/26
3/8
3/13
3/17
3/23
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
23
Fig. 12: Numbers of tweets that (a) mention 'home' or 'evacuation' or (b) are
posted using web browsers or from FOURSQUARE
lines, depicted in black, signify behaviour. The number of tweets posted by regular
web browsers clearly increases around March 13, while the number of Foursquare
check-in around the same period of time slightly decreases. We would be able to ref-
erence this information to better understand haze-affected residents' behaviors and
to complement existing and new types of information for disaster response, but this
should be further validated and evaluated which we leave for future research.
6 Discussion - Applications, Challenges, and Collaborations
We have mined and analysed social media to test its potential to address a real-world
problem, namely the need to provide (near) real-time situational information on peat-
land fire and haze disasters in Indonesia, as complementary information. Meanwhile
we validated our approach and methods with secondary information, such as quanti-
tative data, namely hotspot and air quality, contextual information, including typical
evacuation behaviors led by geographical characteristics, and qualitative discussions,
namely consultations with officials involved in humanitarian activities in Indonesia,
despite limited access to disaster-related data due to the nature of haze disasters. In
this chapter, we discuss applications and challenges, by examining other information
needs in local and global contexts, briefly explaining a platform we are building for
policy-makers based on the results of this analysis, and reviewing research challenges
for the attention of the research community.
(1) Information Needs
Humanitarian action can be characterised by three stages, before , during and after an
event, where the before stage involves disaster preparedness and the development of
early warning systems, the during stage deals with humanitarian needs during a par-
ticular disaster, and the after stage is related to disaster recovery [8]. Even though
data and information exist and are commonly used throughout all states8 such as a
population distribution as baseline information, different sets of data and information
8For instance, IASC Guidelines Common Operational Datasets (CODs) in Disaster Preparedness and Response
(Visit - www.humanitarianresponse.info)
"Home"
"Evacuation"
Web Browser
Foursquare
300
250
200
150
100
50
0
0
1
3
5
7
9
11
13
15
17
19
21
23
24
Mark Kibanov et al.
are required at each stage. Recently social media has been investigated in both an
active mode as a tool for collective knowledge, for instance to map affected areas,
assess damage and disseminate information quickly, and in a passive mode such as
mining tweets in a humanitarian theatre, for instance to improve an early warning
system and better understand supply and demand, as we mentioned in Section 2.
Moreover, last year the United Nations adopted the Sendai Framework9, a non-
binding agreement for Disaster Risk Reduction as the successor of the Hyogo Frame-
work, to better prepare for different natural disasters by providing global guidelines.
This framework encourages national disaster management authorities to prioritise na-
tional policy agendas for understanding disaster risks and to strengthen disaster risk
governance. But some countries, including some developing countries, are experi-
encing difficulties in implementing aspects of the guidelines, due in part to missing
information, some of which, our and other research suggests to extract or mine from
new digital data sources including social media.
(2) A system in progress
Throughout this article we see that social media can provide useful information, such
as a better understand of residents' behavioral changes over time. Section 4 addresses
opportunities for before , during and after haze disasters, and Section 5 shows op-
portunities for during and after haze disasters. We consulted with officials who have
been involved in haze disasters who confirmed that this type of information will be
useful for disaster management, but its utility requires further clarification and has to
be improved upon taking into account inputs from local and national governments as
well as UN agencies. Pulse Lab Jakarta is currently building a system to collect, ana-
lyze and visualize relevant data and information including from social media, which
was discussed in this article, not only for providing complementary and supplemen-
tary information about haze and peatland fires, but also for assisting in the coordina-
tion process between different public bodies, who maintain different datasets relevant
to disaster response.
(3) A common research agenda
In this article, we presented the results of analysis connected to a specific disaster,
namely haze on the scale witnessed in Indonesia, but from limited angles, for example
conversations and mobility patterns, while analyzing GPS-stamped social media data.
When we broaden the scope to other types of disasters and their associated research
angles and new types of information, many more practical and theoretical research
questions arise, but few have been addressed to date by the research community.
Social media is a data source that many researchers have recently used for quantitative
and qualitative studies of human beings and societies. Clearly, using social media in
a passive mode is a task with many challenges, such as whether mined information is
correct or not, but we see many opportunities to help (potentially) affected people and
disaster management authorities across all three stages of humanitarian action. This
article aims to share these findings with the research community but more importantly
also aims to refresh this area among researchers and request a collaboration between
9http://www.unisdr.org/we/coordinate/sendai-framework
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
25
the research community and the humanitarian sector. UN Global Pulse wishes to
foster a stronger link between domain specific challenges and research methods from
other disciplines.
7 Summary and Future Work
Haze and peatland fires remain a near annual disaster in Indonesia and South-East
Asia. As the phenomenon affects millions of citizens in Indonesia and beyond, dis-
aster management needs significant improvement. We propose to use social media
(Twitter) for haze disaster management by extracting complementary and supple-
mentary information. We showed how users of Twitter react to haze emergencies and
found correlations between the public discourse on Twitter and peat fire hotspots. We
also showed how it is possible to understand the changes in users' travel patterns dur-
ing haze periods using social media. We demonstrated that, despite some limitations,
social media data can be used to inform disaster management at different stages of
an emergency. We aim to encourage additional work and research in this field. Con-
cerning our own research agenda, we hope to extend our data sources and to offer
data-driven solutions for the management of haze disasters.
Acknowledgement
We thank Johan Kieft from UN environment who provided insight about haze dis-
asters in Indonesia and George Hodge from Pulse Lab Jakarta for his assistance.
Furthermore, we acknowledge the use of FIRMS data and imagery from the Land,
Atmosphere Near real-time Capability for EOS (LANCE) system operated by the
NASA/GSFC/Earth Science Data and Information System (ESDIS) with funding pro-
vided by NASA/HQ.
References
1. Impact of Haze on Health, Singapore Government, Health Promotion Board. Retrieved September 15,
2015: http://hpb.gov.sg/hopportal/health-article/hpb051226.
2014–2019,
of Twitter
number
2. Indonesia:
users
emarketer. Retrieved
January
30:
http://www.statista.com/statistics/186337/number-of-mobile-broadband-subscriptions-worldwide-
since-2005/.
3. NASA Active Fires, NASA FIRMS. Retrieved August 20, 2015: www.globalforestwatch.org.
4. NASA Fire Information for Resource Management System (FIRMS). Retrieved August 20, 2015:
earthdata.nasa.gov/data/near-real-time-data/firms.
5. Feasibility Study: Supporting Forest and Peat Fire Management Using Social Media. Technical Re-
port 10, UN Global Pulse, 2014.
hadapi Bencana, 5, May 2014.
6. Karhutla riau - ini pembakaran bukan kebakaran. Gema BNPB Ketangguhan Bangsa Dalam Meng-
7. F. Abel, C. Hauff, G.-J. Houben, R. Stronkman, and K. Tao. Semantics + Filtering + Search = Twitci-
dent. Exploring Information in Social Web Streams. In Proceedings of the 23rd ACM Conference on
Hypertext and Social Media, HT '12, pages 285–294, New York, NY, USA, 2012. ACM.
8. S. Amin and M. Goldstein. Data Against Natural Disasters: Establishing Effective Systems for Relief,
Recovery, and Reconstruction. The World Bank, 2008.
26
Mark Kibanov et al.
9. M. Avvenuti, S. Cresci, A. Marchetti, C. Meletti, and M. Tesconi. EARS (Earthquake Alert and Report
System): A Real Time Decision Support System for Earthquake Crisis Management. In Proceedings
of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD
'14, pages 1749–1758, New York, NY, USA, 2014. ACM.
10. M. Avvenuti, S. Cresci, M. N. L. Polla, A. Marchetti, and M. Tesconi. Earthquake emergency man-
In 2014 IEEE International Conference on Pervasive Computing and
agement by social sensing.
Communications Workshops (PERCOM Workshops), pages 587–592, Mar. 2014.
11. M. A. Cameron, R. Power, B. Robinson, and J. Yin. Emergency Situation Awareness from Twitter for
Crisis Management. In Proceedings of the 21st International Conference on World Wide Web, WWW
'12 Companion, pages 695–698, New York, NY, USA, 2012. ACM.
12. K. M. Carley, M. Malik, M. Kowalchuk, J. Pfeffer, and P. Landwehr. Twitter Usage in Indonesia.
Technical report, Institute for Software Research, School of Computer Science, Carnegie Mellon Uni-
versity, Pittsburgh, PA 15213, Dec. 2015.
13. S. Cresci, A. Cimino, F. DellOrletta, and M. Tesconi. Crisis Mapping During Natural Disasters via
Text Analysis of Social Media Messages. In J. Wang, W. Cellary, D. Wang, H. Wang, S.-C. Chen,
T. Li, and Y. Zhang, editors, Web Information Systems Engineering WISE 2015, number 9419 in
Lecture Notes in Computer Science, pages 250–258. Springer International Publishing, Nov. 2015.
DOI: 10.1007/978-3-319-26187-4 21.
14. E. Frankenberg, D. McKee, and D. Thomas. Health consequences of forest fires in Indonesia. De-
mography, 42(1):109–129, Feb. 2005.
15. H. Gao, G. Barbier, and R. Goolsby. Harnessing the Crowdsourcing Power of Social Media for
Disaster Relief. IEEE Intelligent Systems, 26(3):10–14, 2011.
16. R. Goolsby. Social Media As Crisis Platform: The Future of Community Maps/Crisis Maps. ACM
Trans. Intell. Syst. Technol., 1(1):7:1–7:11, Oct. 2010.
17. P. Holmgren. Fire and haze in Riau: Looking beyond the hotspots. Retrieved September 15, 2015:
http://www.eco-business.com/opinion/fire-and-haze-riau-looking-beyond-hotspots/.
18. L. S. Iliadis. A decision support system applying an integrated fuzzy model for long-term forest fire
risk estimation. Environmental Modelling & Software, 20(5), May 2005.
19. M. Imran, C. Castillo, F. Diaz, and S. Vieweg. Processing Social Media Messages in Mass Emergency:
A Survey. ACM Comput. Surv., 47(4):67:1–67:38, June 2015.
20. M. Imran, C. Castillo, J. Lucas, P. Meier, and S. Vieweg. AIDR: Artificial Intelligence for Disaster
Response.
In Proceedings of the 23rd International Conference on World Wide Web, WWW '14
Companion, pages 159–162, Republic and Canton of Geneva, Switzerland, 2014. International World
Wide Web Conferences Steering Committee.
21. M. Imran, S. Elbassuoni, C. Castillo, F. Daz, and P. Meier. Extracting information nuggets from
disaster- Related messages in social media. In F. F. T. Comes and 10th International ISCRAM Con-
ference on Information Systems for Crisis Response and Management, editors, ISCRAM 2013 Con-
ference Proceedings 10th International Conference on Information Systems for Crisis Response and
Management, pages 791–801, KIT, Baden-Baden, 2013. Karlsruher Institut fur Technologie.
22. R. K. Jaiswal, S. Mukherjee, K. D. Raju, and R. Saxena. Forest fire risk zone mapping from satellite
imagery and GIS. International Journal of Applied Earth Observation and Geoinformation, 4(1):1–
10, Aug. 2002.
23. D.-H. Kim, J. O. Sexton, and J. R. Townshend. Accelerated deforestation in the humid tropics from
the 1990s to the 2000s. Geophys. Res. Lett., 42(9):3495–3501, May 2015.
24. M. Krstaji´c, C. Rohrdantz, M. Hund, and A. Weiler. Getting There First: Real-Time Detection of
Real-World Incidents on Twitter. The 2nd Workshop on Interactive Visual Text Analytics: Task-
Driven Analysis of Social Media Content, 2012.
25. Y. Kryvasheyeu, H. Chen, N. Obradovich, E. Moro, P. Van Hentenryck, J. Fowler, and M. Cebrian.
Rapid assessment of disaster damage using social media activity. Science Advances, 2(3):e1500779–
e1500779, Mar. 2016.
26. S. Kumar, G. Barbier, M. A. Abbasi, and H. Liu. TweetTracker: An Analysis Tool for Humanitarian
and Disaster Relief. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social
Media, ICWSM '11, Menlo Park, California, USA, 2011. AAAI Press.
27. B. Mandel, A. Culotta, J. Boulahanis, D. Stark, B. Lewis, and J. Rodrigue. A Demographic Analysis
of Online Sentiment During Hurricane Irene. In Proceedings of the Second Workshop on Language in
Social Media, LSM '12, pages 27–36, Stroudsburg, PA, USA, 2012. Association for Computational
Linguistics.
28. S. E. Middleton, L. Middleton, and S. Modafferi. Real-Time Crisis Mapping of Natural Disasters
Using Social Media. IEEE Intelligent Systems, 29(2):9–17, Mar. 2014.
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
27
29. F. Morstatter, N. Lubold, H. Pon-Barry, J. Pfeffer, and H. Liu. Finding Eyewitness Tweets During
Crises. In Proceedings of the ACL 2014 Workshop on Language Technologies and Computational
Social Science, pages 23–27, Baltimore, MD, USA, June 2014. Association for Computational Lin-
guistics.
30. T. Oz and H. Bisgin. Attribution of Responsibility and Blame Regarding a Man-made Disaster:
#FlintWaterCrisis. In Workshop Social Web for Disaster Management, Indianapolis, USA, Oct. 2016.
31. P. K. Prasetyo, M. Gao, E.-P. Lim, and C. N. Scollon. Social Sensing for Urban Crisis Management:
In Social Informatics, number 8238 in Lecture Notes in Computer
The Case of Singapore Haze.
Science, pages 478–491. Springer International Publishing, 2013.
32. J. Rogstadius. Enhancing Disaster Situational Awareness Through Scalable Curation of Social Media.
PhD thesis, Universidade da Madeira, Madeira, 2014.
33. J. Rogstadius, M. Vukovic, C. Teixeira, V. Kostakos, E. Karapanos, and J. Laredo. CrisisTracker:
Crowdsourced social media curation for disaster awareness. IBM Journal of Research and Develop-
ment, 57(5):4:1–4:13, Sept. 2013.
34. T. Sakaki, M. Okazaki, and Y. Matsuo. Earthquake Shakes Twitter Users: Real-time Event Detection
by Social Sensors. In Proceedings of the 19th International Conference on World Wide Web, WWW
'10, pages 851–860, New York, NY, USA, 2010. International World Wide Web Conferences Steering
Committee.
35. G. Sakr, I. Elhajj, G. Mitri, and U. Wejinya. Artificial intelligence for forest fire prediction. In 2010
IEEE/ASME International Conference on Advanced Intelligent Mechatronics, AIM '10. Institute of
Electrical & Electronics Engineers (IEEE), 2010.
36. A. Schulz, P. Ristoski, and H. Paulheim.
I See a Car Crash: Real-Time Detection of Small Scale
Incidents in Microblogs. In The Semantic Web: ESWC 2013 Satellite Events, number 7955 in Lecture
Notes in Computer Science, pages 22–33. Springer Berlin Heidelberg, 2013.
37. I. S. Sitanggang and M. H. Ismail. Classification model for hotspot occurrences using a decision tree
method. Geomatics, Natural Hazards and Risk, 2(2):111–121, June 2011.
38. S. Zhang and S. Vucetic. Semi-supervised Discovery of Informative Tweets During the Emerging
Disasters. In Workshop Social Web for Disaster Management, Indianapolis, USA, Oct. 2016.
28
Appendix
Mark Kibanov et al.
Conversations about forest and peat fires and haze, detected primarily by the keywords -
9,707 tweets (e.g., "When the haze problem will be solved?"):
( (disasterstormpollutionseverethickfog) && (haze)∗)
OR ( (dangeralertemergencystrongheavy) && (haze)∗)
OR ( hazefire spotfire sourcehotspotair pollutionhaze†)
OR ( forest fire†) OR ( (damageloggingkopenfire
deforestationloggingk) && (forestfieldlandpeat) )
Conversations which contain one of identified hashtags - 3,024 tweets
(e.g., "Let's participate in #melawanasap movement."):
( #saveriau#prayforriau#melawanasap#prayforasap#hentikanasap )
Conversations about happenings in a negative way due to haze, such as flight delay
or school closing - 6,994 tweets (e.g., "Day #3 off because of haze."):
( (closecancelcacelleddelaydelay†cancel†closed)
&& (flightairport) ) OR ( visibility )
OR ( (schoolcollegeuniversity) && (closedcloseleaveleft) )
OR ( (economyimpacteffectlossdownrisk) && (haze)∗)
Conversations with keywords indicating haze-related or derivable diseases -
46,241 tweets (e.g., Welcome to Pekanbaru; do not forget to wear mask!"):
( (infectionstertorous) && (respiratorybreathbreathing) )
OR ( (irritationinflammation) && (eyeskinthroatnoselungs‡) )
OR ( coughheadachesickari§maskasthmaasthma†lungs‡)
OR ( (haze)∗&& (healthhealthybreathpregnantchild
elderly) ) OR ( eye && (soreirritateacute)¶)
general
haze-
hashtag
haze-
impact
haze-
health
haze-
Table 9: English translation of the filtering rules for the identification of corre-
sponding tweets, see Table 2
∗"Kabut asap" is translated as "haze". Both words "kabut" and "asap" are also often used to describe
haze. However, if used not together, both words also may have further meanings.
†These keywords were originally used in English.
kBoth words "pembalakan" and "penebangan" are synonymous and mean "logging".
‡"Paru-paru" is translated as "lungs". Sometimes, the word "paru" is translated as "lungs" as well.
The word "paru" is ambiguous unless it is put in context with further words, such as "infection".
§ARI stands for Acute Respiratory Infection. We used the abbreviation ISPA (Infeksi Saluran Per-
nafasan Akut) which is commonly used by Indonesian Twitter users.
¶All three terms "pedih", "perih", "sakit" describe the eye sore.
|
1810.01012 | 1 | 1810 | 2018-10-01T23:31:34 | Distributional Semantics Approach to Detect Intent in Twitter Conversations on Sexual Assaults | [
"cs.SI"
] | The recent surge in women reporting sexual assault and harassment (e.g., #metoo campaign) has highlighted a longstanding societal crisis. This injustice is partly due to a culture of discrediting women who report such crimes and also, rape myths (e.g., 'women lie about rape'). Social web can facilitate the further proliferation of deceptive beliefs and culture of rape myths through intentional messaging by malicious actors. This multidisciplinary study investigates Twitter posts related to sexual assaults and rape myths for characterizing the types of malicious intent, which leads to the beliefs on discrediting women and rape myths. Specifically, we first propose a novel malicious intent typology for social media using the guidance of social construction theory from policy literature that includes Accusational, Validational, or Sensational intent categories. We then present and evaluate a malicious intent classification model for a Twitter post using semantic features of the intent senses learned with the help of convolutional neural networks. Lastly, we analyze a Twitter dataset of four months using the intent classification model to study narrative contexts in which malicious intents are expressed and discuss their implications for gender violence policy design. | cs.SI | cs | 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI'18)
Distributional Semantics Approach to Detect Intent
in Twitter Conversations on Sexual Assaults
Rahul Pandey
Hemant Purohit
Bonnie Stabile
Aubrey Grant
George Mason University
George Mason University
George Mason University
George Mason University
Fairfax, VA, USA
[email protected]
Fairfax, VA, USA
[email protected]
Fairfax, VA, USA
[email protected]
Fairfax, VA, USA
[email protected]
8
1
0
2
t
c
O
1
]
I
S
.
s
c
[
1
v
2
1
0
1
0
.
0
1
8
1
:
v
i
X
r
a
Abstract -- The recent surge in women reporting sexual assault
and harassment (e.g., #metoo campaign) has highlighted a long-
standing societal crisis. This injustice is partly due to a culture
of discrediting women who report such crimes and also, rape
myths (e.g., 'women lie about rape'). Social web can facilitate
the further proliferation of deceptive beliefs and culture of rape
myths through intentional messaging by malicious actors.
This multidisciplinary study investigates Twitter posts related
to sexual assaults and rape myths for characterizing the types
of malicious intent, which leads to the beliefs on discrediting
women and rape myths. Specifically, we first propose a novel
malicious intent typology for social media using the guidance
of social construction theory from policy literature that includes
Accusational, Validational, or Sensational intent categories. We
then present and evaluate a malicious intent classification model
for a Twitter post using semantic features of the intent senses
learned with the help of convolutional neural networks. Lastly,
we analyze a Twitter dataset of four months using the intent
classification model to study narrative contexts in which malicious
intents are expressed and discuss their implications for gender
violence policy design.
Keywords-Intent Mining, Convolutional Neural Networks,
Policy-affecting intent, Public Health Analytics, Rape Myths
I. INTRODUCTION
Rape and sexual assault are pervasive, long-standing, soci-
etal problems. One out of every six American women, and one
in every 33 men - or about 17% and 3% of the population, re-
spectively - have been the victim of an attempted or completed
rape in their lifetime [1]. Younger people are more likely to
be victims of these crimes. In institutions of higher education
(IHEs), 23.1% of female and 5.4% of male undergraduate
students experience rape or sexual assault by use of physical
force, violence, or incapacitation [2], yet an estimated 80%
of incidents are not reported [3]. Rape or sexual assault are
about half as likely to be reported to police as robbery (54%)
and aggravated assault (58%), with the former being reported
in only about a quarter of all cases (23%) [4]. Social stigma
surrounding sexual crimes likely contributes to this low level
of reporting. This in turn likely emboldens perpetrators, who
act with the confidence of relative impunity given the low level
of reporting, and even more remote likelihood of prosecution.
Rape and sexual assault constitute injustices that impose both
human and financial costs on individuals, and society as a
whole, while also furthering gender inequality.
It is the role of law and policy to address public problems
such as the mitigation of these sexual assault crimes out
of an obligation to lessen harms, protect the autonomy of
citizens, and secure justice. Public attitudes such as those
reflected in social media allow the better understanding of the
nature of public beliefs and the associated intentions at large
scale [5]. Thus, in principle, social media mining can inform
policymakers to ultimately help in the policy formulation and
revision of laws as well as improve the policy outcomes. This
research investigates prominent intentional message themes on
Twitter regarding sexual assault in order to understand the
extent and help mitigate the effect of rape myths - especially
the myth that 'women lie about rape', which is one of the
most frequently endorsed rape myths [6]. Using the guidance
of social construction theory, which explains how policy is
influenced by perceptions of target populations [7], we propose
a novel malicious intent typology and an automated classifier
for categorizing Twitter messages into the relevant classes
of Accusational (blaming someone or a group), Validational
(endorsing a belief), and Sensational (creating uncertainty
and fear). Table I shows examples of such intentional mes-
sages. Addressing the problem of identifying such intentional
messages related to sexual assault and rape on social media
provides the intelligence to better understand and assess the
context in which the public expresses deceptive beliefs. The
specific contributions of this study are the following:
1) We propose a novel malicious intent typology and an
intent classification method using distributional seman-
tics for social media messages. Our evaluation against
several baselines shows the effectiveness of our feature
representation of intent senses learned from convolutional
neural networks.
2) To our knowledge,
this is the first
large-scale multi-
disciplinary study to explore policy-affecting malicious
intent and their contexts in social media, using a novel
application of social construction theory. We present a
scalable alternative for collecting information to help
policy analysts for gender inequality and complement the
costly survey-driven methods.
3) We present novel insights on the context of malicious
intents regarding sexual assault and rape myths in Twitter
dataset collected over 4 months. We found that accusa-
ANONYMIZED EXAMPLE OF MESSAGES WITH VARIED INTENT IN THE CONVERSATION ON TWITTER REGARDING SEXUAL ASSAULT.
TABLE I
Twitter Message
M1. white women have lied about rape against black men for generations
M2. Listening to #Dutton say women on #Nauru who have been raped are often
lying makes me sick. Showing us once again his misogyny & sexism
M3. There is no New Clinton, never has been. Shes the same rape defending, racist,
homophobic liar shes been for 70 yrs URL
Policy-affecting Intent
Accusational
Validational
Sensational
tional intent messages are the most prevalent in social me-
dia. Such messages reflect public beliefs that undermine
the credibility of women who report rape and express
more concern for accusers than the accused, with clear
implications for policy debate, design, and outcomes.
The rest of the paper is organized as follows. Section
II provides a background on social construction theory and
its novel application to understanding policy-relevant beliefs
about sexual assaults including rape myths. Section III presents
our approach for acquiring meaningful intent categories and
classifying intentional messages. Section IV then describes the
experimental setup with several baselines to classify inten-
tional messages on Twitter and compare against the proposed
model. Section V presents result analysis for categorization by
intent typology as well as the topic modeling and psycholin-
guistics analysis of the context of intentional messages before
the discussion in Section VI and conclusion.
II. BACKGROUND AND RELATED WORK
This section presents related work on social construction
theory, its use for identifying policy-affecting intent categories,
and then finally, user intent modeling on social media.
A. Social Construction, Rape Myths, and Policy
The social construction theory of target populations explains
"who benefits and loses from policy change," depending on
whether they are seen positively in the public sphere [7].
Those who are viewed in a negative light are less likely
to find policies shaped in their favor, while those who are
positively socially constructed and powerful (known as the
"advantaged") are more likely to be benefited by policy.
Groups that are negatively socially constructed and weak
(known as the "deviants") are more likely to be condemned
in public discourse and disadvantaged by policy.
Sexual assault policies primarily affect two populations:
accusers (victims) and the accused (perpetrators). Policies that
facilitate the reporting and punishment of sexual assault benefit
accusers, but are seen by some as infringing on the rights of the
accused. Some fear that promulgating such policies will result
in an unreasonably high number of false reports of rape or sex-
ual assault, while, quite to the contrary, evidence demonstrates
that this has been a historically underreported crime. Criminal
justice data indicate that the rate of false rape accusations is
no more than false allegations of other criminal offenses [8],
[9], [10], and place false allegations of rape at around just
5% [11]. Despite this low figure, public dialogue and policy
discussions suggest that there is a belief that the incidence of
false reports of rape is much higher. This false belief leads
to policy outcomes that favor the rights and wellbeing of the
accused over those of the accuser, and, paradoxically, may
even contribute to the continued suppression of rape reporting.
Negative characterizations of accusers are evident in social
constructions of women perpetuated through social media,
among other means. Feminist scholars have long argued that
rape myths contribute to such characterizations by casting
doubt on the very existence of rape, and that the widespread
acceptance of rape myths has practical implications [12]. The
Illinois Rape Myth Acceptance Scale, a tool used to measure
rape myth acceptance [13] is divided into four categories or
subscales: 1) She asked for it; 2) He didn't mean to; 3) It
wasn't really rape; and, 4) She lied. Taken together, these
myths characterize women negatively, as lacking credibility,
at a minimum, or even as routinely and willfully practicing
deceit. Such ideas are rooted in long-standing cultural norms;
the origins of the myth that women lie about rape as vengeful
retaliation towards men who reject their advances can be traced
back to Greek and Judeo-Christian theology [9].
Table II summarizes the policy-relevant characterization
of the key actors in rape and sexual assault context for
our analysis. In short, accusers (mostly young women) have
historically been widely characterized negatively as lying or
promiscuous - "deviants" in the social construction framework.
They have also traditionally been cast as "dependents," lacking
political or economic power. The accused (mostly young men)
are often seen in terms of their prowess as athletes or students,
or their promise as breadwinners, and so are positively con-
structed as "advantaged". Advantaged groups are least likely
to experience burdens and Deviant groups are at the highest
risk, since "punishment" of those in this latter group "yields
substantial political payoffs" for policymakers and political
actors, as does rewarding those in the former group [14], [15].
Therefore, groups characterized as Advantaged and Deviant
are the most discussed in political dialogue, a pattern that
we expect to see mirrored in social media, where the payoffs
might be counted in spreading of a deceptive idea or belief.
Social media can be said to both reflect and perpetuate
prevailing social constructions through both informal online
dialogue and intentional messaging by various stakeholders. It
has been demonstrated that rape myth acceptance is associ-
ated with negative attitudes about women [16], stronger anti-
victim, pro-defendant judgments [17], and influencing "what
is considered a 'legitimate rape' and who is considered a
'credible victim' [18]." Therefore, advancing understanding of
SOCIAL CONSTRUCTION FRAMEWORK AND POLICY-RELEVANT CHARACTERIZATIONS OF ACTORS IN RAPE AND SEXUAL ASSAULT.
TABLE II
Social Construction
Positive
Advantaged
Negative
Contender
Power
Strong
Weak
Accused cast as athletes, breadwinners, men with
potential
[Policy benefits the Accused, burdens Accuser]
Dependents
Accusers seen as innocents, victims, not
blameworthy, but lack political power; Accused
seen as premeditating criminals
[Policy may benefit Accusers or move towards
holding Accused more accountable]
Accusers have political power to influence policy,
but may be cast negatively as promiscuous,
feminist or abrasive
[Policy may move toward accountability for
Accused]
Deviants
Accusers cast as liars, "sluts" or vengeful women
[Policy benefits the Accused, burdens Accusers with
vocal support of politicians and public]
social media's role in propagating (or combating) rape myths
is expected to assist policymakers. Analyzing the context of
malicious intent in propagating the rape myths, or otherwise
deceptive beliefs to discredit women is the first essential step.
We discuss some specific examples of policy that can
precipitate and be influenced by social media dialogue on rape
and sexual assault as follows. The federal guidance on Title IX
issued by the Obama Administration and state level affirmative
consent laws, are two classes of policy interventions designed
to address the injustice of widespread campus sexual assault,
its underreporting, and inadequate institutional response. The
former, the U.S. Department of Education's Office for Civil
Rights' (OCR) Dear Colleague Letter of 2011, articulated to
all school districts, colleges, and universities that Title IX
of the Education Amendments of 1972 would now consider
"sexual harassment of students, which includes acts of sexual
violence[as] a form of sex discrimination prohibited by Title
IX" of the Civil Rights Act of 1964. Likewise, California's
"Yes Means Yes" law, passed in 2014, New York's "Enough
is Enough" law and Illinois' "Preventing Sexual Violence in
Higher Education Act," passed in 2015, as well as Connecti-
cut's "Yes Means Yes" law, passed in 2016, are another set
of examples to include parallel provisions. Both the Obama
Administration's Title IX guidance and state-level Affirmative
Consent
laws can be construed as benefiting victims and
burdening the accused relative to their former positions.
The social construction framework shown in Table II, which
explains how powerful stereotypes influence policy outcomes,
can aid in understanding the contexts of the forces at play. For
instance, in the opposition to existing policies and showing
beliefs for rape myths by sharing intentional messages.
B. Modeling User Intent on Social Media
User intent mining has been traditionally investigated in
the domain of Information Retrieval and Web Search for
better understanding of user query intent. The approach was to
exploit historical user data from search logs and click sequence
graphs for broad categories of navigational, informational, and
transactional intent [19]. It has been a relatively new area of
investigation in social media research [20], where recent works
have investigated the intent classification problem for social
media text in specific domains such as buying-selling intent
for commercial products [21] and help seeking-offering intent
during disasters [22] as well as in general, across different
topics for recommendations such as travel and food [23].
Intent classification is a special type of text classification
focused on action-oriented cues in the text, which differs from
topic classification, which is focused on the subject matter
and sentiment or emotion classification, which is focused on
the current state of affairs [24], [25]. Therefore, the focus
of feature representation and algorithms for learning have
variations across these different types of problems.
Intent expressed in social media messages can be observed
in both implicit and explicit forms. Implicit intent refers to
latent or hidden aim for the action behind the expressed cues,
such as message M2 in Table I, where the author is trying
to validate the presented fact for the purpose of convincing
others. In contrast, explicit intent refers to a specific aim for
the action expressed in the text, for instance, message M1
in Table I clearly expresses the belief to accuse a particular
gender group. Thus, our study requires the modeling of both
explicit and implicit intent forms from short-text messages of
social media, in contrast to the prior work on explicit intent
identification in general [23], [25]. Next, we describe our
method to acquire relevant intent typology and then categorize
messages for the intent types.
III. APPROACH: POLICY-AFFECTING INTENT ANALYTICS
This section first describes our dataset and then the solution
of an intent typology, followed by our classification method.
A. Dataset
We collected Twitter posts using the keyword-based ('fil-
ter/track') method of Twitter Streaming API for the period
of four months - August 1 to December 1 2016 using Citi-
zenHelper system [26]. and the seed keywords of 'rape' and
'sexual assault'. Our dataset contained a total of 5,434,784
tweets. For our study, we created a subset of data containing
deception or myth related terms using the following lexicon,
chosen based on the prior literature about rape myths and
reporting on sexual assault [6], [27]: lie, lying, lied, liar, hoax,
fake, false, fabricated, made up. The filtered subset contained
112,369 tweets (referred as 'myth dataset' in the paper for
clarity), which we investigate for policy-affecting intent.
B. Policy-affecting Intent Typology
Using social construction theory and the constructed an-
alytical framework as shown in Table II, we inferred the
commonalities for potential malicious intent types across the
four quadrants of policy-affecting characterization of actors.
We list the prevalent intent types in the following. We also
consulted two sexual assault policy subject-matter experts,
who further independently reviewed and validated the policy-
affecting intent types and the associated themes in the top
100 'retweet' messages (forwarded tweets) extracted from
our myth dataset. The resulting specific intent categories are
as follows: Accusational, Validational, Sensational, or None,
where
• "Accusational" messages express doubts about or under-
mine accusers; express more concern for the accused than
the accuser; and/or perpetuate the idea that women lie
about rape.
• "Validational" messages express belief in the accuser;
and /or point out the injustice of the crime for an accuser
or accused, and/or the inadequacy of the punishment.
• "Sensational" messages focus more on politics or provo-
cation than on the issue of rape or sexual assault; intent
may be primarily to frighten, politicize or sensationalize
with these terms, but not to affirm, accuse or meaningfully
inform regarding rape or sexual assault.
Messages categorized as Accusational are expected to both
reflect and perpetuate the Advantaged status of the accused and
the Deviant status of accusers. While Validational messages
might contribute to changing the quadrant category of the
accused or accusers. For instance, accusers from the position
of Deviants to a quadrant where they might be more posi-
tively socially constructed (as Dependents) or seen as having
stronger political power (as Contenders).
C. Intent Classification
We used the three key intent types to define our task of
automated intent categorization in the following.
senses
intentional
in a text
Intent classification is a complex problem due to the
likelihood of various
that
complicate natural
language interpretation. There are two
key challenges for classifying intentional messages on the
social media. First, the cues for indicating an intent category
are sparsely present in a short-text message with the lack
of sufficient contextual details. Thus, feature extraction to
efficient capture intent representation becomes challenging
due to the surrounding noise, resulting in poor learning of
the useful regularities and patterns. Second, a specific intent
can be expressed in a variety of textual forms (e.g., consider
message M2 in Table I for the Validational class illustration
that could be written in different ways). Collecting such
varied examples of intent expressions within each category to
create a large training sample for efficient machine learning is
a daunting challenge. Our proposed approach addresses these
challenges of inferring intent from the short-text by observing
an analogy in the domain of computer vision, where an
image is constituted of multiple sparse cues that give the
image an overall meaning and context. Computer vision
research has exploited a distributed semantic representation
of the cues and applying deep learning methods for efficient
performance in image processing tasks, such as Convolutional
Neural Network (CNN). We, therefore, adapt the distributed
semantic representation via word embedding for our feature
representation of sparse intent cues in the short-text messages.
However, for small dataset the CNN based learning approach
is not efficient and generally, the deep learning approaches
require large amount of training data for the requirement of
optimizing a large number of parameters. Thus, we resolve
to rather leverage the fully connected layer in the CNN
architecture as an efficient
feature representation in the
traditional logistic regression classification model. We will
discuss details and comparison with several baseline models
in the following subsection after data annotation.
1) Data Annotation: We randomly sampled 2500 unique
messages from the myth dataset for annotation of intent
categories. We asked for minimum three annotators to label
each message with the four intent classes: Accusational,
Validational, Sensational, or None. We provided instructions
to label with five examples of each class. For the resulting
annotated messages, we used the confidence score greater than
67% for finalizing the label of a message as per the annotation
quality metric of Figure Eight crowdsourcing platform1. We
concluded with the final labeled dataset of 1163 messages.
The resulting label distribution of the classes is: Accusational:
530 (46%), Validational: 161 (14%), Sensational: 347 (30%),
and Other: 125 (10%).
The annotation results suggest an imbalance distribution of
the policy-affecting intent messages, consistent with the real
world machine learning tasks. Next, we describe an automated
multiclass intent classification approach to categorize the
larger myth dataset for our analysis.
2) Feature Extraction and Learning Algorithm: Prior re-
search on intent classification on social media has used a
variety of human-created rules as features [28], [22] as well
as automatically extracted features such as bag-of-words, n-
grams, and Part-of-Speech tags [21]. Instead of exploiting
human-created rules as features due to the cost of creating an
exhaustive list of rules to capture different intent expressions,
we resolve to automatically generating the higher abstract-
1https://success.figure-eight.com/hc/en-us/articles/201855939-How-to-
Calculate-a-Confidence-Score
Fig. 1. Summary of the proposed intent classification model that uses distributed semantics features as the last layer of CNN architecture.
level features. We compare the classic Bag-of-Words model
for features against the distributional semantics based model of
word embedding for features, of the message text. In particular,
we use the publicly available pretrained word2vec vectors for
creating distributional semantic representation of each word in
a message text. The pre-trained word vectors were generated
by neural language models trained over 100 billion words of
Google News data [29]. Prior to that, we used standard text
cleaning for removing special characters, and only kept the
words with minimum frequency of 3 (based on multiple trials.)
We considered two different learning algorithms for our
experiments. First, using a generalized linear model of logistic
regression and second, using deep neural network model of
CNN with softmax as classifier. The reason for exploring
in-depth various feature-model combinations and the two
algorithmic approaches is twofold. First, our dataset is small
enough to train a model for efficient semantic representation
by itself; hence, a pure deep learning based softmax classifier
could not classify efficiently. Second, we have sparse cues
for indicating intent that could limit the efficiency of feature
representation by only the traditional Bag-of-Words or rule-
based feature representation with linear models.
Our resultant approach is to use the deep neural network
model as the feature extractor with a traditional classifier.
Specifically, the proposed model includes CNN codes (with
adapted word2vec embedding) as features for a logistic regres-
sion classifier. We used a three step process as follows. First,
we trained a CNN model, where we adapted the pretrained
word2vec embedding to our event dataset for initialization,
likewise [30] (implementation details in baseline B3). Then,
we used the fully connected layer output as the fixed feature set
of CNN codes, which were used to train a logistic regression
classifier. Figure 1 summarizes our proposed approach.
Fig. 2.
Comparison of stratified 10-fold CV results for different feature
representation and machine learning models for policy-affecting intent classi-
fication. Our method 'word2vec-adapted-Logistic' performs the best.
IV. EXPERIMENTAL SETUP
We evaluate the performance of our multiclass classification
model using the standard metrics of accuracy and micro F-
score with the stratified 10-fold cross validation (CV). Accu-
racy computes the percentage of the total number of correctly
predicted messages, while micro F-score computes per class
the value of weighted average of the precision (number of
relevant messages among the predicted messages) and recall
(sensitivity) [31]. We implement using python gensim library.
We created the following baseline schemes:
• [B1] BoW Features + Linear Model. We generated tf-
idf features for each message and trained with logistic re-
gression model. We considered unigram words and then,
applied Lovins stemming algorithm to get the stem words,
and took maximum 1000 words as default parameters.
• [B2] word2vec Average Features + Linear Model. We
computed the average word vectors of all the words in
a message by using the pretrained Google's word2vec
embeddings. Using the average vectors as features, we
trained a logistic regression model.
• [B3] Random Initialized Embedding + CNN (Soft-
max). We followed the approach of Kim [30] for de-
signing a CNN model for text classification. It consists
of embedding of shape vocabulary size (735) x dimen-
sion (300) followed by 3 parallel convolutional-maxpool
paired layer with convolution filter sizes as 3, 4 and 5
respectively. They are linked to a fully connected layer
of size 384. Then, a dropout layer with 50% dropout
for regularization is connected and at last, softmax layer
for classification probability. We added l2-loss for non-
linearity and cross-entropy as loss function, which is
reduced by Adam Optimizer [30]. Training was done with
higher learning rate (0.005) initially for faster reduction
of loss, and then, we slowly decreased the learning rate
up to 0.0001 to get the minimum loss.
• [B4] word2vec Initialized Embedding + CNN (Soft-
max). We used the same architecture as above but initial-
ized the embedding layers with Google's word2vec and
then trained in the same way.
• [B5] CNN (Randomly Initialized) Codes + Linear
Model. In this scenario, we used a two step process. First,
we trained the CNN model same as the above experiments
with our training data. Then, we used the fully connected
layer output as the fixed feature vectors of CNN Codes.
Finally, we used these CNN codes for training logistic
regression classifier.
Figure 2 shows the stratified 10-fold cross validation results.
V. RESULT ANALYSIS
In this section, we first discuss the automated classification
performance and intent prediction on the myth dataset using
the proposed classifier. We then present an analysis and policy
implication of the topical contexts of messages in the myth
dataset categorized by the predicted intent classes.
A. Classifier Performance and Prediction Results
Figure 2 shows the better performance of our proposed
classifier in comparison to all the baselines, by leveraging
the semantic representation based on CNN codes initialized
with word2vec and trained on the generalized linear model
of logistic regression. The external knowledge in word2vec of
representing varied contexts for the words helps in addressing
the challenge of sparsity in efficiently learning intent represen-
tations from a small training set. Modeling intent from social
media text is a challenging task in general, such as maximum
F-score of 58% for classifying general intent types (e.g., travel,
food, commercial goods, event) on Twitter [23]. Albeit, our
results show better performance of the proposed method for
the domain-specific intent inference task. In particular, our
approach achieved micro F-score for the policy-affecting intent
classes up to 97.3% for Accusational, 96.9% for Validational
and 97.8% for Sensational as well as both accuracy and macro
F-score as 96.9%. A potential reason for the best performance
in learning Accusational intent category is likely the explicit
nature of intent expression when accusing a target. On the
contrary, we note the inferior performance for the Validational
class in contrast to other classes potentially due to the highly
implicit nature of Validational intent expression as described
earlier for the example M2 in Table I. We also intentionally
Fig. 3. Distribution of predicted messages across the intent categories.
did not balance the training dataset for learning to capture the
real data distribution, as we apply the classifier for predicting
categorical messages in the myth dataset next.
For our analysis, we consider only the unique messages for
prediction task input (i.e. removing duplicates using Leven-
shtein string similarity ≥ 0.8, such as retweets or opinions
on news headlines shared as tweets). The resulting non-
duplicate message set comprised of 31,129 tweets and the
intent category distribution of the predicted myth dataset is
shown in Figure 3.
We observed the prevalence of Accusational intent mes-
sages in the myth-related dataset. Examples of such predicted
messages include the following, where feminists are being
accused:
"still a mra favourite tweet to feminists , just hoping that
we will fire back w stats on false rape reporting url"
It indicates the utility of social media as a source to collect
information on public beliefs regarding sexual assault policy
related actors - accusers and accused as well as stakeholders.
Furthermore, nearly one third of the messages are categorized
as Sensational indicating the role of social media as a channel
to propagate agendas while mixing the context with any actor
in the social construction framework, such as the following
predicted message tries to create a narrative with political
motives.
"bill clinton who is been impeached, disbarred, accused of
rape, other sexual misconduct, lying under oath is about tell"
Next, we analyze the topical context of how the public
expresses intent in the categorized messages and the associated
policy implications.
B. Topical Context Analysis
We conducted a topic modeling analysis of the predicted
intent category sets. Topic modeling provides a mechanism
to discover latent themes based on semantic associations be-
tween words by creating clusters that represent abstract topics.
Although it requires parameter tuning to generate human-
interpretable topics. A popular approach for topic modeling
is to employ Latent Dirichlet Allocation (LDA) algorithm
proposed by [32]. After standard text preprocessing steps
of stop word removal and lemmatization, we trained the
LDA model with default parameters using the topic modeling
implementation in MALLET toolkit [33]. We experimented for
different number of topics and found 5 topics suitable for our
analysis with distinct themes. Table III shows the comparative
TOPICAL CLUSTER OF WORDS EXTRACTED FROM MESSAGES ACROSS DIFFERENT POLICY-RELEVANT INTENT CATEGORIES.
TABLE III
TOPIC 1
TOPIC 2
TOPIC 3
Acccusational
rape url raped lie false women lying
case men girls time white made black
rapes saint accused money rapist shit
man asaram police hoax victims
found year allegation stone forced
fined number fact revenge females
delhi free media lot rolling
lied bapu filed assault allegations real
accuser stop guilty report lives hate
charge feminists lies attention
assaulted derrick trial support
Sensational
url lie fake sexual lied steal made
charges accused criminal trial called
court taxes raping muslim defended
abuse white real
rapes year kill donald corrupt cheat
vote hoax muslims pedophile proven
laughed benghazi war hate calls ass
world shit
Validational
fake victims accused victim reported
girl case fuck proven called white
claim culture life making falsely
understand reason stories rapists
liar claims stop thing police report
accusation innocent raping evidence
low guilty actual charges feel talking
woman hard lies assume
rape lying liar trump hillary raped
women bill clinton assault victim
false victims case murder racist media
lying women assault lied girls true ppl
child bad problem year makes wrong
good things call hate world calling
man support time
assaults
analysis of the top three identified topical clusters (due to
space limitation). We observe that messages with Accusational
intent about rape and sexual assault myths have the context
of intent about specific target groups across gender ('men'
and 'women'), race ('white'), religion ('asaram' is a religious
leader), and occupations ('police') as evident. In contrast,
messages with Sensational intent focus on the trending news
topics related to politics and current affairs, which is plausible
with our theory that the prime purpose of such user intent is
to create the alternative narrative for a target (e.g., a political
actor 'donald') in connection with the context of rape and
sexual assault. We can observe a different
theme for the
Validational intent messages, where the context is focused
on verifying or validating the facts and stories on existing or
alleged crimes against women (e.g., 'reported', 'claim', and
'proven' in the Validational column).
C. Psycholinguistic Analysis
We investigate the different psychological patterns in the
context of expressing specific intent. For this purpose, we
use the popular psychometric analysis software Linguistic
Inquiry Word Count (LIWC) [34]. LIWC counts words in
psychologically meaningful categories for a given text. For
this analysis, we randomly sampled 2000 messages from each
of the predicted intent category set and ran through LIWC.
We found three key observations in the LIWC measures.
First, Accusational and Validational intent messages use causal
writing style, which can be associated with their objective
of convincing others about different myths and claims of
a rational approach. Second, Validational
intent messages
express greater certainty in the context of communication,
partly attributed to the observation in the topical context
analysis where we found that the context of such messages
in often about
the facts or stories from the past. Third,
Sensational intent messages use greater expression of power
and negative emotion than any of the other categories. It can be
understood in the context of creating sensation by bullying and
showing strong subjectivity towards a target or topic. These
observations provide guidance towards the design of potential
features to improve identification of policy-affecting intent
messages as well as their topical context in future studies.
VI. DISCUSSION
This study presented novel insights on the contexts of using
social networks as a means to reflect or perpetuate rape and
sexual assault related myths. We investigated a novel adaption
of the framework of social construction theory that helped
identify policy-relevant actors in the conversations about rape
and sexual assault on social media. Using the guidance of
the social construction framework, we discovered three types
of policy-affecting intent categories and proposed a novel
intent categorization scheme for social media. This approach
provides a scalable alternative for collecting information that
can assist the policy analysts on gender violence and can
complement the existing costly, survey-driven methods. We
demonstrated a novel design of intent classifier for short-text
by using a rich feature representation based on the adaptation
of pretrained word2vec embedding, which helped overcome
the challenge of efficiently capturing the sparse cues of intent
indicators in text messages with large labeled data. Finally,
we analyzed a four month data set to identify the themes
in which intent is expressed regarding myths about rape and
sexual assault. We observed that Accusational intent messages
are the most prevalent in social media, with a contextual focus
on public beliefs. They target the credibility of women and
highlight the 'advantaged' status of male accusers that has a
clear influence on social construction and policy development.
This research study has, however, some limitations that
provide a direction for future work. We have only used English
language tweets for a fixed time duration and thus, did not
account for the time-based comparison of different gender
myths events across multiple languages. It is partly due to
the challenge of modeling intent in another language, where
the semantics of how intents are expressed could require a
different approach to develop an efficient feature representa-
tion for learning. Also, since the data collection was done
based on keyword-based approach, in future one can study
the presence of malicious intent types in the dataset collected
through random samples of tweet stream for a particular
location. Given the complexity of modeling policy-affecting
intent, we also plan to investigate novel neural
language
models while incorporating perceptual and cognitive features
associated with specific intent types, as identified in the LIWC
analysis. Finally, the presented analysis approach using the so-
cial construction framework can be extended for studying rape
and sexual assault related myths on another social networking
platform. Also, a future study could compare the prevalence
of specific policy-affecting intent categories and their context
across the different social networking platforms.
VII. CONCLUSIONS
In this paper, we presented the first quantitative analysis
of policy-affecting intent expressed on social media regarding
rape and sexual assault by a novel application of social
construction theory. We showed that by using a social con-
struction framework, meaningful categories of malicious intent
associated with public beliefs can be identified, with key policy
design implications. We demonstrated a novel CNN-based
policy-affecting malicious intent classifier with micro F-score
up to 97% for an intent class, by representing and learning
the semantics of sparse intent cues in the short-text Twitter
messages via external knowledge of word2vec embeddings.
When compared with traditional methods based on bag-of-
words representation, the deep learning based CNN approach
with pre-trained word vector representations generated more
optimal features for efficient learning. The identified intent-
related messages were used to discover the contexts using
topic modeling analysis, where we found that the public uses
social media regarding rape and sexual assault extensively for
Accusational and Sensational intent themes with a focus on
targeted groups. Such targets include race and occupation that
aim to undermine the credibility of women and highlight the
Advantaged status of male accused. This analysis presents a
direction for the use of social media analytics for assisting the
information needs of policy analysts for the design, develop-
ment, and analysis of rape and sexual assault related policies.
Reproducibility. Data is available upon request for research.
VIII. ACKNOWLEDGEMENT
Authors thank WI'18 reviewers for valuable feedback and
also, U.S. National Science Foundation for grant IIS-1657379.
REFERENCES
[1] RAINN, Victims of Sexual Violence Statistics., 2017b.
[Online].
Available: https://www.rainn.org/statistics/victims-sexual-violence
[2] D. Cantor, B. Fisher, S. H. Chibnall, R. Townsend, H. Lee, G. Thomas,
C. Bruce, and I. Westat, "Report on the aau campus climate survey on
sexual assault and sexual misconduct," 2015.
[3] N. R. Council,
Estimating
Rape
and
of
Sexual Assault, C. Kruttschnitt, W. D. Kalsbeek,
and C. C.
House,
The National Academies
Press, 2014. [Online]. Available: https://www.nap.edu/catalog/18605/
estimating-the-incidence-of-rape-and-sexual-assault
Eds. Washington, DC:
Incidence
the
[4] B. of Justice Statistics., Criminal Victimization, 2016., 2017. [Online].
Available: https://www.bjs.gov/content/pub/pdf/cv16 sum.pdf
[5] H. Purohit, T. Banerjee, A. Hampton, V. L. Shalin, N. Bhandutia, and
A. Sheth, "Gender-based violence in 140 characters or fewer: A# bigdata
case study of twitter," First Monday, vol. 21, no. 1, 2016.
[6] R. Franiuk, J. L. Seefelt, S. L. Cepress, and J. A. Vandello, "Prevalence
and effects of rape myths in print journalism: The kobe bryant case,"
Violence Against Women, vol. 14, no. 3, pp. 287 -- 309, 2008.
[7] A. L. Schneider, H. Ingram, and P. Deleon, "Democratic policy design:
Social construction of target populations," Theories of the policy process,
vol. 3, pp. 105 -- 149, 2014.
[8] P. N. Rumney, "False allegations of rape," The Cambridge Law Journal,
vol. 65, no. 1, pp. 128 -- 158, 2006.
[9] K. M. Edwards, J. A. Turchik, C. M. Dardis, N. Reynolds, and
C. A. Gidycz, "Rape myths: History, individual and institutional-level
presence, and implications for change," Sex Roles, vol. 65, no. 11-12,
pp. 761 -- 773, 2011.
[10] C. Gunby, A. Carline, and C. Beynon, "Regretting it after? focus
group perspectives on alcohol consumption, nonconsensual sex and false
allegations of rape," Social & Legal Studies, vol. 22, no. 1, pp. 87 -- 106,
2013.
[11] C. E. Ferguson and J. M. Malouff, "Assessing police classifications of
sexual assault reports: A meta-analysis of false reporting rates," Archives
of sexual behavior, vol. 45, no. 5, pp. 1185 -- 1193, 2016.
[12] M. R. Burt and R. S. Albin, "Rape myths, rape definitions, and
probability of conviction," Journal of Applied Social Psychology, vol. 11,
no. 3, pp. 212 -- 230, 1981.
[13] S. McMahon and G. L. Farmer, "An updated measure for assessing
subtle rape myths," Social Work Research, vol. 35(2), pp. 71 -- 81, 2011.
[14] A. L. Schneider and H. M. Ingram, Policy design for democracy.
University Press of Kansas, 1997.
[15] B. Stabile, "Reproductive policy and the social construction of mother-
hood," Politics & Life Sciences, vol. 35, no. 2, pp. 18 -- 29, 2016.
[16] S. N. Baugher, J. D. Elhai, J. R. Monroe, and M. J. Gray, "Rape myth
acceptance, sexual trauma history, and posttraumatic stress disorder,"
Journal of interpersonal violence, vol. 25, no. 11, pp. 2036 -- 2053, 2010.
[17] P. Sussenbach, F. Eyssel, J. Rees, and G. Bohner, "Looking for blame:
rape myth acceptance and attention to victim and perpetrator," Journal
of interpersonal violence, vol. 32, no. 15, pp. 2323 -- 2344, 2017.
[18] S. Brownmiller, Against our will: Men, women and rape. Open Road
Media, 2013.
[19] B. J. Jansen, D. L. Booth, and A. Spink, "Determining the informational,
intent of web queries," Information
navigational, and transactional
Processing & Management, vol. 44, no. 3, pp. 1251 -- 1266, 2008.
[20] H. Purohit and R. Pandey, Intent Mining for the Good, Bad, and
Ugly Use of Social Web: Concepts, Methods, and Challenges. Cham:
Springer International Publishing, 2019, pp. 3 -- 18. [Online]. Available:
https://doi.org/10.1007/978-3-319-94105-9 1
[21] B. Hollerit, M. Kroll, and M. Strohmaier, "Towards linking buyers and
sellers: detecting commercial intent on twitter," in WWW. ACM, 2013,
pp. 629 -- 632.
[22] H. Purohit, G. Dong, V. Shalin, K. Thirunarayan, and A. Sheth, "Intent
classification of short-text on social media," in Proceedings of IEEE
SocialCom, 2015, pp. 222 -- 228.
[23] J. Wang, G. Cong, W. X. Zhao, and X. Li, "Mining user intents in
twitter: A semi-supervised approach to inferring intent categories for
tweets." in AAAI, 2015, pp. 318 -- 324.
[24] M. Kroll and M. Strohmaier, "Analyzing human intentions in natural
language text," in K-CAP. ACM, 2009, pp. 197 -- 198.
[25] Z. Chen, B. Liu, M. Hsu, M. Castellanos, and R. Ghosh, "Identifying
intention posts in discussion forums," in NAACL, 2013, pp. 1041 -- 1050.
[26] P. Karuna, M. Rana, and H. Purohit, "Citizenhelper: A streaming analyt-
ics system to mine citizen and web data for humanitarian organizations."
in ICWSM, 2017, pp. 729 -- 730.
[27] M. M. Aiken, "False allegation: A concept in the context of rape,"
Journal of psychosocial nursing and mental health services, vol. 31,
no. 11, pp. 15 -- 20, 1993.
[28] C. S. Carlos and M. Yalamanchi, "Intention analysis for sales, marketing
and customer service," Proc. of COLING 2012: Demo, pp. 33 -- 40, 2012.
[29] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean,
"Distributed representations of words and phrases and their composi-
tionality," in NIPS, 2013, pp. 3111 -- 3119.
[30] Y. Kim, "Convolutional neural networks for sentence classification," in
EMNLP, 2014, pp. 1746 -- 1751.
[31] M. Hall, I. Witten, and E. Frank, "Data mining: Practical machine
learning tools and techniques," Kaufmann, Burlington, 2011.
[32] D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation,"
JMLR, vol. 3, no. Jan, pp. 993 -- 1022, 2003.
[33] A. K. McCallum, "Mallet: A machine learning for language toolkit,"
2002.
[34] J. W. Pennebaker, R. L. Boyd, K. Jordan, and K. Blackburn, "The
development and psychometric properties of liwc2015," Tech. Rep.,
2015.
|
1104.3219 | 1 | 1104 | 2011-04-16T08:55:24 | On Social-Temporal Group Query with Acquaintance Constraint | [
"cs.SI"
] | Three essential criteria are important for activity planning, including: (1) finding a group of attendees familiar with the initiator, (2) ensuring each attendee in the group to have tight social relations with most of the members in the group, and (3) selecting an activity period available for all attendees. Therefore, this paper proposes Social-Temporal Group Query to find the activity time and attendees with the minimum total social distance to the initiator. Moreover, this query incorporates an acquaintance constraint to avoid finding a group with mutually unfamiliar attendees. Efficient processing of the social-temporal group query is very challenging. We show that the problem is NP-hard via a proof and formulate the problem with Integer Programming. We then propose two efficient algorithms, SGSelect and STGSelect, which include effective pruning techniques and employ the idea of pivot time slots to substantially reduce the running time, for finding the optimal solutions. Experimental results indicate that the proposed algorithms are much more efficient and scalable. In the comparison of solution quality, we show that STGSelect outperforms the algorithm that represents manual coordination by the initiator. | cs.SI | cs | On Social-Temporal Group Query with
Acquaintance Constraint
Yi-Ling Chen
De-Nian Yang
Academia Sinica
National Taiwan Univ.
[email protected] [email protected]
Wang-Chien Lee
The Penn State Univ.
[email protected]
Ming-Syan Chen
National Taiwan Univ.
[email protected]
ABSTRACT
Three essential criteria are important for activity planning, includ-
ing: (1) finding a group of attendees familiar with the initiator,
(2) ensuring each attendee in the group to have tight social rela-
tions with most of the members in the group, and (3) selecting an
activity period available for all attendees. Therefore, this paper
proposes Social-Temporal Group Query to find the activity time
and attendees with the minimum total social distance to the initia-
tor. Moreover, this query incorporates an acquaintance constraint to
avoid finding a group with mutually unfamiliar attendees. Efficient
processing of the social-temporal group query is very challenging.
We show that the problem is NP-hard via a proof and formulate
the problem with Integer Programming. We then propose two ef-
ficient algorithms, SGSelect and STGSelect, which include effec-
tive pruning techniques and employ the idea of pivot time slots to
substantially reduce the running time, for finding the optimal so-
lutions. Experimental results indicate that the proposed algorithms
are much more efficient and scalable. In the comparison of solu-
tion quality, we show that STGSelect outperforms the algorithm
that represents manual coordination by the initiator.
1.
INTRODUCTION
Three essential criteria are important for activity initiation, in-
cluding: (1) finding a group of attendees familiar with the initiator,
(2) ensuring each attendee in the group to have tight social relations
with most of the members in the group, and (3) selecting an activ-
ity period available for all attendees. For example, if a person has
a given number of complimentary tickets for a movie and would
like to invite some friends, she usually prefers choosing a set of
mutually close friends and the time that all of them are available.
Nowadays, most activities are still initiated manually via phone, e-
mail, messenger, etc. However, a growing number of systems are
able to gather and make available some information required for
activity initiation. For example, social networking websites, such
as Facebook [2] and LinkedIn [5], provide the social relations and
contact information, and web collaboration tools, such as Google
Calendar [3], allow people to share their available time to friends
and co-workers. Even with the availability of the above informa-
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee. Articles from this volume were invited to present
their results at The 37th International Conference on Very Large Data Bases,
August 29th - September 3rd 2011, Seattle, Washington.
Proceedings of the VLDB Endowment, Vol. 4, No. 6
Copyright 2011 VLDB Endowment 2150-8097/11/03... $ 10.00.
tion, nevertheless, an activity initiator still needs to manually de-
cide the suitable time and desirable attendees for activity planning,
which can be very tedious and time-consuming. Thus, it is desir-
able to provide an efficient activity planning service that automati-
cally suggests the attendees and time for an activity.
To support the aforementioned service, we formulate a new query
problem, named Social-Temporal Group Query (STGQ), which con-
siders the available time of candidate attendees and their social re-
lationship. Given an activity initiator, we assume that friends on her
social network (i.e., her friends together with friends of friends) are
candidate attendees. We also assume that the available time slots
of the candidate attendees have been made available for the sys-
tem in charge of query processing (e.g., via web collaboration tools
with the corresponding privacy setting1 ), and the social relation-
ship between friends is quantitatively captured as social distance
[10, 12, 13], which measures the closeness between friends. An
STGQ comes with the following parameters, (1) the activity size,
denoted by p, to specify the number of expected attendees, (2) the
length of time for the activity, denoted by m, (3) a social radius
constraint, denoted by a number s, to specify the scope of can-
didate attendees, and (4) an acquaintance constraint, denoted by
a number k , to govern the social relationship between attendees.
The primary goal is to find a set of activity attendees and a suit-
able time which match the specified number of attendees in (1)
and the activity length in (2) respectively, such that the total so-
cial distance between the initiator and all invited attendees is min-
imized. Additionally, the social radius constraint in (3) specifies
that all the candidate attendees are located no more than s edges
away from the initiator on her social network, while the acquain-
tance constraint in (4) requires that each attendee can have at most
k other unacquainted attendees.2 As such, by controlling s and k
based on desired social atmosphere, suitable attendees and time are
returned. Example 1 in the Appendix A shows an illustrative exam-
ple. Note that, in situations where the time of the planned activity is
pre-determined (e.g., complimentary tickets for a concert or a sport
event in a specified day), the aforementioned STGQ can be simpli-
fied as a Social Group Query (SGQ) (i.e., without considering the
temporal constraint). In this paper, we first examine the processing
1To process STGQ, it is not necessary for a user to share the sched-
ule to friends. However, we assume that any friend can initiate an
STGQ, and the query processing system can look up the available
time of the user, just like the friend making a call to ask the avail-
able time. Different privacy policies or different schedules can be
set for different friends, just like answering different available time,
or even not answering, for various friends. The above privacy and
schedule setting is beyond the scope of this paper.
2Note that the social radius constraint is specified in terms of num-
ber of edges, rather than the social distance, so the users can easily
specify the constraint.
397
strategies for SGQ and then take further steps to extend our study
on the more complex STGQ.
For SGQ, a simple approach is to consider every possible p at-
tendees and find the total social distance. This approach needs to
evaluate C f −1
p−1 candidate groups, where f is the number of can-
didate attendees.
In the current social network [8], the average
number of friends for a user is around 100. Therefore, if an ini-
tiator would like to invite 10 attendees out of her 100 friends, the
number of candidate groups is in the order of 1013 . Note that the
above scenario considers only the friends of the user as candidate
attendees, and the number of candidate groups will significantly
increase if the friends of each friend are also included. To sequen-
tially choose the attendees at each iteration, giving priority to close
friends based on their social distances to the activity initiator may
lead to a smaller total social distance in the beginning, but does not
always end up with a solution that satisfies the acquaintance con-
straint, especially for an activity with a small k . On the other hand,
giving priority to a set of people who know each other to address
the acquaintance constraint does not guarantee to find the solution
with the minimum total social distance. Therefore, to select each
attendee, the challenge comes from the dilemma of (1) reducing
the total social distance at each iteration and (2) ensuring that the
solution eventually follows all constraints of this problem.
Based on the above observations, in this paper, we first prove
that SGQ is NP-hard and then propose an algorithm, called SGSe-
lect, to find the optimal solution. We design three strategies, access
ordering, distance pruning, and acquaintance pruning, to effectively
prune the search space and reduce the processing time. During the
selection of each attendee, we address both the social distance and
connectivity of the attendee, together with the characteristics of the
social network for other attendees that have not been considered, in
order to find the optimal solution. Moreover, to consider the tempo-
ral dimension, we formulate STGQ as an optimization problem and
derive an Integer Programming optimization model, which can be
modified to support SGQ as well. Processing STGQ is significantly
more challenging than processing SGQ because there may exist nu-
merous time periods with different candidate groups. To solve the
problem, a simple approach is to sequentially explore the temporal
dimension and consider every possible activity period with m time
slots. This approach then chooses the corresponding optimal SGQ
attendees for each activity period, and identifies the period with
the smallest total social distance. However, this approach requires
solving numerous SGQ problems and thereby is computationally
intensive. In contrast, in this paper, we propose an algorithm, called
STGSelect, to solve the problem. In addition to the strategies for
SGSelect, we first identify pivot time slots, which are the time slots
only required to be explored in the temporal dimension to reduce
the running time. Moreover, we propose the availability pruning
strategy for Algorithm STGSelect, and the strategy is able to lever-
age the correlation of the available time slots among candidate at-
tendees, to avoid exploring an activity period eventually with fewer
than p available attendees.
The contributions of this paper are summarized as follows.
• We formulate two new and useful queries for an activity ini-
tiator, namely, SGQ and STGQ, to obtain the optimal set of
attendees and a suitable activity time. SGQ can be used to
plan for various types of activities by specifying the social
radius constraint s and the acquaintance constraint k , while
STGQ also takes into account the temporal constraint. We
prove that these two problems are NP-hard.
• We design Algorithm SGSelect and STGSelect to find the
optimal solutions to SGQ and STGQ, respectively. We de-
rive an Integer Programming optimization model for STGQ,
which can also support SGQ. Moreover, we devise various
strategies, including access ordering, distance pruning, ac-
quaintance pruning, pivot time slots, and availability prun-
ing, to prune unnecessary search space and obtain the op-
timal solution in smaller time. Our research result can be
adopted in social networking websites and web collaboration
tools as a value-added service.
The rest of this paper is summarized as follows. In Section 2,
we introduce the related works. Section 3 formulates SGQ and ex-
plains the details of Algorithm SGSelect. Section 4 extends our
study on SGQ to the more complex STGQ. The details of Algo-
rithm STGSelect are also included. We present the experimental
results in Section 5 and conclude this paper in Section 6.
2. RELATED WORKS
There is a tremendous need for activity planning. Even though
some web applications, e.g., Meetup [6], have been developed to
support activity coordination, these applications still require users
to manually assign the activity time and participants. For example,
using Meetup [6] or the Events function in Facebook [1], an activ-
ity initiator can specify an activity time and manually select some
friends to send invitations to. In response, these friends inform the
activity initiator whether they are able to attend or not. Obviously,
the above-described manual activity coordination process is tedious
and time-consuming. In contrast, the proposed STGQ, complemen-
tary to the above web applications, is able to automatically find a
group of close friends to get together at a suitable activity time.
There are some related works on group formation (e.g., [10]),
team formation (e.g., [14, 15]), and community search (e.g., [20]),
but they focus on different scenarios and objectives. In addition,
none of the above works consider the temporal dimension, i.e.,
schedules of attendees, to find a suitable activity time. Specifically,
the work [10] uses real data to analyze the long-term evolution of
the group formation in global social networks. On the contrary,
we concern the social neighborhood of the activity initiator (i.e.,
her egocentric social network), since our goal is to find an opti-
mal group of mutual acquaintances for the initiator. The studies
on team formation [14, 15] find a group of experts covering all re-
quired skills, and minimize the communications cost between these
experts. In contrast, we aim to find a group of friends satisfying so-
cial constraints and having common available time slots. The work
[20] considers an unweighted social graph and studies the commu-
nity search problem. The problem is to find a compact commu-
nity that contains particular members, with the objective such as
minimizing the total degree in the community. However, we con-
sider a weighted social graph and minimize the total social distance
within the group. Moreover, our problem includes an acquaintance
constraint to ensure that each attendee can have at most k other
attendees unacquainted. This constraint is important because it al-
lows us to adapt to the nature activity. In addition, the work [20]
only provides an upper bound on the community size, instead of
the exact number. Thus, users thereby may obtain a solution with
an undesirably small number of attendees.
By minimizing the total social distance among the attendees, we
are actually forming a cohesive subgroup in the social network. In
the field of social network analysis, researches on finding various
kinds of cohesive subgroups such as clique, n-club [17], and k-plex
[19] have been conducted. However, most previous studies focus
on finding all maximal cohesive subgroups or the maximum cohe-
398
sive subgroups, but the total social distance is not considered. For
example, finding the maximum k-plexes is discussed in [11, 16,
18], and enumeration of all maximal k-plexes is discussed in [21].
Instead of finding these extreme cases, we allow the activity initia-
tor to specify an arbitrary group size. Note that the maximal sub-
groups or the maximum subgroups in the egocentric network of the
initiator may not qualify the specified size. Hence, these existing
works are not applicable to the SGQ problem. Besides, to the best
of our knowledge, none of previous works on cohesive subgroups
have considered the schedule of group members. Therefore, the
STGQ problem is not addressed previously.
3. SOCIAL GROUP QUERY
In this section, we present the fundamental problem, namely So-
cial Group Query (SGQ), which focuses on finding the optimal
group of attendees satisfying the social radius constraint and the
acquaintance constraint. In the following, we first present the prob-
lem formulation and research challenges in Section 3.1, and then
prove that SGQ is NP-hard. Afterward, we propose an algorithm
that can effectively prune unnecessary search space to obtain the
optimal solution in Section 3.2.
3.1 Problem Definition
Given an activity initiator q and her social graph G = (V , E ),
where each vertex v is a candidate attendee, and the distance on
each edge eu,v connecting vertices u and v represents their social
closeness. A social group query SGQ(p, s, k), where p is an ac-
social distance between q and every vertex v in F , i.e., (cid:80)
tivity size, s is a social radius constraint, and k is an acquaintance
constraint, finds a set F of p vertices from G to minimize the total
v∈F dv,q ,
where dv,q is the length of the minimum-distance path between v
and q with at most s edges, such that each vertex in F is allowed to
share no edge with at most k other vertices in F .
The initiator can specify different s for different kinds of activi-
ties. For example, the initiator can ensure that all invited attendees
are directly acquainted with her by specifying s = 1. On the other
hand, for a party, the initiator can specify a larger s such that some
friends of friends can also be invited to the party. Moreover, the
initiator can vary k for different kinds of activities, e.g., a small k
for a gathering where all the attendees know each other very well,
while a larger k for a more diverse event. Note that the size of so-
lution space, i.e., the number of candidate groups, rapidly grows
when p and s increase. On the other hand, k serves as a filter to
determine whether each candidate group satisfies the acquaintance
constraint.
Indeed, processing SGQ is an NP-hard problem (see
Appendix B.1 for a formal proof). Fortunately, while the problem
is very challenging, it is still tractable when the size of s and p are
reasonable. In Section 3.2, we design an efficient query processing
algorithm by pruning unqualified candidate groups.
TH EOR EM 1. SGQ is NP-hard.
PROO F. We prove the theorem in Appendix B.1.
3.2 Algorithm Design
In this section, we propose a novel algorithm, namely SGSelect,
to solve SGQ efficiently. Our idea is to first derive a feasible graph
GF = (VF , EF ) from G based on our observation on the social
radius constraint, such that there exists a path with at most s edges
from q to each vertex in GF . Starting from q , we iteratively explore
GF to derive the optimal solution. At each iteration, we keep track
of the set of vertices that satisfy the acquaintance constraint as the
intermediate solution obtained so far (denoted as VS ). Initially, we
set VS = {q}, and let VA denote the set of remaining vertices in
VF , i.e., VA = VF − VS . We select a vertex in VA and examine
whether it is feasible (i.e., following the acquaintance constraint) to
move this vertex to VS at each iteration, until VS has p vertices and
the process stops.
The selection of a vertex from VA at each iteration is critical
to the performance of query processing.
It is essential to avoid
choosing a vertex v that may significantly increase the total social
distance or lead to violation of the acquaintance constraint. Based
on our analysis on various properties and constraints in SGQ, we
observe that the access order of nodes in constructing candidate
groups is a key factor to the overall performance. It is important to
take a priority to consider nodes that are very likely to be included
in the final answer group, i.e., the optimal solution, which may fa-
cilitate effective early pruning of unqualified solutions. Addition-
ally, social radius and acquaintance constraints can be exploited to
facilitate efficient pruning of vertices which would not lead to the
eventual answer. We summarize our ideas as follows.
Access ordering. To guide an efficient exploration of the so-
lution space, we access vertices in VA following an order that in-
corporates (1) the increment of the total social distance and (2) the
feasibility for the acquaintance constraint. Accordingly, we define
the notion of interior unfamiliarity and exterior expansibility of VS
to test the feasibility of examined vertices to the acquaintance con-
straint during the vertex selection.
Distance pruning. To avoid exploring vertices in VA that do
not lead to a better solution in terms of total social distance, Algo-
rithm SGSelect keeps track of the best feasible solution obtained
so far and leverages its total social distance to prune unnecessary
examinations of certain search space.
Acquaintance pruning. We explore the properties of the ac-
quaintance constraint to facilitate search space pruning. Specifi-
cally, we define the notion of inner degree of the vertices in VA and
derive its lower bound, such that a feasible solution can be derived
from vertices in VS and VA . The lower bound is designed to de-
tect the stop condition when there exists no feasible solution after
including any vertex in VA .
To find the optimal solution, Algorithm SGSelect may incur an
exponential time in query processing because SGQ is NP-hard. In
the worst case, all candidate groups may need to be considered.
However, by employing the above pruning strategies, the average
running time of Algorithm SGSelect can be effectively reduced, as
to be shown in Section 5. In the following, we present the details
of the proposed algorithm.
3.2.1 Radius Graph Extraction
Obviously, the social radius constraint can effectively prune un-
necessary candidates in the social network of the activity initiator.
Thus, Algorithm SGSelect first extracts the vertices that satisfy the
social radius constraint. A simple approach to ensure that the so-
cial radius constraint holds is to find the minimum-edge path (i.e.,
the shortest path with the minimum number of edges) between q
and every other vertex, and then remove those vertices that have
their minimum-edge paths longer than s edges. Nevertheless, the
minimum-distance path with at most s edges and the minimum-
edge path can be different. As a result, the total distance of the
minimum-edge path may not be the minimum distance. Moreover,
the minimum-distance path may consist of more than s edges which
does not satisfy the social radius constraint. To address the above
problem, we define the notion of i-edge minimum distance, which
represents the total distance of the minimum-distance path with no
more than i edges as follows.
399
(cid:8)di−1
(cid:9), where
Definition 1. The i-edge minimum distance between the vertex
v,q , di−1
v and the vertex q is di
v,q = minu∈Nv
u,q + cu,v
Nv is the set of neighboring vertices of v .
Based on dynamic programming, Algorithm SGSelect computes
the i-edge minimum distance between the vertex v and the vertex
v,q in terms of di−1
q by iteratively deriving di
u,q of each neighboring
vertex u, for 1 ≤ i ≤ s. Initially, we set d0
v,q as ∞ for every ver-
tex v , v (cid:54)= q . We set d0
q,q as 0 and derive d1
v,q for every vertex v
v,q for v if there exists a
in Nq . At the next iteration, we update d2
neighbor u of v such that d1
u,q + cu,v is smaller than d1
v,q . This case
indicates that there is an alternate path from v to q via a neighbor
u, and the path has a smaller total distance. Our algorithm repeats
the above iterations with at most s times for each vertex. There-
v,q < ∞ is extracted in our algorithm to
fore, each vertex v with ds
construct a feasible graph GF = (VF , EF ). In the graph, the total
distance of the minimum-distance path with at most s edges (i.e.,
v,q ) is adopted as the social distance between v and q (i.e., dv,q ).
ds
In other words, we can ensure that every vertex in VF satisfies the
social radius constraint. Therefore, we consider GF in evaluating
the SGQ for the rest of this paper.
3.2.2 Access Ordering
After constructing the feasible graph GF , Algorithm SGSelect
iteratively explores GF to find the optimal solution. Initially, the
intermediate solution set VS includes only q , and the remaining
vertex set VA is VF − {q}. At each iteration afterward, we select
and move a vertex from VA to VS in order to expand the interme-
diate solution in VS . Therefore, VS represents a feasible solution
when VS = p, and the vertices in VS satisfy the acquaintance
constraint. Next, our algorithm improves the feasible solution by
backtracking the above exploration procedure to previous iterations
and choosing an alternative vertex in VA to expand VS . A branch-
and-bound tree is maintained to record the exploration history for
backtracking. This process continues until VS has p vertices.
To reduce the running time and search space, the selection of a
vertex at each iteration is critical. Naturally, we would like to in-
clude a vertex that minimizes the increment of the total social dis-
tance. Nevertheless, the connectivity of the selected vertex imposes
additional requirements for satisfying the acquaintance constraint.
Thus, we introduce the notion of interior unfamiliarity and exte-
rior expansibility with respect to the intermediate solution set VS
to exploit the acquaintance constraint in query processing.
Definition 2. The interior unfamiliarity of VS is U (VS ) =
maxv∈VS VS − {v} − Nv , where Nv is the set of neighboring
vertices of v in GF . The set VS − {v} − Nv refers to the set of
non-neighboring vertices of v in VS .
As shown later, the interior unfamiliarity of possible intermedi-
ate solution sets are taken into account in deciding which vertex is
to be included in the process of generating the candidate groups. It
is preferable to first include a well-connected vertex that results in
the intermediate solution set with low interior unfamiliarity since it
may make selections of other vertices in the later iterations easier.
Next, we define the exterior expansibility of an intermediate solu-
tion set VS , denoted by A(VS ), as the maximum number of vertices
that VS can be expanded from.
Definition 3. The exterior expansibility of VS is A(VS ) =
minv∈VS {VA ∩ Nv + (k − VS − {v} − Nv )} , where the first
set (i.e., VA ∩ Nv ) contains the neighboring vertices of v in VA and
the second set (i.e., VS − {v} − Nv ) contains the non-neighboring
vertices of v in VS .
Since the number of existing non-neighboring vertices of v in VS
is VS − {v} − Nv , we can select at most k − VS − {v} − Nv
extra non-neighboring vertices of v from VA to expand VS ; other-
wise, vertex v would have more than k non-neighboring vertices in
VS and violate the acquaintance constraint. Therefore, for a ver-
tex v in VS , there are at most VA ∩ Nv neighboring vertices and
k − VS − {v} − Nv non-neighboring vertices to be selected from
VA in order to expand VS .
When selecting a vertex v to expand VS , we consider both the
increment of the total social distance caused by v and the connec-
tivity of vertices in the new intermediate solution set containing v ,
which is captured by U (VS ∪ {v}) and A(VS ∪ {v}). Specifically,
Algorithm SGSelect chooses the vertex v with the minimum social
distance to q that satisfies the following two conditions for interior
unfamiliarity and exterior expansibility, respectively.
Interior Unfamiliarity Condition. The first condition consid-
ers the interior unfamiliarity. Note that a small value of interior un-
familiarity indicates that every vertex v ∈ VS has plenty of neigh-
boring vertices in VS , i.e., the current intermediate solution set VS
(cid:104) VS ∪{v}
(cid:105)θ
is likely to be expanded into feasible solutions satisfying the ac-
quaintance constraint. Based on this observation, we employ the in-
terior unfamiliarity condition, i.e., U (VS ∪ {v}) ≤ k
,
p
where θ ≥ 0 and VS ∪{v}
is the proportion of attendees that have
p
been considered, to ensure that the value of interior unfamiliarity
remains small when a vertex v is selected. Note that the right-
hand-side (RHS) of the inequality reaches its maximum, i.e., k ,
when θ is fixed as 0. With θ = 0, it is flexible to find a vertex
v with a small social distance. However, if a vertex v resulting in
U (VS ∪ {v}) = k is selected, the vertex with k non-neighboring
vertices in the set VS ∪ {v} is required to connect to all the vertices
chosen from VA at later iterations. Thus, the feasibility of select-
ing other qualified vertices in later iterations is thereby decreased.
In contrast, a larger θ allows SGSelect to choose a vertex from VA
that connects to more vertices in VS to ensure the feasibility at later
iterations. Note that the RHS of the condition increases when VS
includes more vertices. On the other hand, the algorithm reduces θ
if there exists no vertex in VA that can satisfy the above condition.
When θ decreases to 0 and the above condition still does not hold
for all vertices, i.e., U (VS ∪ {v}) > k , Algorithm SGSelect re-
moves every v from VA , because adding v to VS does not generate
a feasible solution.
Exterior Expansibility Condition. Now we discuss the sec-
ond condition based on the exterior expansibility, which represents
the maximum number of vertices in VA that can be considered for
expanding the intermediate solution set VS , and this value must
be no smaller than the number of attendees required to be added
later, i.e., p − VS . Therefore, SGSelect chooses the vertex v
from VA that can satisfy the exterior expansibility condition, i.e.,
A (VS ∪ {v}) ≥ (p − VS ∪ {v}). If the inequality does not hold,
the new intermediate solution set obtained by adding v is not ex-
pansible, as shown by the following lemma.
L EMMA 1. Given that A (VS ) < (p − VS ), there must exist
at least one vertex v in VS such that v cannot follow the acquain-
tance constraint for every possible selection of vertices from VA .
PROO F. If A (VS ) < (p − VS ), then we can find at least one
vertex v in VS such that VA ∩ Nv + (k − VS − {v} − Nv ) <
(p − VS ). In other words, (k − VS − {v} − Nv ) < (p − VS )
− VA ∩ Nv . As mentioned above, VS − {v} − Nv is the num-
ber of non-neighboring vertices for v , and k − VS − {v} − Nv
thereby represents the ”quota” for v to choose non-neighbor ver-
400
tices from VA . For any possible selection (cid:98)VA ⊆ VA , let (cid:98)λA de-
note the number of neighbor vertex of v in (cid:98)VA . Since (cid:98)λA ≤
VA ∩ Nv , (p − VS ) − VA ∩ Nv ≤ (p − VS ) − (cid:98)λA . There-
(p − VS ) − (cid:98)λA , and v does not have enough quota to support (cid:98)VA
fore, if A (VS ) < (p − VS ), then (k − VS − {v} − Nv ) <
for satisfying the acquaintance constraint. The lemma follows.
3.2.3 Distance and Acquaintance Pruning
In the following, we further exploit two pruning strategies to re-
duce the search space. Our algorithm aims to obtain a feasible so-
lution early since the total social distance of this solution can be
used for pruning unnecessary candidates. At each iteration, the fol-
lowing distance pruning strategy avoids exploring the vertices in
the remaining vertex set VA if they do not lead to a solution with a
smaller total social distance.
tex from VA to VS if D − (cid:80)
L EMMA 2. The distance pruning strategy stops selecting a ver-
dv,q < (p − VS ) minv∈VA dv,q ,
v∈VS
where D is the total social distance of the best feasible solution ob-
tained so far. The distance pruning strategy can prune the search
space with no better solution.
PROO F. If the above condition holds, it is impossible to find
an improved solution by exploring VA , since the total social dis-
tance of any new solution must exceed D when we select p − VS
vertices from VA . Algorithm SGSelect considers minv∈VA dv,q in
distance pruning to avoid sorting the distances of all vertices in VA ,
which requires additional computation and may not be scalable for
a large social network. Please note that as the best obtained so-
lution improves at later iterations, we are able to derive a smaller
upper bound in the LHS, and thus prune a larger search space with
distance pruning. The lemma follows.
In addition to pruning the search space that does not lead to a
smaller total social distance, we also propose an acquaintance prun-
ing strategy that considers the feasibility of selecting vertices from
VA , and stops exploring VA if there exists no solution that can sat-
isfy the acquaintance constraint. Earlier in this section, the inte-
rior unfamiliarity and the exterior expansibility consider the con-
nectivity between the vertices in only VS , and the connectivity be-
tween the vertices in VS and VA , respectively. Here the acquain-
(and thus the corresponding VS is pruned) if (cid:80)
tance pruning strategy focuses on the edges between the vertices
in VA . Note that all vertices in VA are excluded from expansion
VA ∩ Nv <
v∈VA
(p − VS )(p − VS − k) holds. The LHS of the above inequal-
ity is the total inner degree of all vertices in VA , where the inner
degree of a vertex in VA considers only the edges connecting to
other vertices in VA . The RHS is the lower bound on the total
inner degree on any set of vertices extracted from VA to expand
VS into a solution satisfying the acquaintance constraint. Specif-
ically, our algorithm needs to select p − VS vertices from VA ,
and hence the inner degree of any selected vertex cannot be smaller
than p − VS − k ; otherwise, the vertex must be unacquainted with
the inequality with (cid:80)
more than k vertices and violate the acquaintance constraint.
The above strategy can be improved by replacing the LHS of
VA ∩ Nv , where MA denotes the set
v∈MA
of p − VS vertices in VA with the largest inner degrees. There-
(cid:80)
VA ∩ Nv ≤ (cid:80)
fore, with MA , our algorithm is able to stop the search earlier,
and prune off more infeasible solutions because MA ⊆ VA , and
VA ∩ Nv . However, to obtain
v∈MA
v∈VA
other value between (cid:80)
VA ∩ Nv and (cid:80)
MA , sorting the vertices in VA according to their inner degrees re-
quires additional computation. Therefore, our algorithm finds an-
VA ∩ Nv ,
v∈MA
v∈VA
and the value can be obtained easily. Specifically, the acquaintance
pruning is specified as follows.
a vertex from VA to VS if (cid:80)
L EMMA 3. The acquaintance pruning strategy stops selecting
VA ∩ Nv − (VA − p + VS )
v∈VA
minv∈VA VA ∩ Nv < (p − VS ) (p − VS − k), and the ac-
PROO F. To avoid the sorting in (cid:80)
quaintance pruning strategy can prune the search space with no
feasible solution.
VA ∩Nv , we consider
Nv , and the LHS is an upper bound on (cid:80)
v∈MA
only the vertex with the minimum inner degree minv∈VA VA ∩
VA ∩ Nv . The
v∈MA
reason is that VA − p + VS is the number of vertices not ex-
tracted from VA , and the second term of the LHS thereby repre-
sents a lower bound on the total inner degree of the vertices not
extracted from VA . Therefore, the LHS is an upper bound on the
VA ∩ Nv ≤ (cid:80)
ing strategy, since (cid:80)
total inner degree of the vertices extracted from VA . This up-
(VA − p + VS ) minv∈VA VA ∩ Nv ≤ (cid:80)
per bound can be employed to improve the acquaintance prun-
VA ∩ Nv −
v∈VA
v∈MA
VA ∩ Nv . The
v∈VA
lemma follows.
In the following, we prove that our algorithm with the above
strategies finds the optimal solution.
TH EOR EM 2. SGSelect obtains the optimal solution to SGQ.
PROO F. We prove the theorem in Appendix B.2.
Please refer to Example 2 in Appendix A for illustration of Al-
gorithm SGSelect, and the pseudo code of SGSelect is provided in
Appendix C.
4. SOCIAL-TEMPORAL GROUP QUERY
In the following, we extend SGQ to STGQ by exploring the tem-
poral dimension and formulate the problem in Section 4.1. STGQ is
more complex than SGQ because there may exist numerous activ-
ity periods with different candidate groups. An intuitive approach
is to first find the SGQ solution for each individual activity pe-
riod and then select the one with the minimum total social distance.
However, this approach is computationally expensive. To address
this issue, in Section 4.2, we identify pivot time slots, the only time
slots required to be explored in the temporal dimension, to facilitate
efficient STGQ processing. Moreover, we propose the availability
pruning strategy to leverage the correlation in the available time
slots among candidate attendees to avoid exploring an unsuitable
activity period.
4.1 Problem Definition
STGQ generalizes SGQ by considering the available time of
each candidate attendee via the availability constraint, which en-
sures that all selected attendees are available in a period of m time
slots. Given an activity initiator q and her social graph G = (V , E ),
where each vertex v is a candidate attendee, and the distance on
each edge eu,v connecting vertices u and v represents their so-
cial closeness. A social-temporal group query ST GQ(p, s, k , m),
where p is an activity size, s is a social radius constraint, k is an
distance between q and every vertex in F , i.e., (cid:80)
acquaintance constraint, and m is an activity length, finds a time
slot t and a set F of p vertices from G to minimize the total social
u∈F du,q , where
du,q is the length of the minimum-distance path between u and q
with at most s edges, such that each vertex u in F is allowed to
share no edge with at most k other vertices in F , and u is available
from time slot t to t + m − 1.
401
STGQ is also an NP-hard problem because STGQ can be re-
duced to SGQ if every candidate attendee is available in all time
slots. In Section 4.2, we design an efficient query processing al-
gorithm STGSelect by leveraging the idea of pivot time slots to
effectively reduce the number of time slots to be processed. Addi-
tionally, we derive the Integer Programming formulation of STGQ
(see Appendix D), which is included in Section 5 for comparison.
4.2 Algorithm Design
An intuitive approach to evaluate STGQ is to consider the so-
cial dimension and the temporal dimension separately, by sequen-
tially exploring each time slot t and the candidate attendees who
are available from t to t + m − 1 (i.e., m consecutive time slots).
However, the running time significantly grows when the number of
time slots increases. Therefore, we devise Algorithm STGSelect,
which explores the following features in the temporal dimension to
reduce search space and running time.
Pivot time slot. We consider only a limited number of slots,
namely, the pivot time slots, to find the solution. STGSelect returns
optimal solutions even though only parts of the slots are considered.
Access ordering. In addition to interior unfamiliarity and ex-
terior expansibility discussed earlier, we further consider the solu-
tion quality and the feasibility based on the availability constraint.
Algorithm STGSelect constructs the VS with vertices which have
more available time slots in common to find an initial feasible so-
lution and then chooses the vertices in VA with smaller social dis-
tances to improve the solution.
Availability pruning. In addition to the distance and acquain-
tance pruning discussed in Section 3.2, we propose the availability
pruning strategy to stop the algorithm when selecting any vertex
from VA never leads to a solution with m available time slots.
To find the optimal solution, STGSelect is expected to have an
exponential-time complexity because STGQ is NP-hard.
In the
worst case, all candidate groups in all time slots may need to be
considered. However, as shown in Section 5, the average running
time of the proposed algorithm with the above strategies can be ef-
fectively reduced, especially for a large m. In the following, we
describe the details of Algorithm STGSelect, paying special atten-
tion on the temporal dimension. Instead of considering the interval
from t to t + m − 1 for each time slot t, our algorithm leverages
the pivot time slots defined as follows to reduce running time.
L EMMA 4. A time slot is a pivot time slot if the ID of the slot
is im, where i is a positive integer. Any feasible solution to STGQ
must include exactly one pivot time slot.
PROO F. If a solution does not span over a pivot time slot, the
solution must have fewer than m slots because there are m − 1 time
slots between any two consecutive pivot time slots. If a solution
contains more than one pivot time slot, the solution includes more
than m slots, and the above two cases are not feasible. Moreover,
there must exist an integer i∗ such that the optimal solution resides
in an interval starting from slot (i∗ − 1)m + 1 to (i∗ + 1)m − 1,
corresponding to pivot time slot i∗m. If the optimal solution is not
located in the above interval, the optimal solution must include at
least two pivot time slots and thereby is infeasible, or the optimal
solution must reside in the corresponding interval for pivot time
slot (i∗ − 1)m or (i∗ + 1)m. The lemma follows.
For each pivot time slot im, Algorithm STGSelect extends SGS-
elect by considering the temporal information when selecting a ver-
tex from VA to VS . Specifically, let TS denote the set of consecutive
time slots available for all vertices in VS , and TS must contain slot
im. In other words, TS will be a feasible solution to the STGQ
when VS includes p vertices satisfying the acquaintance constraint,
and TS ≥ m. At each iteration, for each vertex in VA , Algorithm
STGSelect considers the social distance to q during the selection to
reduce the objective value. However, we also consider the tempo-
ral availability of the vertex to avoid choosing a vertex that leads
to a small increment of the total social distance but ends up with
redundant examination of solutions eventually disqualified by the
availability constraint. In other words, in addition to interior unfa-
miliarity and exterior expansibility as described in Section 3.2, we
define the notion of temporal extensibility as follows.
Definition 5. The temporal extensibility of VS is X (VS ) = TS
− m. A larger temporal extensibility ensures that many vertices in
VA with good quality in the temporal dimension can be selected by
our algorithm afterward.
Temporal Extensibility Condition. To consider both the so-
(cid:104) p−VS ∪{u}
(cid:105)φ
lution quality and feasibility in the temporal dimension, Algorithm
STGSelect chooses the vertex u with the minimum social distance
to q , and u must satisfy X (VS ∪ {u}) ≥ (m − 1)
,
p
where φ ≥ 1 and p−VS ∪{u}
is the proportion of attendees that
p
have not been considered. The RHS grows when φ decreases, and
the above condition enforces that the result VS ∪ {u} must be more
temporal extensible, i.e., more available time slots are shared by all
vertices in the result, and hence more vertices in VA are eligible
to be selected at later iterations. In the extreme case, if φ = 1,
the above condition requires that the result contains almost 2m − 1
available time slots when VS = {q}, because the RHS is close to
m − 1. In contrast, as φ grows, our algorithm is able to choose
a vertex with a smaller social distance because more vertices can
satisfy the above condition. Please note that φ is increased by the
algorithm if there exists no vertex in VA that can satisfy the above
condition, and the RHS approaches 0 in this case. For the case that
leads to X (VS ∪ {u}) < 0, we remove u from VA because adding
u to VS results in unqualified solutions that are infeasible in the
temporal dimension.
In addition to distance pruning and acquaintance pruning that
consider the social dimension, we propose availability pruning in
the temporal dimension. The strategy enables our algorithm to stop
exploring VA if there exists no solution that can satisfy the avail-
ability constraint. The above temporal extensibility considers the
available time slots for vertices in VS . In contrast, availability prun-
ing reduces the search space according to the available time slots
of vertices in VA . Specifically, for each pivot time slot im, let t+
A
−
and t
A denote the time slots closest to im, such that all vertices
in VA are not available in the two time slots, where t+
A > im and
−
A < im, respectively. Therefore, we are able to stop considering
t
−
A ≤ m. In this case, the solution is infeasible since
A − t
VA when t+
−
A − 1 contains fewer than m
A + 1 to t+
the interval starting from t
time slots. This strategy can be further improved by considering
the number of vertices that are not available for each time slot, and
the availability pruning strategy is formally specified as follows.
Definition 4. Every vertex v in the feasible graph Gim
F = (V im
F ,
F ) for pivot time slot im has at least m consecutive available
E im
time slots in the interval from slot (i − 1)m + 1 to (i + 1)m − 1.
Moreover, there exists a path from q to v with at most s edges.
L EMMA 5. The availability pruning strategy stops selecting a
−
A (VA − p + VS + 1) − t
A (VA −
vertex from VA to VS if t+
−
p + VS + 1) ≤ m, where t+
A (n) and t
A (n) denote the time slots
closest to im, such that at least n vertices in VA are not available,
402
−
and t+
A (n) < im, respectively. Moreover, the
A (n) > im and t
availability pruning strategy can prune the search space with no
feasible solution.
PROO F. If the above condition holds, there are at most p −
VS − 1 vertices of VA available in each of the above two slots, and
we can never find a feasible solution because Algorithm STGSelect
is required to choose p− VS vertices from VA for a common avail-
able interval with at least m time slots. The lemma follows.
TH EOR EM 3. STGSelect obtains the optimal solution to STGQ.
PROO F. We prove the theorem in Appendix B.3.
Please refer to Example 3 in Appendix A for illustration of Al-
gorithm STGSelect, and the pseudo code of STGSelect is provided
in Appendix C.
5. EXPERIMENTAL RESULTS
In this section, we evaluate the performance and analyze the so-
lution quality of the proposed algorithms. We perform a series of
sensitivity tests to study the impact of query parameters with both
real and synthetic datasets. In the following, Section 5.1 describes
the experiment setup. Section 5.2 then presents the experimental
results on performance and solution quality.
5.1 Experiment Setup
We invite 194 people from various communities, e.g., schools,
government, business, and industry to join our experiment, and
Google Calendar [3] is utilized to collect the schedules from them.
The social distance of each edge is derived according to the inter-
action between the two corresponding people [10, 12, 13], such
as the frequency of meeting, phone calls, and mails. Moreover, a
synthetic dataset with 12800 people is generated from a coauthor-
ship network [7], while the schedule of each person in each day
is randomly assigned from the above 194-people real dataset. The
proposed algorithms are implemented in an IBM 3650 server with
two Quadcore Intel X5450 3.00 GHz CPUs and 8 GB RAM.
To evaluate the solution quality, we compare STGSelect with
PCArrange, which is an algorithm imitating the behavior of man-
ual coordination via phone calls, where the initiator q sequentially
invites close friends first and then finds out the common available
time slots. Note that PCArrange does not include the acquaintance
constraint, but we can obtain a parameter kh from each result, such
that every attendee has at most kh other attendees unacquainted.
In other words, kh is the observed k for each activity in PCAr-
range. In addition to STGSelect, we compare PCArrange with an
algorithm STGArrange, which is designed to utilize STGSelect for
finding the smallest k that can achieve the total social distance no
more than the one in PCArrange.
In other words, starting from
k = 0, STGArrange incrementally increases k in STGSelect to
find the first solution no worse than the one in PCArrange, in order
to evaluate k .
5.2 Analysis of Experimental Results
For SGQ, we compare Algorithm SGSelect with two other ap-
proaches: the baseline algorithm for SGQ, i.e., considering all pos-
sible candidate groups, and the Integer Programming model for
SGQ in Appendix D with CPLEX [4], which is an integer pro-
gramming optimizer that can support parallel computation. We first
compare the running time of Algorithm SGSelect and the baseline
algorithm for SGQ with different numbers of attendees, i.e., p, in
Figure 1(a). Due to the space constraint, we only include the ex-
perimental results with k = 2 and s = 1, and the trends for other
parameter settings, such as s = 2, are identical. The results indi-
cate that Algorithm SGSelect outperforms the baseline algorithm
for SGQ, and the difference between them becomes more signifi-
cant as p grows. This is because the baseline algorithm for SGQ
considers numerous candidate groups, and the processing effort of
each candidate group increases with p, while Algorithm SGSelect
effectively prunes the solution space with the proposed access or-
dering, distance pruning, and acquaintance pruning strategies. In-
teger programming requires more time than the baseline algorithm
for SGQ because it is a general-purpose optimizer. However, the
running time grows slower because it can support parallel compu-
tation to fully utilize the 8-core processing power in IBM 3650.
In contrast, both SGSelect and the baseline algorithm are single-
thread algorithms, and the results show that SGSelect is much faster
than integer programming for finding the optimal solutions.
Figure 1(b) shows the results with different social radius con-
straints, i.e., s. The reason that Algorithm SGSelect is able to effec-
tively reduce the running time is that it first derives a much smaller
feasible graph GF by exploiting the social radius constraint and
then prunes unnecessary branches. Besides the social radius con-
straint, we also compare the running time of these two approaches
under different acquaintance constraints, i.e., k . As shown in Fig-
ure 1(c), different k only slightly change the running time. This
is because the value of k does not directly affect the number of
candidate groups required to be considered. In addition, the result
shows that Algorithm SGSelect outperforms the baseline algorithm
by near two orders under every value of k . We also compare the al-
gorithms with different network sizes as shown in Figure 1(d), and
we can see that the running time of Algorithm SGSelect is still
much smaller than the time of the baseline algorithm.
To evaluate the performance on STGQ, we compare our algo-
rithm STGSelect with the baseline algorithm for STGQ, i.e., se-
quentially considering each time slot and solving the correspond-
ing SGQ problem. In Figure 1(e), we report the running time of
these two algorithms under different activity lengths, i.e., m. The
results show that Algorithm STGSelect significantly outperforms
the baseline algorithm, especially when m increases. In contrast,
Figure 1(f) presents the running time of Algorithm STGSelect and
the baseline algorithm with different lengths of schedules provided
by users. More time slots need to be considered in a longer sched-
ule. As shown in these two figures, Algorithm STGSelect yields
much less running time, and the difference increases as m or the
schedule length increases. The reason is that with the idea of pivot
time slots, Algorithm STGSelect can concurrently consider m can-
didate activity periods spanning the same pivot time slot, while the
baseline algorithm considers these candidate periods separately.
Figure 1(g) and Figure 1(h) compare k and the total social dis-
tance obtained by STGArrange and PCArrange with different p.
For each p, a smaller k corresponds to a better solution since each
attendee is acquainted with more people in the group. Similarly, a
smaller total social distance represents better solution quality since
the attendees are more familiar with the activity initiator. These two
figures indicate that the quality of the solutions obtained by STGAr-
range outperforms the ones obtained by PCArrange. In other words,
STGArrange is able to find a solution with a much smaller k , while
the total social distance is also smaller than the one in PCArrange.
6. CONCLUSION
To the best of our knowledge, there is no real system and ex-
isting work in the literature that addresses the issues of automatic
activity planning based on social and temporal relationship of an
initiator and activity attendees. In this paper, we define two new
403
(a) Comparison of running time
with different p.
(b) Comparison of running time
with different s.
(c) Comparison of running time
with different k .
(d) Comparison of running time
with different network sizes.
(e) Comparison of running time
with different m.
(f) Comparison of running time
with different schedule lengths.
(g) Relation of p and k .
(h) Relation of p and the total
social distance.
Figure 1: Experimental results of SGQ and STGQ.
and useful queries, namely, SGQ and STGQ, to obtain the optimal
set of attendees and a suitable activity time. We devise two algo-
rithms, namely, SGSelect and STGSelect, to find the optimal solu-
tions to SGQ and STGQ, respectively. We show that the problem
is NP-hard and propose an Integer Programming model for STGQ,
which can also support SGQ. Various strategies, including access
ordering, distance pruning, acquaintance pruning, pivot time slots,
and availability pruning are explored to prune unnecessary search
space and obtain the optimal solution efficiently. Experimental re-
sults indicate that the proposed algorithm significantly outperforms
the algorithm that represents manual coordination by the initiator.
Our research result can be adopted in social networking websites
and web collaboration tools as a value-added service, and we are
now implementing the proposed algorithms in Facebook.
7. ACKNOWLEDGEMENTS
This paper was supported in part by National Science Council of
Taiwan under Contract NSC99-2219-E-001-001.
8. REFERENCES
[1] The Events function of the Facebook website.
http://www.facebook.com/?sk=events.
[2] The Facebook website. http://www.facebook.com/.
[3] The Google Calendar website.
http://www.google.com/calendar/.
[4] IBM ILOG CPLEX Optimizer. http:
//www-01.ibm.com/software/integration/
optimization/cplex-optimizer/.
[5] The LinkedIn website. http://www.linkedin.com/.
[6] The Meetup website. http://www.meetup.com/.
[7] Network Data. http:
//www-personal.umich.edu/mejn/netdata/.
[8] The statistics from Facebook website. http://www.
facebook.com/press/info.php?statistics.
[9] The Yahoo Movie website.
http://movies.yahoo.com/.
[10] L. Backstrom, D. P. Huttenlocher, J. M. Kleinberg, and
X. Lan. Group formation in large social networks:
membership, growth, and evolution. In KDD, pages 44–54,
2006.
[11] B. Balasundaram, S. Butenko, and I. V. Hicks. Clique
relaxations in social network analysis: The maximum k-plex
problem. Operations Research, 2009.
[12] J. Chen, W. Geyer, C. Dugan, M. J. Muller, and I. Guy. Make
new friends, but keep the old: recommending people on
social networking sites. In CHI, pages 201–210, 2009.
[13] I. Guy, M. Jacovi, E. Shahar, N. Meshulam, V. Soroka, and
S. Farrell. Harvesting with sonar: the value of aggregating
social network information. In CHI, pages 1017–1026, 2008.
[14] T. Lappas, K. Liu, and E. Terzi. Finding a team of experts in
social networks. In KDD, pages 467–476, 2009.
[15] C.-T. Li and M.-K. Shan. Team formation for generalized
tasks in expertise social networks. In SocialCom/PASSAT,
pages 9–16, 2010.
[16] B. McClosky and I. V. Hicks. Combinatorial algorithms for
max k-plex. Journal of Combinatorial Optimization. To
appear.
[17] R. Mokken. Cliques, clubs and clans. Quality and Quantity,
13:161–173, 1979.
[18] H. Moser, R. Niedermeier, and M. Sorge. Algorithms and
experiments for clique relaxations-finding maximum
s-plexes. In SEA, pages 233–244, 2009.
[19] S. B. Seidman and B. Foster. A graph-theoretic
generalization of the clique concept. Journal of
Mathematical Sociology 6, pages 139–154, 1978.
[20] M. Sozio and A. Gionis. The community-search problem and
how to plan a successful cocktail party. In KDD, pages
939–948, 2010.
[21] B. Wu and X. Pei. A parallel algorithm for enumerating all
the maximal k-plexes. In PAKDD Workshops, pages
476–483, 2007.
404
1.E+041.E+051.E+061.E+071.E+081.E+091.E+1034567891011Execution Time (ns)pSGSelectBaselineIP(k=2, s=1)1.E+051.E+061.E+071.E+081.E+091.E+101.E+11135Execution Time (ns)sSGSelectBaseline(p=4, k=2)1.E+051.E+061.E+071.E+08123456Execution Time (ns)kSGSelectBaseline(p=5, s=2)1.E+051.E+061.E+071.E+08194800320012800Execution Time (ns)Network Size SGSelectBaselineIP(p=5, k=3, s=1)050010001500200024681012141618202224Execution Time (ms)m (0.5 hour)STGSelectBaseline0200400600800100012001234567Execution Time (ms)Schedule Length (day)STGSelectBaseline1357934567891011kpSTGArrangePCArrange05010015034567891011DistancepSTGArrangePCArrangeAPPENDIX
A.
ILLUSTRATING EXAMPLES
EXAM PL E 1. Consider a toy example, as illustrated in Figure
2, where Casey Affleck would like to invite some friends to dis-
cuss a new movie in which he is going to play. Figure 2(a) shows
a possible social network of Casey Affleck, constructed based on
the cooperation relationship extracted from Yahoo! Movies [9].
Assume that Casey Affleck is trying to find three mutually ac-
quainted friends. Issuing an SGQ with p = 4 and s = 1, which
returns {George Clooney, Robert De Niro, Casey Affleck, Michelle
Monaghan}, does not work since the three close friends of Casey
Affleck are not acquainted to each other (as shown in Figure 2(a)).
Instead, by issuing an SGQ with p = 4, s = 1, and k = 0, a better
list of invitees {George Clooney, Brad Pitt, Julia Roberts, Casey
Affleck}, where everyone knows each other very well, is obtained.
To answer this query, all directly connected friends of Casey Af-
fleck, together with Casey Affleck himself, i.e., {George Clooney,
Robert De Niro, Brad Pitt, Julia Roberts, Casey Affleck, Michelle
Monaghan}, are candidates. Thus, an intuitive approach to answer
this SGQ is to first enumerate ten (i.e., C 6−1
4−1 = 10) possible four-
person candidate groups including Casey Affleck himself. Figure
2(b) illustrates the enumeration process of candidate groups, in ac-
cordance with the increasing order of user IDs. Note that the num-
bers 64 and 65 indicate the total social distances of qualified can-
didate groups. These ten non-duplicate candidate groups constitute
the whole solution space, from which we eliminate the ones dis-
qualified by the acquaintance constraint. Finally, we obtain the final
answer {George Clooney, Brad Pitt, Julia Roberts, Casey Affleck},
i.e., the group with the smallest total social distance among quali-
fied candidate groups.
Note that the initiator may also loosen the social constraints (i.e.,
s > 1 and k > 0) to consider more candidates. Assume that Casey
Affleck issues another SGQ, inviting five friends taking the six-seat
chartered plane to visit the refugee children in Haiti with him. Now
Casey Affleck issues an SGQ with p = 6, s = 2 and k = 2, and
the number of candidates is enlarged to eight (and the number of
candidate groups is enlarged to C 8−1
6−1 = 21) since the friends of his
friends can also be considered. The optimal result for this SGQ is
{Angelina Jolie, George Clooney, Robert De Niro, Brad Pitt, Julia
Roberts, Casey Affleck}, and we can see that this is a tight group
satisfying the social constraints in the sample social network.
However, Casey Affleck finds out that these six attendees have
no available time in common when he expects the length of activity
time as 3, i.e., three consecutive time slots. Figure 2(c) shows the
schedule of candidates, with their available time slots marked by
circles. Therefore, he turns to issue an STGQ with p = 6, s = 2,
k = 2 and m = 3. An intuitive approach to find the answer is
to issue an SGQ independently for each activity period of length
3. In this example, the time interval [ts1 , ts6 ] can be divided into
four candidate activity periods, [ts1 , ts3 ], [ts2 , ts4 ], [ts3 , ts5 ] and
[ts4 , ts6 ]. For each activity period, the candidate attendees need to
be available for all the time slots in this activity period in order to
be considered.
After issuing four SGQs, the obtained result is {Angelina Jolie,
George Clooney, Robert De Niro, Brad Pitt, Matt Damon, Casey
Affleck} for both of [ts2 , ts4 ] and [ts3 , ts5 ]. Therefore, the intu-
itive approach returns the group {Angelina Jolie, George Clooney,
Robert De Niro, Brad Pitt, Matt Damon, Casey Affleck} and the
activity period [ts2 , ts4 ] (or [ts3 , ts5 ]) as the optimal solution. 2
Figure 2: An illustrative example for SGQ and STGQ. (a) The
sample social network, (b) the dendrogram of candidate group
enumeration and (c) schedules of candidate attendees.
EXAM PL E 2. In this illustrating example for SGSelect, we re-
visit the social network in Figure 2(a) and assume that v7 is the ini-
tiator issuing an SGQ with p = 4, s = 1, and k = 1. All candidate
vi ,v7 < ∞ are extracted and placed in Figure
attendees vi with d1
3(a), with their social distances to v7 listed in Figure 3(b).3 In the
beginning, VS = {v7 } and VA = {v2 , v3 , v4 , v6 , v8 }. We first
consider selecting v2 (i.e., the vertex with the smallest social dis-
tance) from VA to expand VS . Afterward, we have A(VS ∪{v2 }) =
34 and (p − VS ∪ {v2 }) = 4 − 2 = 2, which means that the ex-
(cid:105)θ
(cid:104) VS ∪{v2 }
terior expansibility condition holds if we select v2 . In addition, we
= 1 × ( 2
find U (VS ∪ {v2 }) = 05 and k
4 )2 = 1
p
4
(assume θ = 2), which means the interior unfamiliarity condition
also holds, and hence v2 is selected. Now we have VS = {v2 , v7 }
and VA = {v3 , v4 , v6 , v8 }, and the next vertex to be considered
is v3 according to the social distance. The exterior expansibility
condition holds when v3 is selected, since A(VS ∪ {v3 }) = 1 ≥
(cid:104) VS ∪{v3 }
(cid:105)θ
(p − VS ∪ {v3 }) = 1; however, it violates the interior unfamil-
iarity condition, since U (VS ∪ {v3 }) = 1 > k
=
p
1 × ( 3
16 . We do not reduce the θ here because there are still
4 )2 = 9
more vertices in VA , and we put v3 in parenthesis and temporarily
skip it. The current VA is {(v3 ), v4 , v6 , v8 }, and the next vertex to
be considered is v6 . We select v6 since both of the exterior expan-
sibility condition and the interior unfamiliarity condition hold, and
then we have VS = {v2 , v6 , v7 } and VA = {v3 , v4 , v8 }. Again,
selecting v3 violates the interior unfamiliarity condition, and we
temporarily skip v3 . When selecting v8 , we find out that it violates
3Some small modifications are made for better illustration.
4To find A(VS ∪ {v2 }), we derive VA ∩ Nv7 + (k −
VS − {v7 } − Nv7 ) = 4 + (1 − 0) = 5 and VA ∩ Nv2 + (k −
VS − {v2 } − Nv2 ) = 2 + (1 − 0) = 3, and then choose the
smaller one. Therefore, we have A(VS ∪ {v2 }) = 3.
5To calculate U (VS ∪ {v2 }), we first need to consider the value
of VS − {v7 } − Nv7 and VS − {v2 } − Nv2 , and then choose
Since VS − {v7 } − Nv7 = ∅ = 0 and
the larger one.
VS − {v2 } − Nv2 = ∅ = 0, we have U (VS ∪ {v2 }) = 0.
405
(a)(b) ts1 ts2 ts3 ts4 ts5 ts6 v1 O O O O v2 O O O O O v3 O O O O O v4 O O O O O O v5 O O O O v6 O O O v7 O O O O O v8 O O O O O (c){v7}{v7,v2}{v7,v3}{v7,v4}{v7,v2,v3}{v7,v2,v4}{v7,v2,v6}{v7,v3,v4}{v7,v3,v6}{v7,v4,v6}{v7,v2,v3,v4}{v7,v2,v3,v6}{v7,v2,v3,v8}{v7,v2,v4,v6}=64{v7,v2,v4,v8}{v7,v2,v6,v8}{v7,v3,v4,v6}=65{v7,v3,v4,v8}{v7,v3,v6,v8}{v7,v4,v6,v8}28141839261920171927121082423Matt Damon (V5)Julia Roberts (V6)George Clooney (V2)Robert De Niro (V3)Angelina Jolie (V1)Brad Pitt (V4)Casey Affleck (V7)Michelle Monaghan (V8)30(cid:104) p−VS ∪{v2 }
(cid:105)φ
selecting a vertex to ensure the feasibility in the temporal dimen-
sion. Since (m − 1)
= 2 × ( 2
2 (assume
4 )2 = 1
p
φ = 2) and X (VS ∪ {v2 }) = 27 , the temporal extensibility condi-
tion also holds, and hence we can select v2 from VA to VS . Now
we have VS = {v2 , v7 } and VA = {v3 , v4 , v6 , v8 }. The later ver-
tex selection ordering is identical to Example 2 since there is no
violation on the temporal constraint, and we also obtain the first
feasible solution {v2 , v4 , v6 , v7 } (total social distance = 64) avail-
able in the activity period [ts2 , ts4 ]. Until we select v3 in the state
VS = {v2 , v4 , v7 } and VA = {(v3 )}, we find out that the tem-
poral extensibility condition does not hold when selecting v3 , and
then we increase φ since there is no other vertex in VA that we can
choose. However, since X (VS ∪ {v3 }) = 2 − 3 = −1, the tempo-
ral extensibility condition does not hold even when the RHS of the
inequality approaches 0. Therefore, we can remove v3 and back-
track to the state VS = {v7 } and VA = {v3 , v4 , v6 , v8 }. As shown
in Example 2, the later branches violate the social constraints and
hence lead to no feasible group. Therefore, {v2 , v4 , v6 , v7 } is the
only feasible group available in activity periods extended from the
pivot time slot ts3 .
Next, we start processing the second pivot time slot, i.e., ts6 .
Different from ts3 , we have VS = {v7 } and VA = {v2 , v3 , v6 , v8 }
in the beginning. Since v4 is not available in the pivot time slot,
we can directly remove it without further consideration. We then
obtain VS = {v2 , v7 } and VA = {v3 , v6 , v8 } because selecting v2
violates no constraint. Note that the LHS of the availability pruning
−
A (VA − p + VS + 1) =
A (VA − p + VS + 1) − t
condition is t+
−
−
A (3 − 4 + 2 + 1) − t
A (3 − 4 + 2 + 1) = t+
A (2) − t
t+
A (2). Since
there are 2 vertices, i.e., v3 and v8 , in VA not available in ts4 ,
−
A (2) = 4. Besides, there are 2 vertices, i.e., v3 and v8 , in VA
t
not available in ts7 , t+
A (2) = 7. Therefore, the availability pruning
−
A (2)− t
A (2) = 7− 4 ≤ m, and we can stop
condition holds since t+
selecting vertices from VA to VS . Then we backtrack one step to
the state VS = {v7 } and VA = {v3 , v6 , v8 }. We can skip this final
branch since the acquaintance pruning condition holds. Therefore,
there exists no feasible group available in activity periods extended
from ts6 . Finally, we return the group {v2 , v4 , v6 , v7 } and the time
period [ts2 , ts4 ] as the optimal result.
2
B. PROOFS
B.1 Proof of Theorem 1
In the following, we prove that SGQ is NP-hard with the reduc-
tion from problem k-plex, which is NP-hard [11]. A k-plex with
c vertices is a subgraph in a graph G = (V , E ), such that every
vertex in the subgraph can share no edge with at most k − 1 other
vertices in the subgraph. Problem k-plex with parameters c and k
is to decide if G has a k-plex with c vertices. We prove that SGQ
is NP-hard with the reduction from problem k-plex. Specifically,
we construct a weighted graph G(V , E ) by letting V as {q} ∪ V
and letting E as E . We then add c edges into E to make q connect
to all the other vertices. The distance of every edge is 1. In the
following, we prove that there exists a feasible group F with c + 1
attendees in G for SGQ with s = 1 and k = k − 1, if and only if
there exists a k-plex with c vertices in G.
We first prove the sufficient condition. If we remove q from F ,
every vertex in F still shares no edge with at most k − 1 other
vertices, since q connects to all the other vertices. In other words,
7Ts = {ts1 , ts2 , ts3 , ts4 , ts5 } since v2 and v7 are available in
them. Hence Ts = 5 and X (VS ∪ {v2 }) = 5 − 3 = 2.
Figure 3: Another illustrative example for SGQ and STGQ. (a)
The sample social network, (b) the social distances of candidate
attendees and (c) the schedules of candidate attendees.
the exterior expansibility condition and then remove v8 from VA .
Therefore, we choose v4 instead and obtain the first feasible solu-
tion {v2 , v4 , v6 , v7 } (total social distance = 64). Note that if we
set a small θ and allow v3 to be selected earlier, it leads to the gen-
eration of an infeasible candidate group {v2 , v3 , v6 , v7 }, instead of
the first feasible solution. If we can obtain the first feasible solu-
tion early, we are able to leverage the distance pruning strategy.
Now we backtrack one step to the state VS = {v2 , v6 , v7 } and
VA = {(v3 )}, and we reduce θ since there is no other vertex in
(cid:105)θ
(cid:104) VS ∪{v3 }
VA . However, selecting v3 still violates the interior unfamiliarity
condition when we reduce θ to 0, since U (VS ∪ {v3 }) = 2 and
= 1 × ( 4
4 )0 = 1. Therefore, we can remove v3
k
p
and backtrack to the state VS = {v2 , v7 } and VA = {(v3 ), v4 , v8 }.
In this branch, we first remove v8 due to the violation of the exte-
rior expansibility condition, and later we select v4 and v3 to obtain
the second feasible solution {v2 , v3 , v4 , v7 } (total social distance
(cid:104) VS ∪{v3 }
(cid:105)θ
= 62). Note that when reducing θ to 0 here, the interior unfamiliar-
ity condition holds and we can select v3 , since U (VS ∪ {v3 }) = 1
= 1 × ( 4
and k
4 )0 = 1. Now we further backtrack
p
to the state VS = {v7 } and VA = {v3 , v4 , v6 , v8 }6 and select
v3 . However, since 62 − 18 < (4 − 2) × 23, the distance prun-
ing strategy then stops selecting a vertex from VA . Later, we find
out that there is no need to explore the last state VS = {v7 } and
VA = {v4 , v6 , v8 }, since (1 + 1 + 0) − (3 − 4 + 1) × 0 <
(4 − 1) × (4 − 1 − 1) and hence the acquaintance pruning strategy
stops selecting a vertex from VA . Therefore, we return the optimal
solution {v2 , v3 , v4 , v7 } with the total social distance as 62.
2
EXAM PL E 3. In this illustrating example for STGSelect, we
extend the SGQ in Example 2 by considering the length of ac-
tivity time as 3 (i.e., m = 3). When processing an STGQ, the
schedules of candidate attendees provided in Figure 3(c) should
be considered as well. Since m = 3, ts3 and ts6 are selected to
be pivot time slots. For the first pivot time slot ts3 , VS = {v7 }
and VA = {v2 , v3 , v4 , v6 , v8 } in the beginning. As obtained in
Example 2, both of the exterior expansibility condition and the in-
terior unfamiliarity condition hold when selecting v2 . Note that
STGSelect also evaluates the temporal extensibility condition when
6There is no parenthesis for v3 , because we leave the branch of
VS = {v2 , v7 }.
406
(a)(b)(vi) (di,7) v2 17 v3 18 v4 27 v6 23 v8 25 ts1 ts2 ts3 ts4 ts5 ts6 ts7 v2 O O O O O O O v3 O O O O v4 O O O O O O v6 O O O O O O v7 O O O O O O v8 O O O O (c)v2v4v6v314181923172927v82520v75:
6:
7:
8:
9:
10:
11:
12:
Algorithm 2 ExpandSG
Function:
ExpandSG(inVS , inVA , inT D)
1: VS = inVS , VA = inVA , T D = inT D ;
2: while VS + VA ≥ p do
if there is any unvisited vertex in VA then
3:
Select an unvisited vertex u with the minimum social dis-
4:
tance to q and mark u as visited;
else if θ > 0 then
Reduce θ and mark remaining vertices in VA as unvisited;
else
BREAK;
if u satisfies the exterior expansibility condition then
if u satisfies the interior unfamiliarity condition then
VS = VS + {u}, VA = VA − {u}, T D = T D + du,q ;
if the distance pruning condition holds for T D or the
acquaintance pruning condition holds for VA then
BREAK;
else if VS < p then
ExpandSG(VS , VA , T D);
else
D = T D , F = VS ;
BREAK;
else if θ = 0 then
VA = VA − {u};
else
VA = VA − {u};
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
Algorithm 3 STGSelect
Require: Graph G(V , E ), activity size p, social radius constraint
with size s, acquaintance constraint with size k , and activity
length m
Ensure: Optimal group F and activity period P
u,q = ∞ for u (cid:54)= q ;
1: d0
q,q = 0, d0
2: for i = 1 to s do
q,q = 0;
3:
di
for all vertex u (cid:54)= q in V do
4:
u,q = di−1
5:
u,q ;
di
for all vertex v in Nu do
6:
if di−1
u,q then
7:
v,q + cu,v < di
u,q = di−1
8:
v,q + cu,v ;
di
w,q < ∞ and form the set
9: Extract all vertices w in V with ds
VF ;
10: Select a pivot time slot every m time slots, i.e., select time slots
with ID as im, where i is a positive integer;
11: while there is any unprocessed pivot time slot im and q is
available in im do
VS = {q}, VA = VF − {q} − {vertices not available in
im}, T D = ∞, D = ∞, F = ∅, T P = [(i − 1)m +
1, (i + 1)m − 1], P = ∅;
13:
ExpandST G(VS , VA , T D , T P, im);
Remove pivot time slot im;
14:
15: if D (cid:54)= ∞ then
16:
Output F and P ;
17: else
18:
Output “Failure”;
12:
F − {q} with c vertices corresponds to a k-plex with size c in G.
We then prove the necessary condition. If there exists a k-plex with
size c in G, F with q and the c vertices must all satisfy the social
radius constraint with s as 1, since all the c vertices connect to q in
G. Moreover, since each vertex in the k-plex shares no edge with at
most k − 1 other vertices, F with q and the c vertices must satisfy
the acquaintance constraint. The theorem follows.
B.2 Proof of Theorem 2
In radius graph extraction, each of the removed vertices has no
path with at most s edges connecting to q , and no feasible solu-
tion thereby contains these vertices. Algorithm SGSelect includes
three strategies: access ordering, distance pruning, and acquain-
tance pruning. For each VS , the interior unfamiliarity condition
only decides the order of selecting a vertex from VA , while Lemma
1 shows that the exterior expansibility does not consider the ver-
tex violating the acquaintance constraint. After we choose a ver-
tex u from VA , Lemma 2 shows that the distance pruning speci-
fies a lower bound on the total social distance that is derived from
VA . Therefore, the distance pruning will prune off only the solu-
tion with a larger total social distance. Moreover, Lemma 3 shows
that the acquaintance pruning specifies the lower bound on the total
inner degree on any set of vertices extracted from VA in any fea-
sible solution. If we choose the required number of vertices with
the largest inner degrees from VA and the result cannot exceed the
above lower bound, the connectivity is too small for VA to obtain a
feasible solution. The theorem follows.
B.3 Proof of Theorem 3
Each pivot time slot is separated from a neighbor pivot time slot
with m − 1 time slots. Therefore, Lemma 4 shows that any feasible
solution must include exactly one pivot time slot. In addition, the
proposed algorithm considers the interval with 2m−1 slots for each
pivot time slot, and we derive the best solution by extending Algo-
rithm SGSelect with the temporal extensibility. Moreover, Lemma
5 shows that the availability pruning discards VA only when there
exists no feasible solution satisfying the availability constraint by
incorporating any vertex from VA . The solution obtained by Al-
gorithm STGSelect is optimal because the algorithm chooses the
pivot time slot and the corresponding group with the smallest total
social distance at the end of the algorithm. The theorem follows.
C. PSEUDO CODES
Algorithm 1 SGSelect
Require: Graph G(V , E ), activity size p, social radius constraint
with size s, and acquaintance constraint with size k
Ensure: Optimal group F
u,q = ∞ for u (cid:54)= q ;
1: d0
q,q = 0, d0
2: for i = 1 to s do
q,q = 0;
3:
di
for all vertex u (cid:54)= q in V do
4:
u,q = di−1
5:
u,q ;
di
for all vertex v in Nu do
6:
if di−1
u,q then
7:
v,q + cu,v < di
u,q = di−1
8:
v,q + cu,v ;
di
w,q < ∞ and form the set
9: Extract all vertices w in V with ds
VF ;
10: VS = {q}, VA = VF − {q}, T D = ∞, D = ∞, F = ∅;
11: ExpandSG(VS , VA , T D);
12: if D (cid:54)= ∞ then
13:
Output F ;
14: else
15:
Output “Failure”;
407
Algorithm 4 ExpandSTG
Function:
ExpandST G(inVS , inVA , inT D , inT P , inIM )
1: VS = inVS , VA = inVA , T D = inT D , T P = inT P ,
im = imIM ;
2: while VS + VA ≥ p do
if there is any unvisited vertex in VA then
3:
4:
Select an unvisited vertex u with the minimum social dis-
tance to q and mark u as visited;
else
if θ > 0 then
Reduce θ and mark remaining vertices in VA as unvis-
ited;
else if φ < a predetermined threshold t then
Increase φ and mark remaining vertices in VA as unvis-
ited;
if φ ≥ t then
set the RHS of the temporal extensibility condition
as 0;
10:
11:
5:
6:
7:
8:
9:
else
BREAK;
if u satisfies the exterior expansibility condition then
if u satisfies the interior unfamiliarity condition then
if u satisfies the temporal extensibility condition then
VS = VS + {u}, VA = VA − {u}, T D = T D +
du,q ;
Update T P using the available time slots of u;
if the distance pruning condition holds for T D or
the acquaintance pruning condition holds for VA or
the availability pruning condition holds for VA then
BREAK;
else if VS < p then
ExpandST G(VS , VA , T D , T P, im);
else
D = T D , F = VS , P = T P ;
BREAK;
else if φ ≥ t then
VA = VA − {u};
else if θ = 0 then
VA = VA − {u};
else
VA = VA − {u};
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
D.
INTEGER PROGRAMMING FORMULA-
TION OF STGQ
In the following, we model STGQ as an Integer Programming
problem, where the formulation can support SGQ by removing the
constraints for the temporal dimension. The derived model, to-
gether with any Integer Programming commercial solver, such as
CPLEX [4], can obtain the optimal solution.
We first define a number of decision variables in the formula-
tion. Let δu denote the social distance from q to u, δu ≥ 0. Let
binary variable φu denote whether vertex u is in F . Let binary vari-
able πu,i,j denote if ei,j is located in the shortest-path from q to u,
where i is ascendant to j in the path. Let binary variable τt denote
if the activity starts in slot t. The problem is to minimize the total
(cid:88)
social distance from q to all vertices in F , i.e.,
u∈F
min
δu .
408
δu ,
min
(6)
(7)
(8)
(9)
(1)
(2)
(3)
(4)
(5)
However, because F needs to be decided in the problem, too, the
above function becomes non-linear thus cannot act as the objective
function for STGQ. To address the above problem, we propose an
(cid:88)
alternative linear objective function, i.e.,
u∈V
which considers set V instead of F . Therefore, to obtain the correct
objective value, we need to design a constraint that ensures that
(cid:80)
δu = 0 for every u not in F . Specifically, the proposed formulation
includes the following constraints.
(cid:80)
u∈V φu = p.
(cid:80)
φq = 1.
φv ≥ (p − 1)φu − k , ∀u ∈ V .
(cid:80)
v∈Nu
πu,q,i = φu , ∀u ∈ V , u (cid:54)= q .
(cid:80)
πu,i,j − (cid:80)
i∈Nq
πu,i,u = φu , ∀u ∈ V , u (cid:54)= q .
i∈Nu
(cid:80)
πu,j,i = 0,
i∈Nj
i∈Nj
∀u, j ∈ V , u (cid:54)= q , j (cid:54)= q , and j (cid:54)= u.
(cid:80)
ei,j ∈E ci,j πu,i,j = δu , ∀u ∈ V .
(cid:80)
ei,j ∈E πu,i,j ≤ s, ∀u ∈ V , u (cid:54)= q .
1≤t≤T −m+1 τt = 1, ∀u ∈ V , u (cid:54)= q .
∀u ∈ V , 1 ≤ t ≤ T − m + 1, and t ≤ (cid:98)t ≤ t + m − 1.
φu ≤ 1 − τt + au,(cid:98)t ,
(10)
Constraint (1) guarantees that exactly p vertices are selected in
solution set F , and vertex q must be one of them as stated in con-
straint (2), to ensure that an activity with size p, including the ini-
tiator, can be obtained. Constraint (3) specifies the acquaintance
constraint and guarantees that every vertex u in F , i.e., φu = 1,
can have no social link with at most k vertices. In other words, at
least p − 1 − k neighbors of u must belong to F , where 1 corre-
sponds to u itself. If u is not in F , φu = 0, we let constraint (3)
become non-enforcing because this constraint does not restrict the
value of φv for each neighbor v of u.
For each vertex u, constraints (4) − (8) find a path from q to u
and the corresponding distance, if u is chosen in F , i.e., φu = 1.
Specifically, if φu is 1, constraints (4) and (5) select an incident
edge for q and u to be included in the path, respectively. In this
case, for every other vertex j , constraint (6) ensures that either j is
to the total distance in the path, i.e., (cid:80)
not in the path, or j has one ascendant and one descendant neigh-
bor vertices in the path. Constraint (7) then derives δu according
ei,j ∈E ci,j πu,i,j , and the
objective function of the formulation enforces that the path must be
the shortest one. If φu is 0, constraints (4) and (5) do not create
the path for u, and the distance δu appearing in the objective func-
tion is thereby 0 according to constraint (7). Constraint (8) states
the social radius constraint and ensures that the path cannot include
more than s edges.
The last two constraints find the time slot in which the activity
begins, and the proposed formulation can support SGQ by discard-
ing the two constraints. Constraint (9) specifies that the activity
must begin in no later than slot T −m+ 1, where T is the largest ID
of a time slot; otherwise, the activity must span fewer than m slots.
The last constraint prohibits a candidate attendee u from joining the
activity if u is not available in the corresponding period. Specifi-
cally, if the activity starts at t and spans the slots from t to t+m− 1,
i.e., τt = 1, φu must be 0 if u is not available, i.e., au,(cid:98)t is 0, for
any slot (cid:98)t in the period. If au,(cid:98)t = 1, u is allowed, but not enforced,
to join the activity. In contrast, if the activity does not start from
t, i.e., τt = 0, we let this constraint become a non-enforcing one
because φu is not restricted in this case.
|
1906.12331 | 2 | 1906 | 2019-12-10T16:20:18 | Modeling Food Popularity Dependencies using Social Media data | [
"cs.SI",
"cs.LG",
"stat.AP",
"stat.ML"
] | The rise in popularity of major social media platforms have enabled people to share photos and textual information about their daily life. One of the popular topics about which information is shared is food. Since a lot of media about food are attributed to particular locations and restaurants, information like spatio-temporal popularity of various cuisines can be analyzed. Tracking the popularity of food types and retail locations across space and time can also be useful for business owners and restaurant investors. In this work, we present an approach using off-the shelf machine learning techniques to identify trends and popularity of cuisine types in an area using geo-tagged data from social media, Google images and Yelp. After adjusting for time, we use the Kernel Density Estimation to get hot spots across the location and model the dependencies among food cuisines popularity using Bayesian Networks. We consider the Manhattan borough of New York City as the location for our analyses but the approach can be used for any area with social media data and information about retail businesses. | cs.SI | cs | MODELING FOOD POPULARITY DEPENDENCIES USING SOCIAL
MEDIA DATA
9
1
0
2
c
e
D
0
1
]
I
S
.
s
c
[
2
v
1
3
3
2
1
.
6
0
9
1
:
v
i
X
r
a
Devashish Khulbe & Manu Pathak
Center for Urban Science + Progress
New York University
New York, NY 10003
{dk3596, mp4515}@nyu.edu
December 11, 2019
ABSTRACT
The rise in popularity of major social media platforms have enabled people to share photos and tex-
tual information about their daily life. One of the popular topics about which information is shared
is food. Since a lot of media about food are attributed to particular locations and restaurants, infor-
mation like spatio-temporal popularity of various cuisines can be analysed. Tracking the popularity
of food types and retail locations across space and time can also be useful for business owners and
restaurant investors. In this work, we present an approach using off-the shelf machine learning tech-
niques to identify trends and popularity of cuisine types in an area using geo-tagged data from social
media, Google images and Yelp. After adjusting for time, we use the Kernel Density Estimation to
get hot spots across the location and model the dependencies among food cuisines popularity using
Bayesian Networks. We consider the Manhattan borough of New York City as the location for our
analyses but the approach can be used for any area with social media data and information about
retail businesses.
Keywords Web Mining · Geographic Information Systems · Business popularity
1 Introduction
In the past decade, numerous social media platforms like Instagram, Facebook and Twitter have seen a surge in
popularity among users [1] and generates vast amount of data in the form of photos, videos and text. Out of the many
topics and categories that can be attributed to this data, one of the top ones is regarding food. A majority of posts
on social media platforms about food are attributed to many retail businesses and restaurants. We argue that data
referenced to defined locations can inform about the activity and potential hot spots regarding a particular food type
or cuisine. Analyzing the time and number of posts about these locations can give insights about popularity among
the online populace. Additionally, it can give an idea about what cuisines are popular in which area if we further dive
deeper into analyzing the content of the food related media being posted. With the influx of information regarding food
online, business owners can identify emerging areas of cuisine popularity and accordingly plan their future decisions
to maximize their profits. Also, restaurant investors can direct their resources in a much more informed and dynamic
way instead on relying on traditional census data based approaches for deciding to invest in a new location or business.
1.1 Related work
Data about social media platforms like Instagram and Twitter have been analyzed, indicating that posts about food
forms major percentage of all media. Literature has also emphasized the potential impact of 'Instagram Branding' [2]
for the success of a business. Another research harvests data from social media platforms to identify momentary social
hot spots based on sudden or gradual increase in online activity by users [3], emphasizing our hypothesis that online
activity can inform about the physical activity for an area. Regarding analysis of users' posts about restaurants, there
have been some work on sentiment analysis [5] of content indicating that there is a scope of identification of areas
with decreasing popularity along with emerging areas in our work. Furthermore, social media images have also been
used as data for prediction of human characteristics and sentiment. Also, deep learning frameworks like Keras and
PyTorch have been used to detect food cuisines from images with significant accuracy.
DECEMBER 11, 2019
2 Data
2.1 Yelp
Yelp API allows to extract information like name, average rating, cuisine type for restaurants in a location. We extract
a total of 1000 operating (as of May 2019) restaurants for Manhattan. According to Yelp, the restaurants are randomly
sampled out of the total number of restaurants. We then convert the name of each restaurant into corresponding
hashtags, attributed for which we extract data from the social media. For instance, if a restaurant has name "Sample
Name", the corresponding hashtag would be "#SampleName". The rationale behind converting to hashtags is that
social media users often write the hashtag name along their posts. This enable us to extract data regarding a particular
topic, which in this case are food types.
The documentation for Yelp API may be found at
https://www.yelp.com/developers/documentation/v3
2.2 Social media images
Most recent images were collected corresponding to each location's (restaurant) hashtag from social media (mainly
Instagram). A limit of 300 was put for each location's maximum media extraction. These were the most recent images
posted by users corresponding to each hashtag. We anticipate that collecting 300 images would cover at least a 15
days worth of media for each restaurant. It was noticed that the posts extracted were dated to more than a year ago for
some locations. We discarded these posts from our data and considered media for the last one year (since May 2018).
Furthermore, the locations for which no media was found were also removed from the data set.
2.3 Google Images
The images for different cuisines and food types were taken from Google. This was required to fine tune a food
classification model which we deployed for identifying different food types in social media data and also for removing
non-food images from it. A total of 100 images were taken for each food type in a cuisine. This allowed for transfer
learning for the classification model based on the images. The 8 food types we looked here are:
2.3.1 Food categories
Ramen
Hot Wings
•
•
Sushi
Nachos
•
•
Waffles
Bagels
•
•
Burgers
Pizza
•
•
3 Methods & Results
3.1 Image food classification model
To classify the social media images into food classes, we used a pre-trained deep learning model and used transfer
learning with our Google images. The prediction model was a deep learning network (convolution neural net) trained
using Keras. Transfer learning methodology was used on a pre-trained ResNet-50 model [6] without the top layers.
Training was switched off for the pre-trained layers since the base layers represent simple features applicable to most
computer vision classification models. The base model was followed by blocks of fully connected layers and dropout
layers for which training was switched on. The fully connected layers were sized based on the length of the feature
vector returned by the base model. An Stochastic Gradient Descent (SGD) optimizer was used along with categorical
cross entropy loss function. The model was trained for 200 epochs with a batch size of 32 per epoch. There were 800
total images for 8 types of food classes which were divided as 80:20 for training and validation. The test set were 200
manually annotated images from the social media data. The final accuracy of the model on the entire data set was
90% with good performance across all 8 food classes.
2
The non-food images posted by users were thus discarded from the data set, which then resulted into a total of around
85,000 images. Furthermore, to adjust for time, we divided each day based on time as follows:
DECEMBER 11, 2019
3.1.1 Time slots
• 5am-12noon : Breakfast
• 12noon-6pm : Lunch
• 6pm-2am : Dinner
3.2 Kernel Density Estimation
We used the Kernel Density Estimation (KDE) model using standard Gaussian kernel to get hot spots and interpola-
tions for each 8 cuisines, optimizing for the bandwidth. The KDE function is defined as
fh(x) =
1
n
N
X
i=1
Kh(x − xi) =
1
nh
N
X
i=1
K(
x − xi
h
)
(1)
where (x1, x2, . . . , xn) be a univariate independent and identically distributed sample drawn from some distribution
with an unknown density f, K is the kernel function and h > 0 is the bandwidth.
The Gaussian kernel function is defined as:
K(u) =
1
√2π
e− u2
2
(2)
Assuming that time of the day may be a confounder for number of posts and popularity of some food, we decided to
do the analyses separately for three different times of the day.
The optimized bandwidth for the three slots is shown in Table 1. The KDE analysis gives an idea about the hot-spots
in the location for different food types, adjusted for time.
Table 1: Optimized bandwidth parameters
Time Slot
5am-12noon
12noon-6pm
6pm-2am
KDE Bandwidth (in meters)
134
151
169
Hot spots
Lower East side, Chinatown
Lower East side
Hell's Kitchen, East Village
3.3 Bayesian Network Modeling
To model the dependencies among the popularity of food cuisines, we construct a Bayesian Network with BIC scoring
method using the Greedy Hill Climbing approach for faster computations. Note that we only use our social media data
(number of posts) to learn the structure of the network. Training and making predictions on the same data could be
an area of further research. Essentially, the approach learned a Directed Acyclic Graph (DAG) G(V, E) by modelling
dependencies based on the number of posts of different food types in the last one year. To account for time of day, we
also divided the data into three time slots as mentioned in section 3.1.1 and learned separate DAG structures for each
slot.
Structure learning based on Maximum Likelihood Estimation and Hill Climb approach The search is started
from either an empty, full, or possibly random network. Then given a Bayesian Network (BN) structure, the parameters
of local probability distributions (pdfs) are estimated. In this case, these are the maximum-likelihood estimation of
the probability entries from the data set, which for multinomial local pdfs consists of counting the number of tuples
that fall into each table entry of each multinomial probability table in the BN. The algorithm's main loop consists of
attempting every possible single-edge addition, removal, or reversal, making the network that increases the score the
most the current candidate, and iterating. The process stops when there is no single-edge change that increases the
score. The BIC score for DAG G and data set D is defined as:
BIC(G, D) = logPr(Dp, G) −
d
2
logN
(3)
3
DECEMBER 11, 2019
The term p is the set of maximum-likelihood estimates of the parameters p of the BN, d is the number of dimensions
of multivariate Gaussian and N is the number of points in data.[7]
The learned graph structure G(V, E) for the three time slots are shown:
G5am-12noon: (Burgers→ Nachos), (Burgers→ Pizza), (Burgers → Bagels), (Burgers → Ramen), (Burgers → Sushi),
(Burgers → Hot Wings), (Burgers → Waffles)
G12noon-6pm: (Ramen → Nachos), (Ramen → Pizza), (Ramen → Bagels), (Ramen → Burgers), (Ramen →Sushi),
(Ramen → Hot Wings), (Ramen → Waffles)
G6pm-2am: (Burgers → Nachos), (Nachos → Hot Wings), (Hot Wings → Ramen), (Ramen → Pizza), (Ramen → Sushi),
(Pizza → Bagel), (Pizza → Waffles)
where each parent-child relationship is shown as (Parent → Child)
4 Discussion
The Bayes Network structures for the three defined time slots models the dependencies among the 8 food types. Con-
sidering the number of posts as a proxy for popularity, we can infer some relationships among these food types in
different locations. At the same time, it cannot be concluded that the resulted structures are the true causal dependen-
cies for our data as we have not included variables like demographics and income which might be confounders in our
analyses. That said, we aim to learn the Bayes Network structures at much more dynamically (update every month)
than the change of other possible variable like demographics and median income, the change of which takes place in a
time frame of years. Thus, we can assume that these confounding variables would not have much impact on the learn-
ing from our dynamically updated geo-tagged posts data. We adjust for time in this work by doing separate analyses
for three time slots in a day. One can argue that most people are active on social media during the evening hours and
thus there would be more number of posts during that time slot, making the data biased. We believe this is one of the
limitations in our data and controlling for it could be an area of future work. Furthermore, the KDE gives the locations
of hot spots which are indicative of the trending areas in our considered location. The results demonstrate that areas
like Midtown and East Village are among the popular areas in food. The optimized bandwidth parameter is indicative
of the radius within which nearby restaurants are influencing the popularity of an area. Through KDE, we also expect
to know when a new area is emerging as a food hub or is becoming popular among people. Apart from KDE, we can
also check spatial autocorrelation to see the spatial dependencies among the food types through measures like Moran's
I and Anselin Local Moran's I in further work.
5 Conclusion
In this work, we postulate that popularity of businesses and food types in a location can be analyzed using the social
media activity of users. We then present ways using machine learning techniques to identify the popular locations
and model the dependencies (of popularity) among different food types in Manhattan, New York. The key areas
of future work regarding this work include incorporation of other covariates like demographics and median income.
Also, finding a proper metric to validate the results and predictions from these methods could be important to test our
hypothesis. We measured the activity of users through social media images but also talked about including other media
such as text. In addition to texts, information like business check-ins can also be used to expand this work and get
comprehensive results. We believe that our approach can be important to business owners and investors who can make
decisions based on the dynamically changing online behavior and opinions of users. This would be improvement from
the current practice of looking at just the demographics data. Considering the short life cycle of restaurants, especially
in New York City, we believe that incorporating new techniques and dynamic data is important and should be widely
adopted in this industry.
References
[1] Dave Chaffey. Global social media research summary 2019
https://www.smartinsights.com/social-media-
marketing/social-media-strategy/new-global-social-media-research/
[2] Ginsberg, K. (2015) "Instabranding: Shaping the Personalities of the Top Food Brands on Instagram." Elon Journal
of Undergraduate Research in Communications, 6(1). Retrieved from http://www.inquiriesjournal.com/a?id=1131
4
DECEMBER 11, 2019
[3] Anthony
Stefanidis, Andrew Crooks,
https://doi.org/10.1007/s10708-011-9438-2
Jacek Radzikowski
GeoJournal
(2013)
78:
319.
[4] Jeanine D. Guidry, Marcus Messner, Yan Jin, Vivian Medina-Messner, (2015) "An analysis of Instagram images
about the 10 largest fast food companies", Corporate Communications: An International Journal, Vol. 20 Issue: 3,
pp.344-359, https://doi.org/10.1108/CCIJ-04-2014-0027
[5] WANG, Y.; WANG, S.; TANG, J.; LIU, H.; LI, B. Unsupervised Sentiment Analysis for Social Me-
dia Images. International Joint Conference on Artificial Intelligence, North America, jun. 2015. Available at:
<https://www.aaai.org/ocs/index.php/IJCAI/IJCAI15/paper/view/11158/10993>
[6] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In
Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770 -- 778, 2016.
[7] https://www.cs.cmu.edu/ dmarg/Papers/PhD-Thesis-Margaritis.pdf
[8] Instagram Scraper: https://github.com/rarcega/instagram-scraper
[9] Montserrat Fuentes Adrian E. Raftery. Model Evaluation and Spatial Interpolation by Bayesian Combination of
Observations with Outputs from Numerical Models. https://doi.org/10.1111/j.0006-341X.2005.030821.x
5
|
1712.09960 | 1 | 1712 | 2017-12-28T18:10:16 | Social Bayesian Learning in the Wisdom of the Crowd | [
"cs.SI",
"physics.soc-ph"
] | Being able to correctly aggregate the beliefs of many people into a single belief is a problem fundamental to many important social, economic and political processes such as policy making, market pricing and voting. Although there exist many models and mechanisms for aggregation, there is a lack of methods and literature regarding the aggregation of opinions when influence and learning between individuals exist. This is in part because there are not many models of how people update their belief when exposed to the beliefs of others, and so it is hard to quantify the dependencies between people's mental models which is essential to minimizing redundancies in the aggregation. In this paper, we explore many models of how users influence and learn from each other, and we benchmark our models against the well-known DeGroot model. Our main contributions are: 1) we collect a new dataset of unprecedented size and detail to be posted online; 2) we develop a new Social Bayesian model of how people update their mental models, 3) we compare of our model to other well-known social learning models. Specifically, we show that our new Social Bayesian model is superior to the other models tested. | cs.SI | cs |
Social Bayesian Learning in the Wisdom of the Crowd
Dhaval Adjodah, Yan Leng, Shi Kai Chong, Peter Krat, Alex Pentland
February 28, 2017
1
Introduction
Being able to correctly aggregate the beliefs of many people into a single belief is a problem
fundamental to many important social, economic and political processes such as policy
making, market pricing and voting. Although there exist many models and mechanisms
for aggregation, there is a lack of methods and literature regarding the aggregation of
opinions when inuence and learning between individuals exist. This is in part because
there are not many models of how people update their belief when exposed to the beliefs
of others, and so it is hard to quantify the dependencies between people's mental models
which is essential to minimizing redundancies in the aggregation. In this paper, we explore
many models of how users inuence and learn from each other, and we benchmark our
models against the well-known DeGroot model [1]. Our main contributions are: 1) we
collect a new dataset of unprecedented size and detail to be posted online; 2) we develop
a new Social Bayesian model of how people update their mental models, 3) we compare
of our model to other well-known social learning models. Specically, we show that our
new Social Bayesian model is superior to the other models tested.
2 Literature Review
There is evidence showing that individuals do not always give their best guess when
answering a question, but instead sample from an internal distribution [8, 5], which ex-
plains why asking the same question multiple times improves guesses. The problem of
aggregation then becomes an exercise of combining people's individual distributions into
a group distribution. Although there is an extensive literature on how to combine distri-
butions [6, 3, 7], there is limited work on how to combine such distributions when there
is inuence and learning between individuals. This is an important distinction because if
people have correlated beliefs, the aggregation over distributions should incorporate the
decrease in entropy that occurs from having shared beliefs compared to the ideal (and
often assumed) case when people have independent beliefs. We build on the work of [2, 4]
to model the individual cognitive process of individuals as they update their beliefs after
being exposed to social information. These individual distributions could then be used
to calculate inter-individual correlations in beliefs, which can then be used to aggregate
with correlation. In this paper, we focus on how to estimate people's individual belief
distribution.
1
3 Data
Over the span of 6 months, we ran 7 sequential and independent Wisdom of the Crowd
(WoC) rounds of 2037 students (from several online classes) making 17420 price predic-
tions of real nancial assets (e.g. the S&P 500) over a period for 3 weeks each round.
We collaborated with the crowdsourced stock rating website Vetr.com and designed the
prediction process as follows: students go to our page and make a (pre-social) prediction
of an instrument's price, then they are showed a histogram of their peer's predictions
after which they make another (post-social) prediction. They have to provide condence
ratings and answers to surveys relating to their past experience in nance. Because the
students are from a class, we also have their demographics, grades, and discussion fo-
rum data.
Interestingly, we also have two rounds of prediction that happened during
extraordinary market environments: the Brexit vote and Trump's election.
4 Analysis & Results
Our new Social Bayesian model is based on the fact that we know each student's pre-
social and post-social predictions, and the exact histogram (of their peers' predictions)
they are exposed to. This model updates individual belief about the price of an asset
using social information as follows:
P (postSI, prior) =
P (SI, priorpost)P (post)
P (SI, prior)
=
P (SIpost)P (priorpost)P (post)
P (SI, prior)
P (postSI)P (SI)
P (postprior)P (prior)
P (post)
=
P (post)
P (post)
P (SI, prior)
=
P (postSI)P (SI)P (postprior)P (prior)
P (post)P (SI, prior)
= κ
P (postSI)P (postprior)
P (post)
where κ is a constant, κ = P (SI)P (prior)
P (prior,SI)
, because all terms in κ are constant and
known given prior and SI. post is the post-social prediction, prior is the pre-social
prediction and SI is the mean of the social information. We only use Bayes theorem in this
derivation. The only assumption we make (between the rst and second step) is that SI
and prior are conditionally independent on post. Because there are potential exogenous
and indirect dependencies, we test the t of our model under this assumption. We do so
by numerically calculating the joint distributions: we rst construct distributions from
point estimates (each person's predictions) and we then discretize the distributions into
several bins. We then calculate the Mean Absolute Error of how our model's post-
social prediction compares to the individual's actual post-social prediction. As we can
see in Table 1, our Social Bayesian model outperforms the DeGroot model baseline.
Additionally, we test our models against another class of models we built which are
loosely Naive Bayesian [9] (because the likelihood is assumed to be the social information
seen by a user) using 1) the mean or mode of the posterior distribution for the post-social
2
Table 1: Model Comparison (all values are percentages)
Mean Absolute Error over Rounds
1
2
Normal Approx.
2.79
6.03
Em_Mean_Norm 3.37
7.31
Em_Mean_Uni
3.94
7.39
Em_Mode_Norm 3.38
7.40
3.30
Em_Mode_Uni
6.62
2.51
DeGroot
5.27
2.05
Prob. Learning
5.23
Social Bayesian
1.52
5.13
54.2 10.5
Improvement
3
2.21
2.63
2.87
2.61
2.49
1.94
1.97
1.92
2.0
4
5
6
7
1.42
1.79
1.79
1.79
1.60
1.24
1.21
0.63
2.10
2.75
2.61
3.51
2.41
3.49
2.62
3.48
2.51
3.37
1.86
2.29
1.69
2.32
0.82
0.86
87.7 58.9 122.3 147.1
2.73
3.48
3.04
3.48
2.89
2.62
2.47
1.28
prediction, 2) either an assumed normal or an empirical distribution for the likelihood
(social histogram), and 3) either a normal or uniform distribution for the prior. Finally,
we also try a simple probabilistic learning model where P (post) = P (SI ∩ prior) =
P (SI) ∗ P (prior).
As we can see in Figure 1, our newly developed Social Bayesian learning model clearly
outperforms all the empirical models used in the literature in all rounds. We improve
54.2%, 10.5%, 2.0%, 87.7%, 58.9%, 122.3% and 147.1% over the best base models. The
improvement is calculated using improv = errorbaseline−errornew
. This indicates that our
Social Bayesian model is a better approximation to how people update their belief when
exposed to the beliefs of others.
1−errorbaseline
Because we now also have an accurate
representation of people's belief (as op-
posed to the usual single point-estimates
in WoC contexts), we could also estimate
the correlations between each user's belief
distribution using, for example, the Kull-
backLeibler divergence. Using such mea-
sures of dependence, one could improve the
WoC through a variety of means because
one could now nd users with beliefs that
are too similar to each other (e.g. to re-
duce redudancy), or to nd outliers who
have very dierent beliefs (e.g. to remove
inacurrate predictors).
Thus, our Social Bayesian formuation
not only outperforms other models from
literature, but it also allows us to construct
a representation that can be used to calcu-
late useful inter-individual correlations for
improved aggregation.
Figure 1: Mean Absolute Error for Social
Bayesian model vs. next best model
3
References
[1] Morris H DeGroot. Reaching a consensus. Journal of the American Statistical Asso-
ciation, 69(345):118121, 1974.
[2] Franz Dietrich. Bayesian group belief. Social Choice and Welfare, 35(4):595626,
2010.
[3] Christian Genest and James V Zidek. Combining probability distributions: A critique
and an annotated bibliography. Statistical Science, pages 114135, 1986.
[4] Thomas L Griths, Charles Kemp, and Joshua B Tenenbaum. Bayesian models of
cognition. 2008.
[5] Stefan M Herzog and Ralph Hertwig. The wisdom of many in one mind: Improving
individual judgments with dialectical bootstrapping. Psychological Science, 20(2):231
237, 2009.
[6] M. N. Jouini and R. T. Clemen. Copula Models for Aggregating Expert Opinions.
Operations Research, 44(February 2015):444457, 1996.
[7] Michael P.Wellman Pennock, D. Graphical representations of consensus belief. Pro-
ceedings of the Fifteenth Conference on Uncertainty in Articial Intelligence,Morgan
Kaufmann, San Francisco, pages 531540, 1999.
[8] Edward Vul and Harold Pashler. Measuring the crowd within probabilistic represen-
tations within individuals. Psychological Science, 19(7):645647, 2008.
[9] Harry Zhang. The optimality of naive bayes. AA, 1(2):3, 2004.
4
|
1510.02995 | 1 | 1510 | 2015-10-11T01:37:53 | Characterization of behavioral patterns exploiting description of geographical areas | [
"cs.SI",
"cs.CY"
] | The enormous amount of recently available mobile phone data is providing unprecedented direct measurements of human behavior. Early recognition and prediction of behavioral patterns are of great importance in many societal applications like urban planning, transportation optimization, and health-care. Understanding the relationships between human behaviors and location's context is an emerging interest for understanding human-environmental dynamics. Growing availability of Web 2.0, i.e. the increasing amount of websites with mainly user created content and social platforms opens up an opportunity to study such location's contexts. This paper investigates relationships existing between human behavior and location context, by analyzing log mobile phone data records. First an advanced approach to categorize areas in a city based on the presence and distribution of categories of human activity (e.g., eating, working, and shopping) found across the areas, is proposed. The proposed classification is then evaluated through its comparison with the patterns of temporal variation of mobile phone activity and applying machine learning techniques to predict a timeline type of communication activity in a given location based on the knowledge of the obtained category vs. land-use type of the locations areas. The proposed classification turns out to be more consistent with the temporal variation of human communication activity, being a better predictor for those compared to the official land use classification. | cs.SI | cs |
Characterization of behavioral patterns exploiting
description of geographical areas
Zolzaya Dashdorj1 and Stanislav Sobolevsky2
1University of Trento (Via Sommarive, 9 Povo, TN, Italy), and SKIL
LAB - Telecom Italia, and DKM - Fondazione Bruno Kessler, and
SICT - Mongolian University of Science and Technology (Bayanzurkh
district 22th khoroo, UB, Mongolia)
[email protected]
2Massachusetts Institute of Technology (MIT 77 Massachusetts Avenue
Cambridge, MA, USA) and
New York University (1 MetroTech Center, Brooklyn, NY)
[email protected]
Abstract
The enormous amount of recently available mobile phone data is providing un-
precedented direct measurements of human behavior. Early recognition and pre-
diction of behavioral patterns are of great importance in many societal applications
like urban planning, transportation optimization, and health-care. Understanding
the relationships between human behaviors and location's context is an emerging
interest for understanding human-environmental dynamics. Growing availability
of Web 2.0, i.e. the increasing amount of websites with mainly user created con-
tent and social platforms opens up an opportunity to study such location's con-
texts. This paper investigates relationships existing between human behavior and
location context, by analyzing log mobile phone data records. First an advanced
approach to categorize areas in a city based on the presence and distribution of
categories of human activity (e.g., eating, working, and shopping) found across
the areas, is proposed. The proposed classification is then evaluated through its
comparison with the patterns of temporal variation of mobile phone activity and
applying machine learning techniques to predict a timeline type of communica-
tion activity in a given location based on the knowledge of the obtained category
vs. land-use type of the locations areas. The proposed classification turns out to
1
be more consistent with the temporal variation of human communication activity,
being a better predictor for those compared to the official land use classification.
Index terms -- land-use, cell phone data records, big data, human activity recogni-
tion, human behavior, knowledge management, geo-spatial data, clustering algorithms,
supervised learning algorithms
1 Introduction
Recent extensive penetration of digital technologies into everyday life have enabled
creation and collection of vast amounts of data related to different types of human ac-
tivity. When available for research purposes this creates an unprecedented opportunity
for understanding human society directly from it's digital traces. There is an impres-
sive amount of papers leveraging such data for studying human behavior, including
mobile phone records [5, 16, 29, 30, 31], vehicle GPS traces [22, 37], social media
posts [20, 21, 25] and bank card transactions [38, 39]. With the growing mobile phone
data records, environment modeling can be designed and simulated for understand-
ing human dynamics and correlations between human behaviors and environments.
Environment modeling is important for a number of applications such as navigation
systems, emergency responses, and urban planning. Researchers noticed that type of
the area defined through official land-use is strongly related with the timeline of human
activity [13, 24, 28, 33, 48]. But those sources of literature do not provide extensive
analyses on categorical profile of the geographical areas. This limits the understanding
of the dependency of human behaviors from geographical areas. Our analysis confirms
this relation, however we show that land-use by itself might be not enough, while cat-
egorical profile of the area defined based on OSM provides a better prediction for the
activity timeline. For example, even within the same land-use category, timelines of
activity still vary depending on the categorical profile. In this paper, different from
these works, we start from clustering the entire city based on area profiles, that are
a set of human activities associated with a geographical location, showing that those
activities have different area types in terms of the timelines of mobile phone commu-
nication activity. Further we show that even the areas of the same land-use, which is
formally defined by land-use management organizations, might have different clusters
based on points of interest (POIs). But those clustered areas are still different in terms
of the timelines. This will contribute to other works showing that not only the land-use
matters for human activity. This paper uses mobile phone data records to determine
the relationship between human behaviors and geographic area context [9]. We present
a series of experimental results by comparing the clustering algorithms aiming at an-
swering the following questions: 1). To what extent can geographical types explain
2
human behaviors in a city, 2). What is the relationship between human behaviors and
geographical area profiles? We demonstrate our approach to predict area profiles based
on the timelines of mobile phone communication activities or vice versa: to predict the
timelines from area profiles. We validate our approach using a real dataset of mobile
phone and geographic data of Milan, Italy. Our area clustering techniques improve
the overall accuracy of the baseline to 64.89%. Our result shows that land-uses in city
planning are not necessarily well defined that an area type is better defined with one
type of human activity. But growing and development of city structures enable various
types of activities that are present in one geographical area. So this type of analy-
sis and its application is important for determining robust land-uses for city planning.
Also the hidden patterns and unknown correlations can be observed comparing the
mobile phone timelines in relevant areas. The result of this work is potentially useful
to improve the classifications of human behaviors for better understanding of human
dynamics in real-life social phenomena and to provide a decision support for stake-
holders in areas, such as urban city, transport planning, tourism and events analysis,
emergency response, health improvement, community understanding, and economic
indicators. The paper is structured as follows Section 3 introduces the data sources we
use in this research and the data-processing performed. The methodology is described
in Section 4. We present and discuss the experimental results in Section 5. Finally, we
summarize the discussions in Section 6.
2 Related Works
Human behavior is influenced by many contextual factors and their change, for in-
stance, snow fall, hurricane, and festival concerts. There are number of research activ-
ities that shed new light on the influence of such contextual factors on social relation-
ships and how mobile phone data can be used to investigate the influence of context
factors on social dynamics. Researchers [2, 4, 15, 28] use an additional information
about context factors like social events, geographical location, weather condition, etc in
order to study the relationship between human behaviors and such context factors. This
is always as successful as the quality of the context factors. The combination of some
meteorological variables, such as air temperature, solar radiation, relative humidity,
can effect people's comfort conditions in outdoor urban spaces [43], poor or extreme
weather conditions influence peoples physical activity [45]. Q. Wang et al. [49] exhib-
ited high resilience, human mobility data obtained in steady states can possibly predict
the perturbation state. The results demonstrate that human movement trajectories ex-
perienced significant perturbations during hurricanes during/after the Hurricane Sandy
in 2012. Sagl et al. [35] introduced an approach to provide additional insights in some
3
interactions between people and weather. Weather can be seen as a higher-level phe-
nomenon, a conglomerate that comprises several meteorological variables including air
temperature, rainfall, air pressure, relative humidity, solar radiation, wind direction and
speed, etc. The approach has been significantly extended to a more advanced context-
aware analysis in [36]. Phithakkitnukoon et al. [28] used POIs to enrich geographical
areas. The areas are connected to a main activity (one of the four types of activities
investigated) considering the category of POIs located within it. To determine groups,
that have similar activity patterns, each mobile user's trajectory is labeled with human
activities using Bayes Theorem in each time-slot of a day for extracting daily activity
patterns of the users. The study shows that daily activity patterns are strongly corre-
lated to a certain type of geographic area that shares a common characteristic context.
Similar to this research idea, social networks [48] have been taken into account to dis-
cover activity patterns of individuals. Noulas et al.
[24] proposed an approach for
modelling and characterization of geographic areas based on a number of user check-
ins and a set of eights type of general (human) activity categories in Foursquare. A
Cosine similarity metric is used to measure the similarity of geographical areas. A
Spectral Clustering algorithm together with K-Means clustering is applied to identify
an area type. The area profiles enables us to understand groups of individuals who have
similar activity patterns. Soto and Frias-Martinez et al. [42] studied mobile phone data
records to characterize geographical areas with well defined human activities, by using
the Fuzzy C-Means clustering algorithm. The result indicated that five different land-
uses can be identified and their representation was validated with their geographical
localization by the domain experts. Frias-Martinez et al. [13] also studied geolocated
tweets to characterize urban landscapes using a complimentary source of land-use and
landmark information. The authors focused on determining the land-uses in a specific
urban area based on tweeting patterns, and identification of POIs in areas with high
tweeting activity. Differently, Yuang et al. [50] proposed to classify urban areas based
on their mobility patterns by measuring the similarity between time-series using the
Dynamic Time Warping (DTW) algoritm. Some areas focus on understanding urban
dynamics including dense area detection and their evolution over time [23, 46]. More-
over, [14, 32, 41] analyzed mobile phone data to characterize urban systems. More
spatial clustering approaches ( Han & Kamber [19]) could group similar spatial objects
into classes, such as k-means, k-medoids, and Self Organizing Map. They have been
also used for performing effective and efficient clustering. In this research, we use
spectral clustering with eigengap heuristic followed by k-means clustering. Calabrese
et al. [33] and also [18, 27] used eigengap heuristic for clustering urban land-uses. In
many works [3, 26, 32, 34, 40, 44] the authors analyzed mobile phone data activity
timelines to interpret land-use type. T. Pei et al. [26] analyzed the correlation between
4
urban land-use information and mobile phone data. The author constructed a vector of
aggregated mobile phone data to characterize land-use types composed of two aspects:
the normalized hourly call volume and the total call volume. A semi-supervised fuzzy
c-means clustering approach is then applied to infer the land-use types. The method is
validated using mobile phone data collected in Singapore. land-use is determined with
a detection rate of 58.03%. An analysis of the land-use classification results shows that
the detection rate decreases as the heterogeneity of land-use increases, and increases
as the density of cell phone towers increases. F. Girardin et al. [17] analyzed aggregate
mobile phone data records in New York City to explore the capacity to quantify the
evolution of the attractiveness of urban space and the impact of a public event on the
distribution of visitors and on the evolution of the attractiveness of the points of interest
in proximity.
3 Collecting and Pre-Processing the data
We use two types of datasources for this experiment; 1) POIs from available geo-
graphical maps, Openstreetmap 2) Mobile phone network data (sms, internet, call, etc)
generated by the largest operator company in Italy. The mobile phone traffic data is
provided in a spatial grid, the rectangular grid of 100 x 100 square of dimension 235
m x 235 m. We use the grid as our default configuration for collecting human activity
distribution and mobile network traffic activity distribution.
3.1 Point of Interests extracted from Openstreetmap
In [6, 7, 8, 11], one of the key elements in the contextual description of geographical
regions is the point of interest (POI) (e.g. restaurants, ATMs, and bus stops) that pop-
ulates an area. A POI is a good proxy for predicting the content of human activities in
each area that was well evaluated in [10]. Employing a model proposed in [10], a set
of human activities likely to be performed in a given geographical area, can be identi-
fied in terms of POI distribution. This allows us to create area profiles of geographical
locations in order to provide semantic (high level) descriptions to mobile phone data
records in Milan. For example, a person looking for food if the phone call is located
close to a restaurant. We exploit the given spatial grid to enrich the locations with POIs
from open and free geographic information, Openstreetmap (OSM)1. We collected in
total 552,133 POIs that refined into 158,797 activity relevant POIs. To have a suf-
ficient number and diversity of POIs in each location, we consider the nearby areas
for estimating the likelihood of human activities. The nearby areas are the intersected
1http://www.openstreetmap.org
5
locations within the aggregation radius of the centroid point at each location. The ag-
gregation radius is configured differently in each location, which satisfies the need for
the total number of POIs in such intersected locations to be above the threshold h, see
Figure 1(b) and 1(a) where each location at least h=50 POIs in the intersected loca-
tions. Across locations, the min, median, and max number of POIs are 50, 53, and
202.
(a) The location size (aggregation radius * 2)
distribution
(b) Human activity relevant POI distribution con-
sidering aggregation radius
Figure 1: The distributions of POIs and human activities across locations
In order to build area profiles of each location, a n x m dimensional matrix An,m is
defined for each location n ∈ {1, .., 10000}. Each element An,m contains the weight
of activity categories m in location n where the m ∈ {eating, educational, entertain-
ment, health, outdoor, residential, shopping, sporting, traveling, working}, with the
total number of 10 measurements of human activities per each location. The weight of
each category of activities are estimated by the HRBModel which allows us to generate
a certain weight for human activities that is proportional to the weight of relevant POIs
located in each location. The weight of POIs in a given location, is estimated by the
following equation of tf − idf (f, l) =
{l∈L:f∈l}, where f is
a given POI; f ∈ F , F ={building, hospital, supermarket,...} and l is a given location;
l ∈ L, L={location1, location2, location3,...}, N (f, l) is the occurrence of POI f and
{N (w, l) : w ∈ l} is the maximum occurrence
its appearance in location l and argmax
of all the POIs in location l, L is the number of all locations, {l ∈ L : f ∈ l} is the
number of locations where POI f appears.
{N (w,l):w∈l} ∗ log
N (f,l)
L
argmax
w
w
The activity distribution in Milan area is shown in Figure 2. The sporting, working,
eating and transportation types of activities are mainly performed in the city.
6
Figure 2: The activity distribution in Milan
3.2 Mobile phone network traffic
In this work, we used a dataset from "BigDataChallenge"2 organized by Telecom Italia.
The dataset is the result of a computation over the Call Detail Records (CDRs) gener-
ated by the Telecom Italia cellular network within Milan. The dataset covers 1 month
with 180 million mobile network events in November, 2014 as November is a normal
month without any particular events organized in Milan. The CDRs log the user activ-
ity for billing purposes and network management. There are many types of CDRs, for
the generation of this dataset we considered those related to the following activities:
square id (the id of the square that is part of the Milan GRID which contains spatially
aggregated urban areas), time interval (an aggregate time), received SMS (a CDR is
generated each time a user receives an SMS), sent SMS (a CDR is generated each time
a user sends an SMS), incoming Calls (a CDR is generated each time a user receives
a call), outgoing Calls (a CDR is generated each time a user issues a call), internet
(a CDR is generate each time, a user starts an internet connection, or a user ends an
internet connection).
By aggregating the aforementioned records, this dataset was created that provides
mobile phone communication activities across locations. The call, sms and internet
connection activity logs are collected in each square of the spatial grid for Milan urban
area. The activity measurements are obtained by temporally aggregating CDRs in time-
slots of ten minutes. But the temporal variations make the comparison of human behav-
iors more difficult. The standard approach to account for temporal variations in human
behavior is to divide time into coarse grained time-slots. In Farrahi and Gatica-Perez
et al. [12], the following eight coarse-grained time-slots are introduced: [00-7:00 am.,
2http://www.telecomitalia.com/tit/it/bigdatachallenge.html
7
7:00-9:00 am., 9:00-11:00 am., 11:00 am.-2:00 pm., 2:00-5:00 pm., 5:00-7:00 pm.,
7:00-9:00 pm., and 9:00 pm.-00 am.]. Here, we aggregate the mobile phone network
data in such coarse-grained time-slots to extract the pattern of 1 month network traffic
volume in each location. For each location, we then aggregated the total number of call
(outgoing and incoming call without considering a country code), and sms (incoming
and outgoing), internet activity for each of those eight time-slots. Such time-slot based
timelines can give us actual patterns of mobile network traffic activity.
Then the dataset reduced to 2.4 million CDR each of which consists of the fol-
lowings: square id, day of month, time-slot, and total number of mobile network
traffic activity. We build a n x p x d dimensional matrix Tn,p,d to collect a mobile
phone traffic activity timeline, where n is the number of locations in [1,10000], p is
the time-slot divisions of the day [1,8] and d is the day in [1,31]. To identify time-
line patterns among those locations, we performed a normalization for the timelines
based on z-score which transforms the timeline into the output vector with mean µ=0
while standard deviation σ is negative if it is below the mean or positive if it is above
the mean. The normalized timelines by day are visualized in Figure 3 which show
a stable communication activity within the month. For this transformation, we used
, i ∈ n, j ∈ p, k ∈ d, where µi is the average value of the mobile
T (cid:48)
i,j,k =
phone activity traffic in location i, σi is the standard deviation of the mobile phone
activity traffic in location i.
Ti,j,k − µi
σi
Figure 3: The timelines for each time-slot of day normalized by z-score in each location
(weekday-blue, saturday-red, sunday-pink)
4 The Approach
We present our methodology for identifying the relation between geographical loca-
tions and human behaviors. Our methodology is divided into two phases: 1) clustering
approaches for inferring categorical area types in terms of geographical area profiles 2)
8
classification approaches for validating the observed area types by mobile phone data
records. Clustering techniques are mostly unsupervised methods that can be used to
organize data into groups based on similarities among the individual data items. We
use the spectral clustering algorithm which makes use of the spectrum (eigenvalues) of
the similarity matrix of the data to perform dimensionality reduction before clustering
in fewer dimensions. The similarity matrix is provided as an input and consists of a
quantitative assessment of the relative similarity of each pair of points in the dataset.
We define a vector space model that contains a set of vectors corresponding to areas.
Relevance between areas is a similarity comparison of the deviation of angles between
each area vector. The similarity between the areas is calculated by the cosine similarity
metric by estimating the deviation of angles among area vectors. For example, the sim-
ilarity between area l1 and l2 would be cos θl1,l2 = l1·l2
(cid:107)l2(cid:107)(cid:107)l1(cid:107) where li denotes the area
or the features associated to the areas. We denote each area li with a set of correspond-
ing features associated with a weight measure j. Having the estimation of similarity
between the areas, we can now create a similarity graph described as the weight ma-
trix W generated by the cosine similarity metrics and the diagonal degree matrix D
is utilized by the spectral clustering algorithm which is the one of the most popular
modern clustering methods and performs better than traditional clustering algorithms.
We create the adjacency matrix A of the similarity graph and graph Laplacian LA,
LA = D− A (given by normalized graph Laplacian LAn = D−1/2LAD−1/2). Based
on eigengap heuristic [47], we identify the number of clusters by k-nearest neighbor
to observe in our dataset as k = argmaxi(λi+1 − λi) where λi ∈ {l1, l2, l3, .., ln}
denotes the eigenvalues of ln in the ascending order. Finally, we easily detect the ef-
fective clusters (area profiles) S1, S2, S3, ..., Sk from the first k eigenvectors identified
by the k-means algorithms.
We investigate the relation between geographical locations and human behaviors
based on categorical area types. To do that, we use supervised learning algorithms to
predict area profile of a given area if we train a classification model with training data,
which are the timelines labeled with area types. In supervised learning, each obser-
vation has a corresponding response or label. Classification models learn to predict
a discrete class given new predictor data. We use several of classifiers for learning
and prediction. We prepare a test set for testing classification models by k-fold cross
validation method.
5 Experiments and Results
In this section, we demonstrate the identification of the relationships between locations
and human behaviors in terms of two types of features in each location: 1) location
9
contexts: categories of human activity estimated through types of available POI 2)
mobile communication activity timeline: mobile communication activity in time-series
of coarse grained time-slots.
In other words, the extent to which human behaviors
depend on geographical area types. To identify and quantify these dependencies, we
perform two types of validations: 1) observed area type we defined vs human behavior
2) land-use type defined formally vs human behavior by estimating the correlations and
prediction algorithms.
Figure 4: Observed area types of the geographical area of Milan based on the area
profiles, k=6, where S1 is red, S2 is lime, S3 is blue, S4 is yellow, S5 is cyan/aqua,
and S6 is magenta/fuchsia
5.1 Observed area type vs human behavior
(cid:80)n
(cid:80)n
i=1 xi+(cid:80)n
i=1 yi
i=1 yi
We first check the two datasets can be clustered or randomly distributed using Hop-
kins statistic, H =
. The distance between element pi and its nearest
neighbor in dataset D is xi = minv∈D {dist(pi, v)} and the distance between element
qi and its nearest neighbor in D − qi is yi = minv∈D,v(cid:54)=qi {dist(qi, v)}. The Hopkins
statistic for the location context dataset is 0.02 and the mobile communication timeline
is 0.04 that indicates that the datasets are highly clustered and regularly distributed. So
we then analyze the correlations of location context and mobile phone communication
timeline in order to understand if humans are attracted to location contexts through
the area types (i.e., shopping, woking, and studying). To validate such relationship,
we start with the geographical area clustering based on the location context by semi-
supervised learning algorithms. We perform spectral clustering on the locations based
on their similarity of human activity distribution An,m. Each location of the grid has
a distribution of activity categories with relative frequency of their appearance. The
10
spectral clustering with k-nearest neighbor (k = 10 based on cosine similarity metrics)
approach allows us to classify geographical areas L based on such multi-dimensional
features, An,m. We then observed significantly different six types of areas, that are
geo-located in Figure 4. The average values of the activity categories for those area
types are presented in Figure 5.
Figure 5: The average values of the activity categories in categorical area types ob-
served
The figure shows that categorical area type S4 contains high percentage values for
residential, and eating activities. The center of the city including a residential zone
were clustered into one area type. The area type S3 contains high percentage value
on working activity. This classification can be refined if we increase the number of
area types observations. For each area type, we are now able to extract and observe
timelines Tn,p,d from mobile phone data records in order to determine the correlation
between the timelines and the area profiles for those area types.
Figure 6: The density distribution of area types observed in Milan
11
Figure 7: The average timeline of mobile phone data by area types (k=6), where S1 is
red, S2 is lime, S3 is blue, S4 is yellow, S5 is cyan/aqua, and S6 is magenta/fuchsia
The density of the clusters are almost uniform distributed except cluster S4 and S5,
see Figure 6. This unbalanced datasets for clusters could contribute to an acceptable
global accuracy, but also to a (hidden) poor prediction for instances in minority classes.
In this context, alternative metrics, such as per class accuracy will be considered. We
estimate the accuracy per class using the two techniques (canonical correlation coeffi-
cients vs learning techniques). Figure 7 shows the actual volume of the mobile network
traffic activities by the area types.
Figure 8: Canonical correlation between the two feature matrices for locations
We illustrated the correlation between the area profiles An,m and timelines Tn,p,d
12
based on the canonical correlation [1] (see Figure 8). The canonical correlation in-
vestigates the relationships between two sets of vectors by maximizing the correlation
in linear combination. In order words, canonical correlation finds the optimal coordi-
nate system for correlation analysis and the eigenvectors defines the coordinate system.
While the overall maximum correlation coefficient (j=1) is 65% between the two vec-
tors, the correlation coefficient by area types is high between 72% and 98%. For exam-
ple, the correlation in area type S5 is stronger than other area types, in which working
type of activities are more distributed. The maximum correlation in S2 containing high
percentage of sporting activity is 82.38%.
We also compared the distance between the two vectors (mean) of area types to
investigate the similarity of the relevant area profiles can have the similar human be-
haviors. We observed linear correlation with a coefficient of r = 0.61 This result shows
that as the distance between the area profiles is increased, the timeline difference in-
creases, and human behaviors are strongly correlated to geographical area profiles.
In second, we profiles the communication timelines with the cluster labels observed
in each location that will be used to estimate the correlation by supervised learning
algorithms. The prediction accuracy of timeline types in a given location could be an
evaluation of the dataset. To that end, we train several predictive models (i.e., Bayesian
algorithms, Decision Trees, Probabilistic Discriminative models and Kernel machines.)
to measure the prediction accuracy by k-fold cross validation method (k=10), which is
used to estimate how accurately a predictive model will perform. We need to prepare
training and test data. The training data are the timelines labeled by area types through
the location. This allows us to determine if timelines are clustered as geographical area
profiles. The experimental results on our data are shown in Table 1. This classification
of the predictive models is aimed at choosing a statistical predictive algorithm to fit in
our analysis.
Among the considered techniques, the Random Forest and the Nearest Neighbor al-
gorithms are resulted in the lowest error with high accuracy, in other words, if we take
the area profile of the nearest-neighbor (the most common area profile of k-nearest-
neighbors), that would give the right timeline type. The confusion matrix of the Ran-
dom Forest classifier, and the precision, recall are estimated in the following Table
2. The receiver operating characteristic curve for visualizing the performance of the
classifiers is described in Figure 9. This result shows that the area type S5 is the well
classified and compact by showing a strong correlation between the area activity cate-
gories and area timeline. The area types S1, S2, S3 and S4, S6 can be still refined in
terms of the area activity categories.
13
Table 1: Results for the predictive models with the use of area types observed by
spectral clustering algorithm
Algorithm
Random classifier
Linear Discriminant
Quadratic Discriminant
Naive Bayes(kernel density)
K-NN (k=5, euclidean dist)
K-NN (k=10, euclidean dist)
Decision Tree
Random Forest
Multi-class SVM
Cross Validation Overall ACC
0.83
0.5404
0.4649
0.6748
0.3822
0.4068
0.4806
0.3513
0.4997
16.7%
45.01%
52.90%
20.38%
61.73%
59.26%
52.58%
64.89%
49.47%
Table 2: Confusion matrix and precision, recall and f-measure in each area type defined
for predicting timeline based on location context about categorical human activity by
Random Forest classifier
Area type defined
S1
S2
S3
S4
S5
S6
S2
S6
S3
S4
S1
4.47%
8.91% 0.20% 1.80%
0.10% 8.58% 0.70%
1.77%
1.77% 0.43% 10.15% 1.70%
2.34% 0.53% 1.13%
0.03% 0.23% 1.37%
2.40% 1.27% 1.67%
S5
0.07% 1.57%
0.47% 1.30%
1.27% 1.23%
19.63% 0.33% 1.54%
6.54% 0.07%
0.53%
2.74%
0.07% 11.08%
F-measure.
Recall.
Prec.
52.35% 57.30% 54.71%
66.41% 76.26% 70.99%
61.29% 60.32% 60.80%
76.96% 63.64% 69.67%
74.52% 74.81% 74.67%
57.64% 66.00% 61.54%
Figure 9: Receiver operating characteristic to multi-class by Random Forest classifier
5.2 Land-use type vs human behavior
After we observed strong prediction accuracy of timelines based on categorical area
types, we analyze the relation between the timelines and land-use types which are for-
14
mally defined by land-use management organizations. While many works try to predict
activity based on land-use, we perform a comparative study of the two approaches. We
identify that even the area of the same land-use might have different area types in
terms of area profiles and those are still different in terms of human activity timelines
quantified through mobile phone records, which validates significance of activity-based
classification vs official land-use. We predict the timeline type of a given area based on
the land-use type using the Random Forest and the Nearest Neighbor classifiers. We
used the land-use types from the OSM3 for this prediction task (see the distribution
of land-use types of Milan in Figure 10(a)). The prediction accuracy of the Random
Forest classifier is 53.47%. This shows that predicting power of categorical types is
higher compared to land-use types.
(a) The distribution of land-use classification in
Milan
(b) The distribution of categorical activity
clusters within commercial land-use area
Figure 10
We also match the area types we observed with the land-use types given officially.
The result shows that even within the same land-use type, the timelines corresponding
to different clusters are still different. For example, 58% of the commercial land-
uses matched with the area type S3 which followed by S1, S6 and S2, S3, S4, S5,
shown in Figure 10(b). The corresponding timelines to the different clusters within the
commercial land-use type are illustrated in Figure 11.
The timelines in the same area type observed, also in the same land-use officially
defined, can be still refined, but the timeline pattern refinement will require more em-
phasis on the appropriate features, for example, timelines for weekday or weekend. The
area profiles are semantically different concepts in terms of human activities performed
in geographical areas. Further, it will allow us to identify a standard or exceptional type
of mobile network activities in relevant areas, as well as to enable the identification of
unknown correlations, or hidden patterns about anomalous behaviors.
3http://wiki.openstreetmap.org/wiki/Key:landuse
15
Figure 11: The timelines belong to different clusters within the commercial land-use:
S1 is red, S2 is lime, S3 is blue, S4 is yellow, S5 is cyan/aqua, and S6 is magenta/-
fuchsia
6 Conclusion and Future works
In this paper, we proposed an approach that characterizes and classifies geographical
areas based on their anticipated (through POI distribution) human activity categorical
types, such as working or shopping oriented areas. We concentrated on the analysis
of the relationship between such spatial context of the area and observed human ac-
tivity. Our approach compares the similarity between area activity categorical profiles
and human activity timeline categories estimated through cell phone data records. We
found an overall correlation of 61% and canonical correlation of 65% between con-
textual and timeline-based classifications. We observed six types of areas according
to the area activity categories where we compared their human activity timelines with
their area activity categories and the correlation (canonical) coefficient is between 72%
and 98%. For example, the area type S5 related to working activity has a strong cor-
relation of 98% which followed by the area types, S2 related to sporting activity and
S3 related to the human activities in the center of the city . The supervised learning
approach validates possibility of using an area categorical profile in order to predict to
some extent the network activity timeline (i.e., call, sms, and internet). For example,
the Random Forest approach performs well with the accuracy of 64.89%. So human
behaviors' temporal variation is characterized similarly in relevant areas, which are
identified based on the categories of human activity performed in those locations. Fur-
thermore we found that the prediction accuracy based on the official land-use types is
only 53.47%. So the official land-use types by themselves are not enough to explain the
observed impact of area context on human activity timelines, also because even within
16
the same land-use type, different activity categorical types still demonstrate different
activity timelines. Further, the semantic description of area profiles associated to mo-
bile phone data enables the investigation of interesting behavioral patterns, unknown
correlations, and hidden behaviors in relevant areas. We expect the approach to be fur-
ther applicable to other ubiquitous data sources, like geo-localized tweets, foursquare
data, bank card transactions or the geo-temporal logs of any other service.
7 Acknowledgments
The authors would like to thank the Semantic Innovation Knowledge Lab - Telecom
Italia for publicly sharing the mobile phone data records which were provided for Big
Data Challenge organized in 2013, Italy. We also would like to thank MIT SENSEable
City Lab Consortium partially for supporting the research.
References
[1] Canonical correlation analysis. In Applied Multivariate Statistical Analysis, pages
321 -- 330. Springer Berlin Heidelberg, 2007.
[2] J. P. Bagrow, D. Wang, and A.-L. Barab´asi. Collective response of human popu-
lations to large-scale emergencies. CoRR, abs/1106.0560, 2011.
[3] R. A. Becker, R. Cceres, K. Hanson, J. M. Loh, S. Urbanek, A. Varshavsky, and
C. Volinsky. A tale of one city: Using cellular network data for urban planning.
[4] F. Calabrese, P. F. C., G. Di Lorenzo, L. Liu, and C. Ratti. The geography of
In the Proc. of the 8th
taste: analyzing cell-phone mobility and social events.
international conference on Pervasive Computing, (Pervasive'10), pages 22 -- 37,
Berlin, Heidelberg, 2010. Springer-Verlag.
[5] F. Calabrese and C. Ratti. Real time rome. Networks and Communication studies,
20(3-4):247 -- 258, 2006.
[6] Z. Dashdorj and L. Serafini. Semantic enrichment of mobile phone data records
using linked open data. In the Proc. of the 12th Intl. Conf. Semantic Web Confer-
ence Poster and Demonstrations Track, 2013.
[7] Z. Dashdorj and L. Serafini. Semantic interpretation of mobile phone records
exploiting background knowledge. In the Proc. of the 12th Intl. Conf. Semantic
Web Conference Doctoral Consortium, 2013.
17
[8] Z. Dashdorj, L. Serafini, F. Antonelli, and R. Larcher. Semantic enrichment of
mobile phone data records. In MUM, page 35, 2013.
[9] Z. Dashdorj and S. Sobolevsky. Impact of the spatial context on human commu-
nication activity. In Proceedings of the 2015 ACM International Joint Conference
on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM Inter-
national Symposium on Wearable Computers, UbiComp '15, pages 1615 -- 1622,
New York, NY, USA, 2015. ACM.
[10] Z. Dashdorj, S. Sobolevsky, L. Serafini, F. Antonelli, and C. Ratti. Semantic
enrichment of mobile phone data records using background knowledge. arXiv
preprint arXiv:1504.05895, 2015.
[11] Z. Dashdorj, S. Sobolevsky, L. Serafini, and C. Ratti. Human activity recognition
from spatial data sources. In Proceedings of the Third ACM SIGSPATIAL Inter-
national Workshop on Mobile Geographic Information Systems, MobiGIS '14,
pages 18 -- 25, New York, NY, USA, 2014. ACM.
[12] K. Farrahi and D. Gatica-Perez. What did you do today? discovering daily rou-
tines from large-scale mobile data. In ACM International Conference on Multi-
media (ACMMM), 0 2008. IDIAP-RR 08-49.
[13] V. Fr´ıas-Mart´ınez, V. Soto, H. Hohwald, and E. Fr´ıas-Mart´ınez. Characterizing
In SocialCom/PASSAT, pages 239 --
urban landscapes using geolocated tweets.
248, 2012.
[14] T. Fujisaka, R. Lee, and K. Sumiya. Exploring urban characteristics using move-
ment history of mass mobile microbloggers. In Proceedings of the Eleventh Work-
shop on Mobile Computing Systems & Applications, HotMobile '10, pages
13 -- 18, New York, NY, USA, 2010. ACM.
[15] B. Furletti, L. Gabrielli, C. Renso, and S. Rinzivillo. Identifying users profiles
In Proceedings of the ACM SIGKDD International
from mobile calls habits.
Workshop on Urban Computing, UrbComp '12, pages 17 -- 24, New York, NY,
USA, 2012. ACM.
[16] F. Girardin, F. Calabrese, F. D. Fiore, C. Ratti, and J. Blat. Digital footprinting:
Uncovering tourists with user-generated content. Pervasive Computing, IEEE,
7(4):36 -- 43, 2008.
[17] F. Girardin, A. Vaccari, R. Gerber, and A. Biderman. Quantifying urban attrac-
tiveness from the distribution and density of digital footprints. Journal of Spatial
Data Infrastructure Research.
18
[18] S. Grauwin, S. Sobolevsky, S. Moritz, I. G´odor, and C. Ratti. Towards a com-
parative science of cities: using mobile traffic records in New york, London and
Hong Kong. CoRR, abs/1406.4400, 2014.
[19] J. Han, M. Kamber, and A. K. H. Tung. Spatial Clustering Methods in Data
Mining: A Survey. Taylor and Francis, 2001.
[20] B. Hawelka, I. Sitko, E. Beinat, S. Sobolevsky, P. Kazakopoulos, and C. Ratti.
Geo-located twitter as proxy for global mobility pattern. Cartography and Geo-
graphic Information Science, pages 1 -- 12, 2014.
[21] A. Java, X. Song, T. Finin, and B. Tseng. Why we twitter: understanding mi-
In Proceedings of the 9th WebKDD and
croblogging usage and communities.
1st SNA-KDD 2007 workshop on Web mining and social network analysis, pages
56 -- 65. ACM, 2007.
[22] C. Kang, S. Sobolevsky, Y. Liu, and C. Ratti. Exploring human movements in
singapore: a comparative analysis based on mobile phone and taxicab usages. In
Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Com-
puting, page 1. ACM, 2013.
[23] J. Ni and C. V. Ravishankar. Pointwise-dense region queries in spatio-temporal
databases. In R. Chirkova, A. Dogac, M. T. zsu, and T. K. Sellis, editors, ICDE,
pages 1066 -- 1075. IEEE, 2007.
[24] A. Noulas, S. Scellato, C. Mascolo, and M. Pontil. Exploiting semantic annota-
tions for clustering geographic areas and users in location-based social networks.
In The Social Mobile Web, 2011.
[25] S. Paldino, I. Bojic, S. Sobolevsky, C. Ratti, and M. C. Gonz´alez. Urban
magnetism through the lens of geo-tagged photography. arXiv preprint arXiv:
1503.05502, 2015.
[26] T. Pei, S. Sobolevsky, C. Ratti, S.-L. Shaw, T. Li, and C. Zhou. A new insight
into land use classification based on aggregated mobile phone data. International
Journal of Geographical Information Science, 28(9):1988 -- 2007, 2014.
[27] T. Pei, S. Sobolevsky, C. Ratti, S.-L. Shaw, and C. Zhou. A new insight into land
use classification based on aggregated mobile phone data. CoRR, abs/1310.6129,
2013.
[28] S. Phithakkitnukoon, T. Horanont, G. Di Lorenzo, R. Shibasaki, and C. Ratti.
Activity-aware map: identifying human daily activity pattern using mobile phone
19
data. In the Proc. of the 1st Intl. Conf. Human Behavior Understanding, pages
14 -- 25, 2010.
[29] D. Quercia, N. Lathia, F. Calabrese, G. Di Lorenzo, and J. Crowcroft. Recom-
mending social events from mobile phone location data. In Data Mining (ICDM),
2010 IEEE 10th International Conference on, pages 971 -- 976, 2010.
[30] C. Ratti, S. Sobolevsky, F. Calabrese, C. Andris, J. Reades, M. Martino, R. Clax-
ton, and S. H. Strogatz. Redrawing the map of great britain from a network of
human interactions. PLoS One, 5(12):e14248, 2010.
[31] C. Ratti, S. Williams, D. Frenchman, and R. Pulselli. Mobile landscapes: Using
location data from cell phones for urban analysis. Environment and planning B,
33(5):727, 2006.
[32] C. Ratti, S. Williams, D. Frenchman, and R. M. Pulselli. Mobile Landscapes:
using location data from cell phones for urban analysis. ENVIRONMENT AND
PLANNING B PLANNING AND DESIGN, 33(5):727, 2006.
[33] J. Reades, F. Calabrese, and C. Ratti. Eigenplaces: analysing cities using the
space time structure of the mobile phone network. Environment and Planning B:
Planning and Design, 36(5):824 -- 836, 2009.
[34] J. Reades, F. Calabrese, A. Sevtsuk, and C. Ratti. Cellular Census: Explorations
in Urban Data Collection. IEEE Pervasive Computing, 6(3):30 -- 38, 2007.
[35] G. Sagl, E. Beinat, B. Resch, and T. Blaschke. Integrated geo-sensing: A case
study on the relationships between weather and mobile phone usage in northern
italy. In IEEE International Conference on Spatial Data Mining and Geograph-
ical Knowledge Services, ICSDM 2011, Fuzhou, China, June 29 - July 1, 2011,
pages 208 -- 213, 2011.
[36] G. Sagl, T. Blaschke, E. Beinat, and B. Resch. Ubiquitous geo-sensing for
context-aware analysis: Exploring relationships between environmental and hu-
man dynamics. Sensors, 12(7):9800 -- 9822, 2012.
[37] P. Santi, G. Resta, M. Szell, S. Sobolevsky, S. Strogatz, and C. Ratti. Taxi pooling
in New York City: a network-based approach to social sharing problems. arXiv
preprint arXiv:1310.2963, 2013.
[38] S. Sobolevsky, I. Sitko, R. T. D. Combes, B. Hawelka, J. M. Arias, and C. Ratti.
Money on the move: Big data of bank card transactions as the new proxy for
20
human mobility patterns and regional delineation. the case of residents and for-
eign visitors in spain. In Big Data (BigData Congress), 2014 IEEE International
Congress on, pages 136 -- 143. IEEE, 2014.
[39] S. Sobolevsky, I. Sitko, S. Grauwin, R. T. d. Combes, B. Hawelka, J. M.
Arias, and C. Ratti. Mining urban performance: Scale-independent classi-
arXiv preprint
fication of cities based on individual economic transactions.
arXiv:1405.4301, 2014.
[40] S. Sobolevsky, M. Szell, R. Campari, T. Couronn, Z. Smoreda, and C. Ratti.
Delineating geographical regions with networks of human interactions in an ex-
tensive set of countries. PLoS ONE, 8(12):e81707, 12 2013.
[41] V. Soto and E. Fr´ıas-Mart´ınez. Robust land use characterization of urban land-
scapes using cell phone data, June 2011. The First Workshop on Pervasive Urban
Applications (PURBA).
[42] V. Soto and E. Fras-martnez. Robust land use characterization of urban land-
scapes using cell phone data, 2011.
[43] T. Stathopoulos, H. Wu, and J. Zacharias. Outdoor human comfort in an urban
climate. Building and Environment, 39(3):297 -- 305, 2004.
[44] J. Sun, J. Yuan, Y. Wang, H. Si, and X. Shan. Exploring spacetime structure of
human mobility in urban space. Physica A: Statistical Mechanics and its Appli-
cations, 390(5):929 -- 942, 2011.
[45] P. Tucker and J. Gilliland. The effect of season and weather on physical activity:
A systematic review. Public Health, 121(12):909 -- 922, 2007.
[46] M. R. Vieira, V. Frias-Martinez, N. Oliver, and E. Frias-Martinez. Characterizing
dense urban areas from mobile phone-call data: Discovery and social dynam-
ics. In Proceedings of the 2010 IEEE Second International Conference on Social
Computing, SOCIALCOM '10, pages 241 -- 248, Washington, DC, USA, 2010.
IEEE Computer Society.
[47] U. von Luxburg. A tutorial on spectral clustering. CoRR, abs/0711.0189, 2007.
[48] S. Wakamiya, R. Lee, and K. Sumiya. Urban area characterization based on se-
In Proceedings of the 4th international
mantics of crowd activities in twitter.
conference on GeoSpatial semantics, GeoS'11, pages 108 -- 123, Berlin, Heidel-
berg, 2011. Springer-Verlag.
21
[49] Q. Wang and J. E. Taylor. Quantifying human mobility perturbation and resilience
in hurricane sandy. PLoS ONE, 9(11):e112608, 11 2014.
[50] Y. Yuan and M. Raubal. Extracting dynamic urban mobility patterns from mobile
phone data. In N. Xiao, M.-P. Kwan, M. F. Goodchild, and S. Shekhar, editors,
GIScience, volume 7478 of Lecture Notes in Computer Science, pages 354 -- 367.
Springer, 2012.
22
|
1705.04485 | 2 | 1705 | 2018-02-25T08:17:33 | Mining Communication Data in a Music Community: A Preliminary Analysis | [
"cs.SI"
] | Comments play an important role within online creative communities because they make it possible to foster the production and improvement of authors' artifacts. We investigate how comment-based communication help shape members' behavior within online creative communities. In this paper, we report the results of a preliminary study aimed at mining the communication network of a music community for collaborative songwriting, where users collaborate online by first uploading new songs and then by adding new tracks and providing feedback in forms of comments. | cs.SI | cs | Mining Communication Data in a Music Community:
A Preliminary Analysis
Fabio Calefato (0000-0003-2654-1588), Giuseppe Iaffaldano (0000-0002-0432-
7735), Filippo Lanubile (0000-0003-3373-7589), Antonio Lategano, and
Nicole Novielli (0000-0003-1160-2608)
University of Bari, Dip. Informatica, Bari, Italy
[email protected]
Abstract. Comments play an important role within online creative communities
because they make it possible to foster the production and improvement of au-
thors' artifacts. We investigate how comment-based communication help shape
members' behavior within online creative communities. In this paper, we report
the results of a preliminary study aimed at mining the communication network of
a music community for collaborative songwriting, where users collaborate online
by first uploading new songs and then by adding new tracks and providing feed-
back in forms of comments.
Keywords: Computer-mediated communication · Online creative communities
Social networks · SNA
1
Introduction
Online creative communities are virtual groups whose members volunteer to collabo-
rate over the Internet to produce music, movies, games, and other cultural products [6].
Active feedback actions, such as commenting, are fundamental to the success of crea-
tive communities [5]. Comments encourage members to produce new artifacts or pro-
vide advice for improving existing content. Over time, comments also help build trust
between the authors of posts and commenters, facilitate the formation of groups of users
who share content and provide support [2] [3].
There has been a considerable amount of studies on social behavior in online com-
munities of software developers. For example, Xu et al. [8] consider two developers
socially related if they participate in the same project. Instead, Bird et al. [1] consider
developers related if there is evidence of email communication – an arguably more
direct evidence of an existing social link.
Although social networks of software developers have been comprehensively stud-
ied from different perspectives, how communication help shape members' behavior
within online artistic communities is relatively unexplored in previous research. Ac-
cordingly, we conducted an empirical study to investigate communication in a music
community where users collaborate online by first uploading new songs and then by
adding new tracks (e.g., sing over them, play another instrument, add audio effects), as
an extension of previous creative work. As the music community includes both authors,
who write songs, and music lovers, who play songs and give feedback to authors
through comments, we are interested in understanding how the communication activity
relates to (i) the songwriting activity and (ii) the establishment of links between authors
and commenters in the underlying social network.
Accordingly, we define the following research questions:
RQ1 - What are the properties of the community communication network?
RQ2 - Do authors and non-authors play different roles in the community communi-
cation network?
RQ3 – Is there a relationship between the communication and the songwriting ac-
tivity?
We address these research questions using a combination of social network analysis,
correlation analysis, and descriptive statistics of the activity traces left by community
members.
The remainder of this paper is organized as follows. In Section 2, we portray the
music community and build the underlying communication network. The results of the
analysis are reported in Section 3. Finally, we draw conclusions and outline future work
directions in Section 4.
2
Communication within the Community
Songtree 1 is a social platform for the collaborative creation and sharing of music
founded in 2015. It relies on a growing community of over 100,000 music enthusiasts
and musicians who contributed more than 37,000 songs. The platform is available both
on the web and as a mobile app. Musicians create their songs through an incremental,
collaborative process that starts with the sharing of a new song, which represents the
root of a song tree to be built collaboratively. Both the author of a new song as well as
other musicians in the community may contribute to collaborative creation by overdub-
bing, that is, recording new tracks over a baseline song, e.g., by playing new instru-
ments or adding voice, thus originating a new branch of the song tree (see Fig. 1).
In Songtree, we can distinguish two member profiles, namely authors and non-au-
thors. Authors contribute to the community by writing and sharing songs, either new
ones or overdubs. Every song in Songtree may originate a thread of discussions com-
posed of comments contributed by community members. Non-authors are users who
do not share any song but nonetheless enjoy listening to music. Non-authors may be
'lurkers,' who do not leave any sign of appreciation, or 'active'. The latter, in turn, are
divided into 'mute' who contribute to the community activities only by providing non-
1 http://songtr.ee
Fig. 1. An example of a song tree with root and derived songs/nodes.
written signals (e.g. liking, reposting), and 'commenters' who contribute by giving a
written feedback on others' songs (see Fig. 2).
Since the focus of the study is on the communication activity, we build a communi-
cation network based on the commenting activity of users, whether authors or just com-
menters.
To understand the nature of comments on a song, we performed a preliminary, qual-
itative investigation based on a sample of comments from the Songtree database. More
specifically, we extracted and manually analyzed the content of the discussion origi-
nated by 50 commented songs, randomly extracted from the dataset (described next).
We observed that in 92% of the cases comments were appreciations for the song; in 6%
of the comments we found a message directed to another commenter; the remaining 2%
were other types of comments. Based on this evidence, we can assume that comments
in Songtree are usually employed to provide feedback to the author of the song and,
therefore, we can represent communication within the community as a feedback net-
work.
Thus, we built the feedback network as a directed weighted graph where a link from
node B to A represents the action of user B commenting on one or more songs authored
by user A.
We focus on two social network analysis measures, that is, in-degree and out-de-
gree, which are indicators of the importance of an individual in a network [7]. The
number of incoming edges (in-degree) is a function of the number of different users an
Fig. 2. A conceptual model of the Songtree community.
author has received comments from, while the number of outcoming edges (out-degree)
is the number of different authors a user has provided comments to.
We built the dataset used for the current study from the entire SQL dump of Songtree
up to December 2016. We queried the database to extract some statistics concerning
the registered users and their songwriting and commenting activities. A breakdown of
the extracted data is reported in Table 1.
We retained in the final dataset only those songs with at least one comment (6,214
out of 20,531). Furthermore, comment threads related to a song often include replies
from the same author expressing gratitude towards other commenters. As such, self-
comments were removed from our final dataset, obtaining 18,154 out of 28,827 com-
ments. We also excluded from the final dataset those authors who commented only on
their own songs, totaling 1,051 (out of 5,520) authors who received comments from
other members, and 562 authors who commented on others' songs.
Finally, the data extracted from the final dataset were exported into TSV (Tab Sep-
arated Value), a compatible format for the Gephi2 tool, used for network graph building
and social network analysis. Fig. 3 shows the feedback network diagram of Songtree in
which the node size is proportional to the in-degree while the edge width is proportional
to the number of received comments.
2 https://gephi.org
Concept
Instances
Association
Instances
Song
New Song
Overdub
User
Author
Non-author
Lurker
Active
Mute
Commenter
37,300
16,769
20,531
111,276
5,520
105,756
102,470
3,286
2,496
790
Comment
Repost
Like
Bookmark
Play
28,827
817
38,787
4,714
566,103
Table 1. Data extracted from the Songtree dump.
Fig. 3. Feedback network diagram (nodes=6,310, edges=4,366).
3
Results
In this section, we report the results of our empirical analysis, grouped by research
question.
3.1
Properties of the Feedback Network
Results in Fig. 4 a-b show different types of users' behavior, according to a typical
power-law distribution. For the sake of completeness, we also report the distribution of
comments made and received by users in the network (see Fig. 4 c-d, respectively). As
common for online communities [4], the majority of community members send only a
few comments while there is a small group of members very active in commenting
other people's songs. Similarly, the great majority of members only receive a few com-
ments, while there is a small group of members who receive more than 500 comments.
This evidence suggests that the in-degree of a member is an indication of higher status
in the community, i.e., authors of popular songs receive more comments on the artifact
they share.
a)
c)
b)
d)
Fig. 4. Communication behavior in the Songtree community. Charts represent the distribution
of a) out-degree, b) in-degree, c) comments sent, and d) comments received.
Next, we examine the relationship between the number of comments sent by an au-
thor (i.e., a member that has posted at least one song) and her related in-degree. Con-
sidering those authors who both commented and received at least one comment
(n=405), we observe a moderate positive association between the two metrics, as de-
picted in Fig. 5 and further confirmed by the Spearman's rank coefficient equal to 0.6.
This evidence suggests that the commenting activity may contribute to increasing the
visibility of an author's artifacts in the network.
Fig. 5. How in-degree grows with number of comments sent by an author
3.2 Roles Played by Authors and Non-Authors in the Feedback Network
First, we analyzed whether there are differences in the commenting behavior of au-
thors and non-authors (see Table 2). Looking at the table, we observe that a higher
percentage of non-authors (94.3%) do not provide any comment. To assess the extent
of such percentages, we performed a chi-square test of independence, which reveals a
relationship between authorship and commenting activity (χ2= 3,890.3, p < 2.2e-16).
Frequency
Percent
No
One or more
comments
comments
Tot.
Authors
Non-authors
Tot.
4,958
4.5%
104,966
94.3%
109,924
98.8%
562
0.5%
790
0.7%
1,352
1.2%
5,520
5.0%
105,756
95.0%
111,276
100.0%
Table 2. Commenting activity: authors vs. non-authors.
We refine our analysis by comparing the commenting behavior of authors against
active users, thus excluding lurkers who may only be registered for curiosity without
ever returning a visit. From Table 3, we note that a higher percentage of authors (56.3%)
do not provide any comment compared to active users (28.3%). Also in this case, the
chi-square test of independence revealed a significant relationship between the catego-
ries in Table 3 (χ2= 304.48, p < 2.2e-16), indicating that active users are more inclined
to leave comments than authors.
Frequency
Percent
Authors
Active
Tot.
No
One or more
comments
comments
Tot.
4,958
56.3%
2,496
28.3%
7,454
84.6%
562
6.4%
790
9.0%
1,352
15.4%
5,520
62.7%
3,286
37.3%
8,806
100.0%
Table 3. Commenting activity: authors vs. active users.
3.3 Relationship Between Communication and Songwriting Activities
Since we analyze here the relationship between the commenting and songwriting activ-
ities, we run a correlation analysis restricted to authors only. We observe a weak
Spearman's rank correlation (r=0.36, n=5,520) between the number of comments sent
by a Songtree user and number of songs recorded (Fig. 6). Similar correlation values
are observed if we distinguish between new songs (r=0.33, n=4,756) and overdubs
(r=0.43, n=1,405), as shown respectively in Fig. 7 a and Fig. 7 b.
Fig. 6. Correlation between authors' commenting activity and songwriting activity.
a)
b)
Fig. 7. Correlation between a) authors' commenting activity and new-song writing activity; b)
authors' commenting activity and overdubbing activity.
4
Conclusions and Future Work
In this paper, we described a preliminary study aimed at mining the communication
activity of a music community for collaborative songwriting.
We found that the in-degree and out-degree measures of the feedback network ex-
hibit typical long-tailed, power-law distribution, meaning that a few members account
for the bulk of the comments sent and received. We also observed a moderate relation-
ship between the number of comments sent by an author and the number of different
people who commented to her songs (i.e., in-degree), meaning that comments may pos-
itively contribute to the visibility of author's creations. Besides, we analyzed the rela-
tion between communication and songwriting activity and found that active users, thus
excluding lurkers, are more inclined to provide feedback than authors.
Considering the variety of genres and people in the community, we intend to repli-
cate this analysis to study the relations among the different sub-communities built
around music genres (e.g., rock, hip-hop, classical). Besides, we will further investigate
the songwriting activity, specifically how collaborations take form and which are the
factors that increment the attractiveness of a song.
Acknowledgements.We thank Songtree for contributing their data. This work has been
partially supported by the project EmoQuest, funded by MIUR under the SIR program.
References
1.
2.
3.
4.
5.
6.
7.
8.
Bird C, Gourley A, Devanbu P, Gertz M, Swaminathan A (2006) Mining Email
Social Networks. In: Proc. 2006 Int. Work. Min. Softw. Repos. ACM, New
York, NY, USA, pp 137–143
Blau PM (1964) Exchange and power in social life. Transaction Publishers
Burke M, Settles B (2011) Plugged in to the Community: Social Motivators in
Online Goal-setting Groups. In: Proc. 5th Int. Conf. Communities Technol.
ACM, New York, NY, USA, pp 1–10
Newman MEJ (2003) The Structure and Function of Complex Networks.
SIAM Rev 45:167–256. doi: 10.1137/S003614450342480
Schultheiss D, Blieske A, Solf A, Staeudtner S (2013) How to Encourage the
Crowd? A Study About User Typologies and Motivations on Crowdsourcing
Platforms. In: Proc. 2013 IEEE/ACM 6th Int. Conf. Util. Cloud Comput. IEEE
Computer Society, Washington, DC, USA, pp 506–509
Settles B, Dow S (2013) Let's Get Together: The Formation and Success of
Online Creative Collaborations. In: Proc. SIGCHI Conf. Hum. Factors Comput.
Syst. ACM, New York, NY, USA, pp 2009–2018
Wasserman S, Faust K (1994) Social Network Analysis: Methods and
Applications. Sociology The Journal Of The British Sociol. Assoc. 8:xxxi, 825.
Xu J, Gao Y, Christley S, Madey G (2005) A Topological Analysis of the Open
Souce Software Development Community. In: Proc. 38th Annu. Hawaii Int.
Conf. Syst. Sci.
|
1201.1717 | 3 | 1201 | 2013-09-14T02:35:20 | On the Hyperbolicity of Small-World and Tree-Like Random Graphs | [
"cs.SI",
"cs.DM",
"physics.soc-ph"
] | Hyperbolicity is a property of a graph that may be viewed as being a "soft" version of a tree, and recent empirical and theoretical work has suggested that many graphs arising in Internet and related data applications have hyperbolic properties. We consider Gromov's notion of \delta-hyperbolicity, and establish several results for small-world and tree-like random graph models. First, we study the hyperbolicity of Kleinberg small-world random graphs and show that the hyperbolicity of these random graphs is not significantly improved comparing to graph diameter even when it greatly improves decentralized navigation. Next we study a class of tree-like graphs called ringed trees that have constant hyperbolicity. We show that adding random links among the leaves similar to the small-world graph constructions may easily destroy the hyperbolicity of the graphs, except for a class of random edges added using an exponentially decaying probability function based on the ring distance among the leaves.
Our study provides one of the first significant analytical results on the hyperbolicity of a rich class of random graphs, which shed light on the relationship between hyperbolicity and navigability of random graphs, as well as on the sensitivity of hyperbolic {\delta} to noises in random graphs. | cs.SI | cs |
On the Hyperbolicity of Small-World and
Tree-Like Random Graphs∗
Wei Chen
Microsoft Research Asia
[email protected]
Guangda Hu
Princeton University
[email protected]
Wenjie Fang
Ecole Normale Sup´erieure de Paris
[email protected]
Michael W. Mahoney
Stanford University
[email protected]
Abstract
Hyperbolicity is a property of a graph that may be viewed as being a "soft" version of a tree, and
recent empirical and theoretical work has suggested that many graphs arising in Internet and related data
applications have hyperbolic properties. Here, we consider Gromov's notion of δ-hyperbolicity, and we
establish several positive and negative results for small-world and tree-like random graph models. First,
we study the hyperbolicity of the class of Kleinberg small-world random graphs KSW (n, d, γ), where
n is the number of vertices in the graph, d is the dimension of the underlying base grid B, and γ is the
small-world parameter such that each node u in the graph connects to another node v in the graph with
probability proportional to 1/dB(u, v)γ with dB(u, v) being the grid distance from u to v in the base grid
B. We show that when γ = d, the parameter value allowing efficient decentralized routing in Kleinberg's
small-world network, with probability 1 − o(1) the hyperbolic δ is Ω((log n)
1.5(d+1)+ε ) for any ε > 0
independent of n. Comparing to the diameter of Θ(log n) in this case, it indicates that hyperbolicity is
not significantly improved comparing to graph diameter even when the long-range connections greatly
improves decentralized navigation. We also show that for other values of γ the hyperbolic δ is either at
the same level or very close to the graph diameter, indicating poor hyperbolicity in these graphs as well.
Next we study a class of tree-like graphs called ringed trees that have constant hyperbolicity. We show
that adding random links among the leaves in a manner similar to the small-world graph constructions
may easily destroy the hyperbolicity of the graphs, except for a class of random edges added using an
exponentially decaying probability function based on the ring distance among the leaves.
Our study provides one of the first significant analytical results on the hyperbolicity of a rich class of
random graphs, which shed light on the relationship between hyperbolicity and navigability of random
graphs, as well as on the sensitivity of hyperbolic δ to noises in random graphs.
1
Keywords: Complex networks, graph hyperbolicity, small-world networks, decentralized navigation
1 Introduction
Hyperbolicity, a property of metric spaces that generalizes the idea of Riemannian manifolds with negative
curvature, has received considerable attention in both mathematics and computer science. When applied to
∗This is the version to appear in the journal of Internet Mathematics.
1
graphs, one may think of hyperbolicity as characterizing a "soft" version of a tree -- trees have hyperbolicity
zero, and graphs that "look like" trees in terms of their metric structure have "small" hyperbolicity. Since
trees are an important class of graphs and since tree-like graphs arise in numerous applications, the idea
of hyperbolicity has received attention in a range of applications. For example, it has found usefulness in
the visualization of the Internet, the Web, and other large graphs [29, 30, 35, 34, 45]; it has been applied to
questions of compact routing, navigation, and decentralized search in Internet graphs and small-world social
networks [13, 10, 25, 1, 26, 5, 40]; and it has been applied to a range of other problems such as distance
estimation, network security, sensor networks, and traffic flow and congestion minimization [2, 17, 18, 19,
36, 12].
The hyperbolicity of graphs is typically measured by Gromov's hyperbolic δ [15, 7] (see Section 2). The
hyperbolic δ of a graph measures the "tree-likeness" of the graph in terms of the graph distance metric. It
can range from 0 up to the half of the graph diameter, with trees having δ = 0, in contrast of "circle graphs"
and "grid graphs" having large δ equal to roughly half of their diameters.
In this paper, we study the δ-hyperbolicity of families of random graphs that intuitively have some sort of
tree-like or hierarchical structure. Our motivation comes from two angles. First, although there are a number
of empirical studies on the hyperbolicity of real-world and random graphs [2, 17, 32, 31, 36, 12], there are
essentially no systematic analytical study on the hyperbolicity of popular random graphs. Thus, our work
is intended to fill this gap. Second, a number of algorithmic studies show that good graph hyperbolicity
leads to efficient distance labeling and routing schemes [8, 13, 11, 9, 27, 10], and the routing infrastructure
of the Internet is also empirically shown to be hyperbolic [2]. Thus, it is interesting to further investigate if
efficient routing capability implies good graph hyperbolicity.
To achieve our goal, we first provide fine-grained characterization of δ-hyperbolicity of graph families
relative to the graph diameter: A family of random graphs is (a) constantly hyperbolic if their hyperbolic δ's
are constant, regardless of the size or diameter of the graphs; (b) logarithmically (or polylogarithmically)
hyperbolic if their hyperbolic δ's are in the order of logarithm (or polylogarithm) of the graph diameters; (c)
weakly hyperbolic if their hyperbolic δ's grow asymptotically slower than the graph diameters; and (d) not
hyperbolic if their hyperbolic δ's are at the same order as the graph diameters.
We study two families of random graphs. The first family is Kleinberg's grid-based small-world ran-
dom graphs [22], which build random long-range edges among pairs of nodes with probability inverse
proportional to the γ-th power of the grid distance of the pairs. Kleinberg shows that when γ equals to
the grid dimension d, the number of hops for decentralized routing can be improved from Θ(n) in the
grid to O(polylog(n)), where n is the number of vertices in the graph. Contrary to the improvement in
decentralized routing, we show that when γ = d, with high probability the small-world graph is not poly-
logarithmically hyperbolic. We further show that when 0 ≤ γ < d, the random small-world graphs is not
hyperbolic and when γ > 3 and d = 1, the random graphs is not polylogarithmically hyperbolic. Although
there still exists a gap between hyperbolic δ and graph diameter at the sweetspot of γ = d, our results already
indicate that long-range edges that enable efficient navigation do not significantly improve the hyperbolicity
of the graphs.
The second family of graphs is random ringed trees. A ringed tree is a binary tree with nodes in each
level of the tree connected by a ring (Figure 1(d)). Ringed trees can be viewed as an idealized version of
hierarchical structure with local peer connections, such as the Internet autonomous system (AS) topology.
We show that ringed tree is quasi-isometric to the Poincar´e disk, the well known hyperbolic space repre-
sentation, and thus it is constantly hyperbolic. We then study how random additions of long-range links on
the leaves of a ringed tree affect the hyperbolicity of random ringed trees. Note that due to the tree base
structure, random ringed trees allow efficient routing within O(log n) steps using tree branches. Our results
2
show that if the random long-range edges between leaves are added according to a probability function that
decreases exponentially fast with the ring distance between leaves, then the resulting random graph is loga-
rithmically hyperbolic, but if the probability function decreases only as a power-law with ring distance, or
based on another tree distance measure similar to [23], the resulting random graph is not hyperbolic. Fur-
thermore, if we use binary trees instead of ringed trees as base graphs, none of the above augmentations is
hyperbolic. Taken together, our results indicate that δ-hyperbolicity of graphs is quite sensitive to both base
graph structures and probabilities of long-range connections.
To summarize, we provide one of the first significant analytical results on the hyperbolicity properties
of important families of random graphs. Our results demonstrate that efficient routing performance does not
necessarily mean good graph hyperbolicity (such as logarithmic hyperbolicity).
1.1 Related work
There has been a lot of work on search and decentralized search subsequent to Kleinberg's original work [22,
23], much of which has been summarized in the review [24].
In a parallel with this, there has been
empirical and theoretical work on hyperbolicity of real-world complex networks as well as simple ran-
dom graph models. On the empirical side, [2] showed that measurements of the Internet are negatively
curved; [17, 18, 19, 32, 31] provided empirical evidence that randomized scale-free and Internet graphs
are more hyperbolic than other types of random graph models; [36] measured the average δ and related
curvature to congestion; and [12] measured treewidth and hyperbolicity properties of the Internet. On the
theoretical side, one has [41, 19, 4, 37, 44, 42], among which [37, 44, 42] study Gromov hyperbolicity of
random graphs and are most relevant to our work. In [37], Narayan et al. study δ-hyperbolicity of sparse
Erdos-R´enyi random graphs G(n, p) where n is the number of vertices in the graph and p is the probability
of any pair of nodes has an edge, with p = c/n for some constant c > 1. They prove that with positive prob-
ability these graphs are not δ-hyperbolic for any positive constant δ (i.e. not constantly hyperbolic in our
definition). In [44], Tucci shows that random d-regular graphs are almost surely not constantly hyperbolic.
In [42], Shang shows that with non-zero probability the Newman-Watts small-world model [38] is not con-
stantly hyperbolic. These studies only investigate constant hyperbolicity on random graphs, while our study
moves beyond constant hyperbolicity and show whether certain random graph classes are logarithmically
hyperbolic, or not hyperbolic at all, comparing with the graph diameters. Moreover, the one dimensional
Newman-Watts small-world model studied in [42] is a special case of the Kleinberg small-world model we
studied in this paper (with dimension d = 1 and small-world parameter γ = 0). As given by Theorem 1 (2),
we show that with probability 1 − o(1) the hyperbolic δ of these random graphs is Ω(log n), where n is the
number of vertices in the graph. Therefore, our result is stronger than the result in [42] for this particular
case.
More generally, we see two approaches connecting hyperbolicity with efficient routing in graphs. One
approach study efficient computation of graph properties, such as diameters, centers, approximating trees,
and packings and coverings for low hyperbolic-δ graphs and metric spaces [9, 8, 13, 10, 11]. In large part,
the reason for this interest is that there are often direct consequences for navigation and routing in these
graphs [13, 10, 25, 1]. While these results are of interest for general low hyperbolic-δ graphs, they can be
less interesting when applied to small-world and other low-diameter random models of complex networks.
To take one example, [9] provides a simple construction of a distance approximating tree for δ-hyperbolic
graphs on n vertices; but the O(log n) additive-error guarantee is clearly less interesting for models in which
the diameter of the graph is O(log n). Unfortunately, this O(log n) arises for a very natural reason in the
analysis, and it is nontrivial to improve it for popular tree-like complex network models.
Another approach taken by several recent papers is to build random graphs from hyperbolic metric
3
spaces and then shows that such random graphs lead to several common properties of small-world complex
networks, including good navigability properties [5, 40, 27, 28]. While assuming a low hyperbolicity metric
space to build random graphs in these studies makes intuitive sense, it is difficult to prove nontrivial results
on the Gromov's δ of these random graphs even for simple random graph models that are intuitively tree-like.
Understanding the relationship between these two approaches was one of the original motivations of
our research. In particular, the difficulties in the above two approaches lead us to study hyperbolicity of
small-world and tree-like random graphs.
Finally, ideas related to hyperbolicity have been applied in numerous other networks applications, e.g.,
to problems such as distance estimation, network security, sensor networks, and traffic flow and congestion
minimization [43, 20, 21, 18, 36, 3], as well as large-scale data visualization [34]. The latter applications
typically take important advantage of the idea that data are often hierarchical or tree-like and that there is
"more room" in hyperbolic spaces of dimension 2 than Euclidean spaces of any finite dimension.
Paper organization.
In Section 2 we provide basic concepts and terminologies on hyperbolic spaces and
graphs that are needed in this paper. In Sections 3 and 4 we study the hyperbolicity of small-world random
graphs and ringed tree based random graphs. For ease of reading, in each of Sections 3 and 4 we first sum-
marize our technical results together with their implications (Sections 3.1 and 4.1), then provide the outline
of the analyses (Sections 3.2 and 4.2), followed by the detailed technical proofs (Sections 3.3 and 4.3), and
finally discuss extensions of our results to other related models (Sections 3.4 and 4.4). We discuss open
problems and future directions related to our study in Section 5.
2 Preliminaries on hyperbolic spaces and graphs
Here, we provide basic concepts concerning hyperbolic spaces and graphs used in this paper; for more
comprehensive coverage on hyperbolic spaces, see, e.g., [7].
2.1 Gromov's δ-hyperbolicity
In [15], Gromov defined a notion of hyperbolic metric space; and he then defined hyperbolic groups to be
finitely generated groups with a Cayley graph that is hyperbolic. There are several equivalent definitions (up
to a multiplicative constant) of Gromov's hyperbolic metric space [6]. In this paper, we will mainly use the
following.
Definition 1 (Gromov's four-point condition). In a metric space (X, d), given u, v, w, x with d(u, v) +
d(w, x) ≥ d(u, x) + d(w, v) ≥ d(u, w) + d(v, x) in X, we note δ(u, v, w, x) = (d(u, v) + d(w, x) −
d(u, x) − d(w, v))/2. (X, d) is called δ-hyperbolic for some non-negative real number δ if for any four
points u, v, w, x ∈ X, δ(u, v, w, x) ≤ δ. Let δ(X, d) be the smallest possible value of such δ, which can
also be defined as δ(X, d) = supu,v,w,x∈X δ(u, v, w, x).
Given an undirected, unweighted and connected graph G = (V, E), one can view it as a metric space
(V, dG), where dG(u, v) denotes the (geodesic) graph distance between two vertices u and v. Then, one can
apply the above four point condition to define its δ-hyperbolicity, which we denote δ = δ(G) = δ(V, dG)
(and which we sometimes refer to simply as the hyperbolicity or the δ of the graph). Trees are 0-hyperbolic;
and 0-hyperbolic graphs are exactly clique trees (or called block graphs), which can be viewed as cliques
connected in a tree fashion [16]. Thus, it is often helpful to view graphs with a low hyperbolic δ as "thick-
ened" trees, or in other words, as tree-like when viewed at large size scales.
4
If we let D(G) denote the diameter of the graph G, then, by the triangle inequality, we have δ(G) ≤
D(G)/2. We will use the asymptotic difference between the hyperbolicity δ(G) and the diameter D(G) to
characterize the hyperbolicity of the graph G.
Definition 2 (Hyperbolicity of a graph). For a family of graphs G with diameter D(G), G ∈ G going to
infinity as the size of G grows to infinity, we say that graph family G is constantly (resp. logarithmically,
polylogarithmically, or weakly) hyperbolic, if δ(G) = O(1) (resp. O(log D(G)), O((log D(G))c) for some
constant c > 0, or o(D(G))) when D(G) goes to infinity; and G is not hyperbolic if δ(G) = Θ(D(G)),
where G ∈ G.
The above definition provides more fine-grained characterization of hyperbolicity of graph families than one
typically sees in the literature, which only discusses whether or not a graph family is constantly hyperbolic.
This definition does not address the hyperbolicity of graph families where the diameter stays bounded while
the size of the graph goes unbounded. For these graph families, one may probably need tight analysis on the
constant factor between the hyperbolic δ and the graph diameter, and it is out of the scope of this paper.
2.2 Rips condition
Rips condition [15, 7] is a technically equivalent condition to the Gromov's four point condition up to a
constant factor. We use the Rips condition when analyzing the δ-hyperbolicity of ringed trees. In a metric
space (X, d), we define a geodesic segment [u, v] between two points u, v to be the image of a function ρ :
[0, d(u, v)] → [u, v] satisfying ρ(0) = u, ρ(d(u, v)) = v, d(ρ(s), ρ(t)) = s − t for any s, t ∈ [0, d(u, v)].
We say that a metric space is geodesic if every pair of its points has a geodesic segment, not necessarily
unique. In a geodesic metric space (X, d), given u, v, w in X, we denote ∆(u, v, w) = [u, v]∪[v, w]∪[w, u]
a geodesic triangle.
[u, v], [v, w], [w, u] are called sides of ∆(u, v, w). We should note that, in general,
geodesic segments and geodesic triangles are not unique up to their endpoints.
In a metric space, it is sometimes convenient to consider distances between point sets in the following
way. We say that a set S is within distance d to another set T if S is contained in the ball B(T, d) of all
points within distance d to some point in T . We say that S and T are within distance d to each other if S is
within distance d to T and vice versa.
Definition 3 (Rips condition). A geodesic triangle ∆(u, v, w) in a geodesic metric space (X, d) is called
δ-slim for some non-negative real number δ if any point on a side is within distance δ to the union of the
other two sides. (X, d) is called Rips δ-hyperbolic if every geodesic triangle in (X, d) is δ-slim. We denote
δRips(X, d) the smallest possible value of such δ (could be infinity).
It is known (see, e.g., [14, 7, 9]) that δ(X, d) and δRips(X, d) differ only within a multiplicative constant.
In particular, δ(X, d) ≤ 8δRips(X, d) and δRips(X, d) ≤ 4δ(X, d). Since we are only concerned with
asymptotic growth of δ(X, d), Rips condition can be used in place of the Gromov's four point condition.
For an undirected unweighted graph G = (V, E), we can also treat it as a geodesic metric space with
every edge interpreted as a segment of length 1, and thus use the Rips condition to define its hyperbolicity,
which we denote as δRips(G). Note that in the case of unweighted graph, when considering the distance
between two geodesics on the graph, we only consider the distance among the vertices, since other points
on the edges can add at most 2 to the distance between vertices.
2.3 Poincar´e disk
The Poincar´e disk (see Figure 1(a) for an illustration) is a well-studied hyperbolic metric space. Although
in this paper we touch upon it only briefly when we study ringed-tree graphs, it is useful to convey intuition
5
(a) Poincar´e disk
(b) Tessellation
of Poincar´e
disk
(c) Binary tree
(d) Ringed tree
Figure 1: Poincar´e disk, its tessellation, a binary tree, and a ringed tree.
about hyperbolicity and tree-like behavior.
Definition 4. Let D = B(0, 1) be a open disk on the complex plane with origin 0 and radius 1, with the
following distance function:
(cid:18)
2(cid:107)u − v(cid:107)2
(1 − (cid:107)u(cid:107)2)(1 − (cid:107)v(cid:107)2)
(cid:19)
.
d(u, v) = arccosh
1 +
(D, d) is a metric space. We call it the Poincar´e disk.
Visually, a (hyperbolic) line in the Poincar´e disk is the segment of a circle in the disk that is perpendicular to
the circular boundary of the disk, and thus all lines bend inward towards the origin. The hyperbolic distance
between two points in the disk of fixed distance in the complex plane increase exponentially fast when they
moves towards the boundary of the disk, meaning that there is much more "space" towards the boundary
than around the origin. This can be seen from a tessellation of the Poincar´e disk, as shown in Figure 1(b).
2.4 Quasi-isometry
Quasi-isometry, defined as follows, is a concept used to capture the large-scale similarity between two metric
spaces.
Definition 5 (Quasi-isometry). For two metric spaces (X, dX ), (Y, dY ), we say that f : X → Y is a
(λ, )-quasi-isometric embedding from X to Y if for any u, v ∈ X,
dX (u, v) − ≤ dY (f (u), f (v)) ≤ λdX (u, v) + .
1
λ
Furthermore, if the neighborhood of f (Y ) covers X, then we say that f is a (λ, )-quasi-isometry. More-
over, we say that X, Y are quasi-isometric if such a (λ, )-quasi-isometry exists for some constants λ and .
If two metric spaces are quasi-isometric with some constant, then they have the same "large-scale" behavior.
For example, the d-dimensional grid Zd and the d-dimensional Euclidean space Rd are quasi-isometric,
√
√
d/2)-quasi-isometric embedding (x, y) (cid:55)→ (x, y). As a second example, consider an
realized by the (
infinite ringed-tree: start with a binary tree (illustrated in Figure 1(c)) and then connect all vertices at a given
tree level into a ring. This is defined more formally in Section 4, but an example is illustrated in Figure 1(d).
d,
6
As we prove in Section 4, the infinite ringed tree is quasi-isometric to the Poincar´e disk -- thus it may be
equivalently viewed as a "softened" binary tree or as a "coarsened" Poincar´e disk.
Quasi-isometric embeddings have the important property of preserving hyperbolicity, up to a constant
factor, as given by the following proposition.
Proposition 1 (Theorem 1.9, Chapter III.H of [7]). Let X and X(cid:48) be two metric spaces and let f : X(cid:48) → X
be a (λ, )-quasi-isometric embedding. If X is δ-hyperbolic, then X(cid:48) is δ(cid:48)-hyperbolic, where δ(cid:48) is a function
of δ, λ, and .
3 δ-hyperbolicity of grid-based small-world graphs
In this section, we consider the δ-hyperbolicity of graphs constructed according to the small-world graph
model as formulated by Kleinberg [22], in which long-range edges are added on top of a base grid, which is
a discretization of a low-dimensional Euclidean space.
The model starts with n vertices forming a d-dimensional base grid (with wrap-around). More precisely,
given positive integers n and d such that n1/d is also an integer, let B = (V, E) be the base grid, with
V = {(x1, x2, . . . , xd) xi ∈ {0, 1, . . . , n1/d − 1}, i ∈ [d]}, E = {((x1, x2, . . . , xd), (y1, y2, . . . , yd))
∃j ∈ [d], yj = xj + 1 mod n1/d or yj = xj − 1 mod n1/d,∀i (cid:54)= j, yi = xi}. Let dB denote the graph
distance metric on the base grid B. We then build a random graph G on top of B, such that G contains
all vertices and all edges (referred to as grid edges) of B, and for each node u ∈ V , it has one long-range
edge (undirected) connected to some node v ∈ V , with probability proportional to 1/dB(u, v)γ, where
γ ≥ 0 is a parameter. We refer to the probability space of these random graphs as KSW (n, d, γ); and
we let δ(KSW (n, d, γ)) denote the random variable of the hyperbolic δ of a randomly picked graph G
in KSW (n, d, γ). Recall that Kleinberg showed that the small-world graphs with γ = d allow efficient
decentralized routing (with O(log2 n) routing hops in expectation), whereas graphs with γ (cid:54)= d do not allow
any efficient decentralized routing (with Ω(nc) routing hops for some constant c) [22]; and note that the
base grid B has large hyperbolic δ, i.e., δ(B) = Θ(n1/d) = Θ(D(B)). Intuitively, the structural reason for
the efficient routing performance at γ = d is that long-range edges are added "hierarchically" such that each
node's long-range edges are nearly uniformly distributed over all "distance scales".
3.1 Results and their implications
The following theorem summarizes our main technical results on the hyperbolicity of small-world graphs
for different combinations of d and γ.
Theorem 1. With probability 1 − o(1) (when n goes to infinity), we have
1. δ(KSW (n, d, γ)) = Ω((log n)
2. δ(KSW (n, d, γ)) = Ω(log n) when d ≥ 1 and 0 ≤ γ < d; and
1
1.5(d+1)+ε ) when d ≥ 1 and γ = d, for any ε > 0 independent of n;
3. δ(KSW (n, d, γ)) = Ω(n
γ−2
γ−1−) when d = 1 and γ > 3, for any > 0 independent of n.
This theorem, together with the results of [22] on the navigability of small-world graphs, have several
implications. The first result shows that when γ = d, with high probability the hyperbolic δ of the small-
world graphs is at least c(log n)
1.5(d+1) for some constant c. We know that the diameter is Θ(log n) in
expectation when γ = d [33]. Thus the small-world graphs at the sweetspot for efficient routing is not
1
7
polylogarithmically hyperbolic, i.e., δ is not O(logc log n)-hyperbolic for any constant c > 0. However,
there is still a gap between our lower bound the upper bound provided by the diameter, and thus it is still open
whether small-world graphs are weakly hyperbolic or not hyperbolic. Overall, though, our result indicates
no drastic improvement on the hyperbolicity (relative to the improvement of the diameter) for small-world
graphs at the sweetspot (where a dramatic improvement was obtained for the efficiency of decentralized
routing).
The second result shows that when γ < d, then δ = Ω(log n). The diameter of the graph in this case
is Θ(log n) [33]; thus, we see that when γ < d the hyperbolic δ is asymptotically the same as the diameter,
i.e., although δ decreases as edges are added, small-world graphs in this range are not hyperbolic. The third
result concerns the case γ > d, in which case the random graph degenerates towards the base grid (in the
sense that most of all of the long-range edges are very local), which itself is not hyperbolic. For the general
γ, we show that for the case of d = 1 the hyperbolic δ is lower bounded by a (low-degree) polynomial
of n; this also implies that the graphs in this range are not polylogarithmically hyperbolic. Note that our
polynomial exponent γ−2
γ−1 − matches the diameter lower bound proven in [39].
3.2 Outline of the proof of Theorem 1
In this subsection, we provide a summary of the proof of Theorem 1. In our analysis, we use two different
techniques, one for the first two results in Theorem 1, and the other for the last result; in addition, for the
first two results, we further divide the analysis into the two cases d ≥ 2 and d = 1.
When d ≥ 2 and 0 ≤ γ ≤ d, the main idea of the proof is to pick a square grid of size (cid:96)0 (it does not
matter in which dimension the square is picked from). We know that when only grid distance is considered,
the four corners of the square grid have the Gromov δ value equal to (cid:96)0. We will show that, as long as (cid:96)0 is
1.5(d+1)+ε ) when γ = d and O(log n) when 0 ≤ γ < d), the probability
not very large (to be exact, O((log n)
that any pair of vertices on this square grid have a shortest path shorter than their grid distance after adding
long-range edges is close to zero (as n tends to infinity). Therefore, with high probability, the four corners
selected have Gromov δ as desired in the lower bound results.
1
To prove this result, we study the probability that any pair of vertices u and v at grid distance (cid:96) are
connected with a path that contains at least one long-range edge and has length at most (cid:96). We upper bound
such (cid:96)'s so that this probability is close to zero. To do so, we first classify such paths into a number of
categories, based on the pattern of paths connecting u and v: how it alternates between grid edges and
long-range edges, and the direction on each dimension of the grid edges and long-range edges (i.e., whether
it is the same direction as from u to v in this dimension, or the opposite direction, or no move in this
dimension). We then bound the probability of existing a path in each category and finally bound all such
paths in aggregate. The most difficult part of the analysis is the bounding of the probability of existing a
path in each category.
For the case of d = 1 and 0 ≤ γ ≤ d, the general idea is similar to the above. The difference is that we
do not have a base square to start with. Instead, we find a base ring of length Θ((cid:96)0) using one long-range
edges e0, where (cid:96)0 is fixed to be the same as the case of d ≥ 2. We show that with high probability, (a) such
an edge e0 exists, and (b) the distance of any two vertices on the ring is simply their ring distance. This is
enough to show the lower bound on the hyperbolic δ.
For the case of γ > 3 and d = 1, a different technique is used to prove the lower bound on hyperbolic
δ. We first show that, in this case, with high probability all long-range edges only connect two vertices with
ring distance at most some (cid:96)0 = o(
n). Next, on the one dimensional ring, we first find two vertices A
and B at the two opposite ends on the ring. Then we argue that there must be a path P +
AB that only goes
√
8
through the clockwise side of ring from A to B, while another path P−
AB that only goes through the counter-
clockwise side of the ring from A to B, and importantly, the shorter length of these two paths are at most
AB and P−
O((cid:96)0) longer than the distance between A and B. We then pick the middle point C and D of P +
AB,
respectively, and argue that the δ value of the four points A, B, C, and D give the desired lower bound.
3.3 Detailed proof of Theorem 1
3.3.1 The case of d ≥ 2 and 0 ≤ γ ≤ d
For this case, let n(cid:48) = n1/d be the number of vertices on one side of the grid. For convenience, our main
analysis for this case uses n(cid:48) instead of n.
Lemmas for calculation. We first provide a couple of lemmas used in our probability calculation.
Lemma 1. There exists a constant c1, such that for any k, m ∈ Z+, we have
(cid:88)
y1+···+yk =m
y1,...,yk∈Z+
1
y1y2 ··· yk
≤ (c1 ln m)k−1
m
,
where the left side is considered to be 0 for k > m; and for k = m = 1, the right side 00 is considered to
be 1.
(cid:88)
Proof. For k = 1, it is trivial. For k = 2, we have
(cid:98)m/2(cid:99) · (cid:100)m/2(cid:101) + ··· +
≤ 2
1
1
y1y2
(cid:18)
y1+y2=m
y1,y2∈Z+
(cid:19)
(cid:18) 1
(cid:100)m/2(cid:101) + ··· +
1
1
(cid:19)
1
(m − 1) · 1
≤ 2
(cid:98)m/2(cid:99)
< c1
ln m
m
,
where c1 is roughly 4.
Suppose the lemma holds for k − 1, with k ≥ 3. The induction hypothesis is
(cid:88)
y1+···+yk−1=m
y1,...,yk−1∈Z+
1
y1y2 ··· yk−1
≤ (c1 ln m)k−2
m
,
Since the logarithm function is increasing, we have
(cid:88)
y1+···+yk =m
y1,...,yk∈Z+
1
y1y2 ··· yk
≤ 1
1
(c1 ln(m − 1))k−2
m − 1
≤ (c1 ln m)k−2 · (cid:88)
1
y1y2
+ ··· +
1
m − 1
(c1 ln 1)k−2
1
y1+y2=m
y1,y2∈Z+
≤ (c1 ln m)k−2 · c1 ln m
.
m
Therefore the inequality holds for all k.
9
Lemma 2. For any constant θ ∈ R with 0 ≤ θ < 1, there exists a constant c2 (may only depend on θ), such
that for any constants k, n(cid:48) ∈ Z+, m ∈ R, and non-zero λ1, λ2, . . . , λk ∈ R, we have
(cid:88)
λ1y1+···+λk yk =m
y1,...,yk∈{1,2,...,n(cid:48)}
1
2 ··· yθ
1yθ
yθ
k
≤ (c2n(cid:48))(k−1)(1−θ),
where the left side is considered to be 0 if there is no y1, y2, . . . , yk ∈ {1, 2, . . . , n(cid:48)} satisfying λ1y1 +λ2y2 +
··· + λkyk = m.
Proof. For each tuple (y1, y2, . . . , yk−1) ∈ {1, 2, . . . , n(cid:48)}k−1, there is at most one yk ∈ {1, 2, . . . , n(cid:48)}
satisfying λ1y1 + λ2y2 + ··· + λkyk = m. Since 1
≤ 1 because 0 ≤ θ < 1, we have
(cid:88)
λ1y1+···+λk yk =m
y1,...,yk∈{1,2,...,n(cid:48)}
yθ
k
1
2 ··· yθ
1yθ
yθ
k
≤
=
(cid:32) n(cid:48)(cid:88)
i=1
(cid:88)
(cid:33)k−1
1
iθ
y1,...,yk−1∈{1,2,...,n(cid:48)}
1
2 ··· yθ
1yθ
yθ
k−1
≤ (c2n(cid:48))(k−1)(1−θ),
where c2 is roughly ( 1
1−θ )
1
1−θ . Therefore the lemma is proved.
Classification of paths.
grid edges, which are edges on the grid, and long-range edges, which are randomly added.
In a d-dimensional random graph KSW (n, d, γ), there are two kinds of edges:
Fix two vertices u and v, a path from u to v may contain some long-range edges and some grid edges.
We divide the path into several segments along the way from u to v: (a) each segment is either one long-
range edge (called a long-range segment) or a batch of consecutive grid edges (called a grid segment); and
(b) two consecutive segments cannot be both grid segments (otherwise combining them into one segment).
We use a d-dimensional vector to denote each edge, so that the source coordinate plus this vector
equals to the destination coordinate module n(cid:48). For grid with wrap-around, there may be multiple vec-
tors corresponding to one edge. We choose the vector in which every element is from {−(cid:98) n(cid:48)
2 (cid:99) +
2 (cid:99)}. In this way, the vector representation of each edge is unique and the absolute value of every
1, . . . ,(cid:98) n(cid:48)−1
dimension is the smallest. We call this the edge vector of that edge. For every segment in the path, we call
the summation (not module n(cid:48)) of all edge vectors the segment vector. For a vector (x1, x2, . . . , xd), define
its sign pattern as (sgn(x1), sgn(x2), . . . , sgn(xd)).
2 (cid:99),−(cid:98) n(cid:48)
We say two paths from u to v belong to the same category if (a) they have the same number of segments;
(b) their corresponding segments are of the same type (long-range or grid segments); (c) for every pair of
corresponding long-range segments in the two paths, the sign patterns of their segment vectors are the same;
(d) for every pair of corresponding grid segments in the two paths, their segment vectors are equal; and (e)
the summations (not module n(cid:48)) of all segment vectors in the two paths are equal.
The last condition is only used to distinguish paths that go different rounds in each dimension on grid
with wrap-around.
In one category, there exist paths of which the long-range edges are identical but the grid edges may be
different. To compute the probability of existing a path in a category, we only need to consider one path
among the paths with identical long-range edges, since grid edges do not change probabilistic events and
thus one such path exists if any only if other such paths exist.
10
We also assume that there are no repeated long-range edges in every path. For a path that has repeated
long-range edges, we can obtain a shorter subpath without any repeated long-range edges so that the original
path exists if and only if the new one exists. Since we are going to calculate the probability about paths not
exceeding some length, it is safe to only consider paths without repeated long-range edges.
Lemma 3. There exists a constant c3 (dependent on d) such that for any fixed (cid:96), the number of categories
of paths from u to v of length (cid:96) is at most c3
(cid:96).
Proof. For each edge on the path, if it is a grid edge, it could be in one of the d dimensions, and in each
dimension it could be in one of the two opposite directions, and thus a grid edge has 2d possibilities. If
the edge is a long-range edge, on each dimension its sign has three possibilities (+1, 0,−1), so totally 3d
possibilities for the sign pattern of the long-range segment vector. Moreover, in the grid with wrap-around,
we consider each wrap-around of the path on some dimension to be one round in that dimension. Then the
path can go at most 2(cid:96) + 1 different numbers of rounds on each dimension (ranging from (cid:96) rounds in one
direction up to (cid:96) rounds in the other direction), so the summation of all segment vectors has at most (2(cid:96)+1)d
different values. The choice of each edge out of 2d + 3d possibilities and the total summation of segments
vectors determine a category. Therefore, the number of categories is bounded by (2d + 3d)(cid:96)(2(cid:96) + 1)d < c3
(cid:96)
for some c3.
The above bound on the number of categories is not tight enough to be used for later analysis, when
the number of long-range segments are small. Thus, we further bound the number of categories in the
following way.
Lemma 4. There exists a constant c4 (dependent on d), such that for any fixed (cid:96) < n(cid:48) and k with 1 ≤ k ≤ (cid:96),
the number of categories of paths from u to v of length (cid:96) and having k long-range segments is at most
k(cid:96)(k+1)(d+1)/kkd.
c4
Proof. For a path from u to v of length (cid:96) and containing k long-range segments (1 ≤ k ≤ (cid:96) < n(cid:48)), the
summation of all segment vectors has at most (2k + 1)d choices. This is because the path can go at most
2k + 1 different number of rounds on each dimension (k rounds in one direction to k rounds in the other
direction). We consider the number of categories for a fixed summation of segment vectors first.
Suppose there are t grid segments, each having a1, a2, . . . , at edges respectively (t ≤ k + 1, ai ≥ 1,
a1 + a2 + ··· + at < (cid:96)). If t = 0, then k = (cid:96), and it is easy to see that there are at most (3d)k categories.
Suppose now t ≥ 1. For the i-th grid segment with ai grid edges, its segment vector is such that on each
dimension the only possible values are −ai,−ai + 1, . . . , 0, . . . , ai − 1, ai. Thus, the number of possible
segment vectors is (2ai + 1)d ≤ 3dad
i . Since each long-range edge has 3d possible sign patterns, the number
i < 9(k+1)d((cid:96)/t)td, where the inequality
of categories for fixed t and a1, a2, . . . , at is at most (3d)k(cid:81)t
i=1 3dad
of arithmetic and geometry means is used.
The tuple (a1, a2, . . . , at) has less than (cid:96)t possibilities. Considering (2k + 1)d different possibilities
of segment vectors summations, the total number of categories from u to v with length (cid:96) and containing k
11
long-range edges is at most
(2k + 1)d
< (2k + 1)d
= (2k + 1)d
(cid:40)
(cid:26)
(cid:26)
(cid:41)
(cid:96)t · 9(k+1)d((cid:96)/t)td
k+1(cid:88)
t=1
(3d)k +
3dk + (k + 1)9(k+1)d max
{(cid:96)t((cid:96)/t)td}
3dk + (k + 1)9(k+1)d(cid:96)k+1(
)(k+1)d
1≤t≤k+1
(cid:96)
k + 1
(cid:27)
(cid:27)
< ck
4 · (cid:96)(k+1)(d+1)
,
kkd
where c4 is a constant depending only on d.
Probability calculation. We first give a lemma to calculate the probability of the existence of a specific
edge. For an integer x, we define x to be x if x (cid:54)= 0 and 1 if x = 0. We also define function f (n(cid:48)) as
follows:
(cid:40)
f (n(cid:48)) =
ln n(cid:48)
(n(cid:48))d−γ
γ = d,
0 ≤ γ < d.
Lemma 5. For two vertices u and v, the probability of the existence of a long-range undirected edge between
u and v is at most c5(x1 · x2 ··· xd)− γ
d /f (n(cid:48)), where c5 is a constant depending only on d and γ, and
(x1, x2, . . . , xd) is the edge vector if there exists a long-range edge from u to v and depends only on u
and v.
Proof. Say the non-zero elements of (x1, x2, . . . , xd) are (xi1, xi2, . . . , xid(cid:48) ) (d(cid:48) ≤ d). Let p be the proba-
bility to add an edge from u to v. Then
p =
(x1 + x2 + ··· + xd)−γ
Θ((cid:80)n(cid:48)
(cid:32)xi1 · xi2 ··· xid(cid:48)− γ
(cid:80)n(cid:48)
id−1
iγ )
(cid:33)
i=1 id−1−γ
i=1
d
≤ O
= O
= O
(cid:33)
(cid:32)xi1 · xi2 ··· xid(cid:48)− γ
(cid:80)n(cid:48)
(cid:33)
(cid:32)
(cid:80)n(cid:48)
i=1 id−1−γ
(x1 · x2 ··· xd)− γ
i=1 id−1−γ
d
d(cid:48)
= O
(cid:32)
(x1 · x2 ··· xd)− γ
d
f (n(cid:48))
(cid:33)
.
Moreover, the edge may also be from v to u, which also has probability p. By union bound the proba-
bility of the undirected edge (u, v) is O(p).
The following lemma gives the probability that one edge jumps within a local area.
Lemma 6. For a vertex u and a long-range edge (u, v) from u, the probability that the grid distance between
u, v is less than s is at most c6f (s)/f (n(cid:48)), where c6 is a constant depending only on d and γ.
Proof. By union bound, the probability is at most
(cid:32) s(cid:88)
O
(cid:33)
id−1 i−γ
f (n(cid:48))
= O
id−1−γ
f (n(cid:48))
≤ c6
f (s)
f (n(cid:48))
,
(cid:33)
where c6 is a constant.
i=1
(cid:32) s(cid:88)
i=1
12
Given a path category C, we now calculate the probability of existing a path in C.
Lemma 7. Given a path category C with length (cid:96) and k long-range edges. The probability that there exists
a path in C is at most
ck
7kk)d(cid:46)
5(ck
5c(k−1)(d−γ)
ck
2
(ln n(cid:48))k
(cid:46)
(n(cid:48))d−γ
γ = d,
0 ≤ γ < d,
where c2 and c5 are the constants given in Lemma 5 and c7 is another constant.
Proof. Let the segment vectors of the long-range edges in a path P ∈ C be
(x11, x12, . . . , x1d), (x21, x22, . . . , x2d), . . . , (xk1, xk2, . . . , xkd).
By our definition of a category, all paths in C have the same sign patterns on the corresponding long-range
segment vectors. Thus, we can define the following sets for the category C: A+
i = {j xji > 0, 1 ≤ j ≤ k},
A−
i = {j xji < 0, 1 ≤ j ≤ k}, and A0
i = {j xji = 0, 1 ≤ j ≤ k}, for all 1 ≤ i ≤ d. For fixed u and
v, there is a fixed vector (t1, t2, . . . , td) such that the summation of the segment vectors of all long-range
segments in any P ∈ C is vector (t1, t2, . . . , td). This is because the summation of all segment vectors
from u to v is fixed, and all grid segments have the fixed segment vectors. Therefore, a path in C can be
characterized by kd integers x11, . . . , xkd satisfying the following for all 1 ≤ i ≤ d:
xji ∈ {1, . . . , n(cid:48)}
xji ∈ {−n(cid:48), . . . ,−1}
xji = 0
xji − (cid:88)
(cid:88)
j∈A+
i
j∈A−
i
for j ∈ A+
i ,
for j ∈ A−
i ,
for j ∈ A0
i ,
xji = ti.
(1)
The probability that some path exists is the multiplication of the probability of the first edge, the probability
of the second edge conditioned on the existence of the first edge, the probability of the third edge conditioned
on the existence of the first two edge, etc. In our model, the probability of an (undirected) edge conditioned
on the existence of other (undirected) edges is less than or equal to the probability without condition, because
each vertex can only connect to exact one other vertex (when considering the edge direction). Hence we can
use the multiplication of the probabilities of all edges as an upper bound of the probability of a path. By
13
union bound and Lemma 5, the probability that a path exists in C is at most
k(cid:89)
j=1
x11,...,xkd:
satisfying (1)
k(cid:89)
(cid:88)
j=1
(cid:40)
(cid:88)
all paths in C
≤
ck
5
f k(n(cid:48))
· d(cid:89)
· d(cid:89)
i=1
i=1
=
=
ck
5
f k(n(cid:48))
ck
5
f k(n(cid:48))
c5(xj1 · xj2 ··· xjd)− γ
d
f (n(cid:48))
(xj1 · xj2 ··· xjd)− γ
d
(cid:88)
x1i,...,xki: (cid:80)
xji− (cid:80)
j∈A−
(cid:88)
∪A−
, xji=1; for j∈A+
j∈A+
i
i
i
i
for j∈A0
i
xji=ti;
, xji∈{1,...,n(cid:48)}
(cid:17)− γ
d
xji
(cid:16) k(cid:89)
(cid:16) (cid:89)
j=1
(cid:17)− γ
d
(cid:41)
.
(2)
xji
The inner brace summation is considered to be 1 for A+
for disjoint sets A+, A− ⊆ {1, 2, . . . , k} (at least one is not empty) and numbers t ∈ Z, γ ≥ 0, d ≥ 0,
i = ∅. Now we consider the following sum
i = A−
(cid:80)
j∈A+
i
xji− (cid:80)
xji (j ranges in A+
i
j∈A−
i
∪A−
):
xji=ti; and xji∈{1,...,n(cid:48)}
i
j∈A+
i ∪A−
i
(cid:88)
(cid:80)
j∈A+
yj− (cid:80)
yj (j ranges in A+∪A−):
j∈A− yj =t; and yj∈{1,2,...,n(cid:48)}
(cid:89)
j∈A+∪A−
− γ
d
yj
.
(3)
• Case γ = d.
If one of A+ and A− is ∅, we only need to consider the case that t (cid:54)= 0, because the sum (3) is 0 for
t = 0. By Lemma 1, the sum (3) is bounded by
(lnt)k
t ≤ ck
1 max
x≥1
ck
1
{ (ln x)k
x
} = (c1k/e)k.
If neither A+ nor A− is ∅, we assume that t ≥ 0. (The calculation for t < 0 is similar if we exchange
14
1(cid:81)
j∈A+
yj
(cid:88)
(cid:80)
1(cid:81)
yj
yj =s+t
j∈A+
j∈A−
· (c1 ln(s + t))A+−1
s + t
A+ and A−.) By Lemma 1 the sum (3) is bounded by
(cid:80)
j∈A−
(c1 ln s)A−−1
yj =s
s=1
(cid:88)
kn(cid:48)(cid:88)
≤ kn(cid:48)(cid:88)
kn(cid:48)(cid:88)
kn(cid:48)(cid:88)
≤ ck
s=1
s=1
s
1
= ck
1
≤ ck
= ck
s=1
1 · max
x≥1
1 · (2k)k
ek
·
(ln(s + t))k
√
s(s + t)
(cid:18) (ln(s + t))k
∞(cid:88)
s + t
{ (ln x)k
x0.5 } ·
· O(1).
s=1
(cid:19)
1
s + t
√
s
1
s1.5
In either case, the sum (3) is bounded by ck
in C is at most ck
7kk)d/(ln n(cid:48))k.
5(ck
7kk for some constant c7. By (2) the probability of a path
• Case 0 ≤ γ < d. By Lemma 2, the sum (3) is bounded by
(c2n(cid:48))(A++A−−1)(1− γ
d ) ≤ (c2n(cid:48))(k−1)(1− γ
d ).
Therefore, by (2) the probability of a path in C is at most
·(cid:16)
d )(cid:17)d
ck
5
(n(cid:48))k(d−γ)
(c2n(cid:48))(k−1)(1− γ
5c(k−1)(d−γ)
ck
(n(cid:48))d−γ
2
.
=
Finally, we apply Lemmas 3, 4, 6, and 7 together to show that the probability of any two vertices
connected by a short path with at least one long-range edge is diminishingly small.
Lemma 8. For any two vertices u and v, the probability that a path exists connecting u and v with at least
one long-range edge and total length at most (cid:96) is o(1), when (cid:96) ≤ (log n(cid:48))
1.5(d+1)+ε (ε > 0) for γ = d; and
(cid:96) < c log n(cid:48) (c is some constant depending only on d and γ) for 0 ≤ γ < d.
1
Proof. We first study the probability of a path with exact length (cid:96), and we divide it into the following two
cases.
• Case γ = d.
If k = 1, the probability that a path from u to v with length (cid:96) exists is at most
O((cid:96)dc6 ln(3(cid:96))/ ln n(cid:48)) = O((cid:96)d ln (cid:96)/ ln n(cid:48)). To see this, we divide the path into three segments: a grid
segment followed by one long-range edge, then followed by another grid segments. The first grid
15
segment can reach at most O((cid:96)d) destinations. For each of this destination w, the long-range edge
has to reach some vertex within grid distance (cid:96) of vertex v. And by triangle inequality, it must be
within grid distance 3(cid:96) of vertex w since the distances between v, u and u, w are both at most (cid:96). By
Lemma 6, we know this probability is c6 ln(3(cid:96))/ ln n(cid:48). Therefore, the above statement holds.
For k ≥ 2, we simply combine Lemmas 4 and 7. Thus, the probability that a path with length (cid:96) exists
is at most
ln n(cid:48)
(cid:18) (cid:96)d ln (cid:96)
(cid:18) (cid:96)d ln (cid:96)
(cid:18) (cid:96)d ln (cid:96)
ln n(cid:48)
(cid:19)
(cid:19)
(cid:19)
ln n(cid:48)
+
+
+
k=2
(cid:96)(cid:88)
(cid:96)(cid:88)
(cid:96)(cid:88)
k=2
k=2
O
= O
≤ O
(cid:0)ck
7kk(cid:1)d
(cid:33)k
(ln n(cid:48))k
ck
4(cid:96)(k+1)(d+1)
· ck
5
(cid:32)
(cid:32)
kkd
c4c5cd
c4c5cd
7 · (cid:96)(d+1)(1+ 1
k )
(cid:33)k
ln n(cid:48)
7 · (cid:96)1.5(d+1)
ln n(cid:48)
.
This probability is o(1) when (cid:96) ≤ (log n(cid:48))
1
1.5(d+1)+ε for any ε > 0.
• Case 0 ≤ γ < d. In this case, we combine Lemmas 3 and 7. The probability that a path with length (cid:96)
exists is at most
c3
(cid:96) · max
1≤k≤(cid:96)
5c(k−1)(d−γ)
ck
(n(cid:48))d−γ
2
≤ (c3c5cd−γ
(n(cid:48))d−γ
2
)(cid:96)
,
(cid:40)
(cid:41)
where the inequality is based on c2, c5 ≥ 1, which is obviously the case. This probability is o(1) when
(cid:96) < c log n(cid:48) for some properly chosen constant c, which depends only on d and γ.
We now consider the case of path length less than (cid:96). Let w be a grid neighbor of v. For any path
connecting u and v with length less than (cid:96), we can add grid edges (v, w) followed by (w, v), to increase the
path length to either (cid:96) − 1 or (cid:96). Thus, the probability that a path of length at most (cid:96) exists is the same as the
probability that a path of length (cid:96) − 1 or (cid:96) exists. The case of (cid:96) − 1 follows exactly the same as the case of (cid:96)
argued above. Therefore, the lemma holds.
With Lemma 8, we are ready to prove Theorem 1 for the case of d ≥ 2 and 0 ≤ γ ≤ d.
1
Proof of Theorem 1 for the case of d ≥ 2 and 0 ≤ γ ≤ d. We define (cid:96) = (cid:98)(log n(cid:48))
1.5(d+1)+ε /2(cid:99) when γ =
d, and (cid:96) = (cid:98)c log n(cid:48)/2(cid:99) when 0 ≤ γ < d, where c is the constant determined by Lemma 8. In the base grid,
find any square in any dimension with one side length equal to (cid:96). Consider the four corner vertices of the
square. By Lemma 8, the probability that a pair of corners of this square are connected by a path with at least
one long-range edge and total length at most 2(cid:96) is o(1). Thus by union bound, the distances between any
pair of these four corner vertices are exactly their grid distance, with probability 1 − o(1). This means that
the δ value of these four vertices is (cid:96), with probability 1 − o(1). Therefore, we know that with probability
1.5(d+1)+ε ) when d ≥ 2 and γ = d, and
1 − o(1), δ(KSW (n, d, γ)) = Ω((log n(cid:48))
δ(KSW (n, d, γ)) = Ω(log n(cid:48)) = Ω(log n) when d ≥ 2 and 0 ≤ γ < d.
Remark (The limitation of this approach). We already have tight lower bound for 0 ≤ γ < d. However,
1.5(d+1)+ε ) for γ = d is still not matching the upper bound O(log n). We show
the lower bound Ω((log n)
1.5(d+1)+ε ) = Ω((log n)
1
1
1
16
below that the lower bound can never be improved to Ω(log n) by the above technique of proving that the
grid distance is the shortest on every small square (with high probability).
Consider a KSW graph with γ = d. For an (cid:96) × (cid:96) square S, let u be its the upper left vertex and v be
its lower right vertex. Similar to the proof in Lemma 6, the probability of existence of an edge linking any
w into the (cid:96)/2 × (cid:96)/2 square on the lower right side of w within the square S (but excluding w's two grid
neighbors in the square) is
(cid:96)/2(cid:88)
i=2
(cid:40)
=
i · i−d
ln n(cid:48)
q = Θ
Θ( log (cid:96)
1
Θ(
log n(cid:48) ) d = 2,
log n(cid:48) ) d ≥ 3.
(cid:16)(cid:113) log n(cid:48)
(cid:17)
log log n(cid:48)
Consider the (cid:96)/2 × (cid:96)/2 square on the lower right side of u, which is the upper left quadrant of the original
square. The probability that at least one vertex w in this quadrant links to its lower right (cid:96)/2 × (cid:96)/2 square
√
is 1 − (1 − q)(cid:96)/2×(cid:96)/2. This probability is almost 1 when (cid:96) = ω
log n(cid:48))
for d ≥ 3. If there exists such a vertex w in the upper right quadrant, and suppose it links to a vertex x in its
lower right (cid:96)/2 × (cid:96)/2 square. Then x must also be in the original square S, and we can have a path from u
to w following the grid path, then the long-range edge from w to x, and then the grid path from x to v. This
path connects u and v and must be shorter than the grid paths from u to v. Therefore our technique cannot
improve the lower bound to ω
log n) for
d ≥ 3.
(cid:16)(cid:113) log n(cid:48)
(cid:16)(cid:113) log n
for d = 2, or (cid:96) = ω(
log n(cid:48)) = ω(
for d = 2 or ω(
log log n(cid:48)
= ω
(cid:17)
√
√
(cid:17)
log log n
3.3.2 The case of d = 1 and 0 ≤ γ ≤ 1
In this section we give lower bounds of δ for the one dimensional KSW model (based on an n-vertex ring).
Let the n vertices be v0, . . . , vn−1. Let (cid:96)0 = (cid:98)(log n)
1.5(d+1)+ε(cid:99) when γ = 1, or (cid:98)c log n(cid:99) when 0 ≤ γ < 1,
where c is the number determined in Lemma 8.
1
The idea is to find a long-range edge e0 between two vertices with grid distance (cid:96)0. As e0 forms a local
ring with the original grid, we can give a lower bound of δ such that the ring distances (with respect to the
grid edges and e0) are the shortest even after adding the long-range edges. We first calculate the probability
of ring distances being the shortest under the condition of existing e0.
We divide the construction of a KSW graph into two stages: 1) Every vertex links to exactly one other
vertex according to some distribution; and 2) we ignore the edge direction and consider the graph as undi-
rected. Let Ei (0 ≤ i ≤ n−1) be the event that vi links to v(i+(cid:96)0 mod n) in the first stage. Under the condition
that Ei happens, v(i+(cid:96)0 mod n) is still free to link to any vertex. The events E0,E1, . . . ,En−1 are independent.
Lemma 9. Under the condition that Ei happens (vi links to v(i+(cid:96)0 mod n)), for any two vertices u, w on the
curve from vi to v(i+(cid:96)0 mod n) (exclusive), the conditional probability of existing a path connecting u and w
with at least one long-range edge other than (vi, v(i+(cid:96)0 mod n)) and path length at most (cid:96)0 is o(1).
Proof. Let e0 be the edge (vi, v(i+(cid:96)0 mod n)). We still follow the arguments for d ≥ 2 and 0 ≤ γ ≤ d, but
change the classification of paths slightly: now e0 is a type of edges by itself, and thus together with grid
edges and long-range edges, we have three types of edges and three types of corresponding segments. For
each original category of paths with length (cid:96) and k long-range segments defined in the previous section,
we further divide it into at most k + 1 categories, based on whether e0 was the first, second, ..., or the k-th
long-range segment, or e0 does not appear in the path. The number of long-range edges in a category with
e0 is decreased by 1. For the categories with only grid edges and e0, those paths now have no long-range
edge and they exist with conditional probability 1, hence they will not be calculated.
17
For Lemma 3, the number of categories is increased by a factor of at most (cid:96) + 1. For Lemma 4, the
number of categories is increased by a factor of at most k + 1. Thus, we only need to properly adjust the
constants c3 and c4 in these two lemmas to make them still hold. Lemma 5 is not changed except that e0
is no longer a long-range edge and the lemma is not applicable on e0. Lemma 6 is not affected. In the
proof of Lemma 7, a category without e0 can be calculated normally. For a category with e0, the number of
long-range edges is decreased by 1 as stated above. One can see that all the arguments still hold by changing
the summation of long-range edges (ti in (1)) to contain e0.
For Lemma 8, only the case γ = d and k = 1 (one long-range edge) needs some modification. If the path
does not contain e0, the calculation still holds. Otherwise, we can divide the path into five segments: grid,
long-range, grid, e0, grid (or grid, e0, grid, long-range, grid). We just consider the 3 consecutive segments
grid, e0, grid as a whole, which contains O((cid:96)) edges and can reach O((cid:96)d) = O((cid:96)) destinations. One can see
the previous argument still holds. Therefore, the consequence of Lemma 8 still holds.
With Lemma 9, we give the proof of Theorem 1 for the case of d = 1 and 0 ≤ γ ≤ 1.
8 (cid:96)0(cid:99) mod n) and Di = v(i+(cid:98) 7
Proof of Theorem 1 for the case of d = 1 and 0 ≤ γ ≤ 1. Let F be the event δ ≥ 1
4 (cid:96)0 − 3. We first show
that Pr{F Ei} = 1 − o(1). Pick four vertices Ai = v(i+(cid:98) 1
8 (cid:96)0(cid:99) mod n), Ci =
8 (cid:96)0(cid:99) mod n). By Lemma 9 and union bound, we know that with probability
v(i+(cid:98) 5
1 − o(1), the distances between every pair of vertices are the ring (grid edges plus (vi, v(i+(cid:96)0 mod n))) dis-
tances. That is, the distances between AiBi, BiCi, CiDi, DiAi are roughly 1
4 (cid:96)0 (off by at most 2), and the
distances between AiCi and BiDi are roughly 1
2 (cid:96)0 (off by at most 1). Therefore, by considering the four
4 (cid:96)0 − 3 with conditional
vertices AiBiCiDi, we have δ at least 1
probability 1 − o(1).
8 (cid:96)0(cid:99) mod n), Bi = v(i+(cid:98) 3
4 (cid:96)0 − 2− 1
4 (cid:96)0 − 2) = 1
2 (cid:96)0 − 1 + 1
2 (cid:96)0 − 1− 1
2 ( 1
(cid:40)
For every Ei, the probability that vi links to v(i+(cid:96)0 mod n) is
Pr{Ei} = Θ(
−γ
(cid:96)
0
f (n)
) =
− 2+ε
Θ((log n)
Θ(log n/n1−γ)
3+ε ) γ = 1,
0 ≤ γ < 1.
Define this probability as q. We have Pr{F and Ei} = Pr{F Ei} Pr{Ei} = (1 − o(1))q.
Let K be the random variable denoting the number of Ei's that occur. We define m = E[K], and
we have m = nq. One can check that m = poly(n) for both cases γ = 1 and 0 ≤ γ < 1. By
Chernoff Bound, Pr{K − m ≤ m0.6} > 1 − 2e−(m−0.4)2/4·m = 1 − 2e−m0.2/4. Hence with very
high probability, K is close to m. Let G denote the event that m − m0.6 ≤ K ≤ m + m0.6. We show
that Pr{F and Ei and G} is very close to Pr{F and Ei}. In fact, Pr{F and Ei and G} ≥ Pr{F and Ei} −
Pr{not G} = (1− o(1)) Pr{F and Ei}, because Pr{not G} < 2e−m0.2/4 = 2e−poly(n) is much smaller than
Pr{F and Ei} = (1−o(1))q = ω(1/n). On the other hand, it is straightforward that Pr{F and Ei and G} ≤
Pr{F and Ei}. Hence Pr{F and Ei and G} differs from Pr{F and Ei} by a factor at most (1 − o(1)), and
Pr{F and Ei and G} = (1 − o(1))q.
For every r = r0r1 ··· rn−1 ∈ {0, 1}n, define Hr to be the event that Ej happens iff rj = 1 for all
j = 0, 1, . . . , n − 1. We can see Hr's are mutually exclusive for r ∈ {0, 1}n. Hence
Pr{F and Ei and G} =
Pr{F and Hr}.
m+m0.6(cid:88)
(cid:88)
k=m−m0.6
r∈{0,1}n
ri=1 and r has k 1's
18
Therefore
Pr{F and G} =
=
>
=
=
k=m−m0.6
r∈{0,1}n
r has k 1's
(cid:88)
m+m0.6(cid:88)
· n−1(cid:88)
m+m0.6(cid:88)
m + m0.6 · n−1(cid:88)
n−1(cid:88)
k=m−m0.6
1
k
i=0
i=0
1
1
i=0
m + m0.6
n(1 − o(1))q
m + m0.6 =
Pr{F and Hr}
(cid:88)
m+m0.6(cid:88)
r∈{0,1}n
ri=1 and r has k 1's
(cid:88)
Pr{F and Hr}
k=m−m0.6
r∈{0,1}n
ri=1 and r has k 1's
Pr{F and Ei and G}
m(1 − o(1))
m + m0.6 = 1 − o(1).
Pr{F and Hr}
The probability that δ ≥ 1
4 (cid:96)0 − 3 = Ω((cid:96)0) is Pr{F} ≥ Pr{F and G} = 1 − o(1).
3.3.3 The case of d = 1 and γ > 3
We first show that with high probability all long-range edges connect two vertices with grid distance o(n),
for general d and γ > 2d.
Lemma 10. In a random graph from KSW (n, d, γ) with γ > 2d, with probability 1 − o(1) there is no
γ−d +ε, where ε is any positive
long-range edge that connects two vertices with grid distance larger than n
number.
1
Proof. For a vertex u, the probability that the long-range edge from u links to somewhere with distance
longer than (cid:96)0 = n
γ−d +ε from u is
1
O
id−1
n1/d(cid:88)
(cid:16)
i=(cid:96)0
O
j=1 jd−1j−γ
i−γ
(cid:80)n1/d
(cid:16)
(cid:17)
= O
n(cid:96)d−γ
0
n · n( 1
(cid:16)
(cid:17)
(cid:96)d−γ
0
.
= O
∞(cid:88)
γ−d +ε)(d−γ)(cid:17)
i=(cid:96)0
id−1−γ
= O
nε(d−γ)(cid:17)
(cid:16)
= O
= o(1).
By union bound, the probability that such u exists is
Therefore with probability 1 − o(1) such u does not exist.
Given a graph G in KSW (n, d, γ), let (cid:96)0(G) be the largest grid distance of two vertices connected by a
long-range edge in G. From the above result, we know that when γ > 3d, (cid:96)0(G) < n
n1/d)
with high probability. For the rest of this section, with d = 1, we fix G to be any graph in KSW (n, 1, γ)
γ−1 +ε, and show that δ(G) = Ω(nc) for some constant c. Since G is fixed, we will use (cid:96)0
with (cid:96)0(G) < n
to be the short hand of (cid:96)0(G).
γ−d +ε = o(
√
1
1
19
Now go back to the one dimensional grid with wrap-around, which is a ring with vertices v0, v1, . . . , vn−1.
Notice that in one-dimensional case, the edge vector defined in Section 3.3.1 degenerates to a scalar value
from {−(cid:98) n
2 (cid:99)}. We arrange v0, v1, . . . , vn−1 clockwise on the ring. Then a pos-
itive edge scalar corresponds to a clockwise hop while a negative edge scalar corresponds to a counter-
clockwise hop.
2(cid:99) + 1, . . . ,(cid:98) n−1
2(cid:99),−(cid:98) n
Let A = v0 and B = v(cid:98)n/2(cid:99) be two specific vertices. We define two kinds of paths between A and B:
a positive path is one in which the summation of edge scalars (not taking module n) is positive, while a
negative path is one in which the summation of edge scalars (not taking module n) is negative.
Lemma 11. There exists a positive path from A to B that does not go through v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2, . . . ,vn−1,
and the length is at most 2(cid:96)0 longer than the shortest positive path from A to B. Similarly, there exists a
negative path from A to B that does not go through v1, v2, . . . , v(cid:98)n/2(cid:99)−1, and the length is at most 2(cid:96)0 longer
than the shortest negative path from A to B.
Proof. We only give the proof for the positive path case. Consider any shortest positive path P from A to B.
We first show the following claim. Let SA = {v1, . . . , v(cid:96)0} be the set of (cid:96)0 consecutive vertices clockwise to
A, and SB = {v(cid:98)n/2(cid:99)−(cid:96)0, v(cid:98)n/2(cid:99)−(cid:96)0+1, . . . , v(cid:98)n/2(cid:99)−1} be the set of (cid:96)0 consecutive vertices counter-clockwise
to B.
Claim. There must exist a subpath in P from a vertex u ∈ SA to a vertex w ∈ SB that does not go
through v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2, . . . ,vn−1.
Say there are m edges in P. Let si (0 ≤ i ≤ m) denote the summation of the first i edge scalars in
P (not taking module n). Initially we have s0 = 0, and the final value sm is kn + (cid:98)n/2(cid:99) for some integer
k ≥ 0. One can also see that the position after going through the first i edges in P is at v(si mod n). Let i1
be the smallest integer such that si1 ≥ (cid:98)n/2(cid:99) (exist because sm ≥ (cid:98)n/2(cid:99)), and i2 be the largest integer such
that i2 < i1 and si2 ≤ 0 (exist because s0 = 0).
We consider the (i2+1)-th edge, which begins at v(si2 mod n) for some si2 ≤ 0, and ends at v(si2+1 mod n)
for some si2+1 > 0. The number si2+1 is at most si2 + (cid:96)0 since no edge is longer than (cid:96)0. Therefore,
si2+1 must be a number in (0, (cid:96)0] and v(si2+1 mod n) must be in SA. We choose u = v(si2+1 mod n) ∈ SA.
Similarly, pick w = si1−1, which is the beginning point of the i1-th edge, we have w ∈ SB. The intermediate
values si2+1, si2+2, . . . , si1−1 are all in the interval (0,(cid:98)n/2(cid:99)) by the definitions of i1 and i2. That is, for
all j such that i2 + 1 ≤ j ≤ i1 − 1, sj mod n = sj, and the corresponding vertex v(sj mod n) = vsj ∈
{v1, v2, . . . , v(cid:98)n/2(cid:99)−1}. Therefore the subpath from u to w does not go through v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2, . . . ,vn−1,
and the claim holds.
With the claim, we can construct a positive path P(cid:48), which use ring edges from A to u, then use the
subpath in the claim from u to w, and then from w to B using ring edges. The length of P(cid:48) is at most 2(cid:96)0
longer than P, the shortest positive path from A to B.
AB to denote the two paths stated in the above lemma. According to this lemma, one
We use P +
AB and P−
Let C be the middle point of P +
AC, P +
AD, P−
AB and P−
AB is at most 2(cid:96)0 longer than the shortest path between A and B.
AB (take a vertex nearest middle if the path has odd number of edges),
CB be the two subpaths from A to C and C to B. Similarly, let D be the middle point of P−
AB
DB be the two subpaths.
CB, P−
of P +
and P +
and P−
Lemma 12. The paths P +
AC, P +
corresponding pairs of vertices.
AD and P−
DB are at most 3(cid:96)0 +1 longer than the shortest paths between
20
Proof. We only give the proof for P +
is at least 3l0 + 2 shorter than P +
the point nearest middle of P +
AB.
Consider the last time that the path P∗
AC. The path P∗
AC. Suppose that it is not true, and the shortest path P∗
AC must be at least 3(cid:96)0 + 1 shorter than P +
AC from A to C
CB because C is
AC gets into the range {v0, v1, . . . , v(cid:98)n/2(cid:99)}, the subpath of P∗
AC
from that point to C must be one of the following cases.
• It is a subpath from a vertex A(cid:48) ∈ {v0, v1, . . . , v(cid:96)0} to C not going through v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2,
AC by the path from A to A(cid:48) through ring edges concatenated with the subpath
AB to decrease by at least 3(cid:96)0 + 2 − (cid:96)0 > 2(cid:96)0,
AC from A(cid:48) to C. This will cause the length of P +
. . . ,vn−1. Replace P +
of P∗
which is impossible by Lemma 11.
• It is a subpath from a vertex B(cid:48) ∈ {v(cid:98)n/2(cid:99)−(cid:96)0, v(cid:98)n/2(cid:99)−(cid:96)0+1, . . . , v(cid:98)n/2(cid:99)} to C that does not go through
AC from C to B(cid:48)
AB to decrease by at least
v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2, . . . ,vn−1. Replace P +
concatenated with ring edges from B(cid:48) to B. This will cause the length of P +
3(cid:96)0 + 1 − (cid:96)0 > 2(cid:96)0, which is impossible by Lemma 11.
CB by the reverse of this subpath of P∗
Therefore the lemma holds.
Then we consider the shortest path between C and D.
AC and
CB and reversed P−
DB, or the concatenation of reversed P +
Lemma 13. Either the concatenation of P +
P−
DA is at most 8(cid:96)0 + 2 longer than the shortest path between C and D.
Proof. The shortest path from C to D (say P∗
CD) must go through either B's neighborhood v(cid:98)n/2(cid:99), v(cid:98)n/2(cid:99)+1,
. . . , v(cid:98)n/2(cid:99)+(cid:96)0 or A's neighborhood v0, v1, . . . , v(cid:96)0. Without loss of generality, we assume that it goes
through the point B(cid:48) in B's neighborhood. Use P∗
B(cid:48)D to denote the two subpaths from C to
B(cid:48) and B(cid:48) to D respectively. They must also be shortest paths of CB(cid:48) and B(cid:48)D.
CB(cid:48) is at most (cid:96)0 shorter than the shortest path between C and B, otherwise the path P∗
CB(cid:48)
concatenated with ring edges from B(cid:48) to B would be shorter than the shortest path. Similarly, P∗
B(cid:48)D is at
most (cid:96)0 shorter than the shortest path between B and D. Therefore the shortest path between C and D
is at most 2(cid:96)0 shorter than the concatenation of shortest paths of CB and BD. Then by Lemma 12, the
summation of P +
DB is at most 2(3(cid:96)0 + 1) + 2(cid:96)0 = 8(cid:96)0 + 2 longer than the shortest path between
C and D.
CB(cid:48) and P∗
CB and P−
The path P∗
We have the following corollary since the two paths in this lemma differ by at most 2 considering the
length.
Corollary 14. The concatenation of P +
P−
DA are both at most 8(cid:96)0 + 4 longer than the shortest path between C and D.
CB and reversed P−
DB, and the concatenation of reversed P +
AC and
Now we can prove the lower bound of δ for this case.
Proof of Theorem 1 for the case of d = 1 and γ > 3. Consider the four points A, B, C and D defined above.
Let d(x, y) denote the distance between vertices x and y. We can see the following consequences about pair-
wise distances: (a) d(A, B) ≥ (cid:98)n/2(cid:99)/(cid:96)0; (b) d(C, D) ≥ P +
DB−
(8(cid:96)0 + 4) ≥ d(A, C) + d(D, B) − (8(cid:96)0 + 5), where the first inequality is due to Corollary 14; and (c) simi-
larly, d(C, D) ≥ d(A, D) + d(C, B)− (8(cid:96)0 + 5). Therefore, we have both d(A, B) + d(C, D) ≥ d(A, C) +
d(D, B) + (cid:98)n/2(cid:99)/(cid:96)0 − (8(cid:96)0 + 5), and d(A, B) + d(C, D) ≥ d(A, D) + d(C, B) + (cid:98)n/2(cid:99)/(cid:96)0 − (8(cid:96)0 + 5).
DB−(8(cid:96)0 +4) ≥ P +
AC−1+P−
CB+P−
21
For (cid:96)0 < n
1
γ−1 +ε with any sufficiently small ε > 0 and sufficiently large n, we have (cid:98)n/2(cid:99)/(cid:96)0 >>
8(cid:96)0 + 5, and thus d(A, B) + d(C, D) is the largest distance pair. In this case, δ ≥ (cid:98)n/2(cid:99)/(cid:96)0 − (8(cid:96)0 + 5).
γ−1 +ε. Therefore, with probability 1 − o(1),
By Lemma 10, with probability 1 − o(1) there is (cid:96)0 < n
γ−2
γ−1−ε) for d = 1, γ > 3 and any sufficiently small ε > 0. Since
δ(KSW (n, 1, γ)) = Ω(n/n
for any ε(cid:48) > ε > 0, n
), we have δ(KSW (n, 1, γ)) = Ω(n
γ−2
γ−1−ε) for any ε > 0.
γ−1 +ε) = Ω(n
γ−2
γ−1−ε(cid:48)
γ−2
γ−1−ε = Ω(n
1
1
3.4 Extensions of the KSW model
Our analysis also holds for some variants of the KSW model. In this section, we study one variant of the
underlying structure: grid without wrap-around; and two variants of edge linking: multiple edges for each
vertex and linking edges independently.
Grid without wrap-around. We modify our analysis so that the first two results of Theorem 1 still hold.
For the case of d ≥ 2 and 0 ≤ γ ≤ d (Section 3.3.1), the changes are as follows. For a path from u to v,
we divide it into segments as before. Elements in an edge vector are in {−n(cid:48),−n(cid:48) + 1, . . . , n(cid:48) − 1, n(cid:48)} now.
Recall the last condition that we define two paths from u to v belong to the same category: the summations
(not module n(cid:48)) of all segment vectors in the two paths are equal. This is always satisfied for grid without
wrap-around, because the summation of all segment vectors depends only on the positions of u and v. In
the proofs of Lemma 3 and Lemma 4, the summation of all segment vectors is fixed rather than (2(cid:96) + 1)d or
(2k + 1)d choices respectively. Hence the upper bounds given in Lemmas 3 and 4 still hold. In Lemma 5,
an edge between u and v can be from u to v or from v to u. The probabilities of the two cases may differ
by a constant factor on grid without wrap-around. Hence the probability of existing an edge between u
and v is changed by at most a constant factor, and Lemma 5 still holds. One can verify the rest analysis in
Section 3.3.1 still hold. For the case of d = 1 and 0 ≤ γ ≤ 1 (Section 3.3.2), the only change is that event
Ei, which is the event that vi links to vi+(cid:96)0, only applies when i = 0, 1, . . . , n− (cid:96)0 − 1. Since (cid:96)0 = O(log n)
is much smaller than n, there are still almost n events Ei and the argument has no significant change. Hence
Theorem 1 still holds for the cases that d ≥ 1 and 0 ≤ γ ≤ d.
Multiple edges for each vertex.
In this model, each vertex links a constant, say d0, number of edges
dB(u,v)−γ
according to the same distribution that u links to v with probability
v(cid:48) dB(u,v(cid:48))−γ . We show that all our
analysis still hold with some slight changes. For the case of d ≥ 2 and 1 ≤ γ ≤ d (Section 3.3.1), Lemma 5
still holds since the probability of the edge (u, v) is increased by at most d0 times using union bound. And
the proof of Lemma 6 still works, because O(id−1 i−γ
f (n(cid:48)) ) is an upper bound of the probability that u links to
some vertex at distance i by union bound. For the case of d = 1 and 0 ≤ γ ≤ 1 (Section 3.3.2), we define
−γ
Ei as the event that at least one of vi's edges links to v(i+(cid:96)0 mod n). One can see Pr{Ei} is still Θ( (cid:96)
f (n) ) and
0
the rest argument also holds. For the case of d = 1 and γ > 3 (Section 3.3.3), Lemma 10 still holds for
the same reason as Lemma 6, that O(id−1
) is an upper bound of the probability that u links to
some vertex at distance i. One can verify all results of Theorem 1 still hold under this change.
Linking edges independently.
In this model, all edges exist independently. The edge between (u, v)
(cid:80)n1/d
exists with probability d0·dB(u,v)−γ
, where d0 is some constant. We also give the changes in our analysis.
i=1 id−1−γ
Lemma 5 is straightforward in this model. Lemmas 6 and 10 still hold for the same reason as above. In
the proof of Lemma 7, the first line of Eq (2), which uses the multiplication of edges' probabilities for an
upper bound of the path's probability, still holds because it is now just the multiplication of independent
events. For the case of d = 1 and 0 ≤ γ ≤ 1 (Section 3.3.2), we define Ei to be the event that the edge
(cid:80)n1/d
j=1 jd−1j−γ
(cid:80)
i−γ
22
(vi, v(i+(cid:96)0 mod n)) exists, one can see the analysis still works. All results of Theorem 1 still hold under this
change.
In summary, Theorem 1 of the case d ≥ 1 and 0 ≤ γ ≤ d still holds for grid without wrap-around,
and Theorem 1 of all cases still holds for both variants of edge linking. The variants of edge linking can be
combined with grid without wrap-around, for which Theorem 1 of the case d ≥ 1 and 0 ≤ γ ≤ d still holds.
4 δ-hyperbolicity of ringed trees
In this section, we consider the δ-hyperbolicity of graphs constructed according to a variant of the small-
world graph model, in which long-rang edges are added on top of a base graph that is a binary tree or
tree-like low-δ graph. In particular, we will analyze the effect on the δ-hyperbolicity of adding long-range
links to a ringed tree base graph; and then we will consider several related extensions, including an extension
to the binary tree.
Definition 6 (Ringed tree). A ringed tree of level k, denoted RT (k), is a fully binary tree with k levels
(counting the root as a level), in which all vertices at the same level are connected by a ring. More precisely,
we can use a binary string to represent each vertex in the tree, such that the root (at level 0) is represented
by an empty string, and the left child and the right child of a vertex with string σ are represented as σ0
and σ1, respectively. Then, at each level i = 1, 2, . . . , k − 1, we connect two vertices u and v represented
by binary strings σu and σv if (σu + 1) mod 2i = σv, where the addition treats the binary strings as the
integers they represent. As a convention, we say that a level is higher if it has a smaller level number and
thus is closer to the root.
Figure 1(d) illustrates the ringed tree RT (6). Note that the diameter of the ringed tree RT (k) is Θ(log n),
where n = 2k − 1 is the number of vertices in RT (k), and we will use RT (∞) to denote the infinite ringed
tree when k in RT (k) goes to infinity. Thus, a ringed tree may be thought of as a soft version of a binary tree;
and to some extent, one can view a ringed tree as an idealized picture reflecting the hierarchical structure
in real networks coupled with local neighborhood connections, such as Internet autonomous system (AS)
networks, which has both a hierarchical structure of different level of AS'es, and peer connections based on
geographical proximity.
4.1 Results and their implications
A visual comparison of the ringed tree of Figure 1(d) with the tessellation of Poincar´e disk (Figure 1(b))
suggests that the ringed tree can been seen as an approximate tessellation or coarsening of the Poincar´e disk.
Our first result in this section makes this precise; in particular, we show that the infinite ringed tree and the
Poincar´e disk are quasi-isometric.
Theorem 2. The infinite ringed tree RT (∞) and the Poincar´e disk are quasi-isometric.
Thus, by Proposition 1, we immediately have the following result.
Corollary 15. There exists a constant c s.t., for all k, ringed tree RT (k) is c-hyperbolic.
Alternatively, we also provide a direct proof of this corollary (Section 4.3.3) to show that the ringed tree
RT (k) is Rips 5-hyperbolic, and Gromov's 40-hyperbolic in terms of the four point condition. Our direct
analysis also provides important properties of ringed trees that are used by later analyses.
23
Next, we address the question of whether long-range edges added at each level of the ring maintains
or destroys the hyperbolicity of the base graph. Given two vertices u and v at some level t of the ringed
tree, we define the ring distance between u and v, denoted dR(u, v), to be the length of the shorter path
connecting u and v purely through the ring edges at the level t. Given any function f from positive integers
to positive integers, let RT (k, f ) denote the class of graphs constructed by adding long-range edges on the
ringed tree RT (k), such that for each long-range edge (u, v) connecting vertices u and v at the same level,
dR(u, v) ≤ f (n), where n = 2k − 1 is the number of vertices in the ringed tree RT (k). Since long-range
edges do not reduce distances from root to any other vertices, the diameter of any graph in RT (k, f ) is still
Θ(log n). Define δ(RT (k, f )) = maxG∈RT (k,f ) δ(G).
Our second result (used in the proof of the first part of our next result, but explicitly stated here since it
is also of independent interest) is the following.
Theorem 3. δ(RT (k, f )) = O(log f (n)), for any positive function f and positive integer k, where n =
2k − 1 is the number of vertices in the ringed tree RT (k).
This result indicates that if the long-range edges added do not span far-away vertices, then the graph should
have good hyperbolicity. In particular, if we take f (n) = log n, then the theorem implies that the class
RT (k, f ) is logarithmically hyperbolic. The theorem covers all (deterministic) graphs in the class RT (k, f ).
We can extend it to random graphs, such that if we can show that with high probability the random graph
is in the class RT (k, f ), then we know that the hyperbolic δ of the random graph is O(log f (n)) with high
probability. The first result in the next theorem is proven via this approach.
Next, we consider adding random edges between two vertices at the outermost level, i.e., level k − 1,
such that the probability connecting two vertices u and v is determined by a function g(u, v). Let Vk−1
denote the set of vertices at level k − 1, i.e., the leaves of the original binary tree. Given a real-valued
positive function g(u, v), let RRT (k, g) denote a random graph constructed as follows. We start with the
ringed tree RT (k), and then for each vertex v ∈ Vk−1, we add one long-range edge to a vertex u with
probability proportional to g(u, v), that is, with probability g(u, v)ρ−1
v where ρv =(cid:80)
We study three families of functions g, each of which has the characteristic that vertices closer to one
another (by some measure) are more likely to be connected by a long-range edge. The first two families use
the ring distance dR(u, v) as the closeness measure. In particular, the first family uses an exponential decay
function g1(u, v) = e−αdR(u,v). The second family uses a power-law decay function g2(u, v) = dR(u, v)−α,
where α > 0. The third family uses the height of the lowest common ancestor of u and v, denoted as h(u, v),
as the closeness measure, and the function is g3 = 2−αh(u,v). Note that this last probability function matches
the function used by Kleinberg in a small-world model based on the tree structure [23]. Moreover, although
g3 and g2 are similar, in the ringed tree they are not the same, since for two leaf nodes u and v, dR(u, v)
may not be the same as 2h(u,v). For example, let u be the rightmost leaf of the left subtree of the root (i.e.
u is represented as the string 01 . . . 1) and v be the leftmost leaf of the right subtree of the root (i.e. v is
represented as the string 10 . . . 0), then dR(u, v) = 1 while h(u, v) = Θ(log n). The following theorem
summarizes the hyperbolicity behavior of these three families of random ringed trees.
u∈Vk−1
g(u, v).
Theorem 4. Considering the follow families of functions (with u and v as the variables of the function)
for random ringed trees RRT (k, g), for any positive integer k and positive real number α, with probability
1 − o(1) (when n tends to infinity), we have
1. δ(RRT (k, e−αdR(u,v))) = O(log log n);
2. δ(RRT (k, dR(u, v)−α)) = Θ(log n);
24
3. δ(RRT (k, 2−αh(u,v))) = Θ(log n);
where n = 2k − 1 is the number of vertices in the ringed tree RT (k).
This theorem states that, when the random long-range edges are selected using exponential decay function
based on the ring distance measure, the resulting graph is logarithmically hyperbolic, i.e., the constant
hyperbolicity of the original base graph is degraded only slightly; but when a power-law decay function
based on the ring distance measure or an exponential decay function based on common ancestor measure
is used, then hyperbolicity is destroyed and the resulting graph is not hyperbolic. One may notice that the
function form in (1) and (3) above is similar but the result is different. This is because with height h(u, v)
the subtree covers actually Θ(2h(u,v)) leaves, and thus (3) is naturally closer to the power-law function of
(2). Intuitively, when it is more likely for a long-range edge to connect two far-away vertices, such an edge
creates a shortcut for many internal tree nodes so that many shortest paths will go through this shortcut
instead of traversing through tree nodes. (In Internet routing this is referred to as valley routes).
Finally, as a comparison, we also study the hyperbolicity of random binary trees RBT (k, g), which are
the same as random ringed trees RRT (k, g) except that we remove all ring edges.
Theorem 5. Considering the follow families of functions (with u and v as the variables of the function)
for random binary trees RBT (k, g), for any positive integer k and positive real number α, with probability
1 − o(1) (when n tends to infinity), we have
δ(RBT (k, e−αdR(u,v))) = δ(RBT (k, dR(u, v)−α)) = δ(RBT (k, 2−αh(u,v))) = Θ(log n),
where n = 2k − 1 is the number of vertices in the binary tree RBT (k, g).
Thus, in this case, the original hyperbolicity of the base graph (δ = 0 for the binary tree) is destroyed.
Comparing with Theorem 4, our results above suggest that the "softening" of the hyperbolicity provided by
the rings is essential in maintaining good hyperbolicity: with rings, random ringed trees with exponential
decay function (depending on the ringed distance) are logarithmically hyperbolic, but without the rings the
resulting graphs are not hyperbolic.
4.2 Outline of the analysis
In this subsection, we provide a summary of the proof of the four theorems in Section 4.1. For Theorem 2,
we provide an embedding of the ringed tree to the Poincar´e disk, intuitively similar to the picture we show
in Figure 1(d), and prove that it is a quasi-isometry.
For the analysis of δ-hyperbolicity, we apply the Rips condition, which is equivalent to the Gromov's
four point condition up to a constant factor. For any two vertices u and v on the ringed tree RT (k), we
define the canonical geodesic (cid:104)u, v(cid:105) to be the geodesic from u to v such that the geodesic always goes up
first, then follows ring edges, and then goes down (any of these segments may be omitted). We show that the
canonical geodesic (cid:104)u, v(cid:105) and any other geodesic [u, v] are within distance 1 of each other, and any triangle
∆(u, v, w) formed by three canonical geodesics (cid:104)u, v(cid:105), (cid:104)u, w(cid:105), and (cid:104)v, w(cid:105) (called canonical triangle) are
3-slim. This immediately implies that any geodesic triangles in RT (k) is 5-slim, which is a direct proof that
ringed trees are constantly hyperbolic.
For Theorem 3, we inductively prove that any geodesic [u, v] in RT (k, f ) is within O(log f (n)) distance
from the canonical geodesic (cid:104)u, v(cid:105), and vice versa. Together with the result that any canonical triangle is 3-
slim, it follows know that any geodesic triangle is O(log f (n))-slim. For Theorem 4, Part (1), we show that
with high probability the long-range edges only connect vertices within ring distance O(log n), and then we
25
can apply Theorem 3 to achieve the O(log log n) bound. For Theorem 4, Part (2), the key is to show that (a)
with high probability some long-range link connects two vertices at ring distance Θ(nc) for some constant
c; and (b) if such a long-range edge (u, v) exists, then we consider the geodesic triangle ∆(u, v, r) where r
is a point with lowest layer number on the canonical geodesic between u, v, and show that the middle point
of [r, u] is Θ(log n) away from the union of [r, v] and [v, u]. For Theorem 4, Part (3), we first show that
with high probability some pair of vertices u, v with h(u, v) ≥ c log2 n for some constant c > 0, and then
we observe that, in such configuration, the ring distance dR(u, v) has high probability to be Ω(nc/2), and
results follows exactly the same analysis in the previous part.
For Theorem 5, part (2) and (3) follow a similar strategy as those of Theorem 4. For part (1), we know
that two "would-be" ring neighbors u and v have constant probability of having a long-range connection.
√
However, since we do not have ring edges, the alternative path between u and v through the tree may be
Θ(log n) in length. We show that there are at least Ω(
n) such pairs, so with high probability at least one
pair is connected, generating a bad δ of Ω(log n).
4.3 Detailed analysis on ringed trees
4.3.1 Properties of ringed tree
We start by some properties of ringed tree, which will be repeatedly used in the following analysis on ringed
tree related graphs and which may be of independent interest.
We define the ring distance dR(u, v) of u and v on the same level to be their distance on the ring. Ringed
trees have the following fundamental property.
Lemma 16. Let u and v be two vertices on the same level, and u(cid:48) and v(cid:48) be their parents respectively. We
have dR(u(cid:48), v(cid:48)) ≤ (dR(u, v) + 1)/2.
Proof. On the ring, there are dR(u, v) + 1 vertices on segment between u and v, which belong to at most
(dR(u, v) + 1)/2 + 1 parents, which correspond to at most (dR(u, v) + 1)/2 + 1 vertices on the ring segment
between u(cid:48) and v(cid:48). This concludes the proof.
For a geodesic [u, v] on the ringed tree RT (k), we call its level sequence the sequence of levels it passes
by from u to v. Lemma 16 implies that the level sequence of any geodesic must be reversed unimodal: it
first decreases, and then increases (but the increasing or decreasing segment may be omitted). The following
lemma further characterizes geodesics in ringed-trees.
Lemma 17. Let u, v be two vertices, u be on level (cid:96), and u(cid:48) be the parent of u at level (cid:96) − 1. Suppose [u, v]
intersects level (cid:96) − 1, and let t be the intersection closest to u. Then d(u, t) ≤ 2, the segment [u, t] of [u, v]
and {u, u(cid:48)} are within distance 1 to each other.
Proof. Let t(cid:48) be the node just before t to u on [t, u]. d(t, u) ≤ 1 + dR(t, u(cid:48)) ≤ 1 + (dR(t(cid:48), u) + 1)/2 by
Lemma 16. As t is the closest node on level (cid:96) − 1 on the geodesic to u, d(t, u) ≥ 1 + dR(t(cid:48), u). We get
d(t(cid:48), u) ≤ 1 and d(t, u) ≤ 2 by combining these two inequalities. The segment [u, t] of [u, v] and {u, u(cid:48)}
are within distance 1 to each other since d(t, u(cid:48)) ≤ 1.
For two vertices u and v, we define the canonical geodesic (cid:104)u, v(cid:105) in a recursive fashion.
1. For u, v on the same level and dR(u, v) ≤ 3, (cid:104)u, v(cid:105) is the path on the ring from u to v.
2. For u, v on the same level but dR(u, v) > 3, let u(cid:48), v(cid:48) be parents of u, v respectively, then (cid:104)u, v(cid:105) =
[u, u(cid:48)] ∪ (cid:104)u(cid:48), v(cid:48)(cid:105) ∪ [v(cid:48), v].
26
3. For u, v on different levels, supposing u on upper level, let v(cid:48) be parent of v, then (cid:104)u, v(cid:105) = (cid:104)u, v(cid:48)(cid:105) ∪
[v(cid:48), v].
This is a well-founded definition. At each level of recursion, either the difference of levels of nodes de-
creases, or in the case of nodes on the same level, ring distance decreases by Lemma 16, until we reach the
base case, where dR(u, v) ≤ 3.
We prove now that canonical geodesics are really geodesics.
Lemma 18. For any u, v, (cid:104)u, v(cid:105) is a geodesic between u, v.
Proof. For u, v on the same level and dR(u, v) ≤ 3, we can check that (cid:104)u, v(cid:105) is a geodesic between u, v.
For u, v on the same level but dR(u, v) > 3, let u(cid:48), v(cid:48) be parents of u, v respectively. Let t, s be the
closest node to u, v to be in an upper level on [u, v] respectively. If t (cid:54)= u(cid:48), then d(u, t) ≥ 2 because the
only way to go up one level in one step is to go to the parent. By Lemma 17, [u, t] and {u, u(cid:48)} are within
distance 1 to each other. Therefore d(u(cid:48), t) = 1, as d(u, t) ≥ 2, and {u, u(cid:48)} ∪ [t, v] is also a geodesic
from u to v. This is also correct for t = u(cid:48). The same can be proved for s. By combining, we have that
{u, u(cid:48)} ∪ [t, s] ∪ {v(cid:48), v} is also a geodesic between u, v for any geodesics [t, s]. If we pick the canonical
geodesic (cid:104)t, s(cid:105), in any cases, this will be the canonical geodesic (cid:104)u, v(cid:105). Therefore, (cid:104)u, v(cid:105) is a geodesic.
For u, v on different levels, the induction is essentially the same as in the previous case, but we only
need to reason on t only on the side of u.
This concludes our induction.
4.3.2 Proof of Theorem 2: Quasi-isometry from infinite ringed tree to the Poincar´e disk
In this subsection, we will exhibit and prove a quasi-isometry from the infinite ringed tree RT (∞) to the
Poincar´e disk. We denote its distance dRT . We denote (D, dP ) the Poincar´e disk, where D is the open disk
of radius 1 on the complex plane.
Here is a brief summary of our approach here. First we propose a candidate of quasi-isometry, then
all possible cases of images of two points of ringed tree are divided into four categories, each of which
is separately analyzed. We then proceed with an analysis on the metric of ringed tree and show that the
candidate of quasi-isometry is effective, thus ringed tree and the Poincar´e disk are quasi-isometric.
The following inequalities are used in the following.
ln(x) ≤ cosh−1(x) ≤ ln(2x)
for x ≥ 1
2
π
1 − x
2
x ≤ sin(x) ≤ x for
≤ √
1 − x ≤ 1 − 3x
5
0 ≤ x ≤ π
2
for
0 ≤ x ≤ 1
2
To state the promised quasi-isometry, we give coordinates to nodes in RT (∞). We know that we can
number nodes with binary strings, which can be regarded as a number. For a node on the k-th level and
numbered by m, its coordinates are (k, m), with 0 ≤ m ≤ 2k − 1. The root is level 0.
Definition 7. Let the following mapping be the candidate of quasi-isometry :
1 − 2−ke2iπ m
f : RT (∞) → D, (k, m) (cid:55)→(cid:112)
2k
27
For 0 ≤ k ≤ (cid:96), m < 2(cid:96)−1, we define D(k, (cid:96), m) = dP (f (k, 0), f ((cid:96), m)). This is a distance in the Poincar´e
disk. Following is its full expression in k and m.
D(k, (cid:96), m) = cosh−1(1 + 2
= cosh−1(1 + 2(
(cid:107)√
1 − 2−k − √
(cid:113)
2(cid:96)(2k − 1) −(cid:113)
2−k−(cid:96)
1 − 2−(cid:96)e2iπ m
2(cid:96) (cid:107)2
)
(cid:113)
m
2(cid:96) ))
We also define D(cid:48)(k, (cid:96), m) = dRT (f (k, 0), f ((cid:96), m)), with 0 ≤ k ≤ (cid:96), m < 2(cid:96)−1. This is a distance in
ringed tree.
2(cid:96)(2(cid:96) − 1)2k(2k − 1) sin2(π
2k(2(cid:96) − 1))2 + 8
We will now try to bound D(k, (cid:96), m) with the following lemma.
Lemma 19. We have the following bounds on D(k, (cid:96), m).
1. For k = 0,
2. For 0 < k = (cid:96), m > 0,
ln(2)
2
(cid:96) +
ln(2)
2
≤ D(0, (cid:96), m) ≤ ln(2)
2
(cid:96) + ln(6).
ln(2)(4 + 2(cid:98)log2 m(cid:99)) ≤ D(k, k, m) ≤ ln(2)(4 + 2(cid:98)log2 m(cid:99)) + ln(
5
4π2 )for(k ≥ 1).
3. For m = 0, 1 ≤ k < (cid:96),
ln(2)((cid:96) − k) − ln(50) ≤ D(k, (cid:96), 0) ≤ ln(2)((cid:96) − k).
4. For 0 < k < (cid:96) and 0 < m < 2(cid:96)−k,
ln(2)((cid:96) − k) − ln(100) ≤ D(k, (cid:96), m) ≤ ln(2)((cid:96) − k) + ln(66π2).
5. For 0 < k < (cid:96) and 2(cid:96)−k ≤ m < 2(cid:96)−1,
ln(2)(k − (cid:96) + 2(cid:98)log2 m(cid:99) + 4) ≤ D(k, (cid:96), m) ≤ ln(2)(k − (cid:96) + 2(cid:98)log2 m(cid:99) + 6) + ln(π2 + 1).
Proof.
1. Case k = 0
D(0, (cid:96), m) = cosh−1(1 + 2
If (cid:96) = 0, D(0, 0, m) = 0. For (cid:96) ≥ 1, we have
(cid:112)
2(cid:96) − 1)
and
√
D(0, (cid:96), m) ≥ cosh−1(2
2(cid:96)−1) ≥ ln(2)
2
(cid:96) +
ln(2)
2
√
D(0, (cid:96), m) ≤ cosh−1(3
2(cid:96)) ≤ ln(2)
2
(cid:96) + ln(6).
28
2. Case 0 < k = (cid:96), m > 0
D(k, k, m) = cosh−1(1 + 2k+3(2k − 1) sin2(
Let a = (cid:98)log2 m(cid:99), we have
m
2k π))
D(k, k, m) ≥ cosh−1(22k+2 sin2(2a−kπ)) ≥ cosh−1(22k+2(2a+1−k)2) ≥ ln(2)(4 + 2a)
and
D(k, k, m) ≤ cosh−1(
5
4
22k+2 sin2(2a+1−kπ)) ≤ cosh−1(
22k+2(2a+1−kπ)2)
5
4
≤ ln(2)(4 + 2a) + ln(
5
4π2 )
3. Case 0 < k < (cid:96), m = 0
D(k, (cid:96), 0) = cosh−1(1 + 2(
(cid:113)
2(cid:96)(2k − 1) −(cid:113)
(cid:112)
1 − 2−k −(cid:112)
2k(2(cid:96) − 1))2)
1 − 2−(cid:96))2)
= cosh−1(1 + 2k+(cid:96)+1(
1 − 2−k > 0, and we have
As 1 ≤ k < (cid:96),
√
and
1 − 2−(cid:96) − √
(cid:112)
1 − 2−(cid:96) −(cid:112)
(cid:112)
1 − 2−(cid:96) −(cid:112)
1 − 2−k ≥ 1 − 2−(cid:96)−1 − 1 +
3
5
2−k ≥ 1
5
2−k−1
1 − 2−k ≤ 1 − 3
5
2−(cid:96) − 1 + 2−k−1 ≤ 2−k−1
Therefore, we have ln(2)((cid:96) − k) − ln(50) ≤ D(k, (cid:96), 0) ≤ ln(2)((cid:96) − k).
4. Case 0 < k < (cid:96), 0 < m < 2(cid:96)−1
We now deal with the general case with m > 0 and 0 < k < (cid:96).
(cid:113)
(cid:113)
(cid:113)
D(k, (cid:96), m) = cosh−1(cosh(D(k, (cid:96), 0)) + 8
2(cid:96)(2(cid:96) − 1)2k(2k − 1) sin2(π
m
2(cid:96) ))
We always note a = (cid:98)log2 m(cid:99), and we have
2(cid:96)(2(cid:96) − 1)2k(2k − 1) sin2(π
m
2(cid:96) ) ≥ 2(cid:96)+k−122a−2(cid:96)+2 = 2k−(cid:96)+2a+1
and
2(cid:96)(2(cid:96) − 1)2k(2k − 1) sin2(π
m
2(cid:96) ) ≤ 2(cid:96)+k22a+2−2(cid:96)π2 ≤ 2k−(cid:96)+2a+2π2
The previous bound on D(k, (cid:96), 0) transforms into the following by applying cosh.
2(cid:96)−k
100
≤ cosh(D(k, (cid:96), 0)) ≤ 2(cid:96)−k
Suitable substitution of cosh(D(k, (cid:96), 0)) gives
cosh−1(
2(cid:96)−k
100
+ 2k−(cid:96)+2a+4) ≤ D(k, (cid:96), m) ≤ cosh−1(2(cid:96)−k + 2k−(cid:96)+2a+5π2).
29
For 0 ≤ a ≤ (cid:96) − k, therefore 0 < m < 2(cid:96)−k,
D(k, (cid:96), m) ≥ cosh−1(
2(cid:96)−k
100
+ 2k−(cid:96)+2a+4) ≥ ln(
2(cid:96)−k
100
) = ln(2)((cid:96) − k) − ln(100)
and
D(k, (cid:96), m) ≤ cosh−1(2(cid:96)−k + 2k−(cid:96)+2a+5π2)
≤ ln(2(cid:96)−k33π2) + ln(2) = ln(2)((cid:96) − k + 1) + ln(33π2).
For (cid:96) − k + 1 ≤ a < m − 1, therefore 2(cid:96)−k ≤ m < 2(cid:96)−1,
D(k, (cid:96), m) ≥ cosh−1(
2(cid:96)−k
100
+ 2k−(cid:96)+2a+4) ≥ ln(2k−(cid:96)+2a+4) = ln(2)(k − (cid:96) + 2a + 4)
and
D(k, (cid:96), m) ≤ cosh−1(2(cid:96)−k + 2k−(cid:96)+2a+5π2)
≤ ln((π2 + 1)2k−(cid:96)+2a+5) + ln(2) = ln(2)(k − (cid:96) + 2a + 6) + ln(π2 + 1).
We will now try to relate D(k, (cid:96), m) and D(cid:48)(k, (cid:96), m) in the following lemma.
Lemma 20. For any 0 ≤ k ≤ (cid:96), 0 ≤ m < 2(cid:96)−1,
D(cid:48)(k, (cid:96), m) − ln(200) ≤ D(k, (cid:96), m) ≤ ln(2)D(cid:48)(k, (cid:96), m) + ln(66π2)
ln(2)
2
In the first case, D(cid:48)(k, k, 1) = 1. In the second case, as the ancestor of any node (k, m) is (k − 1,(cid:98) m
Proof. Consider the canonical geodesic. If k = (cid:96) and m = 1, it is an edge from (k, 0) to (k, 1). In other
cases, it goes up first from ((cid:96), m) to a certain ancestor, then makes 2 or 3 moves on the ring, and finished by
going straight down to (k, 0).
2 (cid:99)),
by the form of canonical geodesics, we should first go up (cid:96) − k steps to reach level k. If m ≤ 2(cid:96)−k+1, it
reaches (k, 0) by at most an extra step. In this case, (cid:96) − k ≤ D(cid:48)(k, (cid:96), m) ≤ (cid:96) − k + 1. If m > 2(cid:96)−k+1,
we go up (cid:98)log2 m(cid:99) − 1 steps from ((cid:96), m) to reach an ancestor numbered 2 or 3, then go 2 or 3 steps on
the ring to the node numbered 0 on the same level, and finish by going down to (k, 0). Thus we have
2(cid:98)log2 m(cid:99) + k − (cid:96) ≤ D(cid:48)(k, (cid:96), m)2(cid:98)log2 m(cid:99) + k − (cid:96) + 1 in this case.
We conclude by comparing to bounds in Lemma 19.
We want to bound distance between any two points in RT (∞) with the following lemma.
Lemma 21. For u1, v1, u2, v2 ∈ RT (∞) with u1, v1, u2, v2 on the same level and dR(u1, v1) = dR(u2, v2),
we have d(u1, v1) − d(u2, v2) ≤ 3.
Proof. Let A = dR(u1, v1). It is clearly correct when A ≤ 3 by the structure of canonical geodesics.
For A ≤ 3, when we consider the canonical geodesics, we take successive ancestors of u1 and v1 until
their distance is 2 or 3. This takes at least (cid:98)log2 A(cid:99) − 1 generations, but at most (cid:98)log2(A − 1)(cid:99). These
bounds differ by at most 1. Platforms differ by at most 1, therefore d(u1, v1) − d(u2, v2) ≤ 3.
30
Proof of Theorem 2. By symmetry, Lemma 21 and Lemma 20, for any u, v ∈ Rt(∞), we have:
ln(2)
2
dRT (u, v) − ln(200) ≤ dP (f (u), f (v)) ≤ ln(2)dRT (u, v) + ln(66π2)
There is only one thing left to prove quasi-isometry. We will now prove that for some constant ,
B(f (RT (∞)), ) covers the Poincar´e disk. Images of each level are all on concentric circles, and the differ-
ence of radius between successive levels can be bounded by ln(6). Distance between images of neighboring
nodes on the same level can be bounded by ln(16). For any point in the Poincar´e disk, its distance to
the nearest image of nodes is bounded by ln(96), by first moving straight away from 0 until reaching a
concentric circle of images, then take the shortest path to reach image of a certain node.
ln(2) , ln(66π2))-quasi-isometry from RT (∞) to the Poincar´e disk, thus RT (∞)
This proves f to be a ( 2
and the Poincar´e disk are quasi-isometric. Constants we found here are not tight.
4.3.3 A direct proof of Corollary 15
We begin with a lemma about the distance between a general geodesic and the corresponding canonical
geodesic.
Lemma 22. For any geodesic [u, v], [u, v] and (cid:104)u, v(cid:105) are within distance 1 to each other.
Proof. We perform an induction on the structure of (cid:104)u, v(cid:105).
For u, v on the same level and dR(u, v) ≤ 3, we can check that [u, v] and (cid:104)u, v(cid:105) are within distance 1 to
each other.
For u, v on the same level but dR(u, v) > 3, let u(cid:48), v(cid:48) be parents of u, v respectively. We have (cid:104)u, v(cid:105) =
(cid:104)u, u(cid:48)(cid:105) ∪ (cid:104)u(cid:48), v(cid:48)(cid:105) ∪ (cid:104)v(cid:48), v(cid:105) by construction. By Lemma 17, the parts of [u, v] that are on the same level with
u, v verify the condition already. We only need to deal with the part on levels with lower numbering.
Let t, s be the closest node to u, v that are in an upper level on [u, v] respectively. If t (cid:54)= u(cid:48), then
d(u, t) ≥ 2 because the only way to go up one level in one step is to go to the parent. By Lemma 17, [u, t]
and (cid:104)u, u(cid:48)(cid:105) are within distance 1 to each other. Therefore d(u(cid:48), t) = 1, as d(u, t) ≥ 2, (cid:104)u, u(cid:48)(cid:105)∪(cid:104)u(cid:48), t(cid:105)∪ [t, v]
is also a geodesic from u to v. This is also correct for t = u(cid:48). The same can be proven for s. By combining
the above, we have that (cid:104)u, u(cid:48)(cid:105) ∪ (cid:104)u(cid:48), t(cid:105) ∪ [t, s] ∪ (cid:104)s, v(cid:48)(cid:105) ∪ (cid:104)v(cid:48), v(cid:105) is also a geodesic between u, v. Thus the
section (cid:104)u(cid:48), t(cid:105) ∪ [t, s] ∪ (cid:104)s, v(cid:48)(cid:105) is also a geodesic from u(cid:48) to v(cid:48). By induction hypothesis, it is within distance
1 to (cid:104)u(cid:48), v(cid:48)(cid:105). However, this geodesic contains the part of [u, v] on levels with lower numbering than that of
u, v, which is precisely [t, s]. We conclude that [u, v] and (cid:104)u, v(cid:105) are within distance 1 to each other.
For u, v on different levels, the induction is essentially the same as in the previous case, but we only
need to reason on t on the side of u.
This concludes our induction.
Lemma 23. Let u and v be two vertices at the same level (cid:96) such that (cid:104)u, v(cid:105) stays at level (cid:96). Then for any
vertex w, (cid:104)u, w(cid:105) and (cid:104)v, w(cid:105) are within distance 3 of each other.
0 be the highest levels reached by (cid:104)u, w(cid:105) and (cid:104)v, w(cid:105), respectively. Without loss of
Proof. Let (cid:96)0 and (cid:96)(cid:48)
generality, we assume that (cid:96)0 ≥ (cid:96)(cid:48)
Consider the base case of (cid:96) = (cid:96)0. Let w(cid:48) be the ancestor of w at level (cid:96)0. Thus we know that both (cid:104)w(cid:48), u(cid:105)
and (cid:104)u, v(cid:105) stay at level (cid:96)0. By definition dR(w(cid:48), u) ≤ 3 and dR(u, v) ≤ 3. We can enumerate all the possible
0 ≥ (cid:96)0 − 1), and
cases of u, v, w(cid:48) arrangement to check that (cid:104)w(cid:48), v(cid:105) is at most one level higher than (cid:96)0 (i.e., (cid:96)(cid:48)
(cid:104)w(cid:48), v(cid:105) and (cid:104)w(cid:48), u(cid:105) are within distance 3 of each other. Since (cid:104)u, w(cid:105) and (cid:104)v, w(cid:105) share the portion (cid:104)w, w(cid:48)(cid:105),
the lemma holds for the case of (cid:96) = (cid:96)0.
0. Thus (cid:96) ≥ (cid:96)0. We prove the lemma by an induction on (cid:96).
31
For the induction step, consider (cid:96) > (cid:96)0. Let u(cid:48) and v(cid:48) be the parents of u and v, respectively. By
Lemma 16 and dR(u, v) ≤ 3, we know that dR(u(cid:48), v(cid:48)) ≤ 2. Then (cid:104)u(cid:48), v(cid:48)(cid:105) must stay at level (cid:96) − 1. By
induction hypothesis, (cid:104)u(cid:48), w(cid:105) and (cid:104)v(cid:48), w(cid:105) are within distance 3 of each other. Since (cid:104)u, w(cid:105) = (cid:104)u, u(cid:48)(cid:105)∪(cid:104)u(cid:48), w(cid:105),
(cid:104)v, w(cid:105) = (cid:104)v, v(cid:48)(cid:105) ∪ (cid:104)v(cid:48), w(cid:105), and dR(u, v) ≤ 3, we know that the lemma holds in this case.
We define canonical triangle ∆(u, v, w) to be a geodesic triangle in which all sides are canonical
geodesics.
Lemma 24. Any canonical triangle ∆(u, v, w) in RT (k) is 3-slim.
Proof. Without loss of generality, let u be the vertex at the lowest level, which is (cid:96). We prove the lemma by
an induction on (cid:96). The base case of (cid:96) = 0 is trivial.
Consider the induction step with (cid:96) > 0. If neither v nor w is at level (cid:96), then both (cid:104)u, v(cid:105) and (cid:104)u, w(cid:105) go
through u's parent u(cid:48). By induction hypothesis, we know that ∆(u(cid:48), v, w) is 3-slim. Adding u in this case
does not change the distance among the sides, and thus ∆(u, v, w) is also 3-slim. Suppose now that v or w
or both are at level (cid:96). In the first case, suppose that at least one pair, say u and v, is such that (cid:104)u, v(cid:105) stays
at level (cid:96). By Lemma 23, we know that (cid:104)u, w(cid:105) and (cid:104)v, w(cid:105) are within distance 3 of each other. Since (cid:104)u, v(cid:105)
has length at most 3, we know that ∆(u, v, w) is 3-slim. In the second case, suppose that all pairs at level
(cid:96) have their canonical geodesics into level (cid:96) − 1. For each vertex at level (cid:96), we take its parent, together
with perhaps another vertex already within level (cid:96)− 1, we can apply the induction hypothesis and show that
their canonical triangle is 3-slim. Since for every vertex at level (cid:96), its canonical geodesics to the other two
vertices all go through its parent, the vertices at level (cid:96) do not change the distance between any pair of sides
of the canonical triangle. Therefore, ∆(u, v, w) is 3-slim.
With Lemmas 22 and 24, we can provide a direct proof of Corollary 15.
Direct proof of Corollary 15. We use Rips condition here. For any u, v, w, By Lemma 22, we have [u, v] ⊆
B((cid:104)u, v(cid:105), 1). By Lemma 24, we have (cid:104)u, v(cid:105) ⊆ B((cid:104)u, w(cid:105) ∪ (cid:104)v, w(cid:105), 3). By Lemma 22 again, we have
(cid:104)u, w(cid:105) ∪ (cid:104)v, w(cid:105) ⊆ B([u, w] ∪ [v, w], 1). Therefore, we conclude that [u, v] ⊆ B([u, w] ∪ [v, w], 5), and thus
δRips(RT (k)) ≤ 5. Since δ(RT (k)) ≤ 8δRips(RT (k)), we have δ(RT (k)) ≤ 40.
4.3.4 Proof of Theorem 3
We now apply Rips condition to analyze the hyperbolicity of ringed trees with limited long-range edges
RT (k, f ). First we show that a geodesic in RT (k, f ) cannot make too many hops at the same level of
the ringed tree. For any two vertices in a graph G ∈ RT (k, f ), let [u, v] denote any one of the geodesics
between u and v in G, while (cid:104)u, v(cid:105) still denote the canonical geodesic between u and v in the base ringed
tree RT (k).
Lemma 25. For any u, v on the same level in RT (k) with d(u, v) > 1, 2 log2 dR(u, v) ≤ d(u, v) ≤
2 log2(dR(u, v) − 1) + 2.
Proof. We perform induction on dR(u, v).
If
dR(u, v) > 3, let u(cid:48), v(cid:48) be parents of u, v respectively. By induction hypothesis, 2 log2 dR(u(cid:48), v(cid:48)) ≤
d(u(cid:48), v(cid:48)) ≤ 2 log2(dR(u(cid:48), v(cid:48))− 1) + 2. By triangle inequality, d(u, v) ≤ d(u(cid:48), v(cid:48)) + 2 ≤ 2 log2(dR(u(cid:48), v(cid:48))−
1) + 4. But dR(u(cid:48), v(cid:48)) − 1 ≤ (dR(u, v) − 1)/2 by Lemma 16. And we have d(u, v) ≤ 2 log2(dR(u(cid:48), v(cid:48)) −
1) + 4 ≤ 2 log2(dR(u, v) − 1) + 2. On the other hand, d(u, v) ≥ 2 + d(u(cid:48), v(cid:48)) ≥ 2 log2(2dR(u(cid:48), v(cid:48))). As
dR(u(cid:48), v(cid:48)) ≥ dR(u, v)/2, we have d(u, v) ≥ 2 log2 dR(u, v). Combining this two inequalities concludes the
induction.
If 1 < dR(u, v) ≤ 3, we can check that it is correct.
32
Corollary 26. For any u, v on the same level in RT (k), d(u, v) ≤ 2 log2 dR(u, v) + 2.
Proof. We check for the case d(u, v) = 1 and it is satisfied. For d(u, v) > 1, this results directly from
d(u, v) ≤ 2 log2(dR(u, v) − 1) + 2 ≤ 2 log2 dR(u, v) + 2.
Lemma 27. For a graph in the class RT (k, f ) and two vertices u and v at the same level j, if [u, v] never
goes into vertices at level i < j, then d(u, v) ≤ max(32, 4 log2 f (n))−1 and dR(u, v) ≤ f (n) max(32, 4 log2 f (n))−
1.
Proof. First, we will prove dR(u, v)/f (n) ≤ d(u, v) ≤ 2 log2 dR(u, v) + 2. The first inequality is because
the shortest distance from u to v without going into vertices in level i < j in the base ringed tree RT (k)
is dR(u, v), and each long-range edge can jump at most f (n) hops on the ring at any level. The second
inequality results directly from Corollary 26. Let x = d(u, v). From the above two inequalities, we have
x ≤ 2 log2 xf (n) + 2. Then, f (n) ≥ 2(x−2)/2/x ≥ 2(x+1)/4 for x ≥ 32, and thus x = d(u, v) ≤
max(32, 4 log2 f (n)) − 1. It follows that dR(u, v) ≤ f (n) max(32, 4 log2 f (n)) − 1.
Lemma 28. For a graph in the class RT (k, f (n)) and two vertices u and v, [u, v] and (cid:104)u, v(cid:105) are within
distance 2 max(32, 4 log2 f (n)) to each other.
Proof. The case of u and v are ancestor and descendant to each other on the tree are trivial. Thus we
(cid:104)(cid:105)
0 and (cid:96)[ ]
consider the case that u and v are not ancestor and descendant to each other. Let (cid:96)
0 be the innermost
(cid:104)(cid:105)
level that geodesics (cid:104)u, v(cid:105) and [u, v] reach, respectively. If (cid:96)[ ]
0 , then [u, v] uses at least two more tree
0 < (cid:96)
edges than (cid:104)u, v(cid:105). This means (cid:104)u, v(cid:105) uses at least two ring edges. If (cid:104)u, v(cid:105) uses exactly two ring edges, all
edges in [u, v] must be tree edges, which is impossible to be a geodesic given that u and v are not ancestor
and descendant to each other. Thus, (cid:104)u, v(cid:105) uses exactly three ring edges. Then [u, v] uses exactly one ring
(cid:104)(cid:105)
or long-range edge. Let u(cid:48) and v(cid:48) be the ancestors of u and v at level (cid:96)
0 , respectively. In this case, the only
(cid:104)(cid:105)
0 − 1, and (b) the parents of u(cid:48) and v(cid:48) are connected either by a ring edge
possible situation is : (a) (cid:96)[ ]
0 = (cid:96)
or a long-range edge, which is used by [u, v]. Hence, [u, v] and (cid:104)u, v(cid:105) share the tree edges from u to u(cid:48) and
v(cid:48) to v, and (cid:104)u, v(cid:105) goes through ring edges from u(cid:48) to v(cid:48) while [u, v] goes through the edge connecting the
parents of u(cid:48) and v(cid:48). We thus have that [u, v] and (cid:104)u, v(cid:105) are within distance 1 of each other. Therefore, from
now on, we consider (cid:96)[ ]
(cid:96)u ≥ (cid:96)v ≥ (cid:96)[ ]
0 .
0 ≤ (cid:96) ≤ (cid:96)u, let x(cid:96) be the first level-(cid:96) vertex on
geodesic [u, v] starting from u, and let y(cid:96) be the first level-(cid:96) vertex on geodesic (cid:104)u, v(cid:105) starting from u. We
claim that dR(x(cid:96), y(cid:96)) ≤ f (n) max(32, 4 log2 f (n)).
prove the claim for level (cid:96)−1. By the induction hypothesis, we know that dR(x(cid:96), y(cid:96)) ≤ f (n) max(32, 4 log2 f (n)).
Let x(cid:48)
portion [x(cid:96), x(cid:48)
dR(x(cid:48)
parents of x(cid:48)
claim holds for level (cid:96) − 1. By induction, our claim stands.
(cid:96) be the level-(cid:96) vertex just before x(cid:96)−1 on [u, v] starting from u. By Lemma 27 and the fact that the
(cid:96)) ≤ f (n) max(32, 4 log2 f (n)) − 1 . Therefore,
(cid:96)] never goes to level i < (cid:96), we have dR(x(cid:96), x(cid:48)
(cid:96), y(cid:96)) ≤ dR(x(cid:96), y(cid:96)) + dR(x(cid:96), x(cid:48)
(cid:96)) ≤ 2f (n) max(32, 4 log2 f (n)) − 1. Since x(cid:96)−1 and y(cid:96)−1 are the
(cid:96) and y(cid:96) respectively, by Lemma 16 we have dR(x(cid:96)−1, y(cid:96)−1) ≤ f (n) max(32, 4 log2 f (n)). Our
0 ≤ (cid:96) ≤ (cid:96)u. For
(cid:96) on [u, v] (note that x may be at a level (cid:96)(cid:48) ≥ (cid:96)), by Lemma 27 we have
We thus have d(x(cid:96), y(cid:96)) ≤ 2 log2(dR(x(cid:96), y(cid:96))) + 2 ≤ max(32, 4 log2 f (n)), for all (cid:96)[ ]
Let (cid:96)u and (cid:96)v be the levels of u and v respectively. Without loss of generality, We can suppose that
For level (cid:96)u, it is trivial. Suppose that our claim is correct for some level (cid:96) > (cid:96)[ ]
0 , and we inductively
0 ≥ (cid:96)
(cid:104)(cid:105)
0 .
For any level (cid:96) both reachable by [u, v] and (cid:104)u, v(cid:105), i.e., (cid:96)[ ]
any vertex x between x(cid:96) and x(cid:48)
33
to z
(cid:96)[ ]
0
, w
(cid:96)[ ]
0
(cid:96)[ ]
0
0 , and d(z
in geodesic [u, v], and from y
(cid:96), x(cid:96)) + d(x(cid:96), y(cid:96)) ≤ 2 max(32, 4 log2 f (n)). Hence all such vertices
d(x, y(cid:96)) ≤ d(x, x(cid:96)) + d(x(cid:96), y(cid:96)) ≤ d(x(cid:48)
x are within distance 2 max(32, 4 log2 f (n)) from vertex y(cid:96) in (cid:104)u, v(cid:105), and vice versa.
Similarly, we can define z(cid:96) to be the the first level-(cid:96) vertex on geodesic [v, u] starting from v, and w(cid:96) to
be the first level-(cid:96) vertex on geodesic (cid:104)v, u(cid:105) starting from v, for all (cid:96)[ ]
0 ≤ (cid:96) ≤ (cid:96)v. By a symmetric argument,
we can show that w(cid:96) are within distance 2 max(32, 4 log2 f (n)) from all vertices in the segment of [u, v]
) ≤ max(32, 4 log2 f (n)).
from z(cid:96)−1 to z(cid:96) for (cid:96) > (cid:96)[ ]
The only portion left to argue is from x
(cid:96)[ ]
0
(cid:104)u, v(cid:105). By Lemma 27 and the definition of (cid:96)[ ]
0 , we know that d(x
fore, all vertices in the segment from x
to z
both y
bound the distance from x to [u, v]. Since dR(y
3f (n) max(32, 4 log2 f (n)), we have d(y
, w
Thus, for any vertex x in the segment from y
z
(cid:96)[ ]
0
[u, v].
Proof of Theorem 3. We use Rips condition here. For any u, v, w, by Lemma 28, we have [u, v] ⊆ B((cid:104)u, v(cid:105),
2 max(32, 4 log2 f (n))). By Lemma 24, (cid:104)u, v(cid:105) ⊆ B((cid:104)u, w(cid:105) ∪ (cid:104)v, w(cid:105), 3). Again by Lemma 28, (cid:104)u, w(cid:105) ∪
(cid:104)v, w(cid:105) ⊆ B([u, w]∪[v, w], 2 max(32, 4 log2 f (n))). Combining these together, we have [u, v] ⊆ B([u, w]∪
[v, w], 4 max(32, 4 log2 f (n)) + 3). Therefore, since δ and δRips differ within a constant factor, we have
δ(RT (k, f )) ≤ c log f (n) for some constant c.
in geodesic
) ≤ max(32, 4 log2 f (n)). There-
in geodesic [u, v] are within 2 max(32, 4 log2 f (n)) to
in geodesic (cid:104)u, v(cid:105), we need to
(cid:96)[ ]
) ≤
0
) + 2 ≤ max(32, 4 log2 f (n)).
and
in at most 2 max(32, 4 log2 f (n)) hops. Therefore, x is within distance 2 max(32, 4 log2 f (n)) from
. Now, for any vertex x in the segment from y
) ≤ dR(y
in geodesic (cid:104)u, v(cid:105), x can reach either x
(cid:96)[ ]
0
(cid:96)[ ]
0
, w
, x
(cid:96)[ ]
(cid:96)[ ]
) ≤ 2 log2 dR(y
0
0
to w
(cid:96)[ ]
0
(cid:96)[ ]
0
(cid:96)[ ]
0
, z
(cid:96)[ ]
0
(cid:96)[ ]
0
) + dR(x
, z
(cid:96)[ ]
0
(cid:96)[ ]
0
) + dR(z
and w
, w
(cid:96)[ ]
0
(cid:96)[ ]
0
to w
(cid:96)[ ]
0
, w
(cid:96)[ ]
0
(cid:96)[ ]
0
(cid:96)[ ]
0
(cid:96)[ ]
0
(cid:96)[ ]
0
(cid:96)[ ]
0
(cid:96)[ ]
0
(cid:96)[ ]
0
to w
(cid:96)[ ]
0
(cid:96)[ ]
0
4.3.5 Proof of Theorem 4
We first analyze the δ-hyperbolicity of RRT (k, e−αdR(u,v)).
Proof of Theorem 4, part 1. eα ≤ ρ = (cid:80)
v∈V \{u} e−dR(u,v)α ≤ 2(cid:80)+∞
i=1 eiα. Therefore, ρ = Θ(1). A
vertex u on the leaves of RT (k) has a long-range edge with ring distance greater than k with probability
Θ(e−kα)/ρ. Let k = 2
α log n, we know that a vertex has a long-range edge of ring distance greater than
α log n with probability Θ(1/n2) = o(1/n).
rem 3 it follows that δ(RRT (k, e−αdR(u,v))) = O(log log n), for any α > 0.
Therefore, with probability 1 − o(1), long-range edges never exceed ring distance 2
α log n. From Theo-
2
For the case of δ(RRT (k, dR(u, v)−α)), we first look at a lemma about the effect of long-range edges
with ring distance Ω(nc) on δ-hyperbolicity of ringed trees.
Lemma 29. If we add an edge between u and v on the outermost ring of a k level ringed tree with dR(u, v) ≥
c(cid:48)nc, for some constants c and c(cid:48), then the resulted graph G (possibly with other edges on the outermost
ring) has δ(G) = Ω(log n).
Proof. Let w be a node of lowest layer number on (cid:104)u, v(cid:105). By Lemma 25 and the structure of canonical
geodesic, d(w, u) ≥ (2 log2 c(cid:48)nc − 3)/2 ≥ c log2 n + log2 c(cid:48) − 3/2. We consider the midpoint x of
[u, w]. For any point y in [v, w], by considering the canonical geodesic (cid:104)x, y(cid:105), we know that d(x, y) ≥
(c log2 n + log2 c(cid:48) − 3/2)/2 − 3. Therefore ∆(u, v, w) is at best ((c log2 n + log2 c(cid:48) − 3/2)/2 − 3)-slim,
and thus δ(G) = δRips(G) = Ω(log n).
34
A probabilistic version comes naturally as the following corollary.
Corollary 30. For a random graph G formed by linking edges on leaves of a ringed tree. if for some constant
c with 0 < c < 1, with high probability there exists an edge linking some u and v with dR(u, v) = Θ(nc),
then with high probability δ(G) = Θ(log n).
Proof. Diameter of ringed tree gives O(log n) upper bound. Lemma 29 gives Ω(log n) lower bound.
We can now estimate the δ-hyperbolicity of RRT (k, dR(u, v)−α).
Proof of Theorem 4, part 2. Note that in a ringed tree with n vertices, at least n/2 of them are leaves. For
a constant c with 0 < c < 1 and a fixed vertex u, the probability that the long-range edge (u, v) has
dR(u, v) ≤ (n/4)c (we say that it is good) is p = 2ρ−1(cid:80)(n/4)c
d=1 d−α, where ρ = Θ((cid:80)n
For 0 < α < 1, p = O(n(1−α)(c−1)) = o(1). For α = 1, p = c + o(1). In these two cases, all edges are
For α > 1, ρ = O(1). We take q = 1 − p. We have q = O(nc(1−α)). By picking c = min(1,
good with probability at most (c + o(1))(n/2) = o(1).
we have q = O(n−1/2). All edges are good with probability (1 − q)n/2 = O(e−√
In all three cases, by Corollary 30, with probability 1 − o(1), δ(RRT (k, dR(u, v)−α)) = Θ(log n).
Finally, we estimate the δ-hyperbolicity of RRT (k, 2−αh(u,v)).
d=1 d−α).
n) = o(1).
2(α−1) ),
1
h=1
h=1
L /(1 − 21−α) for α (cid:54)= 1, and ρ = 1
2 log2 nL for α = 1. For α (cid:54)= 1, p(c) = n
leaves v such that h(u, v) = h. Therefore ρ = (cid:80)log2 nL
p(c) = ρ−1(cid:80)c log2 nL
Proof of Theorem 4, part 3. We note nL = (n + 1)/2 the number of leaves. Fix a leaf u. There are 2h−1
2h−1−αh. For a constant c with 0 < c < 1, let
2h−1−αh be the probability that u never links to any v with h(u, v) ≥ c log2 n. We
−(1−α)(1−c)
have ρ = 2−αn1−α
.
L
For α = 1, p(c) = c.
For the case α ≤ 1, p(1/2) = O(1). Therefore with probability (1 − p(1/2))nL = o(1) there exists
some u, v linked together with h(u, v) ≥ 1
2(α−1) ),
nL) = o(1) linked together with
and p(c0) = n
h(u, v) ≥ c0 log2 nL. In any cases, with 1− o(1) probability, there exists u, v linked together by long-range
edge with h(u, v) ≥ c log2 nL for some constant c. We notice that this occurs uniformly through all edges.
Given u, v with h(u, v) = h, dR(u, v) < 2h/2 with probability at most 2h21−2h = 21−h by simply
counting pairs within ring distance 2h/2. With h(u, v) ≥ c log2 nL, c > 0, we know that with probability
1 − 2n−c
L . Combining with the previous analysis, we
prove that with 1 − o(1) probability, there exists u, v linked together by long-range edge with dR(u, v) ≥
L for some constant c > 0. By Corollary 30 and by nL > n/2, with probability 1 − o(1) we have
nc/2
δ(RRT (k, 2−αh(u,v))) = Θ(log n).
. Therefore with probability (1 − p(c0))nL = O(e−√
L = 1 − o(1) we have dR(u, v) ≥ 2h/2 = nc/2
2 log2 n. For α > 1, we take constant c0 = min(1,
−1/2
L
1
4.3.6 Proof of Theorem 5
We can order a binary tree to give it a ring distance. We will suppose that such a distance is defined
hereinafter. We begin with a counter part of Lemma 29 in binary tree.
Lemma 31. If there is an edge between two leaves u, v of a binary tree of size n with distance to lowest
common ancestor h(u, v) = c1 log2 n + c2 for some constant c1 > 0, c2 > 0, then the resulted graph G
(possibly with other edges on the outermost ring) has δ(G) = Ω(log n).
35
Proof. Consider w the lowest common ancestor of u, v, and x the midpoint of [u, w]. We have d(x, w) =
d(w, u)/2 = h(u, v)/2. For any y in [w, v], d(x, y) ≥ h(u, v)/2, as the only path in the tree from y to x
always passes by w, and we need to climb h(u, v)/2 levels if we use links on leaves. Therefore ∆(u, v, w)
is at best h(u, v)/2 = 1
2 (c1 log2 n + c2), and we conclude that δ(G) = Ω(log n).
Corollary 32. For a random graph G formed by linking edges on leaves of a binary tree. if for some constant
c with 0 < c < 1, with high probability there exists an edge linking some u and v with h(u, v) = Θ(log n),
then with high probability δ(G) = Θ(log n).
Proof. Diameter of binary tree gives O(log n) upper bound. Lemma 31 gives Ω(log n) lower bound.
Proof of Theorem 5. For RBT (k, e−αdR(u,v)), the height of the whole tree is h = (cid:98)log2 n(cid:99). There are
√
n) subtrees of height h/2, with the root at the level h/2. For every neighboring such subtrees, the
Θ(
rightmost leaf u on the left subtree and the leftmost leaf v on the right subtree verifies dR(u, v) = 1,
h(u, v) ≥ h/2. For each leaf, ρ = O(1). Therefore, for u, v with dR(u, v) = 1, there is an extra edge
n such pairs, with probability 1 − (1 −
between u, v with constant probability e−αρ−1 > 0. As there are
n = 1 − o(1), there is a pair of leaves u, v linked by an extra edge with dR(u, v) = 1, h(u, v) ≥
e−αρ−1)
h/2 = Θ(log n). By Corollary 32, with probability 1 − o(1), δ(RBT (k, e−αdR(u,v))) = Θ(log n).
For RBT (k, dR(u, v)−α) and RBT (k, 2−αh(u,v)), using the same analysis in the proof of Theorem 4,
we know that for some constant c > 0, with 1 − o(1) probability, there is an extra edge between u, v with
dR(u, v) = Ω(nc). We have h(u, v) = Ω(log n) because a subtree of height h spans a ring distance at most
2h. By Corollary 32, we have δ(RBT (k, dR(u, v)−α)) = δ(RBT (k, 2−αh(u,v))) = Θ(log n).
√
√
4.4 Extensions of random ringed tree model
We will now discuss some extensions of the random ringed tree (RRT) model, and show that our results still
hold for these extensions, thus extending its expressivity.
We start from some observations in the proof of Theorem 4.
In this proof, the upper bound of δ-
hyperbolicity is given by Theorem 3, and the lower bound is given by Corollary 30. In the statement of
Theorem 3, by the definition of RT (k, f ), only a uniform bound of ring distance dR(u, v) for each long-
range edge (u, v) is considered. In the statement of Corollary 30, the only quantity concerning a long-range
edge (u, v) is also the ringed distance between u and v, and to apply this corollary, we only need to show that
a long-range edge (u, v) with dR(u, v) = Θ(nc) for some constant c exists with high probability. Therefore,
the proof of Theorem 4 relies only on the ring distances of long-range edges.
To extend the RRT model while keeping similar properties on δ-hyperbolicity, we only need to show
that Theorem 3 and Corollary 30 are still applicable in these extensions. We will here discuss two extensions
on choosing long-range edges.
A constant number of long-range edges for each node. In the original RRT model, each node only have
one long-range edge connecting to other nodes. We can extend the model to allow each node to have a
constant number of long-range edges connecting to a constant number of other nodes. In this extension,
Theorem 4 still holds, since Theorem 3 is not concerned by the number of long-range edges, and Corollary
30 is still applicable as the required probability only increases with extra long-range edges.
Independent long-range edges. In the original RRT model, we choose exactly one long-range edge for
each node. A variant of the model is that each node u can choose edge (u, v) independently from other
edges (u, v(cid:48)), with the same probability as in the original model such that on expectation u connect out with
one long-range edge. In this variant, Theorem 4 still holds. The reason is that in expectation, at least a
36
constant fraction of nodes issue only one edge, and the computation for applying Corollary 30 stays similar.
It is clear that the application of Theorem 3 stays valid.
In the two variants discussed above, we can see that Theorem 4 still applies, and we have exactly the
same property on δ-hyperbolicity of these variants. We can also combine these two variants, and it is clear
that our results are still valid.
5 Discussions and open problems
Perhaps the most obvious extension of our results is to close the gap in the bounds on the hyperbolicity in
the low-dimensional small-world model when γ is at the "sweetspot," as well as extending the results for
large γ to dimensions d ≥ 2. Also of interest is characterizing in more detail the hyperbolicity properties of
other random graph models, in particular those that have substantial heavy-tailed properties. Finally, exact
computation of δ by its definition takes O(n4) time, which is not scalable to large graphs, and thus the
design of more efficient exact or approximation algorithms would be of interest.
From a broader perspective, however, our results suggest that δ is a measure of tree-like-ness that can
be quite sensitive to noise in graphs, and in particular to randomness as it is implemented in common
network generative models. For example, the ringed trees have constant hyperbolicity but once adding some
random links among leaves, our results show that very likely their hyperbolic δ reaches the level of graph
diameter and they become not hyperbolic at all. Moreover, our results for the δ hyperbolicity of rewired trees
(Theorem 5) versus rewired low-δ tree-like metrics (Theorem 4 (1)) suggest that, while quite appropriate for
continuous negatively-curved manifolds, the usual definition of δ may be somewhat less useful for discrete
graphs. Thus, it would be of interest to address questions such as: does there exist a measure other than
Gromov's δ that is more appropriate for graph-based data or more robust to noise/randomness as it is used in
popular network generation models; is it possible to incorporate in a meaningful way nontrivial randomness
in other low δ-hyperbolicity graph families; and can we construct non-trivial random graph families that
contain as much randomness as possible while having low δ-hyperbolicity comparing to graph diameter?
Acknowledgments
We are grateful to Yajun Wang and Xiaohui Bei for their helpful discussions on this topic.
References
[1] I. Abraham, M. Balakrishnan, F. Kuhn, D. Malkhi, V. Ramasubramanian, and K. Talwar. Reconstruct-
ing approximate tree metrics. In Proceedings of the 26th Annual ACM Symposium on Principles of
Distributed Computing, pages 43 -- 52, 2007.
[2] Y. Baryshnikov. On the curvature of the Internet. in Workshop on Stochastic Geometry and Teletraffic,
Eindhoven, The Netherlands, April 2002.
[3] Y. Baryshnikov and G. H. Tucci. Asymptotic traffic flow in an hyperbolic network I: Definition and
properties of the core. Technical Report Preprint: arXiv:1010.3304, 2010.
37
[4] S. Bermudo, J. M. Rodr´ıguez, J. M. Sigarreta, and J.-M. Vilaire. Mathematical properties of Gromov
hyperbolic graphs. In Proceedings of the 2010 International Conference of Numerical Analysis and
Applied Mathematics, pages 575 -- 578, 2010.
[5] M. Bogun´a, D. Krioukov, and K. Claffy. Navigability of complex networks. Nature Physics, 5:74 -- 80,
2009.
[6] B. H. Bowditch. Notes on Gromov's hyperbolicity criterion for path-metric spaces. Group theory from
a geometrical viewpoint (Trieste, 1990), pages 64 -- 167, 1991.
[7] M. R. Bridson and A. Haefliger. Metric Spaces of Non-Positive Curvature. Springer, 1999.
[8] V. Chepoi and F. Dragan. A note on distance approximating trees in graphs. European Journal of
Combinatorics, 21(6):761 -- 766, 2000.
[9] V. Chepoi, F. F. Dragan, B. Estellon, M. Habib, and Y. Vax`es. Diameters, centers, and approximating
trees of δ-hyperbolic geodesic spaces and graphs. In Proceedings of the 24th Annual Symposium on
Computational Geometry, pages 59 -- 68. ACM, 2008.
[10] V. Chepoi, F. F. Dragan, B. Estellon, M. Habib, Y. Vax`es, and Y. Xiang. Additive spanners and distance
and routing labeling schemes for hyperbolic graphs. Algorithmica, 62(3-4):713 -- 732, 2012.
[11] V. Chepoi and B. Estellon. Packing and covering δ-hyperbolic spaces by balls. In Proceedings of the
10th International Workshop on Approximation, pages 59 -- 73, 2007.
[12] F. de Montgolfier, M. Soto, and L. Viennot. Treewidth and hyperbolicity of the internet.
In IEEE
Networks Computing and Applications 2011. IEEE, 2011.
[13] C. Gavoille and O. Ly. Distance labeling in hyperbolic graphs. In Proceedings of the 16th Annual
International Symposium on Algorithms and Computation, pages 1071 -- 1079, 2005.
[14] ´E. Ghys and P. de La Harpe. Sur Les Groupes Hyperboliques D'apr`es Mikhael Gromov. Birkhauser,
1990.
[15] M. Gromov. Hyperbolic groups. Essays in group theory, 8:75 -- 263, 1987.
[16] E. Howorka. On metric properties of certain clique graphs. Journal of Combinatorial Theory, Series
B, 27(1):67 -- 74, 1979.
[17] E. Jonckheere and P. Lohsoonthorn. Hyperbolic geometry approach to multipath routing. In Proceed-
ings of the 10th Mediterranean Conference on Control and Automation, 2002.
[18] E. Jonckheere and P. Lohsoonthorn. Geometry of network security. In Proceedings of the 2004 Amer-
ican Control Conference, pages 2:976 -- 981, 2004.
[19] E. Jonckheere, P. Lohsoonthorn, and F. Bonahon. Scaled Gromov hyperbolic graphs. Journal of Graph
Theory, 57(2):157 -- 180, 2008.
[20] E. Jonckheere, M. Lou, F. Bonahon, and Y. Baryshnikov. Euclidean versus hyperbolic congestion in
idealized versus experimental networks. Internet Mathematics, 7(1):1 -- 27, 2011.
38
[21] E. A. Jonckheere, M. Lou, J. Hespanha, and P. Barooah. Effective resistance of Gromov-hyperbolic
graphs: Application to asymptotic sensor network problems. In Proceedings of the 46th IEEE Confer-
ence on Decision and Control, pages 1453 -- 1458, 2007.
[22] J. Kleinberg. The small-world phenomenon: an algorithm perspective. In Proceedings of the 32nd
Annual ACM Symposium on Theory of Computing, pages 163 -- 170, 2000.
[23] J. Kleinberg. Small-world phenomena and the dynamics of information. In Proceedings of Annual
Advances in Neural Information Processing Systems, pages 431 -- 438, 2002.
[24] J. Kleinberg. Complex networks and decentralized search algorithms. In Proceedings of the Interna-
tional Congress of Mathematicians, 2006.
[25] R. Kleinberg. Geographic routing using hyperbolic space. In Proceedings of the 26th IEEE Interna-
tional Conference on Computer Communications, pages 1902 -- 1909, 2007.
[26] D. Krioukov, k. c. claffy, K. Fall, and A. Brady. On compact routing for the Internet. Computer
Communication Review, 37(3):41 -- 52, 2007.
[27] D. Krioukov, F. Papadopoulos, M. Kitsak, A. Vahdat, and M. Bogun´a. Hyperbolic geometry of com-
plex networks. Physical Review E, 82:036106, 2010.
[28] D. Krioukov, F. Papadopoulos, A. Vahdat, and M. Bogun´a. Curvature and temperature of complex
networks. Physical Review E, 80:035101(R), 2009.
[29] J. Lamping and R. Rao. Laying out and visualizing large trees using a hyperbolic space. In Proceedings
of the 7th Annual ACM Symposium on User Interface Software and Technology, pages 13 -- 14, 1994.
[30] J. Lamping, R. Rao, and P. Pirolli. A focus+context technique based on hyperbolic geometry for
visualizing large hierarchies. In Proceedings of CHI'95: Conference on Human Factors in Computing,
pages 401 -- 408, 1995.
[31] P. Lohsoonthorn. Hyperbolic Geometry of Networks. PhD thesis, University of. Southern California,
2003.
[32] M. Lou. Traffic pattern in negatively curved network. PhD thesis, University of Southern California,
2008.
[33] C. U. Martel and V. Nguyen. Analyzing Kleinberg's (and other) small-world models. In Proceedings
of the 23rd Annual ACM Symposium on Principles of Distributed Computing, pages 179 -- 188, 2004.
[34] T. Munzner. Exploring large graphs in 3D hyperbolic space. IEEE Computer Graphics and Applica-
tions, 18(4):18 -- 23, 1998.
[35] T. Munzner and P. Burchard. Visualizing the structure of the World Wide Web in 3D hyperbolic space.
In Proceedings of the First Symposium on Virtual Reality Modeling Language, pages 33 -- 38, 1995.
[36] O. Narayan and I. Saniee. Large-scale curvature of networks. Phys. Rev. E, 84:066108, Dec 2011.
[37] O. Narayan, I. Saniee, and G. Tucci. Lack of spectral gap and hyperbolicity in asymptotic Erdos-R´enyi
random graphs. In Proceedings of the 5th International Symposium on Communications Control and
Signal Processing (ISCCSP), pages 1 -- 4, 2012.
39
[38] M. E. J. Newman and D. J. Watts. Scaling and percolation in the small-world network model. Physical
Review E, 60(6):7332 -- 7342, 1999.
[39] V. Nguyen and C. U. Martel. Analyzing and characterizing small-world graphs. In Proceedings of the
16th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 311 -- 320, 2005.
[40] F. Papadopoulos, D. V. Krioukov, M. Bogun´a, and A. Vahdat. Greedy forwarding in dynamic scale-
free networks embedded in hyperbolic metric spaces. In Proceedings of the 29th IEEE International
Conference on Computer Communications (INFOCOM), pages 2973 -- 2981, 2010.
[41] C. Papazian and E. R´emila. Some properties of hyperbolic networks.
In Proceedings of the 9th
International Conference on Discrete Geometry for Computer Imagery, pages 149 -- 158, 2000.
[42] Y. Shang. Lack of Gromov-hyperbolicity in small-world networks. Central European Journal of
Mathematics, 10(3):1152 -- 1158, 2012.
[43] Y. Shavitt and T. Tankel. Hyperbolic embedding of Internet graph for distance estimation and overlay
construction. IEEE/ACM Transactions on Networking, 16(1):25 -- 36, 2008.
[44] G. H. Tucci. Random regular graphs are not asymptotically Gromov hyperbolic. Technical Report
Preprint: arXiv:1203.5069 (2012), 2012.
[45] J. A. Walter and H. Ritter. On interactive visualization of high-dimensional data using the hyperbolic
plane. In Proceedings of the 8th Annual ACM SIGKDD Conference, pages 123 -- 132, 2002.
40
|
1611.10305 | 1 | 1611 | 2016-11-30T18:46:55 | Influential Node Detection in Implicit Social Networks using Multi-task Gaussian Copula Models | [
"cs.SI",
"cs.LG",
"stat.ML"
] | Influential node detection is a central research topic in social network analysis. Many existing methods rely on the assumption that the network structure is completely known \textit{a priori}. However, in many applications, network structure is unavailable to explain the underlying information diffusion phenomenon. To address the challenge of information diffusion analysis with incomplete knowledge of network structure, we develop a multi-task low rank linear influence model. By exploiting the relationships between contagions, our approach can simultaneously predict the volume (i.e. time series prediction) for each contagion (or topic) and automatically identify the most influential nodes for each contagion. The proposed model is validated using synthetic data and an ISIS twitter dataset. In addition to improving the volume prediction performance significantly, we show that the proposed approach can reliably infer the most influential users for specific contagions. | cs.SI | cs |
Influential Node Detection in Implicit Social Networks using
Multi-task Gaussian Copula Models
Qunwei Li
Syracuse University
Bhavya Kailkhura
Lawrence Livermore National Labs
Jayaraman J. Thiagarajan
Lawrence Livermore National Labs
Zhenliang Zhang
Intel Labs
Pramod K. Varshney
Syracuse University
[email protected]
[email protected] ∗
[email protected]
[email protected]
[email protected]
Editor: Oren Anava, Marco Cuturi, Azadeh Khaleghi, Vitaly Kuznetsov, Alexander Rakhlin
Abstract
Influential node detection is a central research topic in social network analysis. Many ex-
isting methods rely on the assumption that the network structure is completely known
a priori. However, in many applications, network structure is unavailable to explain the
underlying information diffusion phenomenon. To address the challenge of information dif-
fusion analysis with incomplete knowledge of network structure, we develop a multi-task
low rank linear influence model. By exploiting the relationships between contagions, our
approach can simultaneously predict the volume (i.e. time series prediction) for each con-
tagion (or topic) and automatically identify the most influential nodes for each contagion.
The proposed model is validated using synthetic data and an ISIS twitter dataset.
In
addition to improving the volume prediction performance significantly, we show that the
proposed approach can reliably infer the most influential users for specific contagions.
1. Introduction
Information emerges dynamically and diffuses quickly via agent interactions in complex
networks (e.g. social networks) (López-Pintado, 2008). Consequently, understanding and
prediction of information diffusion mechanisms are challenging. There is a rapidly growing
interest in exploiting knowledge of the information dynamics to better characterize the fac-
tors influencing spread of diseases, planned terrorist attacks, and effective social marketing
campaigns, etc (Guille and Hacid, 2012). The broad applicability of this problem in social
network analysis has led to focused research on the following questions: (I) Which conta-
gions are the most popular and can diffuse the most? (II) Which members of the network
∗. This work was supported in part by ARO under Grant W911NF-14-1-0339. This work was performed
under the auspices of the U.S. Dept. of Energy by Lawrence Livermore National Laboratory under
Contract DE-AC52-07NA27344.
1
are influential and play important roles in the diffusion process? (III) What is the range
over which the contagions can diffuse (Guille et al., 2013)? While attempting to answer
these questions, one is confronted with two crucial challenges. First, a descriptive diffusion
model, which can mimic the behavior observed in real world data, is required. Second, effi-
cient learning algorithms are required for inferring influence structure based on the assumed
diffusion model.
A variety of information diffusion prediction frameworks have been developed in the
literature (Yang and Leskovec, 2010; Wang et al., 2013; Guille et al., 2013; Du et al., 2013;
Zhang et al., 2016). A typical assumption in many of these approaches is that a connected
network graph and knowledge of the corresponding structure are available a priori. However,
in practice, the structure of the network can be implicit or difficult to model, e.g., modeling
the structure of the spread of infectious disease is almost impossible. As a result, network
structure unaware diffusion prediction models have gained interest. For example, (Yang
and Leskovec, 2010), Yang et. al. proposed a linear influence model, which can effectively
predict the information volume by assuming that each of the contagions spreads with the
same influence in an implicit network. Subsequently, in (Wang et al., 2013), the authors
extended LIM by exploiting the sparse structure in the influence function to identify the
influential nodes. Though the relationships between multiple contagions can be used for
more accurate modeling, most of the existing approaches ignore that information.
In this paper, we address the above issues by augmenting linear influence models with
complex task dependency information. More specifically, we consider the dependency of dif-
ferent contagions in the network, and characterize their relationships using Copula Theory.
Furthermore, by imposing a low-rank regularizer, we are able to characterize the clustering
structure of the contagions and the nodes in the network. Through this novel formulation,
we attempt to both improve the accuracy of the prediction system and better regularize
the influence structure learning problem. Finally, we develop an efficient algorithm based
on proximal mappings to solve this optimization problem. Experiments with synthetic data
reveal that the proposed approach fairs significantly better than a state-of-the-art multi-task
variant of LIM both in terms of volume prediction and influence structure estimation per-
formance. In addition, we demonstrate the superiority of the proposed method in predicting
the time-varying volume of tweets using the ISIS twitter dataset1.
2. Background
In this section, we present the formulation of linear influence model (LIM) (Yang and
Leskovec, 2010) and discuss its limitations. Consider a set of N nodes that participate in
an information diffusion process of K different contagions over time. Node u ∈ {1, . . . , N}
can be infected by contagion k ∈ {1, . . . , K} at time t ∈ {0, 1, . . . , T}. The volume Vk(t) is
defined as the total number of nodes that get infected by the contagion k at time t. Let the
indicator function Mu,k(t) = 1 represent the event that node u got infected by contagion k
at time t, and 0 otherwise. LIM models the volume Vk(t) as a sum of influences of nodes u
1. ISIS dataset from Kaggle is available at https://www.kaggle.com/kzaman/how-isis-uses-twitter.
2
that got infected before time t:
Vk(t + 1) =
N(cid:88)
L−1(cid:88)
u=1
l=0
Mu,k(t − l)Iu(l + 1),
(1)
where each node u has a particular non-negative influence function Iu(l). One can simply
think of Iu(l) as the number of follow-up infections l time units after u got infected. The
value of L is set to indicate that the influence of a node drops to 0 after L time units. Thus,
the influence of node u is denoted by the vector Iu = (Iu (1) , . . . , Iu (L))T ∈ RL×1. Next,
using the notation Vk = (V (1), . . . , V (T ))T ∈ RT×1 and I = (IT
N )T ∈ RLN×1, the
inference procedure of LIM can be formulated as follows
1 ,··· , IT
minimize
(cid:107)Vk − Mk · I(cid:107)2
2 + 1(I),
(2)
K(cid:88)
k=1
K(cid:88)
k=1
minimize 1
2
N(cid:88)
u=1
N(cid:88)
K(cid:88)
u=1
k=1
where Mk is obtained via concatenation of Mu,k, (cid:107)·(cid:107)2 denotes the Euclidean norm, and 1(I)
is an indicator function that is zero when Iuk (l) ≥ 0 and +∞ otherwise. Though LIM has
been effective in predicting the future volume for each contagion, it assumes that each node
has the same influence across all the contagions. Consequently, to achieve contagion-sensitive
node selection in an implicit network, the LIM model was extended and the multitask sparse
linear influential model (MSLIM) was proposed in (Wang et al., 2013).
The influence function is defined by extending Iu in LIM into contagion-sensitive Iu,k ∈
RL×1, which is a L-length vector representing the influence of the node u for the contagion k.
For each contagion k, let Ik ∈ RLN×1 be the vector obtained by concatenating I1k, . . . , IN k.
For each node u, the influence matrix for the node u is defined: Iu = (Iu1, . . . , IuK) ∈ RL×K.
Using these notations, the inference procedure to estimate Iu,k was formulated as follows
(cid:107)Vk − Mk · Ik(cid:107)2
2 + λ
(cid:107)Iu(cid:107)F + γ
(cid:107)Iuk(cid:107)2 + 1(I),
(3)
N(cid:80)
where (cid:107) · (cid:107)F denotes the Frobenius norm. The penalty term (cid:107)Iu(cid:107)F was used to encourage
the entire matrix Iu to be zero altogether, which means that the node u is non-influential
for all different contagions. If the estimated (cid:107)Iu(cid:107)F > 0 (i.e., the matrix Iu is non-zero), a
(cid:107)Iuk(cid:107)2, which is essentially a group-
fine-grained selection is performed by the penalty
Lasso penalty and can encourage the sparsity of vectors {Iuk}. For a specific contagion k,
one can identify the most influential nodes by finding the optimal solution {Iuk} of (3).
However, the penalty terms used in MSLIM encourages that certain nodes have no influence
over all the contagions which may not be true in practice. Furthermore, for most of the real
world applications, there exists complex dependencies among the contagions. In order to
alleviate these shortcomings, we propose a novel probabilistic multi-task learning framework
and develop efficient optimization strategies.
K(cid:80)
u=1
k=1
3. Proposed Approach
Probabilistic Multi-Contagion Modeling of Diffusion: We assume a linear regression
model for each task:Vk = MkIk + nk, where Vk, Mk and Ik are defined as before, and
3
nk ∈ RT×1 is an i.i.d. zero-mean Gaussian noise vector with the covariance matrix Σk. The
distribution for Vk given Mk, Ik and Σk can be expressed as
(cid:16)− 1
2
(cid:0)Vk − MkIk(cid:1)T Σ−1
k
(cid:0)Vk − MkIk(cid:1)(cid:17)
VkMk, Ik, Σk ∼ N(cid:16)
.
(4)
(cid:17)
MkIk, Σk
exp
=
(2π)
T
2 Σk 1
2
Assuming that the influence for a single contagion is also Gaussian distributed, we can
express the marginal distributions as Ikmk, Θk ∼ N (mk, Θk), where mk ∈ RLN×1 is the
N,k]T , and Θk ∈ RLN×LN is the
mean vector and can be expressed as mk = [mT
covariance matrix of Ik. For a node u and contagion k, we assume that the variables
in the influence Iuk have the same mean, i.e., mu,k = mu,k1L×1, where mu,k is a scalar
and 1L×1 is a vector of all ones with dimension L × 1. Let m(cid:48) ∈ RN×K represent the
mean matrix with entries mu,k, and it is connected as m = (m1, . . . , mK) = Qm(cid:48), where
Q ∈ RLN×N = IN×N ⊗ 1L×1 and IN×N is the identity matrix with dimension N × N and
⊗ is the Kronecker product operator.
1,k, . . . , mT
3.1 Dependence Structure Modeling Using Copulas
Consider a general case where the contagions are correlated. We construct a new influence
matrix I = (cid:2)I1, . . . , IK(cid:3) ∈ RLN×K. In our formulation, Ik's are assumed to be correlated
and the joint distribution of I is not a simple product of all the marginal distributions of Ik
as is adopted by most multi-task learning formulations. Here, we propose to use a multi-task
copula that is obtained by tailoring the copula model for the multi-task learning problem.
Theorem 1 (Sklar's Theorem). Consider an N-dimensional distribution function F with
marginal distribution functions F1, . . . , FN. Then there exists a copula C, such that for
all x1, . . . , xN in [−∞,∞], F (x1, . . . , xN ) = C (F1 (x1) , . . . , FN (xN )). If Fn is continuous
for 1 ≤ n ≤ N, then C is unique, otherwise it is determined uniquely on RanF1 × . . . ×
RanFN where RanFn is the range of Fn. Conversely, given a copula C and univariate CDFs
F1, . . . , FN, F is a valid multivariate CDF with marginals F1, . . . , FN.
As a direct consequence of Sklar's Theorem, for continuous distributions, the joint proba-
bility density function (PDF) f (x1, . . . , xN ) is obtained by,
(cid:32) N(cid:89)
(cid:33)
f (x1, . . . , xN ) =
fn (xn)
c (F1 (X1) , . . . , FN (XN )) ,
where fn (·) is the marginal PDF and c is termed as the copula density given by
n=1
c(v) =
∂N C (v1, . . . , vN )
∂v1, . . . , ∂vN
(5)
(6)
where vn = Fn(xn). We extend the copula theory to multi-task learning and express the
joint distribution of I as follows:
p(I1, I2, . . . , IK) =
c(F1(I1), F2(I2), . . . , FK(IK)),
(7)
(cid:33)
(cid:32) K(cid:89)
N (mk, Θk)
k=1
4
where Fk(Ik) is the CDF of the influence for kth contagion. The copula density function c(·)
takes all marginal CDFs {Fk(Ik)}K
k=1 as its arguments, and maintains the output correlations
in a parametric form.
Gaussian copula: There are a finite number of well defined copula families that can
characterize several dependence structures. Though, we can investigate the choice of an
appropriate copula, we consider the Gaussian copula for its favorable analytical properties. A
Gaussian copula can be constructed from the multivariate Gaussian CDF, and the resulting
prior on I is given by a multivariate Gaussian distribution as
(cid:16)− 1
2tr
(cid:16)
U−1 (I − m) Ω−1 (I − m)T(cid:17)(cid:17)
(2π)
LN K
2
Ω LN
2 U K
2
(8)
I ∼ MN LN×K(m, U, Ω) =
exp
(cid:104)
where U ∈ RLN×LN is the row covariance matrix modeling the correlation between the
influence of different nodes, Ω ∈ RK×K is the column covariance matrix modeling the
correlation between the influence for different contagions, and m ∈ RLN×K is the mean
matrix of I. The two covariances can be computed as E
= Utr(Ω)
= Ωtr(U) respectively. We assume that N individual nodes are
and E
spreading the contagions and influencing others independently, and thus the row covariance
n, n ∈
matrix is diagonal and can be expressed as U = diag(e2
{1, . . . , N} are scalars. The posterior distribution for I, which is proportional to the product
of the prior in Eq. 4 and the likelihood function in Eq. 8, is given as
(I − m) (I − m)T(cid:105)
N ) ⊗ IL×L, where e2
(I − m)T (I − m)
1, e2
2, . . . , e2
(cid:104)
(cid:105)
p (IM, V, Σ, U, Ω) ∝ p (VM, I, Σ) p (Im, U, Ω)
(cid:32) K(cid:89)
k=1
N(cid:16)
=
(cid:17)(cid:33)
MkIk, Σk
MN LN×K (Im, U, Ω) ,
(9)
where M = (M1, . . . , MK) ∈ RT×LN K, V = (V1, . . . , VK) ∈ RT×K, Σ is the corresponding
covariance matrix of n = (n1, . . . , nK) ∈ RT×K. We assume Σk (cid:44) σ2IT×T and also an
n = e2,∀k = 1, . . . , K,∀n = 1, . . . , N. We employ maximum a posteriori
identical value of e2
(MAP) and maximum likelihood estimation (MLE), and obtain I, m, and Ω by
K(cid:88)
k=1
min
I,m,Ω
1
σ2
(cid:107)Vk − MkIk(cid:107)2
2 +
e2 tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) + LN lnΩ + 1(I).
1
However, if we assume Ω−1 to be non-sparse, the solution to Ω−1 will not be defined (when
K > LN) or will overfit (when K is of the same order as LN) (Rai et al., 2012). In fact,
some contagions in the network can be uncorrelated, which makes the corresponding entry
values in Ω−1 zero. Hence, we add a l1 penalty to promote sparsity of matrix Ω−1 to obtain
2 + λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) − λ2 lnΩ−1 + λ3(cid:107)Ω(cid:107)1 + 1(I).
K(cid:88)
min
I,m,Ω
(cid:107)Vk − MkIk(cid:107)2
k=1
5
3.2 Modeling Structure of Influence Matrix I
In order to better characterize the influence matrix, we propose to impose a low rank struc-
ture on the influence matrix I. The nodes or the contagions in the influence network are
known to form communities (or clustering structures), which may be captured using the
low-rank property of the influence matrix. Note that, the sparse structure in the influence
matrix implies that most individuals only influence a small fraction of contagions in the
network while there can be a few nodes with wide-spread influence. We incorporate this
into our formulation by using a sparsity promoting regularizer over Iu,k.
K(cid:88)
k=1
min
I,m,Ω
(cid:107)Vk − MkIk(cid:107)2
2 + λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1)
K(cid:88)
N(cid:88)
(10)
− λ2 lnΩ−1 + λ3(cid:107)Ω(cid:107)1 + λ4(cid:107)I(cid:107)∗ + λ5
(cid:107)Iuk(cid:107)2 + 1(I),
where (cid:107) · (cid:107)∗ denotes the nuclear norm, and λ1, λ2, λ3, λ4 and λ5 are the regularization
parameters. With the estimated {Iuk}, one can predict the total volume of the contagion k
at T + 1 by Vk(T + 1) =(cid:80)N
(cid:80)L−1
l=0 Muk(T − l)Iuk(l + 1).
u=1
u=1
k=1
4. Algorithm
We adopt an alternating optimization approach to solve the problem in Eq. 10.
Optimization w.r.t. m: Given I and Ω−1, the mean matrix m can be obtained by solving
the following problem
tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) .
min
m
The estimate m can be analytically obtained as m = 1
Optimization w.r.t. Ω: Given I and m, the contagion inverse covariance matrix Ω−1 can
be estimated by solving the following optimization problem
L QQT I.
λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) − λ2 lnΩ−1 + λ3(cid:107)Ω(cid:107)1
min
Ω
The above is an instance of the standard inverse covariance estimation problem with sample
(I − m)T (I − m), which can be solved using standard tools. In particular, we
covariance λ1
λ2
use the graphical Lasso procedure in (Friedman et al., 2008)
Optimization w.r.t. I: The corresponding optimization problem becomes
Ω−1 = gLasso(cid:0)λ1/λ2(I − m)T (I − m), λ3
(cid:1) .
2 + λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) + λ4(cid:107)I(cid:107)∗ + λ5
N(cid:88)
K(cid:88)
K(cid:88)
min
I
(cid:107)Vk − MkIk(cid:107)2
k=1
u=1
k=1
(11)
(cid:107)Iuk(cid:107)2 + 1(I).
(12)
We rewrite the problem as
(cid:96)(I) + λ4(cid:107)I(cid:107)∗ + 1(I).
min
I
6
K(cid:80)
k=1
2 + λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) + λ5
N(cid:80)
K(cid:80)
Algorithm 1 Incremental Proximal Descent
1: Initialize I = A
2: repeat
Set I = I − θ∇I(cid:96)(I)
3:
Set I = proxθλ4(cid:107)·(cid:107)∗(I)
4:
Set I = P1(I)
5:
6: until convergence
7: return I
u=1
k=1
(cid:107)Vk − MkIk(cid:107)2
(cid:107)Iuk(cid:107)2. This
where (cid:96)(I) =
formulation involves a sum of a convex differentiable loss and convex non-differentiable reg-
ularizers which renders the problem non-trivial. A string of algorithms have been developed
for the case where the optimal solution is easy to compute when each regularizer is considered
in isolation. This corresponds to the case where the proximal operator defined for a convex
regularizer R : RLN×K → R at a point Z by proxR(Z) = arg min 1
F + R(I), is easy
to compute for each regularizer taken separately. See (Combettes and Pesquet, 2011) for a
broad overview of proximal methods. The proximal operator for the nuclear norm is given
by the shrinkage operation as follows (Beck and Teboulle, 2009). If Udiag(σ1, . . . , σn)V T
is the singular value decomposition of Z, then proxλ4(cid:107)·(cid:107)∗(Z) = Udiag((σi − λ4)+)iV T . The
proximal operator of the indicator function 1(I) is simply the projection onto Iu,k(l) ≥ 0,
which is denoted by P1(I). Next, we mention a matching serial algorithm introduced in
(Bertsekas, 2011). We present here a version where updates are performed according to a
cyclic order (Richard et al., 2012). Note that one can also randomly select the order of the
updates. We use the optimization algorithm 1 to solve the optimization problem in Eq. 12.
2(cid:107)I − Z(cid:107)2
5. Experiments
We compare the performance of the proposed approach to MSLIM by applying it to both
synthetic and real datasets. Since the volume of a contagion over time Vk(t) can be viewed
as a time series, we set up this problem as a time series prediction task and evaluate the
performance using the prediction mean-squared error (MSE). Furthermore, for the synthetic
data set, where we have access to the true influence matrix I, we also evaluate the perfor-
mance of the influence matrix prediction task using the metric (cid:107)I − I(cid:107)F . We determined
the regularization parameters for the proposed model using cross validation. In particular,
we split the first 60% of the time instances as the training set and the rest for validation.
Following (Wang et al., 2013), we combine the training and validation sets to re-train the
model with the best selected regularization parameters and estimate the influence matrix.
5.1 Synthetic Data
We created a synthetic dataset with the number of nodes fixed at N = 100 and the number
of contagions at K = 20. In addition, we assumed that L = 10 and T = 20. A rank 5 (low-
rank) influence matrix I was generated randomly with uniformly distributed entries. The
matrix M was generated with uniformly distributed random integers {0, 1}. Following our
7
Table 1: Prediction performance for different information diffusion models on synthetic data.
Approach
Volume Prediction MSE
Influence Matrix Estimation Error
MSLIM Proposed
0.834
0.7681
0.007
0.62
model assumption, the volume for each Vk was calculated as follows Vk = Mk×Ik+N (0, ∆)
where N (0, ∆) is a multivariate normal distribution with covariance matrix ∆. In Table 1,
we present the results obtained using the proposed approach and its comparison to MSLIM.
As can be observed, for both volume prediction and influence matrix estimation tasks, the
proposed approach achieves highly accurate estimates.
5.2 ISIS Twitter Data
In this section, we demonstrate the application of the proposed approach to a real-word
analysis task. We begin by describing the twitter dataset used for analysis and the procedure
adopted to extract the set of contagions. Following this, we discuss the problem setup and
present comparisons to MSLIM on predicting the time-varying tweet volume. Finally, we
present a qualitative analysis of the inferred influence structure for different contagions.
The ISIS dataset from Kaggle2 is comprised of over 17, 000 tweets from 112 users posted
between January 2015 and May 2016. In addition to the actual tweets, meta-information
such as the user name and the timestamp for each tweet are included. We performed a
standard pre-processing by removing a variety of stop words, e.g. URLs, symbols. After
preprocessing, we converted each tweet into a bag-of-words representation and extracted the
term frequency-inverse document frequency (tf-idf) feature.
Topic Modeling: When applying our approach, the first step is to define semantically
meaningful contagions. A simple way of defining topics is to directly use words as topics
(e.g., ISIS). However, a single word may not be rich enough to represent a broad topic (e.g.,
social network sites). Hence, we propose to perform topic modeling on the tweets based on
the tf-idf features. In our experiment, we obtained the topics using Non-negative Matrix
Factorization (NMF), which is a popular scheme for topic discovery, with the number of
topics K set at 10. Table 2 lists the top 10 words for each of the topics learned using NMF.
Volume Time Series Prediction: In our experiment, we set one day as the discrete time
step for aggregating the tweet volume. The parameter L denotes the number of time steps
it takes for the influence of a user to decay to zero. We set the parameter L equal to 5 since
we observed that beyond L = 5, there is hardly any improvement in performance. The MSE
on the predicted volume is computed over the entire period of observation. The comparison
of the prediction MSE is presented in Table 3. It can be seen that the proposed approach
significantly outperforms MSLIM in predicting the time-varying volume.
Influential Node Detection: For a contagion k, we identify the most influential nodes
with respect to this contagion as nodes having high (cid:107)Iu,k(cid:107)2 values. First, in Figure 2(a), we
2. ISIS dataset from Kaggle is available at https://www.kaggle.com/kzaman/how-isis-uses-twitter.
8
Table 2: Top words for each topic learned using NMF with the ISIS twitter dataset.
Topic 1
Topic 2
Topic 3
Topic 4
Topic 5
Topic 6
Topic 7
Topic 8
Topic 9
Topic 10
isis ramiallolah iraq attack libya warreporter1 saa aamaq usa abu
killed soldiers today airstrikes injured wounded civilians militants iraqi attack
syria russia ramiallolah turkey ypg breakingnews usa group saa terror
state islamic fighters fighting group saudi new http wilaya control
aleppo nid gazaui rebels north today northern syrian ypg turkish
assad regime myra forces rebels fsa pro islam syrian jaysh
al qaeda nusra abu sham ahrar islam jabhat http warreporter1
army iraq near ramiallolah iraqi lujah turkey ramadi west sinai
allah people muslims abu accept muslim make know don islam
breaking islamicstate forces amaqagency city fighters iraqi near area syrian
(a) Average Influence
(b) Maximum Influence
Figure 1: Comparing statistics from the estimated influence matrix with the volume of
In both
tweets corresponding to each of the users to identify influential users.
cases, the users with a large influence score are marked in red.
plot the correlation among 10 topics learned by NMF. More specifically, we plot the pair-
wise correlation structure learned by our approach. It can be seen that, a strong positive
correlation structure exists, which enabled the improved prediction in Table 3. Following
this, we use the predicted influence matrix to select a set of highly influential nodes from
the dataset. A simple approach to select the influential users can be to select the ones with
a large number of tweets. However, we argue that the influence predicted in an information
diffusion model can be vastly different. Consequently, we consider a user to be influential if
she has a high influence score for at least one of the topics, or if she can be influential for
multiple topics. For example, in Figure 1(a), we plot average influence scores of the users
(averaged over all the topics) against the total number of tweets. Similarly, in Figure 1(b),
9
(a)
(b)
Figure 2: (a) Correlation Structure among the topics (non-black color represents positive
correlation), (b) Top 9 influential users and their tweet distributions.
Table 3: Volume prediction performance on the ISIS twitter dataset.
Approach
MSLIM Proposed
Volume Prediction MSE
2.7
0.329
we plot influence scores of the users (maximum over all the topics) against the total number
of tweets. The first striking observation is that the users with high influence scores are
not necessarily the ones with the most number of tweets.
Instead, their impact on the
information diffusion relies heavily on the complex dynamics of the implicit network.
Finally, in Figure 2(b) we plot the percentage of tweets regarding each of the topics for
top 9 influential nodes. Influential nodes are obtained as a union of nodes identified based on
both average and maximum influence scores. More specifically, we select the union of users
with average influence score greater than 1.3 and maximum influence score greater than 1.8.
In addition to displaying the distribution across topics, for each influential user, we show
the total number of tweets posted by that user. It can be seen that the total number of
tweets of these users vary a lot and, therefore, is not a good indication of their influence.
6. Conclusion
In this paper, we considered the problem of influential node detection and volume time series
prediction. We proposed a descriptive diffusion model to take dependencies among the top-
ics into account. We also proposed an efficient algorithm based on alternating methods to
perform inference and learning on the model. It was shown that the proposed technique out-
performs existing influential node detection techniques. Furthermore, the proposed model
was validated both on a synthetic and a real (ISIS) dataset. We showed that the proposed
approach can efficiently select the most influential users for specific contagions. We also
presented several interesting patterns of the selected influential users for the ISIS dataset.
10
References
Amir Beck and Marc Teboulle. A fast iterative shrinkage-thresholding algorithm for linear
inverse problems. SIAM journal on imaging sciences, 2(1):183 -- 202, 2009.
Dimitri P Bertsekas. Incremental gradient, subgradient, and proximal methods for convex
optimization: A survey. Optimization for Machine Learning, 2010:1 -- 38, 2011.
Patrick L Combettes and Jean-Christophe Pesquet. Proximal splitting methods in signal
In Fixed-point algorithms for inverse problems in science and engineering,
processing.
pages 185 -- 212. Springer, 2011.
Nan Du, Le Song, Manuel Gomez-Rodriguez, and Hongyuan Zha. Scalable influence estima-
tion in continuous-time diffusion networks. In Advances in neural information processing
systems, pages 3147 -- 3155, 2013.
Jerome Friedman, Trevor Hastie, and Robert Tibshirani. Sparse inverse covariance estima-
tion with the graphical lasso. Biostatistics, 9(3):432 -- 441, 2008.
Adrien Guille and Hakim Hacid. A predictive model for the temporal dynamics of informa-
tion diffusion in online social networks. In Proceedings of the 21st international conference
on World Wide Web, pages 1145 -- 1152. ACM, 2012.
Adrien Guille, Hakim Hacid, Cecile Favre, and Djamel A Zighed. Information diffusion in
online social networks: A survey. ACM SIGMOD Record, 42(2):17 -- 28, 2013.
Dunia López-Pintado. Diffusion in complex social networks. Games and Economic Behavior,
62(2):573 -- 590, 2008.
Piyush Rai, Abhishek Kumar, and Hal Daume. Simultaneously leveraging output and task
structures for multiple-output regression. In Advances in Neural Information Processing
Systems (NIPS), pages 3185 -- 3193, 2012.
Emile Richard, Pierre-andre Savalle, and Nicolas Vayatis. Estimation of simultaneously
In Proceedings of the 29th International Conference on
sparse and low rank matrices.
Machine Learning (ICML), pages 1351 -- 1358, 2012.
Yingze Wang, Guang Xiang, and Shi-Kuo Chang. Sparse multi-task learning for detecting
influential nodes in an implicit diffusion network. In AAAI, 2013.
Jaewon Yang and Jure Leskovec. Modeling information diffusion in implicit networks. In
2010 IEEE International Conference on Data Mining, pages 599 -- 608. IEEE, 2010.
Peng Zhang, Jing He, Guodong Long, Guangyan Huang, and Chengqi Zhang. Towards
anomalous diffusion sources detection in a large network. ACM Transactions on Internet
Technology (TOIT), 16(1):2, 2016.
11
|
1801.07055 | 1 | 1801 | 2018-01-22T11:35:40 | Multi-Source Social Feedback of Online News Feeds | [
"cs.SI"
] | The profusion of user generated content caused by the rise of social media platforms has enabled a surge in research relating to fields such as information retrieval, recommender systems, data mining and machine learning. However, the lack of comprehensive baseline data sets to allow a thorough evaluative comparison has become an important issue. In this paper we present a large data set of news items from well-known aggregators such as Google News and Yahoo! News, and their respective social feedback on multiple platforms: Facebook, Google+ and LinkedIn. The data collected relates to a period of 8 months, between November 2015 and July 2016, accounting for about 100,000 news items on four different topics: economy, microsoft, obama and palestine. This data set is tailored for evaluative comparisons in predictive analytics tasks, although allowing for tasks in other research areas such as topic detection and tracking, sentiment analysis in short text, first story detection or news recommendation. | cs.SI | cs |
Multi-Source Social Feedback of Online News Feeds
Nuno Moniz∗and Lu´ıs Torgo†
LIAAD - INESC Tec
FCUP - DCC, University of Porto
January 23, 2018
Abstract
The profusion of user generated content caused by the rise of social media platforms has enabled a surge
in research relating to fields such as information retrieval, recommender systems, data mining and machine
learning. However, the lack of comprehensive baseline data sets to allow a thorough evaluative comparison has
become an important issue. In this paper we present a large data set of news items from well-known aggregators
such as Google News and Yahoo! News, and their respective social feedback on multiple platforms: Facebook,
Google+ and LinkedIn. The data collected relates to a period of 8 months, between November 2015 and July
2016, accounting for about 100,000 news items on four different topics: economy, microsoft, obama and palestine.
This data set is tailored for evaluative comparisons in predictive analytics tasks, although allowing for tasks in
other research areas such as topic detection and tracking, sentiment analysis in short text, first story detection
or news recommendation.1.
1 Summary
Social media is a broad term encompassing forums, blogs, video sharing websites, collaborative coding platforms
and social networking platforms (e.g. Facebook, Twitter) [25]. Their common denominator is the possibility for
users to generate and share content, i.e. web content. The web content generated by social media platforms,
which is also referred to as social media data, is diverse, including text, images, audio and videos, and the impact
of social media platforms is enormous when considering the volume of web traffic and content it generates.
Consider the following statistics from three of the most popular platforms: i) the number of users in Youtube
is almost a third of all Internet users (over a billion users) [30], representing a significant amount of all Internet
traffic [7]; ii) in September 2016, Facebook had an average of more than a billion daily active users [4]; and
Twitter generated over a billion visits to sites using embedded tweets [27].
Despite the profusion of social media data, the context in which it is generated and shared presents several
factors that may facilitate or hinder the ability to use such data [15]. On one hand, social media data is
massive and linked. On the other hand, it is commonly noisy, sparse, informal and biased. Additionally, it is
heterogeneous, partial, asymmetrical and multi-sourced. This combination of factors illustrates well the difficulty
of using web content and their impact in reducing the ability to successfully disclose its full potential.
The potential of social media data is immense.
Its broad definition concerns a very diverse set of data
types with particular properties. For example, online news are a very dynamic type of web content, due to the
information it conveys and its impact on everyday life. As such, new events and stories are constantly being
published as well as updates on old stories. This causes news items to have a very short life span [3, 29]. In
contrast, online videos have a much longer alive-time, enduring for weeks or months [23].
For over a decade, researchers have taken advantage of the profusion of user generated data in social media
to tackle a diverse set of tasks concerning information retrieval, recommender systems, data mining and machine
learning. Efforts by many data proprietaries have been made in order to allow access to this enormous amount
of data. However, for several fields, the lack of ready-to-use, accessible, comprehensive, detailed and large data
sets that would serve as basis for comparison between approaches, is a major issue. This is the main motivation
for our contribution.
In this paper we describe a large scale data set of news items from multiple official media sources and their
respective social feedback in multiple social media platforms. Our objective is to establish this data set as
∗Email: [email protected]
†Email: [email protected]
1Link to dataset: http://www.dcc.fc.up.pt/~nmoniz/MultiSourceNews
1
a well-known baseline for research efforts pertaining to various fields of research concerning web content, and
specifically predictive analytics.
2 Data Description
News data can be obtained from two types of sources: i) official media, and ii) social media sources. The first
type of source, official media, relates to the origin of news items and their content.
It may also provide an
indication of the items' relevance according to the official media source, denoted by its ranking position. The
second, social media, is a medium used to measure the attention received by news items, i.e. popularity. In
previous work, the provenance of the data used can be framed in one of three settings: i) solely using official
media sources (e.g. [28, 13, 23]), ii) solely using social media sources (e.g. [21, 19]), or iii) using data from both
official and social media sources (e.g. [12, 8, 3]).
Official media sources include legacy media2 outlets (e.g. The Washington Post), news aggregation platforms
(e.g. Digg, Slashdot) and news recommender systems (e.g. Google News, Yahoo! News). Most of previous
work solely concerning official sources was focused on the second, with emphasis on the Digg platform. Since
one of our objectives is to allow the analysis of recommendation and/or learning to rank approaches, this data
set is based on the third type of official sources: news recommender systems. This choice has the benefits of i)
providing a potentially large list of items, and of ii) presenting a multitude of news outlets, including those that
are not considered as being legacy media.
Regarding social media sources of news data, research has shown that the micro-blogging platform Twitter
covers almost all news-wire events but the opposite is not true [19]. Furthermore, Osborne and Dredze [18]
have shown that Twitter is the preferred medium for breaking news, almost consistently leading Facebook or
Google+. However, this claim has since grown out of date, as it has been shown [18] that Facebook is now the
leading platform in accessing and sharing news, followed by Twitter. Newman et al. [17] provide a survey of
over 50,000 people in 26 countries concerning news consumption. It shows that the most popular platform is
Facebook, followed by Youtube, Twitter, Whatsapp, Google+, LinkedIn and Instagram. The data set presented
in this paper does not include the sources Youtube, Whatsapp, Instagram and Twitter. Concerning the first
three, for technical reasons, such platforms either do not allow the sharing of news items (although allowing it in
comments) as in the case of Youtube and Instagram, or are essentially focused on direct messaging, significantly
reducing the dynamics of popularity and social spread. In the case of Twitter, the decision was related to the
deprecation of its API functionality allowing for the extraction of such data3.
Nonetheless, considering the wide use of Twitter data in the context social media data research, it should
be noted that other alternatives would be possible, such as using the search functionality of Twitter API or
obtaining archive access services. The first possibility was discarded due to the loss of information implied in
such functionality, since Twitter only allows the access to 1% of its data stream4. The second possibility was
also discarded due to the heavy financial implications regarding such archive access services.
In order to allow the analysis and discussion of the interplay between these two types of data sources, the
data set presented in this paper uses data from both types of sources: official and social media. The information
portrayed in such sources is used and interpreted differently. From official data sources descriptors of news
items are extracted. As for social media sources, these are used to obtain the popularity of news, which may be
denoted by different signals in each source.
3 Data Set
This data set is a multi-source data set, using two official media sources (Google News and Yahoo! News) and
three social media sources (Facebook, Google+ and LinkedIn). It contains news-related data concerning four
topics: economy, microsoft, obama, and palestine. These topics were chosen ad-hoc, based on two factors: their
worldwide popularity and constant activity, and the fact that they report to different types of entities (sector,
company, person, and country, respectively). Notwithstanding, this choice raises some caveats. Being limited to
a small number of topics might undermine conclusions concerning the ability to generalize the predictive ability
reported in experiments. On the other hand, it does provide a deep insight into topics that have a daily activity
of high magnitude, in opposition to having a news sample of a variety of topics. By approaching the development
of data sets as proposed, possible problems related to context-sensitivity (i.e. topic) characteristics of text-based
tasks [2] are also tackled. Furthermore, due to the technical restrictions, such as access limitations per hour that
both Google News and Yahoo! News applies, extending the list of topics would not be possible unless the time
intervals of access would be greater. In this light, we chose to maintain the previously mentioned list of topics.
2Common expression to denote traditional media outlets.
3Twitter API: https://developer.twitter.com/en/docs. The count method was deprecated on 20th of November, 2015.
4Adjustments
Streaming
(Twitter):
to
API
sample
volumes
https://twittercommunity.com/t/
potential-adjustments-to-streaming-api-sample-volumes/31628
2
Concerning the data horizon, previous work has differed on the active time that one should consider news
items relevant, since their publication, although agreeing that such items have a very short lifetime in terms of
capturing the attention of users, in comparison to other types of web content, i.e. video. For example, researchers
have shown evidence for alternative values such as two days [3, 10], four days [29, 1] and 30 days [24] concerning
the alive-time for which news may receive the attention of users, leading to such items being shared on social
media platforms. However, based on the analysis provided by these works, most of the popularity dynamics of
news develop in the first day, although showing that in some cases it may develop for more time. Nonetheless,
in the latter cases, the increase is very residual in terms of proportion. Given this, an active time for the news
items of two days is established, since their publication. This means that the popularity evolution of each item
is stored for this period, since their appearance in official media sources.
Finally, it should be noted that a stochastic view of the popularity concept is assumed (i.e. aggregate
behaviour [24]), considering all publications from every user equally. Different approaches have been proposed,
such as those focused on determining the number of "retweets" (Twitter functionality to re-publish a tweet)
a given tweet will obtain [22, 31, 8] or those using data concerning the social network of individual users to
predict the popularity of content they generate [6]. The data composed in these data sets is not focused on the
popularity of content generated by a single or a given group of users, but on the general popularity of content
in social media platforms, allowing for a source-wide perception of news stories' popularity.
The data set is divided in two sets of data files. The first set concerns news data, and is represented by a
single data file, containing 11 variables that identify and describe the news items. The second set of data files
relate to social feedback data concerning the news items, and is composed by 12 data files with 145 variables
each. These variables contain the information of the evolution of the popularity of news items for a period of
two days. In the following sections, the two sets of data files are described, and the methods used to obtain the
data are detailed in Section 4.
3.1 News Data
In this section, the data file concerning the description of news items is detailed. The data descriptors are based
on information obtained by querying the official media sources Google News and Yahoo! News. Each news item
is described by 11 variables, which are explained in Table 1.
Table 1: Name, type of data and description of data variables in news data file.
Variable
IDLink
Title
Headline
Source
Topic
PublishDate
SentimentTitle
SentimentHeadline
Facebook
GooglePlus
LinkedIn
Type
numeric
string
string
string
string
timestamp
numeric
numeric
numeric
numeric
numeric
Description
Unique identifier of news items
Title of the news item according to the official media sources
Headline of the news item according to the official media sources
Original news outlet that published the news item
Query topic used to obtain the items in the official media sources
Date and time of the news items' publication
Sentiment score of the text in the news items' title
Sentiment score of the text in the news items' headline
Final value of the news items' popularity according to the social media source Facebook
Final value of the news items' popularity according to the social media source Google+
Final value of the news items' popularity according to the social media source LinkedIn
In addition to the original information retrieved from the official media sources, we chose to include the
additional information of the sentiment scores of both the title and headline of the news items. Sentiment
analysis, also known as opinion mining, is a field of text mining which studies people's opinions, judgments and
ideas towards entities [14]. In this data set, the process to obtain these sentiment scores was carried out by
applying the framework of the qdap R package [20] with default parametrization. It should be made clear that
these results were obtained by an off-the-shelf approach, and as such, its values should not be interpreted as
being verified as to its accuracy. The choice of adding such information was in order to enrich the data set and
make clear the options for further research by data set users.
In previous work, several authors have used social network features, such as its structure [9, 26] the number
of followers and/or followees [11]. The reasons for not including such information in this data set are two.
First, using social network features in a broad spectrum prediction-based system raises the issue of access to
data. Although it is possible to relax this issue, by obtaining a sample of data which is used to derive and test
prediction models, its extensive use would virtually require full access to real-time data. Unfortunately, it is
highly unlikely that this option is available to anyone other than the data owners. Secondly, handling data on
the connections that users establish with other users, as well as harnessing and using their interactions, raises
issues related to privacy [5].
Figure 1 shows the global number of news per topic (left) and a smoothed approximation of the amount of
news per day for each topic (right). The total amount of news retrieved in both official media sources is 93,239.
3
Figure 1: Number of news from both Google News and Yahoo! News (left) and a smoothed approximation of the
amount of news per day, for each topic.
3.2 Social Feedback Data
The second set of data files concerns the evolution of news items' popularity in the various social media sources.
This set is composed of 12 data files, for all combinations of the four topics (economy, microsoft, obama and
palestine) and the available social media sources Facebook, Google+ and LinkedIn. Each case is described by
145 variables: a unique identifier, and 144 measurements of popularity in 20 minute intervals for a total of 2
days.
The evolution of popularity in each of the combination of social media source-topic available in the data sets
is different. Figure 2 illustrates the evolution of popularity for each of the query periods in the data set, referred
to as time slices. Results are depicted as the average proportion between the popularity scores at each given
time slice, and the respective final popularity scores.
Figure 2: Evolution of popularity (as proportion of final popularity) in each topic, for social media sources. Each
time slice represents a 20 minute period.
Based on the results depicted in Figure 2, it is observed that in most social media sources, news items obtain
close to half of their final popularity in a short amount of time: Facebook, Google+ and LinkedIn show that in
the first moments after publication, news items quickly obtain on average close to 20% (22%, 21.8% and 16.8%,
respectively) of their final popularity.
In Figure 3 the intersection of the sets of news that were published in each of the social media sources
is illustrated. Results show that most of the news published in Google+ or LinkedIn are also published in
4
010000200003000040000economymicrosoftobamapalestineTopicnrNews5010015011−201512−201501−201602−201603−201604−201605−201606−201607−2016DaynrNewsTopiceconomymicrosoftobamapalestineFacebookGoogle+LinkedIn0501001500501001500501001500.000.250.500.751.00TimeSliceProportionTopicEconomyMicrosoftObamaPalestineFacebook (91.7% and 88.7% respectively). Conversely, data shows that roughly a third (36%) of news published
in Facebook are also published in both Google+ and LinkedIn. Additionally, only 2,006 (7.9%) news stories were
published in both Google+ and LinkedIn, and not on Facebook.
Figure 3: Venn diagram of published news items in social media sources.
4 Methods
The official media sources Google News and Yahoo! News were queried, during a period of approximately eight
months (November 10th, 2015 until July 7th 2016), for each of the four topics (economy, microsoft, obama
and palestine). The queries were done simultaneously, in 20 minute intervals. For each query, the top-100
recommended news of the respective official media sources were collected. For each recommended news item,
the following information was collected: title, headline, publication date and the news outlet.
In order to deal with duplicated cases, the following procedure was applied. First, cases with the same title,
headline and from the same news outlet, are grouped. Second, the oldest case is kept and the remaining are
removed from the data set. Finally, the identifiers of the removed cases are replaced by that of the case that
was kept.
In addition, concerning the data quality from official media sources, we should note that some of the news
items' title and headline may be truncated (represented by the use of "..."), which is an option of the official
media sources Google News and Yahoo! News. Alternatives to this shortcoming would include following the
URL of each news and creating tailored components for each news outlet. Considering the magnitude of news
outlets in our data set, we found this to be impractical. Also, standard operations for cleaning the textual
variables were applied, namely the removal of double, trailing and leading white spaces.
After retrieving the query-data from the official sources, the popularity of all known news items, with an
alive time below the defined period of two days, is obtained from the social media sources Facebook, Google+
and LinkedIn, simultaneously. Considering the differences between each social media source, the procedures for
obtaining popularity are different. They are described as follows.
• For obtaining information from Facebook, the Facebook Graph API5 is used, by querying for information
concerning the URL of each news item. The data retrieved reports the number of shares concerning each
unique URL, which is used as a popularity measure. In 11,602 cases (12.4%) it was not possible to obtain
the number of shares, and in 26,919 cases (28.9%) the news items' were not shared on Facebook;
• The social media platform Google+ does not allow to obtain the number of shares of a given URL, due
to technical restrictions. Nonetheless, it allows one to check the number of times users have "liked" the
URL's. Despite the differences with other social media sources, it is nonetheless a valid metric of received
attention by news stories. This process is carried out by querying a public end-point6 in order to obtain
the amount of "+1" (similar to "like" in Facebook) a given URL received. In 5,744 cases (6.2%) it was not
5The Graph API: https://developers.facebook.com/docs/graph-api
6The number of "+1" received by a given URL in Google+ is obtained by appending the respective URL to https://plusone.
google.com/_/+1/fastbutton?url=. This approach is no longer available.
5
FacebookGoogle+LinkedIn37640369402533464793333683389023328possible to obtain the number of "+1", and in 55,114 cases (59.1%) the news items' did not obtain any
"+1";
• Finally, concerning the LinkedIn platform, the number of times each news story URL was shared is obtained
by querying its public end-point7, designed for such purposes. Concerning the overall statistics of the news
items' presence in the platform, in 5,745 cases (6.2%) it was not possible to obtain information concerning
the news item URL. In addition, in 54,413 cases (58.4%) the news were not shared on the LinkedIn platform.
In some cases, the value of the popularity of news items at a given moment (i.e. timeslice) was not acquirable.
These cases are denoted with the value −1, which are mostly associated to scenarios where the items are
suggested in official media sources after two days have passed since its publication in the original news outlet.
Such situations represent 12.4% of cases concerning the final popularity of items according to the social media
source Facebook, and 6.2% of cases for both Google+ and LinkedIn sources.
In addition, a common situation is when the news items appeared in the official media sources' recommen-
dations with some delay w.r.t. their original publication time. This leads to some cases only having popularity
data since a given time slice. Concerning this issue of the available data according to each time slice (i.e. query
period of 20 minutes) of news items, Figure 4 depicts the evolution of the available data proportion for all social
media sources and query topics. It illustrates the proportion of cases for which popularity data is available in
each time slice.
Figure 4: Evolution of available information in each time slice for all topics and social media sources.
Finally, it is important to clarify the ethical component of this data set as it pertains to the use of publicly-
available data generated by users in social media platforms [16]. As such, we should stress that, as previously
denoted, this data set is based on a stochastic view of the popularity concept, and therefore the data concerns
the aggregate behaviour of users. This data is obtained from public end-points of the social media sources,
which is already anonymized and aggregated by the data proprietaries. Thus, this data set does not include any
personally identifiable information either from single or groups of users, e.g. social network data, guaranteeing
the privacy of the users.
5 User Notes
In order to facilitate the quick use of the data set a file with basic operations was designed in the programming
language R. This file is located in the data set archive.
Acknowledgments
This work is financed by the ERDF – European Regional Development Fund through the COMPETE 2020 Pro-
gramme within project POCI-01-0145-FEDER-006961, and by National Funds through the FCT – Funda¸cao para
a Ciencia e a Tecnologia (Portuguese Foundation for Science and Technology) as part of project UID/EEA/50014/2013.
7The number of times a given URL was shared in LinkedIn is obtained by appending the respective URL to https://www.linkedin.
com/countserv/count/share?format=json&url=.
6
FacebookGoogle+LinkedIn0501001500501001500501001500.000.250.500.751.00TimeSliceProportionTopicEconomyMicrosoftObamaPalestineReferences
[1] Roja Bandari, Sitaram Asur, and Bernardo A. Huberman. The pulse of news in social media: Forecasting
popularity. In Proceedings of the Seventh International Conference on Weblogs and Social Media. The AAAI
Press, 2012.
[2] John Blitzer, Mark Dredze, and Fernando Pereira. Biographies, bollywood, boom-boxes and blenders:
Domain adaptation for sentiment classification. In Proceedings of the 45th Annual Meeting of the Association
of Computational Linguistics, pages 440–447. ACL, June 2007.
[3] Gianmarco De Francisci Morales, Aristides Gionis, and Claudio Lucchese. From chatter to headlines:
Harnessing the real-time web for personalized news recommendation.
In Proceedings of the Fifth ACM
International Conference on Web Search and Data Mining, WSDM '12, pages 153–162. ACM, 2012. ISBN
978-1-4503-0747-5. doi: 10.1145/2124295.2124315.
[4] Facebook. Facebook - statistics, 2016. URL http://newsroom.fb.com/company-info/#statistics. [On-
line; accessed 23-January-2017].
[5] Florent Garcin, Christos Dimitrakakis, and Boi Faltings. Personalized news recommendation with context
trees. In Proceedings of the 7th ACM Conference on Recommender Systems, RecSys'13, pages 105–112, New
York, NY, USA, 2013. ACM. ISBN 978-1-4503-2409-0.
[6] M. Gupta, J. Gao, C. Zhai, and J. Han. Predicting future popularity trend of events in microblogging
platforms. In Andrew Grove, editor, ASIS&T 75th Annual Meeting, 2012.
[7] Gonca Gursun, Mark Crovella, and Ibrahim Matta. Describing and forecasting video access patterns. In
INFOCOM, pages 16–20. IEEE, 2011. ISBN 978-1-4244-9921-2.
[8] Liangjie Hong, Ovidiu Dan, and Brian D. Davison. Predicting popular messages in twitter. In Proceedings
of the 20th International Conference Companion on World Wide Web, WWW '11, pages 57–58, New York,
NY, USA, 2011. ACM. ISBN 978-1-4503-0637-9.
[9] Salman Jamali and Huzefa Rangwala. Digging digg: Comment mining, popularity prediction, and social
network analysis. In Proceedings of the 2009 International Conference on Web Information Systems and
Mining, WISM '09, pages 32–38, Washington, DC, USA, 2009. IEEE Computer Society. ISBN 978-0-7695-
3817-4. doi: http://dx.doi.org/10.1109/WISM.2009.15.
[10] Himabindu Lakkaraju and Jitendra Ajmera. Attention prediction on social media brand pages. In Pro-
ceedings of the 20th ACM Conference on Information and Knowledge Management, CIKM 2011, Glas-
gow, United Kingdom, October 24-28, 2011, pages 2157–2160, 2011. doi: 10.1145/2063576.2063915. URL
http://doi.acm.org/10.1145/2063576.2063915.
[11] Kristina Lerman and Aram Galstyan. Analysis of social voting patterns on digg. In Proceedings of the First
Workshop on Online Social Networks, WOSN '08, pages 7–12, New York, NY, USA, 2008. ACM. ISBN
978-1-60558-182-8. doi: 10.1145/1397735.1397738.
[12] Kristina Lerman and Rumi Ghosh. Information contagion: An empirical study of the spread of news on
digg and twitter social networks. In William W. Cohen and Samuel Gosling, editors, ICWSM. The AAAI
Press, 2010.
[13] Kristina Lerman and Tad Hogg. Using a model of social dynamics to predict popularity of news.
In
Proceedings of the 19th International Conference on World Wide Web, WWW '10, pages 621–630, New
York, NY, USA, 2010. ACM. ISBN 978-1-60558-799-8.
[14] Bing Liu and Lei Zhang. A survey of opinion mining and sentiment analysis. In Charu C. Aggarwal and
ChengXiang Zhai, editors, Mining Text Data, pages 415–463. Springer, 2012. ISBN 978-1-4419-8462-3.
[15] Huan Liu, Fred Morstatter, Jiliang Tang, and Reza Zafarani. The good, the bad, and the ugly: uncovering
novel research opportunities in social media mining. International Journal of Data Science and Analytics,
1(3):137–143, 2016. ISSN 2364-4168. doi: 10.1007/s41060-016-0023-0.
[16] Annette Markham and Elizabeth Buchanan. Ethical decision-making and internet research: Recommen-
dations from the aoir ethics working committee (version 2.0). https://aoir.org/reports/ethics2.pdf.
Accessed: 2018-01-13.
[17] Nic Newman, Richard Fletcher, David A. L. Levy, and Rasmus Kleis Nielsen. Reuters institute digital news
report 2016. Technical report, Reuters Institute for the Study of Journal (University of Oxford), 2016.
7
[18] M. Osborne and M. Dredze. Facebook, twitter and google plus for breaking news: Is there a winner? In
Proc. of the 8th ICWSM 2014, 2014.
[19] Sasa Petrovic, Miles Osborne, Richard McCreadie, Craig Macdonald, Iadh Ounis, and Luke Shrimpton.
Can twitter replace newswire for breaking news? In Proc. of 7th ICWSM. The AAAI Press, 2013.
[20] Tyler W. Rinker. qdap: Quantitative Discourse Analysis Package. University at Buffalo/SUNY, Buffalo,
New York, 2013. URL http://github.com/trinker/qdap. 2.2.5.
[21] Benjamin Shulman, Amit Sharma, and Dan Cosley. Predictability of popularity: Gaps between prediction
and understanding. In Proceedings of the Tenth International Conference on Web and Social Media, Cologne,
Germany, May 17-20, 2016., pages 348–357, 2016.
[22] B. Suh, L. Hong, P. Pirolli, and E. H. Chi. Want to be retweeted? large scale analytics on factors impacting
retweet in twitter network. In Proc. of the 2nd IEEE SOCIALCOM, pages 177–184, DC, USA, 2010. IEEE.
[23] Gabor Szabo and Bernardo A. Huberman. Predicting the popularity of online content. Commun. ACM,
53(8):80–88, 2010. ISSN 0001-0782. doi: 10.1145/1787234.1787254. URL http://doi.acm.org/10.1145/
1787234.1787254.
[24] Alexandru Tatar, Marcelo Dias de Amorim, Serge Fdida, and Panayotis Antoniadis. A survey on predicting
the popularity of web content. Journal of Internet Services and Applications, 5(1):8, 2014. ISSN 1867-4828.
[25] Manos Tsagkias. Mining Social Media: Tracking Content and Predicting Behavior. PhD thesis, Faculteit
der Natuurwetenschappen, Wiskunde en Informatica, 2012.
[26] Oren Tsur and Ari Rappoport. What's in a hashtag?: Content based prediction of the spread of ideas in
microblogging communities. In Proceedings of the Fifth ACM International Conference on Web Search and
Data Mining, WSDM '12, pages 643–652, New York, NY, USA, 2012. ACM. ISBN 978-1-4503-0747-5. doi:
10.1145/2124295.2124320.
[27] Twitter. Twitter - statistics, 2016. URL https://about.twitter.com/company.
[Online; accessed 23-
January-2017].
[28] F. Wu and B. A. Huberman. Novelty and collective attention. Proc. Natl. Acad. Sci. USA, 104(45):
17599–17601, 2007.
[29] Jaewon Yang and Jure Leskovec. Patterns of temporal variation in online media. In Proceedings of the
Fourth ACM International Conference on Web Search and Data Mining, WSDM '11, pages 177–186, New
York, NY, USA, 2011. ACM. ISBN 978-1-4503-0493-1. doi: 10.1145/1935826.1935863. URL http://doi.
acm.org/10.1145/1935826.1935863.
[30] Youtube. Youtube - statistics, 2016. URL https://www.youtube.com/yt/press/statistics.html. [Online;
accessed 23-January-2017].
[31] Tauhid Zaman, Emily B. Fox, and Eric T. Bradlow. A bayesian approach for predicting the popularity of
tweets. The Annals of Applied Statistics, 8(3):1583–1611, 2014.
8
|
1502.02341 | 2 | 1502 | 2015-06-02T18:56:33 | First Women, Second Sex: Gender Bias in Wikipedia | [
"cs.SI"
] | Contributing to history has never been as easy as it is today. Anyone with access to the Web is able to play a part on Wikipedia, an open and free encyclopedia. Wikipedia, available in many languages, is one of the most visited websites in the world and arguably one of the primary sources of knowledge on the Web. However, not everyone is contributing to Wikipedia from a diversity point of view; several groups are severely underrepresented. One of those groups is women, who make up approximately 16% of the current contributor community, meaning that most of the content is written by men. In addition, although there are specific guidelines of verifiability, notability, and neutral point of view that must be adhered by Wikipedia content, these guidelines are supervised and enforced by men.
In this paper, we propose that gender bias is not about participation and representation only, but also about characterization of women. We approach the analysis of gender bias by defining a methodology for comparing the characterizations of men and women in biographies in three aspects: meta-data, language, and network structure. Our results show that, indeed, there are differences in characterization and structure. Some of these differences are reflected from the off-line world documented by Wikipedia, but other differences can be attributed to gender bias in Wikipedia content. We contextualize these differences in feminist theory and discuss their implications for Wikipedia policy. | cs.SI | cs | First Women, Second Sex: Gender Bias in Wikipedia
Eduardo
Graells-Garrido1,2
1Web Research Group
Universitat Pompeu Fabra
Barcelona, Spain
Mounia Lalmas3
Filippo Menczer4,5
2Telefónica I+D
Santiago, Chile
3Yahoo Labs
London, UK
4Yahoo Labs
Sunnyvale, USA
5Indiana University
Bloomington, USA
5
1
0
2
n
u
J
2
]
I
S
.
s
c
[
2
v
1
4
3
2
0
.
2
0
5
1
:
v
i
X
r
a
ABSTRACT
Contributing to history has never been as easy as it is today. Anyone
with access to the Web is able to play a part on Wikipedia, an open
and free encyclopedia. Wikipedia, available in many languages,
is one of the most visited websites in the world and arguably one
of the primary sources of knowledge on the Web. However, not
everyone is contributing to Wikipedia from a diversity point of view;
several groups are severely underrepresented. One of those groups is
women, who make up approximately 16% of the current contributor
community, meaning that most of the content is written by men. In
addition, although there are specific guidelines of verifiability, nota-
bility, and neutral point of view that must be adhered by Wikipedia
content, these guidelines are supervised and enforced by men.
In this paper, we propose that gender bias is not about partici-
pation and representation only, but also about characterization of
women. We approach the analysis of gender bias by defining a
methodology for comparing the characterizations of men and women
in biographies in three aspects: meta-data, language, and network
structure. Our results show that, indeed, there are differences in
characterization and structure. Some of these differences are re-
flected from the off-line world documented by Wikipedia, but other
differences can be attributed to gender bias in Wikipedia content.
We contextualize these differences in feminist theory and discuss
their implications for Wikipedia policy.
Categories and Subject Descriptors
H.3.4 [Information Storage and Retrieval]: Systems and Soft-
ware—Information networks
Keywords
Wikipedia; Gender; Gender Bias; Computational Linguistics.
1.
INTRODUCTION
Today’s Web creates opportunities for global and democratic me-
dia, where everyone has a voice. One of the most visible examples
is Wikipedia, an open encyclopedia where anyone can contribute
content. In contrast to traditional encyclopedias, where a staff of
experts in specific areas takes care of writing, editing and validating
content, in Wikipedia these tasks are performed by a community
of volunteers. Whether or not this open source approach provides
reliable and accurate content [22, 43], Wikipedia has gained unprece-
dented reach. Indeed, Wikipedia was the 7th most visited website
during 2014.1 An extensive body of research builds upon Wikipedia
[36], covering topics like participation, structured data, and analysis
of historical figures, among others.
In theory, by following its guidelines about verifiability, notability,
and neutral point of view, Wikipedia should be an unbiased source
of knowledge. In practice, the community of Wikipedians is not
diverse, and contributors are inherently biased. One group that is
severely underrepresented in Wikipedia is women, who represent
only 16% of editors [24]. This disparity has been called the gender
gap in Wikipedia, and has been studied from several perspectives
to understand why more women do not join Wikipedia, and what
can be done about it. It is a problem because reportedly women
are not being treated as equals to men in the community [29], and
potentially, in content. For instance, Filipacchi [17] described a
controversy where women novelists started to be excluded from
the category “American Novelists” to be included in the specific
category “American Women Novelists.”
Instead of focusing on the participatory gender gap, we focus
on how women are characterized in Wikipedia articles, to assess
whether gender bias from the off-line world extends to Wikipedia
content, and to identify biases exhibited by Wikipedians in the
characterization of women and of their historical significance. The
research questions that drive our work are:
Is there a gender bias in user-generated characteriza-
tions of men and women in Wikipedia?
If so, how to identify and quantify it? How to explain it
based on social theory?
The study of biases in Wikipedia is not new. Hecht and Gergle
[23] defined the notion of self-focus bias to study the cultural biases
present in Wikipedia from a “hyperlingual” approach. Having the
gender gap in mind, we focus on gender bias not only to quantify it,
but to understand what could be causing it. As a first approach to
the problem, we focus on the English language to be able to analyze
our results in terms of western feminist theories from the social
sciences.
In the book The Second Sex, Simone de Beauvoir widely discusses
different aspects of women oppression and their historical signifi-
cance. She wrote in 1949: “it is not women’s inferiority that has
determined their historical insignificance: it is their historical in-
significance that has doomed them to inferiority” [15]. More than 60
This is the author’s version of this paper. To be presented at the ACM Conference on
Hypertext and Social Media 2015.
1http://www.alexa.com/siteinfo/wikipedia.org
years later, almost anyone with access to the Web can contribute to
the writing of history, thanks to Wikipedia. The scale of Wikipedia,
as well as its openness, allows us to perform a quantitative analysis
of how women are characterized in Wikipedia in comparison to men.
Encyclopedias characterize men and women in many ways, e. g., in
terms of their lives and the events in which they participated or were
relevant. We concentrate on biographies because they are a good
source to study gender bias, given that each article is about a specific
person. We propose three dimensions along which to perform our
analysis: meta-data, language, and network structure. This leads to
three major findings:
1. Differences in meta-data are coherent with results in previous
work, where women biographies were found to contain more
marriage-related events than men’s.
2. Sex-related content is more frequent in women biographies
than men’s, while cognition-related content is more high-
lighted in men biographies than women’s.
3. A strong bias in the linking patterns results in a network
structure in which articles about men are disproportionately
more central than articles about women.
The main contributions of this work are methods to quantify gen-
der bias in user generated content, a contextualization of differences
found in terms of feminist theory, and a discussion of the implica-
tions of our findings for informing policy design in Wikipedia. As
said earlier, we focus on the English Wikipedia, but our methods are
generalizable to other languages and platforms.
2. BACKGROUND
Research on the community structure and evolution of Wikipedia
has been prominent. In its first steps, the focus was on growth [2]
and dynamics [41], without attention toward gender. Later, it was
found that there is a gender gap, as Wikipedia has fewer contribu-
tions from women, and women stop contributing earlier than men
[29]. There are differences in how genders behave. For instance,
men and women communicate differently in the inner communi-
cation channels in Wikipedia [30]: they focus on different topics
[29] and the level of content revision differs by gender but also
by amount of activity [4]. In addition, Lam et al. [29] found that
women are more reverted than men (i.e., their contributions are dis-
carded), and reportedly women contribute less because of aggressive
behavior toward them [14, 48]. Efforts have been made to build a
more welcoming community and to encourage participation [33,
13], and Wikimedia itself encourages initiatives like WikiWomen’s
Collaborative.2
Content-wise, the study of biographies in Wikipedia enables cul-
tural comparisons of coverage [9], as well as the construction of
social networks of historical (and current) figures [6]. Although bias
in content has been addressed before through self-focus bias [23],
such bias has been measured at large-scale only in terms of culture,
not gender. Lam et al. [29] found that coverage of “female topics”
was inferior to “male topics ” when classifying topics as “male” or
“female” according to the people who contributed to them. Reagle
and Rhue [42] found that in characterization of women, in com-
parison to commercial encyclopedias like Britannica, Wikipedia
has better coverage of notable profiles, although this coverage is
quite low and it is still biased towards men. Bamman and Smith [7]
found that women biographies are more likely to include marriage
or divorce events.
Addressing the gender gap from a content perspective may help
to improve the quality and value of the content. Currently, focus
on quality in Wikipedia has been about predicting article quality [3,
2http://meta.wikimedia.org/wiki/WikiWomen’s_Collaborative
19]. However, focusing on quality without considering readers does
not give the whole picture, as Wikipedia readers are not necessarily
interested in the same topics as contributors [31] and might have
a different concept of quality. Moreover, in our context, Flekova,
Ferschke, and Gurevych [19] found that quality of biographies is
assessed differently depending on the gender of the portrayed person.
Is it because the raters were biased? Or is it because biographies
were written differently? Our hypothesis is that biographies are
written differently, an idea inspired by seminal work about how
women are characterized by language [28].
To study differences in text, word frequency is commonly used.
Word frequency follows Zipf’s law [53, 45]. An interesting property
of Zipf distributions in language is that small sets of words that are
semantically or categorically related also follow a Zipf distribution
[39]. This property implies that, given two subsets of words that
are related semantically or categorically, their frequency distribu-
tions can be compared. Thus, we compare frequency distributions
according to gender for several semantic categories derived from
the Linguistic Inquiry and Word Count (LIWC) dictionary. LIWC
studies “emotional, cognitive, structural, and process components
present in individuals’ verbal and written speech samples” [37]. It
has been used to analyze interactions between Wikipedia contrib-
utors [25] and article content with respect to emotions [16]. In a
context similar to ours, Schmader, Whitehead, and Wysocki [44]
used LIWC to quantify differences in characterization of women
and men in recommendation letters.
In our work, we quantify gender bias in Wikipedia’s character-
ization of men and women through their biographies. To do so
we approach three different dimensions of biographies, which we
analyze in different sections on this paper: meta-data, provided
by the structured version of Wikipedia, DBPedia [32]; language,
considering how frequent are words and concepts [45]; and net-
work structure. In terms of network structure, we build a biography
network [6] in which we estimate PageRank, a measure of node
centrality based on network connectivity [8, 20]. In similar contexts,
PageRank has been used to provide an approximation of historical
importance [6, 46] and to study the bias leading to the gender gap
[46]. We measure bias in link formation by comparing the impor-
tance given by PageRank in the biography network with those of
null models, i. e., graphs that are unbiased by construction but that
maintain certain properties of the source biography network.
3. DATASET
To study gender bias in Wikipedia, we consider three freely avail-
able data sources:
1. The DBPedia 2014 dataset [32].3
2. The Wikipedia English Dump of October 2014.4
3. Inferred gender for Wikipedia biographies by Bamman and
Smith [7].5
DBPedia and Meta-data. DBPedia is a structured version of
Wikipedia that provides meta-data for articles, normalized article
URIs (Uniform Resource Identifiers), and normalized links between
articles (taking care of redirections). It provides a shallow hierarchy
of classes, which includes a Person category. To provide the struc-
tured meta-data, DBPedia processes from the content of infoboxes
in Wikipedia articles. Infoboxes are template-based specifications
for specific kinds of articles. When DBPedia detects an infobox with
a template that matches those of a person, it assigns the article to the
Person class, and to a specific subclass if applicable (e. g., Artist).
3http://wiki.dbpedia.org/Downloads2014
4https://dumps.wikimedia.org/enwiki/20141008/
5http://www.ark.cs.cmu.edu/bio/
Table 1: Number of biographies in the dataset for the Person class
and its most common child classes (in terms of biographies with gen-
der). In this and the following tables, we use this legend for p-values:
*** p < 0.001, ** p < 0.01, * p < 0.05.
Ontology
Person
Athlete
Artist
OfficeHolder
Politician
MilitaryPerson
Scientist
SportsManager
Cleric
Royalty
Coach
FictionalCharacter
Noble
Criminal
Judge
With gender % Women
15.53
8.94
25.14
13.04
8.75
1.67
8.79
0.62
6.34
35.24
2.40
26.08
23.16
12.45
14.88
893380
187828
79690
38111
32398
22769
15853
11255
8949
7054
5720
4023
3696
1976
1949
OutD. t
20.77***
10.64***
12.95***
10.97***
1.29
4***
4.91***
0.79
3.23**
0.55
0.27
3.03**
3.16**
1.08
3.93***
Len. t
-2.65**
-2.83**
-0.33
3.77***
-4.02***
1.03
-0.01
-2.79**
0.02
1.75
-2.65**
0.39
2.05*
-1.69
2.97**
Figure 2: Distribution of biographies according to birth year.
Of the set of 1,445,021 biographies (articles in the DBPedia Person
class), 893,380 (61.82%) have gender meta-data. Of those, only
15.5% are about women.
The mean article length is 5,955 characters for men and 6,013
characters for women (a significant difference according to a t-test
for independent samples: p < 0.01, Cohen’s d = 0.01). The mean
out-degrees (number of links) of 42.1 for men and 39.4 for women
also differ significantly (p < 0.001, Cohen’s d = 0.06). Table
1 displays the number of biographies in the Person class, as well
as its most common subclasses. Of all biographies in the dataset,
61.82% have gender meta-data. From the table, in comparison to the
global proportion of women, the following categories over-represent
women: Artist, Royalty, FictionalCharacter, Noble, BeautyQueen,
and Model. The others over-represent men. The differences in
length and degree do not hold for all classes, hinting that a study
according to semantic categories of people is needed. However, in
this paper we focus on the global differences in Person.
Distribution According to Date of Birth. Figure 2 displays the dis-
tribution of biographies according to their corresponding birthYear
property, considering only those biographies between years 1600
and 2000 (inclusive). This accounts for 65.48% of biographies with
gender (note that 34.07% does not have date of birth in meta-data).
The distribution per gender (top chart) shows that most of the bi-
ographies of both genders are about people from modern times. The
distribution of fraction of women per year (bottom chart) shows that
since the year 1943 the fraction of women is consistently above the
global value of 0.155. Note that, of the biographies that have date of
Figure 1: Infobox from the biography article of Simone de Beauvoir.
For instance, Figure 1 displays the infobox of Simone de Beauvoir.
The infobox contains specific meta-data pertinent to a biography,
such as date and place of birth, but it does not include gender (in
specific cases it does, see “Inferred Gender” next). DBPedia maps
infobox properties to specific fields in a person’s meta-data. These
properties are not always available in the infobox templates, and do
not always have a standardized name. DBPedia, whenever possible,
normalizes both attribute keys and attribute values.
Wikipedia Biographies. We consider two versions of the biogra-
phies: the overview and the full text. We analyze both in different
contexts: in the overview we analyze the full vocabulary employed,
while in the full text we analyze only the words pertaining to the
LIWC dictionaries. The overview is described by Wikipedia as “an
introduction to the article and a summary of its most important as-
pects. It should be able to stand alone as a concise overview.” Since
those aspects are subjective, the introduction content is a good proxy
for any potential biases expressed by Wikipedia contributors. At the
same time we avoid potential noise included in the full biography
text from elements like quotations and the filmography of a given
actor/actress. In both cases (overview and full content), template
markup is removed from analysis.
Inferred Gender. To obtain gender meta-data for biographies, we
match article URIs with the dataset by Bamman and Smith [7],
which contains inferred gender for biographies based on the number
of grammatically gendered words (i. e., he, she, him, her, etc.)
present in the article text. Bamman and Smith [7] tested their method
in a random set of 500 biographies, providing 100% precision and
97.6% recall. This method has also been used before by Reagle
and Rhue [42] and DBPedia itself [32], making DBPedia to include
gender meta-data in some cases. However, note that the genders
considered in these datasets (and thus, in this work) are only male
and female.
4. META-DATA PROPERTIES
In our first analysis we estimate the proportion of women in
Wikipedia. We analyze meta-data by comparing how men and
women proportionally have several attributes in the data from DB-
Pedia.
Presence and Proportion According to Class. DBPedia estimates
the length (in characters) and provides the connectivity of articles.
Table 2: Proportion of men and women who have the specified
attributes in their infoboxes. Proportions were tested with a chi-
square test, with effect size estimated using Cohen’s w.
birthName
careerStation
deathDate
deathYear
formerTeam
numberOfMatches
occupation
position
spouse
team
title
years
% Men % Women
11.46
1.13
19.35
25.45
0.24
1.06
23.28
1.68
6.86
1.97
19.65
1.12
4.01
8.95
32.82
44.68
4.40
8.60
12.52
13.62
1.56
14.06
9.17
8.95
χ2
4.84*
6.84**
5.53*
8.28**
3.94*
6.61*
4.97*
10.46**
4.10*
10.39**
5.59*
6.84**
w
0.81
0.94
0.64
0.66
0.97
0.94
0.68
0.94
0.88
0.93
0.73
0.94
Figure 4: A density hexbin plot of word frequencies in men/women’s
biographies (left), and the PDF of word frequency distribution ac-
cording to gender (right).
the most common class with the spouse attribute is Person, the
reference class, with 45% of the instances of the attribute.
5. LANGUAGE PROPERTIES
In this section we explore the characterization of women and men
from a lexical perspective. We analyze the vocabulary used in the
overview of each biography through word frequency, and we use the
estimated frequencies to find which words are associated with each
gender. To estimate relative frequencies, words were considered
once per biography, and we estimated bi-gram word collocations
to identify composite concepts (e. g., New York). We obtained a
vocabulary of size Vm = 1,013,305 for men, Vw = 376,737 for
women, with V = 272,006 common words.
Figure 4 displays a density plot of word frequency, and the Prob-
ability Density Functions (PDFs) for both genders. The frequency
distributions are similar across genders. Word frequencies in the
common vocabulary for both genders follow a Zipf distribution
P (f ) ∼ f−α with similar exponents α ≈ 1.8, consistent with the
value found by Serrano, Flammini, and Menczer [45]. In addition,
frequency with respect to gender presents a high rank-correlation
ρ = 0.65 (p < 0.001). For reference, consider that the inter-
language rank correlation of words with the same meaning across
languages is 0.54 [10]. This implies that words share meanings when
referring to men and women.
Associativity of Words with Gender. To explore which words are
more strongly associated with each gender, we measure Pointwise
Mutual Information [12] over the set of vocabulary in both genders.
PMI is defined as:
PMI(c, w) = log
p(c, w)
p(c)p(w)
Figure 3: Relation between the cumulative fraction of women and
the fraction of women per year (dots). The y-axis was truncated to
0.25 for clarity.
birth in their meta-data, 53% are from 1943 until 2000. To explore
the evolution of growth of women presence, in Figure 3 we display
the relationship between the cumulative fraction of biographies and
the yearly fraction of biographies of women. The chart includes a
LOWESS6 fit of the data, to be able to see the tendency of changes
in representation. This tendency became positive in the period 1750–
1800. These results are discussed in terms of historical significance
in the discussion section.
Infobox Attributes. Given that there are different classes of in-
foboxes, there are many different meta-data attributes than can
be included in biographies. In total, we identified 340 attributes.
For each one of them, we counted the number of biographies that
contained it, and then compared the relative proportions between
genders with a chi-square test. Only 3.53% presented statistically
significant differences. Those attributes are displayed in Table 2.
All of them have large effect sizes (Cohen’s w > 0.5). Inspection
allows us to make several observations:
• Attributes careerStation, formerTeam, numberOfMatches, po-
sition, team, and years are more frequent in men. All these
attributes are related to sports, and thus, these differences can
be explained by of the prominence of men in sports-related
classes (e. g., Athlete, SportsManager and Coach in Table 1).
• Attributes deathDate, deathYear are more frequent in men.
According to Figure 2, most women are from recent times,
and thus they are presumably still alive.
• Attribute birthName is more frequent in women. Its values
refer mostly to the original name of artists, and women have
considerable presence in this class (see Table 1). In addi-
tion, other possible explanation is that, in the case of married
women, they usually change their surnames to those of their
husbands.
• Attributes occupation and title are more frequent in women.
Title is a description of a person’s occupation (the most com-
mon are Actor and Actress), while occupation is a DBPedia
resource URI (e.g., http://dbpedia.org/resource/Actor). The
infoboxes of sport-related biographies do not contain these
attributes because their templates are already indicators of
their occupations, and thus, athletes (which are mostly men)
do not contain such attributes.
The case of the spouse attribute is different. The inspection does
not offer a direct explanation other than the tendency to include this
attribute more in women biographies than in men’s. For instance,
6Locally weighted scatterplot smoothing.
where c is a class (men or women), and w is a word. The probabilities
can be estimated from the proportions of biographies about men
Figure 5: Words most associated with women (left) and men (right), estimated with Pointwise Mutual Information. Font size is inversely
proportional to PMI rank. Color encodes frequency (the darker, the more frequent).
and women, and the corresponding proportions of words and bi-
grams. Since PMI overweights words with very small frequencies,
we consider only words that appear in at least 1% of men or women
biographies.
Associativity results are displayed as word clouds in Figure 5.
The top-15 words associated to each gender are (relative frequency
in parentheses):
• Women: actress (15.9%), women’s (8.8%), female (5.6%), her
husband (4.1%), women (5.3%), first woman (1.9%), film ac-
tress (1.6%), her mother (1.8%), woman (4.4%), nee (3.6%),
feminist (1%), miss (1.9%), model (3.3%), girls (1.5%) and
singer (6.5%).
• Men: played (14.2%), footballer who (3.0%), football (4.5%),
league (5.9%), john (7.9%), major league (1.8%), football
league (1.6%), college football (1.5%), son (7%), football
player (2.2%), footballer (2%), served (11.7%), william (4.6%),
national football (2%) and professional footballer (1%).
Clearly, the words most associated with men are related to sports,
football in particular, which refers to both popular sports of soccer
and American football (recall from Table 1 that Athlete is the largest
subclass of Person). For women, the most associated words are
related to arts (recall from Table 1 that Artist is the second largest
subclass of Person), gender (women’s, female, first woman, feminist),
and family roles (her husband, her mother, nee7). This is consistent
with the results from the meta-data analysis, where women are more
likely to have a spouse attribute in their infoboxes (see Table 2), and
with the results of Bamman and Smith [7].
Gender Differences in Semantic Categories of Words. Words
most associated to each gender might belong to categories that are
hard to compare, given their richness and complexity. We use the
Linguistic Inquiry and Word Count dictionary of semantic categories
to find if different genders have different characterizations according
to those semantic categories. The LIWC dictionary includes, for
each category (and its corresponding subcategories), a list of words
and prefixes that match relevant words. We consider the following
pertinent categories to our context: Social Processes, Cognitive
Processes, Biological Processes, Work Concerns and Achievement
Concerns. To generate the final dictionaries from the vocabulary, we
matched the prefixes in our corpus and performed manual cleaning
of noisy keywords like place names (e. g., Virginia matches virgin*
from the sexual category), surnames (Lynch matches lynch* from
the death category), and words with unrelated meanings. In total,
our cleaned dictionary contained 2,877 words.
7Adjective used when giving a former name of a woman.
To compare the distribution of words in the semantic categories,
we employed two metrics: relative frequency in overviews, as pre-
viously done with PMI, and burstiness in the full text. Word fre-
quencies identify how language is used differently to characterize
men and women in terms of semantic categories. However, word
frequency alone does not give insights on how those semantic cate-
gories portray a given biography, or in other words, the importance
that editors give to those categories. Burstiness is a measure of word
importance in a single document according to the number of times
it appears within the document, under the assumption that important
words appear more than once (they appear in bursts) when they are
relevant in a given document. We use the definition of burstiness
from Church and Gale [11]:
B(w) =
Ew(f )
Pw(f ≥ 1)
where Ew(f ) is the mean number of occurrences of a given word
w per document, and Pw(f ≥ 1) is the probability that w appears
at least once in a document. The differences in frequency and
burstiness are tested using the Mann-Whitney U test, which indicates
if one population tends to have larger values than another. It is non-
parametric, i. e., it does not assume normality.
Differences in Frequency. Table 3 shows statistics related to word
frequency in biography overviews for the LIWC categories. Note
that, although the medians are very similar for each category, the U
test compares differences in the distribution instead of differences
in means or medians. If the test revealed significant differences, we
calculated the common language effect size (ES) as the percentage
of words that had a greater relative frequency for the dominant
gender. Of the 20 categories under consideration, two of them (one
top-level) shown significant differences between genders: cogmech
(cognitive processes, ES = 63%) is dominated by men, while sexual
(sexual processes, subcategory of biological processes, ES = 85%)
is dominated by women.
Differences in Burstiness. Burstiness distributions in full biogra-
phies per semantic category are displayed in Table 4. There are
three (two top-level) categories with significant differences, both
dominated by men: cogmech (cognitive processes, ES = 60%), its
subcategory cause (causal processes, ES = 71%), and work (work
concerns, ES = 64%).
Overview of Results. In summary, in this section we found that
words have similar meaning when referring to both genders, that
there are qualitative differences in words most associated to them,
and that a small number of the semantic categories show significant
differences. Although this implies more similarities than differences
Table 3: Word frequency in biography overviews. For each LIWC category we report vocabulary size, median frequencies, the result of a
Mann-Whitney U test, and the three most frequent words. M and W mean men and women, respectively.
Category
social
– family
– friend
– humans
cogmech
– insight
– cause
– discrep
– tentat
– certain
– inhib
– incl
– excl
bio
– body
– health
– sexual
– ingest
work
achieve
Category
social
– family
– friend
– humans
cogmech
– insight
– cause
– discrep
– tentat
– certain
– inhib
– incl
– excl
bio
– body
– health
– sexual
– ingest
work
achieve
V Median (M) Median (W)
498
43
33
59
1045
354
182
57
151
110
229
7
6
638
193
274
105
122
570
364
0.04%
0.03%
0.05%
0.13%
0.02%
0.02%
0.02%
0.02%
0.01%
0.03%
0.01%
0.25%
0.11%
0.01%
0.01%
0.01%
0.00%
0.01%
0.04%
0.05%
0.05%
0.09%
0.05%
0.17%
0.02%
0.02%
0.02%
0.02%
0.01%
0.02%
0.01%
0.29%
0.07%
0.01%
0.01%
0.01%
0.01%
0.01%
0.03%
0.04%
U
-1.12
-0.85
-0.58
-1.34
2.04*
0.73
1.31
0.06
0.85
0.92
1.75
-0.06
0.48
-1.63
-0.60
-0.40
-3.02**
-0.51
1.12
1.06
Top-3 (M)
team (7.5%), son (7.0%), received (5.1%)
son (7.0%), father (5.0%), family (3.9%)
fellow (2.0%), friend (0.8%), partner (0.8%)
people (2.4%), man (2.2%), children (1.8%)
became (10.8%), known (9.8%), made (8.1%)
became (10.8%), known (9.8%), become (2.2%)
made (8.1%), since (6.2%), based (3.3%)
outstanding (0.4%), wanted (0.3%), besides (0.3%)
appeared (3.2%), mainly (0.9%), mostly (0.8%)
law (2.7%), total (1.1%), completed (1.0%)
held (4.2%), conservative (0.7%), control (0.5%)
addition (1.5%), open (0.8%), close (0.6%)
except (0.2%), whether (0.2%), vs (0.1%)
life (3.9%), head (2.5%), living (1.1%)
head (2.5%), body (0.6%), face (0.5%)
life (3.9%), living (1.1%), hospital (0.9%)
love (0.8%), passion (0.2%), gay (0.2%)
water (0.4%), food (0.3%), cook (0.2%)
career (9.5%), team (7.5%), worked (6.4%)
won (8.7%), team (7.5%), worked (6.4%)
Top-3 (W)
daughter (6.8%), received (5.9%), role (5.8%)
daughter (6.8%), family (4.7%), father (3.7%)
fellow (1.8%), partner (1.1%), friend (0.8%)
female (5.6%), women (5.3%), children (4.5%)
known (10.3%), became (9.2%), since (8.1%)
known (10.3%), became (9.2%), become (2.0%)
since (8.1%), made (6.7%), based (4.2%)
outstanding (0.5%), wanted (0.4%), hope (0.4%)
appeared (6.8%), appearing (1.1%), mainly (0.8%)
law (2.0%), ever (1.0%), completed (0.9%)
held (3.1%), hold (0.6%), opposite (0.5%)
addition (1.7%), open (1.0%), close (0.4%)
except (0.2%), whether (0.1%), vs (0.1%)
life (4.7%), love (1.9%), living (1.7%)
head (1.5%), body (0.8%), face (0.6%)
life (4.7%), living (1.7%), health (1.2%)
love (1.9%), sex (0.5%), lesbian (0.3%)
food (0.5%), water (0.4%), cook (0.3%)
career (8.1%), worked (6.6%), school (6.1%)
won (13.0%), worked (6.6%), team (5.5%)
Table 4: Word burstiness in full biographies for LIWC categories. Columns are analog to Table 3.
V Median (M) Median (W)
498
43
33
59
1045
354
182
57
151
110
229
7
6
638
193
274
105
122
570
364
1.21
1.31
1.23
1.35
1.12
1.13
1.15
1.10
1.12
1.11
1.10
1.27
1.27
1.26
1.27
1.24
1.27
1.29
1.23
1.15
1.22
1.35
1.26
1.44
1.12
1.12
1.13
1.14
1.10
1.10
1.10
1.29
1.20
1.25
1.26
1.24
1.31
1.24
1.20
1.15
U
0.21
-1.12
-1.06
-1.00
2.85**
1.75
2.17*
-1.05
1.86
1.62
1.09
-0.45
0.48
1.87
1.24
1.33
-0.51
1.30
2.62**
0.54
Top-3 (M)
band (3.63), team (3.38), game (2.95)
family (1.85), father (1.75), son (1.64)
friendly (1.86), buddy (1.66), guest (1.59)
sir (2.39), human (2.02), man (2.02)
open (2.37), law (2.36), decision (2.34)
decision (2.34), logic (2.15), became (1.88)
force (2.05), made (1.92), production (1.85)
desir (1.49), outstanding (1.48), idealism (1.45)
mysterium (1.96), puzzle (1.70), appeared (1.68)
law (2.36), total (2.14), truth (1.50)
fencing (2.28), security (1.92), defensive (1.89)
open (2.37), inside (1.30), close (1.30)
vs (2.17), versus (1.32), whether (1.31)
choke (5.18), lymphology (3.50), pelvimeter (3.00)
pelvimeter (3.00), hip (2.15), pee (2.03)
choke (5.18), lymphology (3.50), chiropractic (2.92)
gay (2.56), hiv (2.35), love (2.12)
chew (2.39), cook (2.22), coke (2.11)
gre (4.54), team (3.38), dotcom (2.98)
team (3.38), win (3.19), king (2.64)
Top-3 (W)
team (3.40), women (3.14), role (2.96)
family (2.02), mother (1.98), granny (1.87)
guest (1.75), fellowship (1.54), buddy (1.53)
women (3.14), mrs (2.33), lady (2.25)
open (3.28), revelator (2.75), law (2.31)
revelator (2.75), became (1.86), ponder (1.86)
causation (2.29), outcome (2.04), production (1.82)
outstanding (2.03), wanna (1.58), oughta (1.55)
appeared (2.02), bet (1.67), overall (1.63)
law (2.31), reality (1.55), total (1.52)
fencing (2.20), safe (2.16), blocker (2.02)
open (3.28), close (1.31), additive (1.30)
vs (1.75), versus (1.35), whether (1.24)
love (2.52), prostatic (2.50), hiv (2.33)
prostatic (2.50), pelvimeter (2.00), tits (1.98)
hiv (2.33), choke (2.32), insulin (2.16)
love (2.52), prostatic (2.50), hiv (2.33)
cookery (2.18), cooking (1.98), food (1.95)
pce (18.67), team (3.40), award (3.40)
team (3.40), award (3.40), best (2.72)
in characterization of women and men, in the discussion section we
elaborate over the importance of such differences and the implica-
tions of these findings.
6. NETWORK PROPERTIES
To study structural properties of biographies, we first built a di-
rected network of biographies from the links between articles in
the Person DBPedia class. This empirical network was compared
with several null graphs that, by construction, preserve different
known properties of the original network. This allows us to at-
tribute observed structural differences between genders either to
empirical fluctuations in such properties, such as the heterogeneous
importance of historical figures, or to gender bias. To do so, we
consider PageRank, a measure of node centrality based on network
connectivity [8, 20].
Empirical Network and Null Models. We study the properties of
the directed network constructed from the links between 893,380
biographical articles in the Person class. After removing 192,674 sin-
gleton nodes, the resulting graph has 700,706 nodes and 4,153,978
edges. We use this graph to construct the following null models:
• Random. We shuffle the edges in the original network. For
each edge (u,v), we select two random nodes (i,j) and replace
(u,v) by (i,j). The resulting network is a random graph with
neither the heterogeneous degree distribution nor the clustered
structure that the Wikipedia graph is known to have [54].
• In-Degree Sequence. We generate a graph that preserves
the in-degree sequence (and therefore the heterogeneous in-
degree distribution) of the original network by shuffling the
sources of the edges. For each edge (u,v), we select a random
node (i) and rewire (u,v) to (i,v). Each node has the same
in-degree, or popularity, as the corresponding biography.
• Out-Degree Sequence. We generate a graph that preserves the
out-degree sequence (and therefore the out-degree distribu-
tion) of the original network by shuffling the targets of the
edges. For each edge (u,v) select a random node (j) and rewire
(u,v) to (u,j).
• Full Degree Sequence. We generate a graph that preserves
both in-degree and out-degree sequences (and therefore both
distributions) by shuffling the structure in the original network.
For a random pair of edges ((u,v), (i,j)) rewire to ((u,j), (i,v)).
We repeat this shuffling as many times as there are edges.
We tested the differences between observed and null models using a
Mann-Whitney U test, and found that the observed model is always
significantly different (U values shown in Figure 6, p < 0.001 for
all pairwise comparisons with the observed model, Holm-Sidak cor-
rected). This implies a biased behavior that cannot be explained by
any of the heterogeneities in the structure of the network preserved
by the null models. For instance, even if men biographies tended to
have more incoming links (as they do), or to be more densely clus-
tered, those factors would not explain the lower centrality observed
in women biographies.
7. DISCUSSION
Even though we found more similarities than differences in char-
acterization, in this section we contextualize those differences in
social theory and history. We do this to understand why such differ-
ences exist, and whether they can be attributed to bias in Wikipedia
or to a reflection of western society.
Meta-data. We found that there are statistically significant differ-
ences in biographies of men and women. Most of them can be
explained because of the different areas to which men and women
belong (mostly sports and arts, respectively), as well as the recency
of women profiles available on Wikipedia. Other differences, like
article length and article out-degree, although significant, have very
small effect sizes, and depend on the person class being analyzed.
The greater frequency of the spouse attribute in women can be
interpreted as specific gender roles attributed to women. A similar
result on Implicit Association was obtained by Nosek, Banaji, and
Greenwald [34], as they found that Internet visitors tended to asso-
ciate women to family and arts. Arguably, an alternative explanation
is that people in the arts could be more likely to marry a notable
spouse than people in sports. Yet, we found that the most common
class was the generic one not assigned to any of those categories.
In terms of time, we found that the year 1943 marked a hit on
the growth of women presence. According to Strauss and Howe
[49], the post-war Baby Boomers generation started in 1943. The
following generations are Generation X (1961–1981) and Millenials
(1982–2004). The social and cultural changes embraced by people
from those generations, plus the increased availability of secondary
sources, might explain this growth. The growth started in dates
nearby the French Revolution (1789–1799), where women had an
important role, although they were oppressed after it [1]. During
these years seminal works about feminist philosophy and women’s
rights were published, like the works of Mary Wollstonecraft (1792)
and Olympe de Gouges (1791). It is reasonable to assume that these
historical events paved the way for women to become more notable.
Language. We found that the words most associated with men are
mostly about sports, while the words most associated with women
are to arts, gender and family. Of particular interest are two con-
cepts strongly associated with women: her husband and first woman.
These results are arguably indicative of systemic bias: the usage
of her husband was found in concordance with our meta-data re-
sults and previous work by Bamman and Smith [7], and the already
mentioned work on Implicit Association [34]. These results can be
contextualized in terms of stereotyping theory [40], as they catego-
rize women, either as norm breaking (being the first is an exception
to the norm) or as with predefined roles (being wives). As Fiske
and Neuberg [18] indicate in their continuum model of impression
formation, such categorization makes individuals more prone to
stereotyping than those who are not categorized. The usage of
first woman might indicate notability, but it also has been seen as
an indicator of gender bias, as indicated by the Bechdel-inspired
Figure 6: Women fraction in top biographies sorted by PageRank.
Note that although the in- and out-degree of each node is
unchanged, the degree correlations and the clustering are lost.
• Small World. We generate a undirected small world graph
using the model by Watts and Strogatz [51]. This model inter-
polates a random graph and a lattice in a way that preserves
two properties of small world networks: average path length
and clustering coefficient.
All null models have the same number of nodes n = 700,706
and approximately the same mean degree k ≈ 4 as the empirical
network.
Gender, Link Proportions and Self-Focus Ratio. For each graph,
we estimated the proportion of links from gender to gender, and we
tested those proportions against the expected proportions of men
and women present in the dataset using a chi-square test. Table 5
shows the results. None of the null models show any bias in link
proportions. The observed graph, on the other hand, shows a signifi-
cant difference in the proportion of links from women biographies.
In particular, articles about women tend to link to other women
biographies more than expected (χ2 = 40.54, p < 0.001, Cohen’s
w = 0.76). Men biographies show a greater proportion of links
to men and a lesser proportion to women than expected, but the
difference is not statistically significant, although it has an impact
on the estimated Self-Focus Ratio [23]. In our context, this ratio
is defined as the relation between the sum of PageRank for men
and the sum of PageRank for women. A SFR above 1 confirms
the presence of self-focus, which, given the proportions of men and
women in the dataset, is expected. In fact, given those proportions,
the expected SFR is 5.41. Note that the null models have similar
SFRs to the expected value, in contrast with the observed model
with SFR of 6.55.
Biography Importance. As an approximation for historical im-
portance in our biography network we considered the ranking of
biographies based on their PageRank values.
To compare the observed distribution of PageRank by gender to
those of the null models, we analyzed the fraction of women biogra-
phies among the top-r articles by PageRank, for r ∈ [10, 700, 706]
(i. e., we considered only nodes with edges). In the absence of any
kinds of bias, whether endogenous to Wikipedia or exogenous, one
would expect the fraction of women to be around 15% (the overall
proportion of women biographies) irrespective of r. In the presence
of correlations between popularity or historical importance and gen-
der, we expect the ratio to fluctuate. But such fluctuations would
also be observed in the null models.
The results are shown in Figure 6. While the null models sta-
bilize around the expected value by r ≤ 104, the proportion of
women in the observed network reaches 15% only when the en-
tire dataset is considered. This systematic under-representation of
women among central biographies is not mirrored in the null models.
Table 5: Comparison of the empirical biography network and the null models. M and W mean men and women, respectively.
Nodes
Edges
Observed
Small World
Random
In Deg. Seq.
Out Deg. Seq.
Full Deg. Seq.
693843
693843
693843
693843
693843
693843
4106916
2775372
4106916
4106916
4106916
4106916
Clust.
Coeff.
0.16
0.16
0.00
0.00
0.00
0.00
Edges (M to
M)
90.05%
84.45%
84.41%
85.36%
84.43%
85.34%
Edges (M to
W)
χ2 (M to
W)
9.95% 2.38
15.55% 0.00
15.59% 0.00
14.64% 0.06
15.57% 0.00
14.66% 0.06
Edges (W to
M)
62.19%
84.15%
84.39%
85.27%
84.37%
85.39%
Edges (W to
W)
χ2 (W to
W)
37.81% 37.83***
15.85% 0.01
15.61% 0.00
14.73% 0.05
15.63% 0.00
14.61% 0.06
SFR
6.55
5.41
5.41
5.75
5.42
5.74
Finkbeiner-test8 about scientific women, where it is explicitly men-
tioned that an article about a woman does not pass the test if it
mentions “How she’s the ‘first woman to . . . ”’ Despite being infor-
mal, the Finkbeiner-test raises awareness on how gender becomes
more important than the actual achievements of a person.
To formalize the PMI analysis, we performed analysis based on
semantic dictionaries of words. According to Nussbaum [35], one
possible indicator of objectification is the “denial of subjectivity:
the objectifier treats the object as something whose experience and
feelings (if any) need not be taken into account.” This idea is
supported as, in the overviews, men are more frequently described
with words related to their cognitive processes, while women are
more frequently described with words related to sexuality. In the full
biography text, the cognitive processes and work concerns categories
are more bursty in men biographies, meaning that those aspects of
men’s lives are more important than others at the individual level.
Presence and Centrality of Women. Women biographies tend to
link more to other women than to men, a disproportion that might be
related with women editing women biographies in Wikipedia, one
of the reported interests of women editors [48]. Since we are consid-
ering notable people, it is known that men and women’s networks
evolve differently through their careers [26], not to mention the set
of life-events that influence those changes like child-bearing and
marriage (see a in-depth discussion by Smith-Lovin and McPherson
[47]). Thus, link proportion between women cannot be attributed
to bias in Wikipedia, as it seems to be more a reflection of what
happens in the physical world.
We found that network structure is biased in a way that gives more
importance to men than expected, by comparing the distribution
of PageRank across genders. The articles with highest centrality,
or historical importance [6], tend to be predominantly about men,
beyond what one could expect from the structure of the network. As
shown in Figure 6, there are women biographies with high central-
ity, but their presence is not a sign of an unbiased network: “the
successes of some few privileged women neither compensate for nor
excuse the systematic degrading of the collective level; and the very
fact that these successes are so rare and limited is proof of their
unfavorable circumstances” [15].
7.1
Implications
At this point, considering the gender gap that affects Wikipedia
[24], it is pertinent to recall the concept of feminine mystique by
Friedan [21], developed from the analysis of women’s magazines
from the 50s in the United States, which were edited by men only.
Fortunately, as discussed earlier, we have found women in different
fields, mostly arts, in contrast to the “Occupation: Housewife” iden-
tified by Friedan [21], as well as more similarities in characterization
than differences. Moreover, the presence of women is increasing
steadily and most of the differences found are not from an inherent
bias in Wikipedia. Nevertheless, the identified language differences
8http://www.doublexscience.org/the-finkbeiner-test/
objectify women and the network structure diminishes their findabil-
ity and centrality. Hence, the gender bias in Wikipedia is not just a
matter of women participation in the community, because content
and characterization of women is also affected. This is important,
for example, because Wikipedia is used as an educational tool [27],
and “children learn which behaviors are appropriate to each sex by
observing differences in the frequencies with which male and female
models as groups perform various responses in given situations”
[38].
Editing Wikipedia and NPOV. Critics may rightly say that by
relying on secondary sources, Wikipedia just reflects the biases
found in them. However, editors are expected to write in their own
words, “while substantially retaining the meaning of the source
material”9, and thus, the differences found in terms of language
that objectify women are chosen explicitly by them. In this aspect,
Wikipedia should provide tools that help editors to reduce sexism in
language, for instance, by considering already existing manuals like
[5]. Furthermore, their neutral point of view guidelines should be
updated to explicitly include gender bias, because biased language
is a clear violation of their guidelines.
Affirmative Action for Women in Notability Guidelines. The
current notability guidelines for biographies in Wikipedia state:
“1. The person has received a well-known and significant award
or honor, or has been nominated for one several times. 2. The
person has made a widely recognized contribution that is part of the
enduring historical record in his or her specific field.”10 However,
the boundary between not being notable according to sources and
exclusion from history is blurred when evaluating the notability
of women. For instance, consider a discussion about women in
philosophy: “Feminist historians of philosophy have argued that the
historical record is incomplete because it omits women philosophers,
and it is biased because it devalues any women philosophers it forgot
to omit. In addition, feminist philosophers have argued that the
philosophical tradition is conceptually flawed because of the way
that its fundamental norms like reason and objectivity are gendered
male” [52]. Women, specially in historical contexts before 1943,
should be targeted by affirmative actions that would allow them to
appear in the content if they are not there, and be linked from other
articles. We acknowledge that this is not easy, because relaxing
notability guidelines can open the door to original research, which
is not allowed. However, a correctly defined affirmative strategy
would allow to grow the proportion of women in Wikipedia, make
women easier to find, both through search (as it increases relevance)
and exploratory browsing.
7.2 Summary, Limitations and Future Work
We studied gender bias in Wikipedia biographies. Our results
indicate significant differences in meta-data, language, and network
9https://en.wikipedia.org/wiki/Wikipedia:No_original_
research
#Any_biography
10https://en.wikipedia.org/wiki/Wikipedia:Notability_(people)
structure that can be attributed not only to the mirroring of the offline
world, but also to gender bias endogenous to content generation in
Wikipedia. Our contribution is a set of methodologies that detect
and quantify gender bias with respect to content and structure, as
well as a contextualization of the differences found in terms of
feminist theory. As concluding remark, we discussed that Wikipedia
may wish to consider revising its guidelines, both to account for
the non-findability of women and to encourage a less biased use of
language, which is a violation of its neutral point of view guideline.
Limitations. Our study has two main limitations. First, our focus is
on the English Wikipedia, which is biased towards western cultures.
However, a parallel work to ours by Wagner et al. [50] focused on
hyperlingual quantitative analysis, and obtained similar results for
other languages. Our methods can be applied in other contexts given
the appropriate dictionaries with semantic categories, although our
discussion remains to be applied, as it is culture-dependent. The
second limitation is a binary gendered view, but we believe this is a
first step towards analyzing the gender dimension in content from a
wider perspective, given the social theory discussion we have made.
Future Work. At least three areas are ripe for further work. The
first is the construction of editing tools for Wikipedia that would help
editors detect bias in content, and suggest appropriate actions. The
second is a study of individual differences among contributors, as
our work analyzed user generated content without considering who
published and edited it. This aspect can be explored by analyzing
how contributors discuss and edit content based on their gender
and other individual factors. The last area is a further exploration
of bias considering more fine-grained ontology classes and meta-
data attributes. For instance, it may be possible that gender bias
is stronger or weaker for different ontology classes (e.g., Scientist
vs. Artist) or in biographies of people from different regions and
religions. Finally it would be helpful to study whether gender
bias depends on the quality of an article: does bias decrease with
increasing number of edits or other measures of article maturity?
Acknowledgments. We thank Daniela Alarcón for fruitful discus-
sion and Luca Chiarandini for tool code. This work was partially
funded by Grant TIN2012-38741 (Understanding Social Media: An
Integrated Data Mining Approach) of the Min. of Economy and
Competitiveness of Spain.
References
[1]
Jane Abray. “Feminism in the French Revolution”. In: The
American Historical Review (1975), pp. 43–62.
[2] Rodrigo Almeida, Barzan Mozafari, and Junghoo Cho. “On
the Evolution of Wikipedia.” In: International Conference on
Weblogs and Social Media. 2007.
[3] Maik Anderka, Benno Stein, and Nedim Lipka. “Predicting
quality flaws in user-generated content: the case of Wikipedia”.
In: Proceedings of the 35th international ACM SIGIR confer-
ence on Research and development in information retrieval.
ACM. 2012, pp. 981–990.
Judd Antin et al. “Gender differences in Wikipedia editing”.
In: Proceedings of the 7th International Symposium on Wikis
and Open Collaboration. ACM. 2011, pp. 11–14.
[4]
[5] APA. “Publication Manual of the American Psychological
Association”. In: Sixth. American Psychological Association,
2000. Chap. General Guidelines for Reducing Bias.
[7] David Bamman and Noah A Smith. “Unsupervised Discovery
of Biographical Structure from Text”. In: Transactions of the
Association for Computational Linguistics 2 (2014), pp. 363–
376.
[8] Sergey Brin and Lawrence Page. “The anatomy of a large-
scale hypertextual Web search engine”. In: Computer net-
works and ISDN systems 30.1 (1998), pp. 107–117.
[9] Ewa S Callahan and Susan C Herring. “Cultural bias in
Wikipedia content on famous persons”. In: Journal of the
American society for information science and technology
62.10 (2011), pp. 1899–1915.
[10] Andreea S Calude and Mark Pagel. “How do we use lan-
guage? Shared patterns in the frequency of word use across
17 world languages”. In: Philosophical Transactions of the
Royal Society of London B: Biological Sciences 366.1567
(2011), pp. 1101–1107.
[11] Kenneth W Church and William A Gale. “Poisson mixtures”.
In: Natural Language Engineering 1.02 (1995), pp. 163–190.
[12] Kenneth Ward Church and Patrick Hanks. “Word association
norms, mutual information, and lexicography”. In: Computa-
tional linguistics 16.1 (1990), pp. 22–29.
[13] Giovanni Luca Ciampaglia and Dario Taraborelli. “Mood-
Bar: Increasing new user retention in Wikipedia through
lightweight socialization”. In: arXiv preprint arXiv:1409.1496
(2014).
[14] Benjamin Collier and Julia Bear. “Conflict, criticism, or
confidence: an empirical examination of the gender gap in
Wikipedia contributions”. In: Proceedings of the ACM 2012
conference on Computer Supported Cooperative Work. ACM.
2012, pp. 383–392.
[15] Simone De Beauvoir. The second sex. Random House LLC,
2012.
[16] Michela Ferron and Paolo Massa. “Psychological processes
underlying Wikipedia representations of natural and man-
made disasters”. In: Proceedings of the Eighth Annual Inter-
national Symposium on Wikis and Open Collaboration. ACM.
2012, p. 2.
[17] Amanda Filipacchi. “Wikipedia’s sexism toward female nov-
elists”. In: The New York Times, April 28th, 2013 (2013).
[18] Susan T Fiske and Steven L Neuberg. “A continuum of im-
pression formation, from category-based to individuating
processes: Influences of information and motivation on atten-
tion and interpretation”. In: Advances in experimental social
psychology 23 (1990), pp. 1–74.
[19] Lucie Flekova, Oliver Ferschke, and Iryna Gurevych. “What
makes a good biography?: multidimensional quality analysis
based on Wikipedia article feedback data”. In: Proceedings of
the 23rd international conference on World wide web. Inter-
national World Wide Web Conferences Steering Committee.
2014, pp. 855–866.
[20] S. Fortunato et al. “On local estimations of PageRank: A
mean field approach”. In: Internet Mathematics 4.2–3 (2007),
pp. 245–266. DOI: 10.1080/15427951.2007.10129294.
[6] Pablo Aragón et al. “Biographical social networks on Wikipedia:
a cross-cultural study of links that made history”. In: Pro-
ceedings of the Eighth Annual International Symposium on
Wikis and Open Collaboration. ACM. 2012, p. 19.
[22]
[21] Betty Friedan. The feminine mystique. WW Norton & Com-
pany, 2010.
Jim Giles. “Internet encyclopaedias go head to head”. In:
Nature 438.7070 (2005), pp. 900–901.
[40] Felicia Pratto, Peter J Hegarty, and Josephine D Korchmaros.
“How communication practices and category norms lead peo-
ple to stereotype particular people and groups”. In: Stereo-
type dynamics: Language based approaches to the formation,
maintenance, and transformation of stereotypes (), pp. 293–
313.
Jacob Ratkiewicz et al. “Characterizing and modeling the
dynamics of online popularity”. In: Physical review letters
105.15 (2010), p. 158701.
Joseph Reagle and Lauren Rhue. “Gender bias in Wikipedia
and Britannica”. In: International Journal of Communication
5 (2011), p. 21.
[41]
[42]
[43] Roy Rosenzweig. “Can history be open source? Wikipedia
and the future of the past”. In: The Journal of American
History 93.1 (2006), pp. 117–146.
[44] Toni Schmader, Jessica Whitehead, and Vicki H Wysocki. “A
linguistic comparison of letters of recommendation for male
and female chemistry and biochemistry job applicants”. In:
Sex Roles 57.7-8 (2007), pp. 509–514.
[45] M Ángeles Serrano, Alessandro Flammini, and Filippo Menczer.
“Modeling statistical properties of written text”. In: PloS ONE
4.4 (2009), e5372.
[46] Steven S. Skiena and Charles B. Ward. Who’s Bigger?: Where
Historical Figures Really Rank. Cambridge Univ. Press, 2014.
[47] Lynn Smith-Lovin and J Miller McPherson. “You are who
you know: A network approach to gender”. In: Theory on
gender/feminism on theory (1993), pp. 223–51.
[48] Sarah Stierch. Women and Wikimedia Survey 2011. https:
/ / meta . wikimedia . org / wiki / Women _ and _ Wikimedia _
Survey_2011. [Online; accessed April 2015]. 2013.
[49] William Strauss and Neil Howe. Generations: The history
of America’s future, 1584 to 2069. Morrow New York, NY:
1991.
[50] Claudia Wagner et al. “It’s a Man’s Wikipedia? Assessing
Gender Inequality in an Online Encyclopedia”. In: arXiv
preprint arXiv:1501.06307 (2015).
[51] Duncan J Watts and Steven H Strogatz. “Collective dynam-
ics of ‘small-world’ networks”. In: Nature 393.6684 (1998),
pp. 440–442.
[52] Charlotte Witt and Lisa Shapiro. “Feminist History of Philos-
ophy”. In: The Stanford Encyclopedia of Philosophy. Ed. by
Edward N. Zalta. Winter 2014. 2014.
[53] George Kingsley Zipf. Human behavior and the principle of
least effort. Addison-Wesley Press, 1949.
[54] Vinko Zlati´c et al. “Wikipedias: Collaborative web-based
encyclopedias as complex networks”. In: Physical Review E
74.1 (2006), p. 016115.
[23] Brent Hecht and Darren Gergle. “Measuring self-focus bias in
community-maintained knowledge repositories”. In: Proceed-
ings of the fourth international conference on Communities
and technologies. ACM. 2009, pp. 11–20.
[24] Benjamin Mako Hill and Aaron Shaw. “The Wikipedia Gen-
der Gap Revisited: Characterizing Survey Response Bias
with Propensity Score Estimation”. In: PloS ONE 8.6 (2013),
e65782.
[25] Daniela Iosub et al. “Emotions under discussion: Gender,
status and communication in online collaboration”. In: PloS
ONE 9.8 (2014), e104880.
Jerry A Jacobs. Revolving doors: Sex segregation and women’s
careers. Stanford University Press, 1989.
[26]
[27] Piotr Konieczny. “Teaching with Wikipedia and other Wiki-
media foundation wikis”. In: Proceedings of the 6th Interna-
tional Symposium on Wikis and Open Collaboration. ACM.
2010, p. 29.
[28] Robin Tolmach Lakoff. “Language and woman’s place”. In:
Language in Society 2, No. 1, Apr. (1973), pp. 45–80.
[29] Shyong Tony K Lam et al. “WP: clubhouse?: an exploration
of Wikipedia’s gender imbalance”. In: Proceedings of the 7th
International Symposium on Wikis and Open Collaboration.
ACM. 2011, pp. 1–10.
[31]
[30] David Laniado et al. “Emotions and dialogue in a peer-
production community: the case of Wikipedia”. In: Proceed-
ings of the Eighth Annual International Symposium on Wikis
and Open Collaboration. ACM. 2012, p. 9.
Janette Lehmann et al. “Reader preferences and behavior on
Wikipedia”. In: Proceedings of the 25th ACM conference on
Hypertext and Social Media. ACM. 2014, pp. 88–97.
Jens Lehmann et al. “DBpedia - A Large-scale, Multilingual
Knowledge Base Extracted from Wikipedia”. In: Semantic
Web Journal (2014).
Jonathan T Morgan et al. “Tea and sympathy: crafting positive
new user experiences on Wikipedia”. In: Proceedings of the
2013 conference on Computer supported cooperative work.
ACM. 2013, pp. 839–848.
[32]
[33]
[34] Brian A Nosek, Mahzarin Banaji, and Anthony G Greenwald.
“Harvesting implicit group attitudes and beliefs from a demon-
stration web site.” In: Group Dynamics: Theory, Research,
and Practice 6.1 (2002), p. 101.
[35] Martha C Nussbaum. “Objectification”. In: Philosophy &
Public Affairs 24.4 (1995), pp. 249–291.
[36] Chitu Okoli et al. “Wikipedia in the eyes of its beholders: A
systematic review of scholarly research on Wikipedia readers
and readership”. In: Journal of the American Society for
Information Science and Technology (2014).
James W Pennebaker, Martha E Francis, and Roger J Booth.
“Linguistic inquiry and word count: LIWC 2001”. In: Mah-
way: Lawrence Erlbaum Associates 71 (2001), p. 2001.
[37]
[38] David G Perry and Kay Bussey. “The social learning theory
of sex differences: Imitation is alive and well.” In: Journal of
Personality and Social Psychology 37.10 (1979), p. 1699.
[39] Steven T Piantadosi. “Zipf’s word frequency law in natural
language: A critical review and future directions”. In: Psy-
chonomic bulletin & review (2014), pp. 1–19.
|
1706.06253 | 1 | 1706 | 2017-06-20T03:19:33 | Social Events in a Time-Varying Mobile Phone Graph | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | The large-scale study of human mobility has been significantly enhanced over the last decade by the massive use of mobile phones in urban populations. Studying the activity of mobile phones allows us, not only to infer social networks between individuals, but also to observe the movements of these individuals in space and time. In this work, we investigate how these two related sources of information can be integrated within the context of detecting and analyzing large social events. We show that large social events can be characterized not only by an anomalous increase in activity of the antennas in the neighborhood of the event, but also by an increase in social relationships of the attendants present in the event. Moreover, having detected a large social event via increased antenna activity, we can use the network connections to infer whether an unobserved user was present at the event. More precisely, we address the following three challenges: (i) automatically detecting large social events via increased antenna activity; (ii) characterizing the social cohesion of the detected event; and (iii) analyzing the feasibility of inferring whether unobserved users were in the event. | cs.SI | cs | Social Events in a Time-Varying Mobile Phone Graph
Carlos Sarraute
Grandata Labs
[email protected]
Klaus Wehmuth
LNCC
[email protected]
Jorge Brea
Grandata Labs
Javier Burroni
Grandata Labs
[email protected]
[email protected]
Artur Ziviani
LNCC
[email protected]
J.I. Alvarez-Hamelin
UBA -- CONICET
[email protected]
7
1
0
2
n
u
J
0
2
]
I
S
.
s
c
[
1
v
3
5
2
6
0
.
6
0
7
1
:
v
i
X
r
a
Introduction
The large-scale study of human mobility has been signifi-
cantly enhanced over the last decade by the massive use of
mobile phones in urban populations [1, 2]. Studying the ac-
tivity of mobile phones allows us, not only to infer social
networks between individuals, but also to observe the move-
ments of these individuals in space and time [4].
In this
work, we investigate how these two related sources of in-
formation can be integrated within the context of detecting
and analyzing large social events. We show that large social
events can be characterized not only by an anomalous in-
crease in activity of the antennas in the neighborhood of the
event, but also by an increase in social relationships of the
attendants present in the event. Moreover, having detected
a large social event via increased antenna activity, we can
use the network connections to infer whether an unobserved
user was present at the event. More precisely, we address the
following three challenges: (i) automatically detecting large
social events via increased antenna activity; (ii) character-
izing the social cohesion of the detected event; and (iii) an-
alyzing the feasibility of inferring whether unobserved users
were in the event.
Data Source and Methodology
Our data source is an anonymized traffic dataset from a
mobile phone operator in Argentina, collected mostly in the
Buenos Aires metropolitan area, over a period of 5 months.
The raw data logs contain about 50 million calls per day.
Call Detail Records (CDR) are an attractive source of loca-
tion information since they are collected for all active cel-
lular users (about 40 million users in Argentina). Further,
additional uses of CDR data incur little marginal cost.
Together with the location of the clients of the mobile
phone network, the CDRs allow us to reconstruct a social
graph derived from the communications among users. We
first define a contact graph G composed of all users partici-
pating in the mobile network, where an edge between users
exist if they have communicated at any point within the
5 months period. We note that G includes non client users
that have communicated with client users.
Then, we define a time series of subgraphs of G composed
only of users present at a given location at a given time.
In this work, these subgraphs are restricted to client nodes
(users for which we have mobility data) using the event an-
tenna at a specified day, for a given time window. Note that
the existence of a link between such nodes in any subgraph
depends on whether there is a link between them in G. These
subgraphs allow us to focus on the social dynamics of a set
of users present at a particular location at a given time as
is the case of client users attending a large-scale event.
We formalize this temporal sequence of subgraphs within
the context of a Time-Varying Graph (TVG) based on the
representation encountered in [6]. We consider a TVG as an
object H = (V, E, T ), where V is a vertex set, T is a time
instant set, and E is an edge set. In this context, an edge
e ∈ E is primarily a quadruple of the form (cid:104)u, ta, v, tb(cid:105), where
u, v ∈ V are vertices and ta, tb ∈ T are time instants. In this
representation, an edge (cid:104)u, ta, v, tb(cid:105) then shows a relation
between vertex u at time ta and vertex v at time tb, i.e.
a directed relation, where the pair (cid:104)u, ta(cid:105) is the origin and
the pair (cid:104)v, tb(cid:105) is the destination. Note that the represented
relation is between the composite objects u = (cid:104)u, ta(cid:105) and
v = (cid:104)v, tb(cid:105). In this representation, a TVG edge e ∈ E ⊂
V × T × V × T can be thus seen as an ordered pair (cid:104)u, v(cid:105) ∈
(V × T ) × (V × T ) of composite vertices.
In this work, each edge in a subgraph is represented as
a tuple (cid:104)(x, tx), (y, ty)(cid:105), where user x is the caller, user y
is the callee, tx = ty is the date and time of the call.
In
addition to the origin and destination composite vertices
present on the TVG edge, we also wish to identify the local
base station antenna (BSA) used on the call represented by
each TVG edge. In order to achieve this, we represent the
BSA identity as an edge attribute, so that the TVG edge
used in this particular work becomes an ordered 5-tuple of
the format (cid:104)x, tx, y, ty, l(cid:105) where in addition to the known
edge elements, l represents the BSA identity.
Automatic Event Detection
In this section, we show how we can use the mobile phone
data in an endogenous manner to detect past events auto-
matically (as [3, 5] did with social media such as Twitter).
The events we are interested in involve a large amount of
people, hence they significantly increase the usage demand
of antennas nearby, as evidenced by their traffic time series.
Our strategy thus is to locate time windows where the an-
tenna activity is significantly higher than some appropriate
baseline. Defining an appropriate activity baseline is not a
trivial task since this is possibly dependent on the size of
the event one is trying to detect and on the regularity of the
normal antenna activity patterns.
In this work, the antennas activity is given by the number
of calls per hour registered in each antenna, according to the
week wi (0 ≤ i < n, where n is the number of weeks in the
studied dataset), the day of the week dj (0 ≤ j ≤ 6), and
the hour of the day hk (0 ≤ k ≤ 23). For each time slot
(wi, dj, hk), we denote the number of calls as C(i,j,k) which
we then normalise be the average activity over a period of 3
months, defining an event index E(i,j,k) given by
(cid:80)
E(i,j,k) =
1
n
C(i,j,k)
(cid:96) C((cid:96),j,k)
for the ith week in the 3 month period, jth day of the week,
kth hour of the day, and where (cid:96) sums over all weeks in the
whole time period considered (0 ≤ (cid:96) < n). Figure 1 shows
the event index E for an antenna near the stadium of River
Plate, a major soccer team in Buenos Aires, for each time
slot (hour) from January 1 to March 31, 2012. We consider
a large-scale event to have occurred when the event index is
within the highest 99-percentile while considering the whole
3 months period.
During January and February, we observe the event in-
dex smoothly oscillating around the mean value except for
small sharp increases due to normal peak daily activity. As
we approach March, the oscillations' amplitude starts to in-
crease reaching its peak value by mid March. On top of
this large oscillations we see very large sharp peaks reach-
ing values of E = 9.98 on March 20. Additional high peaks
are also observed on March 7, 9, 10, 12, 14, 15, 17, and 18.
Retrospectively, we corroborated that a sequence of 9 Roger
Waters concerts took place at this location during March on
the same days of the observed peaks. We thus highlight that
the event index has clearly spotted the Roger Waters events
on the exact days the concerts took place.
An open question is to understand the slight increase in
the background oscillation during these peak periods. A
plausible explanation is an increase in activity due to gath-
erings before the event (e.g., fans trying to get tickets, or-
ganizers working at the stadium, January and February are
vacations month in Argentina, etc.) or it might be a sta-
tistical fluctuation one could verify if one had access to a
much longer dataset. In any case, further study of this back-
ground activity can prove very useful, for instance, allowing
for the forecasting of large-scale events.
Identifying these
early precursors could allow us not only to automatically
detect events retrospectively, but also give us the possibility
of anticipating a future event.
Social Dimension of Events
Having detected a large-scale event, we now take a look at
social relationships of users attending these events. We con-
sider all communications from the event antenna for a pe-
riod of 5 months from November 1, 2011 to March 31, 2012,
therefore including the Roger Waters concert series from
March 7 -- 20, 2012. For each day, we compute the implicit
social subgraph induced by G restricted to users observed
at the event antenna during the time window from 18:00 to
22:00 (time window for the Roger Waters concerts).
Figure 2 shows the induced subgraphs for February 7 and
17, in which no event took place (a, b), along with March
7 and 17 for which two Roger Waters concerts took place
(c, d). The total number of nodes on February 7 and 17
were 107 and 130, respectively, whereas on March 7 and 17
we observe 716 and 740 attenders, respectively. Most nodes
are singlets and are thus not shown in the plots, leaving only
nodes for whom at least one of his/her contacts in G was also
present at the event location, at the same day, and during
the defined time window.
Therefore, one can expect that it is somewhat likely that
the nodes present in these subgraphs are attending this lo-
cation together. We call these nodes social attenders and all
nodes, singlets included, attenders. An immediate observa-
tion is the larger number of social attenders at the days of
the concerts than on a normal day. This is expected given
the larger attendance during the event. More interestingly,
for the days of the event, especially on March 17, we observe
more complex group relationships of up to 7 nodes, possi-
bly indicating larger groups of people attending the concert
together.
(a) Feb 7
(b) Feb 17
(c) March 7
(d) March 17
Figure 2: Implicit social graphs: (a), (b) two days
with no large event; (c), (d) two days of the Roger
Waters concerts.
Probability of Being in an Event
The increased social structure suggested in Fig. 2 motivates
the following question: can we estimate the probability that
a user attended the event, given that k of his/her contacts
in graph G also attended the event? We compute this prob-
ability as follows:
p(x ∈ Uk contacts ∈ U ) =
users ∈ U with k contacts ∈ U
users with k contacts ∈ U
,
Figure 1: Event index E for an antenna near the
River Plate soccer stadium.
where U is the set of all users in the event. The results
are shown in Fig. 3, where we also plot a linear regression
curve showing how strongly the expectation of finding a user
in the event depends on the amount of graph contacts this
user has in the event. The scatter plot and the regression
curve (R = 0.83) show that the probability that a given
user attended the event grows linearly with the number of
his/her contacts in the event. If several of the user contacts
in G represent real social relationships, such as friends or
family members, and a significant fraction of such contacts
Jan2012FebMarApr0246810Event Index Eare in a social event, such as a music concert, one could
expect an increase in the likelihood the user is also attending
the event. Nevertheless, it is worth noticing that the linear
relation does no saturate even for high values of k.
Figure 3: Scatter plot and linear regression curve
for the conditional probability of a user being in an
event given that k of his/her contacts in graph G
were in the event.
We also computed the ratio between the number of users
in the event and the number of users with contacts in the
event (such users can be at the event or not), both having
at least K contacts in the event U . This ratio is displayed in
Fig. 4, which can be interpreted as the conditional probabil-
ity that a user is in the event given that at least K of his/her
contacts are in the event, as a function of K. This proba-
bility remarks the social character of the event because, as
the number of contacts in the event increases, the probabil-
ity of users with such contacts also increases up to K = 10.
Then, it starts to decrease due to the less significant pro-
portion of people with more than 10 contacts. Notice that
the sample space, where each probability is taken, is defined
independently for each K.
Figure 4: Probability of a user being in the event U ,
given the user has at least K contacts in the event.
Conclusion and Future Work
In this work, we have shown how we can combine the mobil-
ity and social network information present in mobile phone
datasets to detect large social events and characterize their
social features, such as an increase in local community struc-
tures of users present at an event. We have also shown that
it is plausible to infer the probability of a user (in the con-
tact graph) attending an event, given the number of his/her
contacts who attended the event.
Finding useful inference algorithms of users attendance to
a particular location given the mobility of their contacts can
be of tremendous use for mobile phone companies. Mobile
phone carriers have no mobility information about users in
the contact graph G who are not clients of the carrier. There-
fore, having the possibility of making at least weak inferences
about the locations and mobility of these users can add a
valuable dimension for the carrier to better understand these
(non client) users.
We have presented this work within the formalism of time-
varying graphs (TVG). Even though this work has not yet
explored the potential uses of the TVG to analyse the dy-
namics of the graph structure, we believe this is a useful
formalism to extend this work into further understanding
the changes in social dynamic networks as one approaches
large-scale events.
Acknowledgements
Authors are grateful to the STIC-AmSud program. Brazil-
ian authors thank CAPES, CNPq, FAPERJ, and FINEP for
their support.
1. REFERENCES
[1] R. Becker, R. C´aceres, K. Hanson, S. Isaacman, J. M.
Loh, M. Martonosi, J. Rowland, S. Urbanek,
A. Varshavsky, and C. Volinsky. Human mobility
characterization from cellular network data.
Communications of the ACM, 56(1):74 -- 82, Jan. 2013.
[2] F. Calabrese, L. Ferrari, and V. D. Blondel. Urban
sensing using mobile phone network data: A survey of
research. ACM Computing Surveys, 47(2):25:1 -- 25:20,
Nov. 2014.
[3] F. C. T. Chua and S. Asur. Automatic summarization
of events from social media. In International AAAI
Conference on Weblogs and Social Media -- ICWSM,
2013.
[4] N. Ponieman, A. Salles, and C. Sarraute. Human
mobility and predictability enriched by social
phenomena information. In Proceedings of the 2013
IEEE/ACM International Conference on Advances in
Social Networks Analysis and Mining, pages 1331 -- 1336.
ACM, 2013.
[5] A. Ritter, O. Etzioni, S. Clark, et al. Open domain
event extraction from twitter. In Proceedings of the
18th ACM SIGKDD international conference on
Knowledge discovery and data mining, pages
1104 -- 1112. ACM, 2012.
[6] K. Wehmuth, A. Ziviani, and E. Fleury. A Unifying
Model for Representing Time-Varying Graphs.
Technical Report RR-8466, INRIA, Feb. 2014.
024681012141618Number of contacts in event0.000.050.100.150.200.250.300.35Probability of x∈ event024681012141618K (contacts ∈U)0.050.000.050.100.150.200.25p(x∈Ux with k≥K contacts) |
1912.02484 | 1 | 1912 | 2019-12-05T10:33:41 | EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions | [
"cs.SI",
"cs.IR"
] | Despite the significant efforts made by the research community in recent years, automatically acquiring valuable information about high impact-events from social media remains challenging. We present EviDense, a graph-based approach for finding high-impact events (such as disaster events) in social media. One of the challenges we address in our work is to provide for each event a succinct keyword-based description, containing the most relevant information about it, such as what happened, the location, as well as its timeframe. We evaluate our approach on a large collection of tweets posted over a period of 19 months, using a crowdsourcing platform. Our evaluation shows that our method outperforms state-of-the-art approaches for the same problem, in terms of having higher precision, lower number of duplicates, and presenting a keyword-based description that is succinct and informative. We further improve the results of our algorithm by incorporating news from mainstream media. A preliminary version of this work was presented as a 4-pages short paper at ICWSM 2018. | cs.SI | cs |
EviDense: a Graph-based Method for Finding Unique
High-impact Events with Succinct Keyword-based
Descriptions
OANA BALALAU, Inria and École Polytechnique, France
CARLOS CASTILLO, Universitat Pompeu Fabra, Spain
MAURO SOZIO, Télécom Paris University, France
Despite the significant efforts made by the research community in recent years, automatically acquiring valu-
able information about high impact-events from social media remains challenging. We present EviDense,
a graph-based approach for finding high-impact events (such as disaster events) in social media. One of the
challenges we address in our work is to provide for each event a succinct keyword-based description, contain-
ing the most relevant information about it, such as what happened, the location, as well as its timeframe. We
evaluate our approach on a large collection of tweets posted over a period of 19 months, using a crowdsourc-
ing platform. Our evaluation shows that our method outperforms state-of-the-art approaches for the same
problem, in terms of having higher precision, lower number of duplicates, and presenting a keyword-based
description that is succinct and informative. We further improve the results of our algorithm by incorporating
news from mainstream media.
A preliminary version of this work was presented as a 4-pages short paper at ICWSM 2018 [4].
CCS Concepts: • Information systems → Social networks; Data mining; • Mathematics of computing
→ Graph algorithms;
Additional Key Words and Phrases: Event detection, crisis event, weighted quasi-clique
1 INTRODUCTION
Social media have been playing increasingly a major role during crises and disasters. For example,
the American Red Cross (ARC) pointed out the effectiveness of social media and mobile apps
in handling emergency situations such as those generated by a disaster event (e.g. earthquakes,
mass shootings, etc.)1. Automatically acquiring valuable information about high-impact events
from social media would be extremely valuable, however, it presents non-trivial challenges. Social
content is often noisy, inconsistent and ambiguous. Tweets, for example, are short and written by
non-experts using informal language while containing typos and abbreviations. Moreover, relevant
information is often intertwined with noisy or non-interesting content such as spam or posts by
so-called Twitter bots. Another additional difficulty when analyzing data from Twitter lies on the
fact that not all tweets are publicly available, with only a small fraction of them being accessible
through rate-limited APIs. Indeed, despite the significant efforts made by the research community
-- see, e.g., surveys [3, 5, 11] -- automatically acquiring valuable information about high-impact
events from social media remains challenging.
1http://www.redcross.org/news/press-release/More-Americans-Using-Mobile-Apps-in-Emergencies
Authors' addresses: Oana Balalau, Inria and École Polytechnique, France, [email protected]; Carlos Castillo, Universitat
Pompeu Fabra, Spain, [email protected]; Mauro Sozio, Télécom Paris University, France, [email protected].
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and
the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses,
contact the owner/author(s).
© 2019 Copyright held by the owner/author(s).
XXXX-XXXX/2019/12-ART
https://doi.org/10.1145/nnnnnnn.nnnnnnn
, Vol. 1, No. 1, Article . Publication date: December 2019.
2
Oana Balalau, Carlos Castillo, and Mauro Sozio
One of the challenges we address in our work is how to provide a succinct keyword-based
description of high-impact events containing the most relevant information about the events, such
as what happened, where, and when. According to a survey by the US Congressional Service, the
administrative cost for monitoring multiple social media sources, which typically produce large
amounts of noisy data, is significant [16]. Therefore, in order to alleviate the burden of analyzing
social content, a succinct and informative description of the events is needed.
Our approach consists of the following steps: i) filtering of the tweets by retaining only those
containing at least one term in a given lexicon. In our work, we use the lexicon constructed
in Olteanu et al. [22] which contains terms related to disaster events, however, any lexicon can
be used; ii) finding locations whose number of occurrences in tweets deviates significantly on a
given time window from their expected frequency; iii) a graph mining approach for selecting the
relevant keywords in the description, based on a novel definition of a clique and a quasi-clique in
a weighted graph. To ensure that the description is succinct we enforce an upper bound (specified
in input) on the number of keywords to be selected.
We call our approach EviDense, as our graph mining approach is based on finding "dense" re-
gions in the graph representing the co-occurrence of keywords in the tweets. We evaluate this al-
gorithm against state-of-the-art approaches on a collection of tweets covering the period between
November 2015 and May 2017, by means of a crowdsourcing platform. Our evaluation represents
one of the most extensive evaluations for an event detection algorithm in social media. It shows
that our approach outperforms the baselines both in terms of precision (at k) and number of dupli-
cates, while the keyword-based description provided by our algorithm is succinct and informative.
Moreover, we show how to further improve the results of our algorithm by incorporating news
from mainstream media. Given these results, we consider EviDense could represent a valuable tool
for analyzing both social content and news articles from mainstream media, as well as for studying
how they compare. It could also be used to boost the performance of other approaches, such as
automatic classifiers. For this purpose, we released a collection of tweets containing mentions of
the disaster events identified by our approach.
To summarize, the contributions of this paper are:
• We propose a completely unsupervised technique for finding with high precision mentions
of high-impact events.
• We show that our approach can incorporate information from mainstream media in order
to improve event detection in social media.
• We propose a new definition of a clique and quasi-clique in a weighted graph and we com-
pare its performance to other dense subgraph definitions. The quasi-clique is a building block
of our event detection algorithm and gives a succinct description of an event.
• We show that our approach is versatile and can be used for finding other mentions of high-
impact events, such as political events.
• We provide a dataset containing tweets that were retrieved using the disasters' keyword
descriptions computed by our algorithm.
The rest of the paper is organized as follows: In Section 2 we outline the related work; in Section 3
we present our algorithm, while we compare it against state-of-the-art approaches in Section 4. In
Section 5, we compare different definitions of dense subgraphs for the task of event description in
social media. Finally, we recap and discuss some possible use cases in Section 6.
2 RELATED WORK
Event detection. Several approaches have been proposed for event detection in social media,
which can be classified according to whether they focus on a particular pre-specified class of events
, Vol. 1, No. 1, Article . Publication date: December 2019.
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct
Keyword-based Descriptions
3
(e.g., such as earthquakes, computer security breaks) or whether such a class is not specified. An-
other criteria that can be used to classify the related work is the main technique used. The most
successful techniques that have been employed for this task include clustering-based methods,
graph mining approaches, wavelet, and supervised learning methods based on SVMs or gradient
boosted decision trees. There are extensive surveys on this topic [3, 11, 17, 20]. Approaches that
deal with a pre-specified class of events typically use classifiers in order to label tweets [11, 29] or
aggregations of tweets [25, 27]. In [11], the authors present a platform for automatic classification
of messages during a disaster event. More precisely, first tweets are crawled using certain crite-
ria like location or keywords and then human annotators label tweets using different categories,
such as "needs". An automatic classifier is trained based on the labels and retrained as new labels
arrive. The authors emphasize that automatic classification using a pre-existing dataset is not a
good solution as disaster events can have very specific aspects that differentiate them. In order
to facilitate the task of finding mentions of disasters, we propose an unsupervised approach for
finding such mentions that can scale to very large datasets. Therefore, in the following we focus
on other unsupervised event detection methods that allow a large-scale analysis.
Weng and Lee [36] propose an event detection algorithm (EDCoW ) based on clustering of the
wavelet-based signal of words. More precisely, the frequency of words in text over time is a time
series, which can be processed using wavelet analysis. The authors filter trivial words using auto-
correlation of signals and cluster the remaining words employing as a similarity metric the cross-
correlation of signals. Clusters are finally ranked according to a score which takes into account
the cross-correlation of words and the total number of words associated with each cluster.
Cordeiro [6] proposes an algorithm based on continuous wavelet transformation and Latent
Dirichlet Allocation (LDA), a widely-used unsupervised method for topic modeling. In the first
step, the frequency of hashtags over time is analyzed using continuous wavelet transformation and
hashtags that present a peak in their pattern of occurrence are selected. After filtering the hashtag,
LDA is used to infer topics associated with each tag. For intervals of five minutes, all the tweets
containing the hashtag are retrieved and passed to the LDA algorithm for the computation of five
representative topics of the hashtag. LDA has been modified in Pan and Mitra [24] in order to take
into account temporal and geographic features. The approach in Pan and Mitra [24] represents a
pioneering work, but it suffers from the fact that either the number of topics or the number of
events has to be fixed.
Angel et al. [1] develop an algorithm for maintaining overlapping dense subgraph with size
limit in a dynamic graph. Each dense subgraph represents an event, where the nodes are words
describing the event. Their main contribution consists in designing an efficient data structure for
maintaining overlapping subgraphs.
Guille and Favre [10] leverage the intuition that during an event users will mention more of-
ten other users in order to engage in conversation or they will retweet posts of other users. The
words from tweets containing mentions are selected and for each of them, the deviation from the
expected frequency for given time periods is computed. To provide a better description of an event,
additional words sharing similar temporal patterns with the initial word are added.
Event detection shares some similarities with trend detection,2 which is one main focus for Twit-
ter. Trend detection aims at finding keywords or hashtags whose frequency deviates significantly
from the average frequency. However, it does not focus on a given class of real-world events (such
as disaster events), nor does it provide a short description of the topics.
2https://blog.twitter.com/2015/trend-detection-social-data
, Vol. 1, No. 1, Article . Publication date: December 2019.
4
Oana Balalau, Carlos Castillo, and Mauro Sozio
We evaluate our algorithm against Guille and Favre [10], as it is the approach which performed
best in our experimental evaluation. We select also the technique presented in [36], as it has been
shown [35] to perform better than several other event detection techniques [6, 33, 34].
Dense subgraphs. Dense subgraphs discovery has applications in many areas, for example in
community detection [7], finding patterns in gene annotation graphs [28], link spam detection [8]
and event detection [1]. One of the most well known and studied definitions of density is the aver-
age degree density and the problem of finding a subgraph that has the maximum average degree is
called the densest subgraph problem. Goldberg [9] formally defined the problem in an undirected
graph and presented an algorithm that computes the densest subgraph in O(lo❕(n)) maximum-flow
computations. When enforcing a limit on the size of the subgraph, finding the densest subgraph
of exactly k vertices (DkS), the problem becomes NP-hard. Variations on the problem, finding a
densest subgraph with at most k vertices(DamkS) or a densest subgraph with at least k vertices
(DalkS) are also NP-hard [12]. Recent work [14], showed that exact solutions for the heaviest
k-subgraph (DkS in a weighted graph) can be obtained efficiently when considering real-world
graphs. An interesting variation on finding a dense subgraph is the cocktail party problem [30],
where the task is to find a dense subgraph that contains a specified set of input nodes.
Cliques and quasi-cliques are dense subgraphs par excellence. Given an undirected, unweighted
graph, a clique is a fully connected subgraph. A quasi-clique in an unweighted graph has been
defined as a subgraph with a number-edges-to-number-edges-clique-same-size ratio larger than
a given threshold value in [32], and a subgraph maximizing the edge surplus over the expected
number of edges under the random-graph model in [31]. When considering undirected weighted
graphs, cliques have been defined either as a subgraph of maximum total weight where any two
nodes are connected [23], or as a subgraph with a sum-edge-weight-to-number-edges-clique-same-
size ratio larger than a threshold [32].
3 ALGORITHMS
Our algorithm consists of the following main steps: 1) collection of tweets containing keywords
related to disaster events by means of the Twitter API; 2) recognition and tagging of mentions
of locations in the tweets; 3) finding bursts of mentions of locations; 4) mentions of locations are
finally complimented with related keywords so as to provide more informative results. Each of
these steps is described in the following sections.
Collection of Tweets and Preprocessing
Tweets have been collected by means of the Twitter API while specifying a list of keywords related
to disaster events, such as attack, flood, victims. To this end, we use the list of keywords provided
in [22]. For the recognition and tagging of locations, we use an entity recognition tagger that was
trained on Twitter data [26]. Such a tagger focuses on ten different categories: person, location,
company, product, facility (e.g. Cornell University), tv show, movie, sports team, and band. We
retain only location and facility tags while ignoring the others. Our intuition is that bursts in the
mentions of a location ( in tweets dealing with disaster events ) might signal the happening of
an important event in that location. After the tagging step, we lemmatize the words and then we
filter them such that to remove stop words, URLs and infrequent terms (i.e. terms with an hourly
frequency smaller than 5).
Finding Bursts of Locations
When an event such as a disaster event occurs, we observe a burst of activity in Twitter with
terms pertinent to the event increasing suddenly their frequency in tweets. In our approach (where
tweets contain keywords related to disaster events), a burst in the number of mentions of a location
, Vol. 1, No. 1, Article . Publication date: December 2019.
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct
Keyword-based Descriptions
5
gives us a first signal that a disaster event is unfolding at that location. Previous works [24] have
used geolocation of posts and not mentions of locations. We argue that using mentions of locations
makes our algorithm more versatile, allowing it to analyze datasets coming from different sources.
Burstiness of words in streams of data is a well-studied topic [13, 37] and in our approach, we use
a simple technique, similar to other event detection methods [10].
For each location, we compute a set of intervals in which the deviation between the frequency of
the location and its expected frequency is always above a threshold. Our intuition is that all tweets
(dealing with the same location) posted during each of those intervals refer to the same event. We
refer to such intervals as interesting intervals. We are interested in finding maximal interesting
intervals. The expected frequency of a location is computed assuming that location frequencies
can be approximated by the binomial distribution. Our algorithm computes for every location and
every maximal interesting interval of that location its frequency and how much it deviates from
the expected frequency. Then, all the (location, maximal interesting interval) pairs are ranked
according to how much the frequency of a location deviates from its average frequency. A larger
deviation corresponds to a higher interest in the event, therefore we retain the top k (location,
maximal interesting interval) pairs with the largest deviation from the average.
Below we provide more technical details. The expected frequency of a term (a location in our
case) is computed as follows. Let Xw be the random variable indicating the number of tweets con-
taining a term w while letting N be the number of tweets. We assume that the probability of having
n tweets containing w, denoted as P(Xw = n), can be approximated by a binomial distribution:
P(Xw = n) = (cid:18)N
n(cid:19)pn
w (1 − pw )N −n,
where pw is the probability of a tweet containing the term w. In order to have an estimate of
pw , we sample a collection of tweets written well before the event (we will take tweets from the
previous month). Given the percentage of tweets containing w in that collection, we obtain a 95%
interval of confidence for pw using Wilson score method [19].
Afterwards, we can compute the expected number of tweets containing a term w and the stan-
dard deviation as follows:
Let fl, w (t) be the frequency of a term w in all tweets posted in the time window [t, t + l ]. We let
E[Xw ] = Npw
and σ [Xw ] = pNpw (1 − pw ).
βl, w (t) =
fl, w (t) − E[Xw ]
σ [Xw ]
,
which measures how much fl, w (t) deviates from the expected frequency of the term w. We say
that an interval I = [a, b] is interesting with respect to a term w if for all t ∈ I, βl, w (t) ≥ α. We
say that an interesting interval I = [a, b] is maximal if for all ¯a < a and ¯b > b, [a, ¯b], and [ ¯a, b] are
not interesting.
Given a maximal interesting interval I, we define β max
l, w (I) = maxt ∈I βl, w (t), i.e. the maximum
deviation from the expected frequency of w in I. When it is clear from the context we use the
abbreviation βmax. Our goal is to find all maximal interesting intervals for every term w together
with their corresponding βmax 's. We then retain only the top k intervals with maximum βmax 's
among all the terms. Algorithm 1 shows a pseudocode for computing all bursts of a given location,
while Algorithm 3 shows a pseudocode for computing the top k maximal interesting intervals
together with their corresponding locations, as well as other relevant terms (to be discussed next).
, Vol. 1, No. 1, Article . Publication date: December 2019.
6
Oana Balalau, Carlos Castillo, and Mauro Sozio
Algorithm 1 FindTermBurst(C, w, α, ℓ)
1: Input: A collection of tweets C with their timestamps, a location w, a threshold α ≥ 0, a
window size ℓ
2: S ← ∅, βmax ← 0, I ← ∅
3: t ← minT imestamp(C)
4: while t ≤ maxT imestamp(C) − ℓ do
5:
6:
7:
I ← I ∪ [t, t + ℓ]
βmax ← max(βmax, βℓ, w (t))
if βℓ, w (t) ≥ α then
8:
9:
10:
if (βℓ, w (t) < α or t = maxT imestamp(C) − ℓ) and I , ∅ then
S ← S ∪ (w, I, βmax)
I ← ∅, βmax ← 0
t ← t + 1
11:
12: Return S
Locations in tweets might be mentioned at different levels of granularity (city, state or a country).
As a result, two tweets might refer to the same event, even if two different locations are mentioned
in the corresponding tweets (e.g. Los Angeles and California). Therefore, determining whether
there is a hierarchical relationship between two locations might help us determining whether two
events are duplicate events, thereby improving the fraction of unique events. To this end, we use
GeoNames, a geographical dataset which can be queried using web services 3. In our algorithm we
remove a tuple (l
max)
with I
max) from further consideration, if there exists another tuple (l
max and an hierarchical relation between l
, I
′
, ∅, β
′ and l
′′.
max ≤ β
, I
, β
′
′
, β
∩ I
′′
′′
′′
′
′
′′
′′
Finding (cid:30)asi-Cliques
In order to complement the set of locations (found with Algorithm 1) with additional information
about the corresponding event, we employ a graph mining approach. In particular, for each loca-
tion and each interesting interval for that location, we wish to find a set of terms which induce a
dense region in the co-occurrence graph during that time interval. Given an interesting interval I
and a collection of tweets, we define a weighted undirected graph G I = (VI, E I), where VI con-
sists of the set of terms in the collection of tweets, while there is an edge between two nodes if the
corresponding terms co-occur in at least one tweet posted within I. A weight function c : E → R+
represents the number of co-occurrences of terms in tweets posted within I.
Cliques and quasi-cliques are dense subgraphs par excellence. Several definitions of weighted
cliques have been provided in the literature, such as a subgraph of maximum total weight where
any two nodes are connected [23], as well as a subgraph with a sum-edge-weight-to-number-edges-
clique-same-size ratio larger than a threshold [32]. Observe that both definitions would favor the
graph on the left in Figure 1, which exhibit weak connections between the set of nodes {1, 2} and
{3,4}. As a result, those two different parts of the graph might actually refer to two different events.
It is more likely that the nodes of the graph on the right in Figure 1 refer to the same event, as the
edges of the graph have the same weight.
3http://www.geonames.org/export/web-services.html
, Vol. 1, No. 1, Article . Publication date: December 2019.
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct
Keyword-based Descriptions
7
Fig. 1. The le(cid:28) subgraph has a larger weight than the right one, but the nodes in the right subgraph are
much be(cid:29)er connected.
This motivates the following definitions of cliques and quasi-cliques. We say that a graph H is
a weighted clique if all pairs of nodes in H are connected by an edge with the same weight. Given
a parameter γ > 0, we then define a weighted quasi-clique as follows.
Definition 1 (Weighted (cid:28)asi-Cli(cid:27)e). Given an undirected weighted graph H = (V (H ), E(H ), w),
0 < γ ≤ 1, we say that H is a weighted γ -quasi-clique if the following holds:
e ∈E(H )
w(e) ≥ γ · wmax (H )(cid:18)V (H )
2
(cid:19),
(1)
where wmax (H ) = maxe ∈E(H )(w(e)).
We define the function qG : V → (0, 1] (q for short) to be the function which associates to every
set S ⊆ V a rational number γ such that the subgraph induced by S in G is a γ -quasi-clique and γ
is the largest value for which this holds.
Finding quasi-cliques is an NP-hard problem, therefore we resort to the following heuristic for
finding quasi-cliques containing a node v and at most s nodes. The algorithm starts with v and
adds the edge with maximum weight containing v. At any given step, let S be set of current nodes.
If S = s, the algorithm stops. Otherwise, it adds a node x in the neighborhood of S maximizing
q(S ∪ {x }) provided that by adding x the resulting subgraph is still a γ -quasi-clique. Algorithm 2
shows a pseudocode, where ∆(u) denotes the sets of neighbors of u.
Algorithm 2 FindQuasiClique(G, v, γ , s)
if S = s return S
∆(S) ← ∪u ∈S ∆(u) \ S
if ∆(S) = ∅ then
1: Input: A graph G = (V , E), a vertex v, 0 < γ ≤ 1
2: Output: A weighted quasi-clique containing v
3: u ← arg maxu:uv ∈E w(uv)
4: S ← {u, v }
5: while true do
6:
7:
8:
9:
10:
11:
12:
13:
14: Return S
return S
S ← S ∪ {x }
return S
x ← arg maxu ∈∆(S ) q(S ∪ {u})
if q(S ∪ {x }) < γ then
, Vol. 1, No. 1, Article . Publication date: December 2019.
8
Oana Balalau, Carlos Castillo, and Mauro Sozio
EviDense: Analysis of its Running Time
Our algorithm for event detection can then be recapped as follows. The first step consists of col-
lecting tweets from Twitter specifying as a filter a list of terms related to disaster events. Then,
mentions of locations in tweets are recognized and tagged. A list of the top k bursty locations is
computed, each of them is then complemented with additional terms related to the same event by
finding quasi-cliques in the co-occurrence graph. Algorithm 3 shows a pseudocode for our main
algorithm.
Algorithm 3 EviDense(C, γ , α, ℓ, k, s)
1: Input: A collection C of tweets each one containing at least one term related to disaster events
(lexicon provided in [22]), 0 < γ ≤ 1, an integer α, a window size ℓ, integer k, s
2: Output: The list of the top k events in C
3: S ← ∅
4: Recognize and tag locations in C with [26]
5: for w ∈ Locations(C) do
6:
7: Let Sk be the top k triples in S with maximum βmax's
8: for (w, I, β) ∈ Sk do
9:
10:
Compute G I
output (FindQuasiClique ( G I, w, γ , s), I)
S ← S∪ FindTermBurst(C, w, α, ℓ, k)
To ease the presentation, Algorithm 1 and Algorithm 3 show a simple pseudocode of the main
steps of our algorithm. However, our algorithm can be efficiently implemented so that it requires
a few constant passes over the collection of tweets. For each location we store its frequency in the
current time window (i.e. fl, w (t)) together with the corresponding I, βmax. Every time we process
a new tweet, we verify for every location in that tweet the conditions from Algorithm 1 lines 5-10.
Let c be the maximum number of terms in a tweet. We can then claim that the total running time
of Algorithm 1 is O(c C).
Let n, m be the number of nodes and the number of edges in G, respectively (i.e. the input of
Algorithm 2). For line 3 we require O(n) operations, for line 7 we need at each iteration O(n)
operations, while the computation at line 10 requires in the worst case to process all the edges in
G. Thus, the overall running time of Algorithm 2 is O(s(m +n)). We now evaluate the running time
of Algorithm 3, lines 5-10, that is, excluding the tagger. Line 7 is implemented using a heap of size
k, requiring a number of operation of O(Cc log k). Any graph constructed from a collection of at
most C tweets will have at most c 2 C edges and c C nodes. For computing a graph G I, we need
at most O(c 2 C) operations. Then, the running time for lines 8-10 is O(ksc 2 C), which implies a
total running time of Algorithm 3 of O(T + ksc 2C), where T is the running time required by the
tagger. Notice that in practice k, s, c are small constants.
Incorporating Information from Mainstream Media
By running EviDense on a collection of titles of news articles, we can detect high-impact events in
mainstream media as well. This observation leads to the question of whether our approach could
benefit from incorporating news articles from mainstream media.
This is done as follows. Recall that the ranking of a result is determined by the deviation from the
expected frequency of its location in a given interval. We introduce a new random variable Yl oc =
X ne w s
l oc are random variables denoting the frequency of the location
l oc, where X ne w s
and X t w
+ X t w
l oc
l oc
, Vol. 1, No. 1, Article . Publication date: December 2019.
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct
Keyword-based Descriptions
9
, X t w
loc in news and tweets in a given interval, respectively. We make the simplifying assumption
that the random variables X ne w s
l oc are independent. Such an assumption holds up to some
extent, given that news articles and tweets are written typically by different people. Therefore, the
expected value and the standard deviation of Yl oc can be computed as the sum of the expected
values and standard deviations of the two random variables, respectively. We will then compute
the maximum deviation of that location considering the sum of mentions of the location in both
datasets.
l oc
To summarize, we first select the top k bursty locations in mainstream media. For each of these
locations, we shall consider the random variable Yl oc to determine the expected frequency, while
for the remaining locations we shall consider the variable X t w
l oc. We then compute the top k results
in Twitter.
4 EXPERIMENTAL EVALUATION
Experimental Se(cid:29)ings
We evaluate our approach on a large collection of tweets, as well as, news articles, by means of
a crowdsourcing platform. We mostly focus on disaster events, while in Section 4 we investigate
if our approach is effective for other classes of events, as well. We consider a disaster, any event
that is included in any of the lists provided by the US Government4 or the International Disaster
Database5 (such as earthquakes, mass shootings, floods, etc.).
Corpora. We collect tweets posted over a period of 19 months between November 2015 and May
2017. We use the Twitter Streaming API while filtering the tweets so that they contain at least one
term related to disasters [22]. We focus on tweets written in English. We obtain 16M tweets in
total, which we divide into nineteen datasets (one per month). We then use an entity recognition
tagger [26] for recognizing and tagging the mentions of locations in the tweets. We collected news
articles over the same time period using GDELT6, as in [21], which contains major international,
national, regional, and local news. The GDELT dataset is updated regularly, every 15 minutes,
with news posted in that timeframe. We filtered the news using the same lexicon used to filter the
tweets, which can be done by specifying the tag "CRISISLEX_CRISISLEXLEC"7 in GDELT. From
each news article, we retain its title and publication date which are given in input to our algorithm.
In order to get an estimate of the probability of a tweet or a news article to contain a location, we
sampled the month previous to the event, and we obtained a 95% interval of confidence using
Wilson score method[19]. For simplicity, we selected the upper bound of the interval as the value
of the probability.
Related work. We compare against MABED [10] and EDCoW [36]. All approaches are evaluated
on the same collection of tweets. There has been significant disagreement among the crowd work-
ers when interpreting the results of [1]. Therefore, we omit the approach from our study, deferring
a more careful evaluation to future work.
Parameter settings. In our approach, we set s to 10, k to 20, ℓ to three hours, α = 8 and γ = 0.5.
We run MABED using the implementation provided by the authors8 and the setting specified in
the original paper [10], that is p = 10, θ = 0.7 and σ = 0.5. The parameter σ controls the similarity
between the events produced in the results. Small values of sigma correspond to more diverse
results. We observe that determining the right value for such a parameter is crucial in the MABED
approach. In particular, if σ is too small one may not get enough relevant results, while with
4https://www.ready.gov/be-informed
5http://www.emdat.be/classification
6http://blog.gdeltproject.org/gdelt-2-0-our-global-world-in-realtime/
7https://blog.gdeltproject.org/crisislex-taxonomies-now-available-in-gkg/
8https://github.com/AdrienGuille/MABED
, Vol. 1, No. 1, Article . Publication date: December 2019.
10
Oana Balalau, Carlos Castillo, and Mauro Sozio
large values of σ the algorithm might return many duplicates of the same "popular" event. For
the EDCoW algorithm we use the implementation of [35] and we set the parameters as follows:
the size of first level of intervals is s = 100s, while we take ∆ = 32, setting a size of 3200s for the
second-level intervals and, as in [35], we set γ = 1. As EDCoW does not enforce any constraint on
the size of the output, we order the results according to ϵ (as defined in the original paper), which
measures the relevance of the results and retain only the top k results.
Machine stats. We run our experiments on a Linux machine equipped with 4 processors Intel
Xeon CPU E7-4870 @ 2.40 GHz as well as 10 cores split into 2 threads each (a total of 80 threads)
and 64 G of RAM DDR3 1333 MHz.
Methodology
We run the three approaches on each of the first four months of our dataset from Twitter and
evaluate the top 10 as well as the top 20 results for each such dataset. MABED and EDCoW provide
a measure of relevance for their results which we use to determine the top results. The approach
that performs best is then evaluated against our approach, over the whole period of 19 months.
All approaches receive in input the same collection of tweets.
Metrics. We evaluate the precision at k for all three approaches on our collection of tweets. Preci-
sion at k, denoted with P@k (or precision for short), is defined as the percentage of true events in
the top k results, divided by k. In addition to the precision, we compute the percentage of duplicate
events among all the events retrieved, i.e. the DeRate [15]. From these two metrics, we can infer
a third one, which measures the percentage of unique events (i.e. duplicates do not contribute) in
the top k results. We denote such a metric with U @k. We observe that if an algorithm performs
best in terms of U @k, it performs best also in terms of recall. Therefore, we do not report recall in
our experimental evaluation.
Crowdsourcing Settings. In order to ensure a fair comparison, we use a crowdsourcing service,
GetHybrid9. For each result produced by any of the approaches, we ask 5 workers to determine
whether it was a disaster event, that is an event considered to be a disaster by the US Government or
the International Disaster Database.10. We added to the description of a result two relevant tweets
in order to facilitate the labeling task. We note that as we find the relevant tweets automatically, a
larger collection of tweets could be used for other applications, such as to create training sets for
automatic classifiers.
In order to evaluate a result, a worker would select one of the following answers to the question
of what type of event do the keywords and tweets describe:
(A) A natural disaster (earthquake, landslide, volcano, extreme temperature, hurricane, large
and dense fog, large storm, flood, tsunami, drought, wildfire, epidemic, insect infestation,
large accident involving animals, asteroid impact),
(B) A technological disaster (chemical spill, building collapse, explosion, fire, gas leak, large
poisoning, nuclear, radiation, cyberattack),
(C) A human-induced disaster (war, shooting, terror attack),
(D) A large transport accident (air, road, rail, water),
(E) Not a natural, technological, or human-induced disaster, or large transport accident.
Answers A-D correspond to a disaster. We label a result as a disaster if 3 out of 5 workers
confirmed.
9https://www.gethybrid.io
10https://www.ready.gov/be-informed, http://www.emdat.be/classification
, Vol. 1, No. 1, Article . Publication date: December 2019.
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct
Keyword-based Descriptions
11
In order to compute the DeRate, we use the following definition for duplicate events: two events
(E1, E2) are duplicates if they can be referenced to a more general event (E), that is each event
satisfies one of the conditions:
(1) describes the event E,
(2) describes a sub-event of the event E, e.g. the Bataclan attack was one of the sub-events of
the Paris attacks in November 2015,
(3) describes the consequences of the event E, e.g. actions taken in the aftermath of a tornado.
As before we label two events as being duplicates if 3 out of 5 workers confirmed.
Estimating DeRate and U@k. The task of estimating the average number of duplicate events is
non-trivial, given the large number of results. Asking the workers in GetHybrid to estimate the
number of duplicate events in a list containing approximately 20 or more results is time-consuming
and most probably would result in a non-accurate evaluation. Therefore, we draw a random sample
from the set of all possible event pairs. Each worker is then asked to determine whether a given
pair of events in the sample contains duplicate events or not. The resulting percentage of duplicate
event pairs in the sample is used to infer a 95% confidence interval on the percentage of duplicate
event pairs on the whole dataset, using the Wilson score method [19].
We then proceed to estimate the number of unique events produced in output by the different
approaches. Given a 95% confidence interval [a, b] for the number of duplicate event pairs, we
compute a 95% confidence interval [ ¯a, ¯b] for the number of duplicate events as follows. In the case
when there are at least a duplicate event pairs, there are at least ¯a = n − 1 duplicate events where
n is the smallest integer such that (cid:0)n
be at most ¯b = b duplicate events. Therefore, for an approach with precision (at k) p > 0 and
95% confidence interval [ ¯a, ¯b] on the number of duplicate events, we estimate that the number of
unique events be in the range [max(1, p · k − ¯b), p · k − ¯a].
2(cid:1) ≥ a. If there are at most b duplicate event pairs, there can
Results
Comparison. In Table 1 we present the average P@10 and the average P@20 for all the approaches
over the time period November 2015 - February 2016. The evaluation has been conducted using
the GetHybrid crowdsourcing platform, as discussed in Section 4. We observe that EviDense out-
performs the other two approaches for both top-10 and top-20 results.
Method
EDCoW
MABED
EviDense
Average P@10 Average P@20
42.5%
60%
70%
32.5%
53.7%
73.7%
Table 1. Average precision over the time period November 2015 - February 2016.
We evaluate the number of duplicate events in the results, as discussed in Section 4. First, we
measure the percentage of duplicate event pairs in our sample. This is shown in Table 2. Observe,
that EviDense produces less duplicate event pairs. In particular, our results are better with a 95%
confidence.
From the results shown in Table 2, we obtain a 95% confidence interval on the percentage of
duplicate events, i.e. the DERate. We obtain a 95% confidence interval of [0%, 84.6%] for EDCoW,
[37.2%, 90.6%] for MABED, and [0%, 47.4%] for EviDense. From the latter result, it is difficult to
determine which algorithm performs best in terms of DERate. Moreover, observe that approaches
with higher precision might be penalized by the DERate, in that, they tend to have a larger number
, Vol. 1, No. 1, Article . Publication date: December 2019.
12
Oana Balalau, Carlos Castillo, and Mauro Sozio
Method
EDCoW
MABED
EviDense
Percentage in sample
95% Confidence Interval
12%
22%
2%
4.9% to 25%
14.5% to 31.6%
0.3% to 7.7%
Table 2. Percentage of duplicate event pairs.
of duplicates. For example, an approach which retrieves exactly one event has a DERate of zero.
Therefore, we also consider the U @k metric, that is, the percentage of unique events in the top
k results, as discussed in Section 4. The results are shown in Table 3. We can see that even with
a pessimistic estimate, EviDense outperforms the other approaches in terms of U @k, while the
percentage of unique events in the top-20 results can be up to 73.7%.
The output of our algorithm is shown in Table 6. We can see that the description of each of the
events is succinct and informative. In particular, one can easily retrieve the location of the event
(in bold), its time-frame and what happened.
Method
EDCoW
MABED
EviDense
U @20
5% to 32.5%
5% to 33.7%
38.7% to 73.7%
Table 3. Average percentage of unique events over the time period November 2015 - February 2016.
Long-Term Comparison. In order to give further proof of the performance of our approach, we
compute the precision with 95% confidence of EviDense and the second best algorithm MABED
for the period of 19 months of our dataset. We retrieve the top 20 results for every month, giving
a total of 380 results for each approach. From these results, we randomly selected 100 results per
method and we used crowdsourcing to evaluate the precision. For EviDense, 72 events out of 100
are disaster events, giving a precision between 61.9% and 80.3% with 95% confidence, while for
MABED, 33 events out 100 are disaster events, resulting in a precision between 24.1% to 43.2%
with 95% confidence. These results are summarized in Table 4. This confirms that our approach
has higher precision than MABED, while it performs remarkably well over such an extensive
experimental evaluation.
Method
MABED
EviDense
Percentage in sample
95% Confidence Interval
33%
72%
24.1% to 43.2%
61.9% to 80.3%
Table 4. Average precision over the period November 2015 - May 2017 for the best two methods.
Tweets & News Articles. We investigate whether our approach could benefit from incorporat-
ing another source of information such as news articles from mainstream media, as discussed in
Section 3. The results are shown in Table 5. We observe that we obtain significantly better re-
sults for top-10 and slightly better results for top-20. Overall, the precision improves when adding
additional information from mainstream media.
Running time. Annotating the entities in the tweets using the entity recognition tagger [26]
takes on average 0.02s/tweet. The average running time for the algorithms (without taking into
, Vol. 1, No. 1, Article . Publication date: December 2019.
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct
Keyword-based Descriptions
13
Method
Average P@10 Average P@20
EviDense on News
EviDense on Twitter
EviDense Merged
80%
70%
77.5%
66.2%
73.7%
76.2%
Table 5. Comparison of the performance of EviDense on different datasets: news articles, Twi(cid:29)er and both.
account the annotating phase) is the following: for MABED is around 90s, for EDCoW is 52min
and around 25s for EviDense.
Time interval (UTC)
Dec 03 02:20 , Dec 07 08:50
Event keywords
San Bernardino, dead, female, #san-
bernardino, killed, male, police, shoot-
ing
Dec 27 01:04 , Dec 28 03:37 Dallas, Rowlett, tornado
Dec 07 03:24 , Dec 10 21:11 Chennai, damaged, flood, fresh, issue,
lost, passport, psks, sushmaswaraj
Dec 04 09:12 , Dec 04 23:23 Cairo, attack, firebomb, killed, night-
club, people, restaurant
Dec 28 20:15 , Dec 29 09:21 Cleveland, 12-year-old, Tamir Rice
charged, death, grand, indict, jury, po-
lice, prosecutor, shooting
Dec 01 12:32 , Dec 06 22:03 Chennai, find, flood, girl, lost, parent,
pls
Dec 27 01:39 , Dec 27 08:38 Garland, Texas, dead, hit, killed, peo-
ple, storm
Dec 21 04:56 , Dec 22 00:57
Dec 18 16:40 , Dec 19 02:32
Dec 07 13:31 , Dec 08 08:59
Las Vegas, crash, critical, dozen, driver,
injured, pedestrian, people, strip
republican, agrabah, aladdin, bomb-
ing, country, #nottheoni, nationally,
ppppolls, primary
Pearl Harbor, attack, #pearlharbor,
honor, live, lost, remember, today, year
Description
The San Bernardino terrorist at-
tack.
Many tornadoes in Dallas and
Rowlett.
Chennai residents whose pass-
ports were damaged during the
floods could get a new one.
People killed in Cairo at a
restaurant that operated also as
a nightclub.
Not a disaster event.
A girl has disappeared during
the floods and her parents are
looking for her.
A series of tornados hit the
state of Texas, reaching Gar-
land, Dallas and Rowlett (dupli-
cate event).
Driver in Las Vegas deliber-
ately attacked pedestrians.
Not a disaster event, also we
can notice a mislabelling of the
tagger.
Commemoration of the attack
on Pearl Harbor 74 years ago to-
day.
Table 6. Top 10 events discovered in December 2015 by EviDense. The event is centered on the location given
in bold.
Parameter Se(cid:29)ings for EviDense
Our algorithm has four input parameters: k, ℓ, α and γ . For the experiments we used the values
k = 10 or k = 20, we set ℓ to three hours, α = 8 and γ = 0.5. The first parameter k is used to limit
the output size. The size of the time-window, ℓ, has two functionalities: firstly, it has a smoothing
, Vol. 1, No. 1, Article . Publication date: December 2019.
14
Oana Balalau, Carlos Castillo, and Mauro Sozio
effect over the number of occurrences of a term and can alleviate the difference between active
periods and inactive periods, such as day and night. Secondly, because of the smoothing effect,
it can decrease the importance of small events which have short-lived peaks and increase the
importance of events which are discussed for longer periods but without having important peaks.
We experiment with different values of ℓ in order to balance between the segmentation of a single
event and the order of magnitude of an event. In order to assess what is the best value for the time
window, we compute the percentage of duplicate events between the events retrieved, the DeRate.
We only include an evaluation of the top 20 events in the month of December 2015, as the results
are similar to the other datasets. In Figure 2a, we can notice that the number of duplicate events
decreases as the time window increases, which is intuitive, as a larger time window decreases the
effect of an inactive period. We settled for three hours, as choosing larger time windows would
likely merge different events that occur in the same location. Moreover, larger time windows would
also increase the running time of the algorithm, as shown in Figure 2b. This is due to the fact that
the search for weighted quasi-cliques is performed on a larger graph.
140s
e
m
i
i
t
g
n
n
n
u
R
71s
40s
11s16s22s28s
1h2h3h4h 6h
12h
Window size (hours)
24h
1h2h3h4h 6h
12h
Window size (hours)
24h
(a) DeRate vs ℓ
(b) Running time vs ℓ
s
l
a
v
r
e
t
n
i
g
n
i
t
s
e
r
e
t
n
i
h
t
g
n
e
l
g
v
A
53h
42h
30h
18h
11h
42
8
16
α coefficient
32
(d) Avg length of maximal intervals vs α
0.29
0.180.18
e
t
a
R
e
D
0.06
0.05
00
0.27
0.22
0.18
0.12
e
t
a
R
e
D
0.06
2 4
8
16
α coefficient
(c) DeRate vs α
32
Fig. 2. Parameter se(cid:29)ings
The parameter α is used as a threshold for determining which location has a frequency which
deviates significantly from the average frequency. We use the binomial distribution as a simple
model that gives an estimate of a mean and standard deviation, and we try several values for α, as
shown in Figure 2c. When increasing the parameter α the average length of interesting intervals
decreases (Figure 2d) and given that our goal is to minimize the length of interesting intervals
without reporting the same event twice, we select the value α = 8. The last parameter, γ , is used
to provide different levels of detail concerning an event. We have obtained good results for a large
range of values of γ . The best is to avoid values smaller than 0.3 which might add unrelated terms
to an event, and values larger than 0.8 as the description of the events could be not informative.
, Vol. 1, No. 1, Article . Publication date: December 2019.
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct
Keyword-based Descriptions
15
Disaster Dataset
We released a dataset 11 containing 32K tweets written in the period November 2015 -February
2016. The dataset was obtained by selecting tweets referring to each true disaster event discovered
by EviDense. The tweets were written in the timeframe of the disaster event and contained the
mention of the event location and of at least one more event keyword. In order to test the quality
of the dataset, we randomly sampled 200 tweets and we marked them as being disaster-related
or not. A tweet was considered as being disaster-related if it described a disaster event, described
a sub-event of a disaster event or described the consequences of a disaster event. We obtained a
precision of 86.5%, which gives a 95% confidence interval [19] for the precision in the entire dataset
between 83.05% and 92.42%.
Beyond Disaster Events
In this section, we study a different category of events in order to understand whether our approach
can effectively be used to detect other classes of events. We focus on political events. In order to
obtain tweets relevant to our task, we create a lexicon of terms related to politics. We include
keywords like "protest", "immigration", "election" or "government", however, better results could
be obtained if the list of words is produced in the same fashion as the lexicon provided in [22].
Detecting bursts in the mentions of locations turned out to be an effective method to detect disaster
events. In the case of political events, politicians might play an important role in this kind of events.
Therefore, we detect bursts in the mentions of locations or persons, as the latter ones might refer
to well-known politicians. In order to recognize and tag mentions of well-known persons, we use
we use the same entity recognition tagger used in the rest of paper [26]. The rest of the algorithm
remains unchanged.
We obtain the following results. In the month of November 2015 the first event retrieved by our
algorithm is related to the declaration of François Hollande that France will close its borders in
the aftermath of the November 13th attacks described by the following terms "attacks", "France",
"borders", "closes", "declares", followed by an event about people injured at protests calling for
the resignation of South Korea's president ("Korea", "beaten", "happening", "people", "protest").
In December 2015 most of the detected events are related to the presidential elections in the US
("bernie", "hillary", "#demdebate", "war"), however, we find also a mention of the killing of peaceful
protesters during a pro-Biafra protest (nigerian, #ipob, navy, police, protester, shooting, unarmed).
In January 2016 the UN holds an emergency meeting after North Korea claims having done a
nuclear test (North Korea, council, emergency, meeting, security, set, test), while in February 2016
Jeb Brush and Rand Paul suspend their presidential campaigns. Another event detected in February
is related to the Yemen civil war (Yemen, #usakillyemenis, saudi-led, us-backed) and was triggered
by a bombing at a cement factory close to the capital of Yemen, which resulted in the death of
civilians.
These observations suggest that our approach is robust and it has good potential in providing
meaningful results for other classes of events.
5 USING DENSE SUBGRAPHS FOR EVENT DESCRIPTION
In this section, we investigate if the weighted quasi-clique definition that we introduced in this
paper is the best suited for describing events. We compare our method with well-known definitions
of dense subgraphs.
11https://github.com/nyxpho/evidense
, Vol. 1, No. 1, Article . Publication date: December 2019.
16
Oana Balalau, Carlos Castillo, and Mauro Sozio
Dense subgraphs definitions and algorithms
In this section, we give the definitions for the types of dense subgraphs we consider for the com-
parison. We make simple modifications to some of the baselines, in order to enforce that a query
node q is part of the solution.
Definition 2 (Heaviest k-subgraph containing (cid:27)ery node q (HkS)). Given an undirected
weighted graph G = (V , E, w), an integer k and a query node q, the induced subgraph H = (V (H ), E(H ))
is the heaviest k-subgraph containing query node q, if H has size k, contains the query node q and
has maximum sum of edge weights.
Definition 3 (Heaviest k-cli(cid:27)e containing (cid:27)ery node q (HkC)). Given an undirected
weighted graph G = (V , E, w), an integer k and a query node q, the induced subgraph H = (V (H ), E(H ))
is the heaviest k-clique containing query node q, if H is a k-clique, contains the query node q and has
maximum sum of edge weights.
Definition 4 (Cocktail party problem (CP)). Given an undirected weighted graph G = (V , E, w)
and a query node q, the induced subgraph H = (V (H ), E(H )) is a solution to the cocktail party prob-
lem if H contains the query node q, is connected and maximizes the minimum weighted degree of all
nodes in the subgraph.
This definition is a particular case of Problem 1 defined in [30].
Definition 5 (Cocktail party problem with distance d (CPD)). Given an undirected weighted
graph G = (V , E, w), an integer d and a query node q, the induced subgraph H = (V (H ), E(H )) is
a solution to the cocktail party problem with distance d if H contains node q, is connected, all the
nodes of H are connected to the query node through a short path of at most size d, and maximizes the
minimum weighted degree of all nodes in the subgraph.
This definition is a particular case of Problem 2 defined in [30].
Finally, we also consider the following simple baseline.
Definition 6 (Top k co-occurrences (Topk)). Given a query word q, a collection of tweets C
and an integer k, the top k word co-occurrences represent k words co-occurring the most often in a
tweet with word q.
These four definitions of dense subgraphs are well studied in literature [2, 14, 23, 30]. In order
to compute the dense subgraphs, we implemented the techniques presented in [14, 30] with small
adjustements for our problem. We describe these implementations in the following. In [14], the au-
thors present an exact and an approximate algorithm for the heaviest k-subgraph. The algorithm
is a well designed branch and bound technique that enumerates the candidate solutions. The ap-
proach is bottom up, that is it gradually adds nodes to the candidate solutions. We enforce that
the query node is present in the final solution by adding it in the initialization of the candidate
solutions.
In order to compute the heaviest k-clique containing a query node q, we modify the branch and
bound algorithm [14]. We shortly remind the approach: in the first step the edges are sorted in
non-increasing order of the weights and each edge has assigned its index in the order. We can
visualize the branch and bound algorithm as a tree, in which the root corresponds to all possible
solutions and each node to a subset of solutions. Each node on a level i has two children, one child
corresponding to the solutions containing edge i ( where i is the position in the sorted order) and
one to the solutions that don't contain the edge. A node has an upper bound which represents
the maximum possible weight of a solution of that node and a lower bound which is the weight
of the subgraph induced by the edges accepted in the node. In the bounding phase, we update
, Vol. 1, No. 1, Article . Publication date: December 2019.
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct
Keyword-based Descriptions
17
the upper bound of the subgraph and we decide if this branch can lead to the optimum solution.
This is done by comparing the upper bound with the current best lower bound. For the heaviest
k-clique problem, we add the constraint that each subgraph that we keep has to be a clique, which
is intuitive as every induced subgraph of the heaviest k-clique is also a clique. For the solution to
contain the input query node q, we initialize each solution set with the query node q.
For the cocktail party problem, we implement the GREEDY algorithm presented in [30]. The
algorithm can be summarized as follows: starting from an input graph G, at each step, the node
of minimum degree is removed. If the node of minimum degree is q or if the graph becomes dis-
connected, we stop. The solution is the the induced subgraph with the largest minimum degree.
The cocktail party problem already allows for an input query node q to be given in input, so no
further modification is necessary. The algorithm for the cocktail party with distance d works as
follows: starting from an input graph G, at each step a node at distance bigger than d from the
query node q is removed, or if no such node exists than the node of minimum degree is removed.
We define the distance between two nodes to be the length of the shortest path and the degree to
be the weighted degree.
Keyword coherence
In order to evaluate which method produces the best set of keywords, we use a metric proposed
for the automatic evaluation of the coherence of keywords describying a topic [18]. The metric
has been shown to be a good indicator of human judgment.
Given a collection of tweets C, a set of keywords K, the frequencies of keywords f (k1) and
keyword co-occurrences f (k1, k2) in C, the coherence of K given C is:
Coherence(K C) = k1, k2 ∈K
log(
f (k1, k2) + 1
f (k1)
)
(2)
Evaluation
In order to assure a fair comparison, we run Algorithm 3 while only changing line 10, that is the
subroutine for computing keywords associated with the event. We considered the top 20 events
in the months November 2015 - February 2016, in total 80 events. We compute the coherence
of every event description given by the 6 methods (quasi clique, heaviest k-subgraph, heaviest
k-clique, cocktail party problem, cocktail party problem with distance d and top co-occurrences).
For the heaviest k subgraph and heaviest k-clique we choose k = 10. For the cocktail party with
distance d we experimented with d = 1 and d = 2 and we choose d = 1 as it gave better results.
For the top k co-occurrences, we return the 9 top co-occuring keywords with query node d. For
each approach, the query node is the location and the co-occurrence graph is created from tweets
written in the event timeframe. We compare these results with the results returned by running the
quasi clique subroutine with v = location, γ = 0.4, s = 10.
We report the results in Table 7. A cell (i, j) gives the percentage of events on which the method i
performed better or equally well in comparison with method j. The results show that our definition
of a weighted quasi-clique (W QC) gives the best results in terms of keyword coherence. The second
best technique is cocktail party with distance 1, followed by top k co-occurrences.
6 CONCLUSIONS
We presented EviDense, a graph-based approach for finding high-impact events in social media.
In particular, we address the challenge of providing a succinct and informative description of the
events retrieved with our approach. We focus on disaster events, while we discuss how our ap-
proach could be adapted to other classes of events. Our extensive experimental evaluation over a
, Vol. 1, No. 1, Article . Publication date: December 2019.
18
Oana Balalau, Carlos Castillo, and Mauro Sozio
-
Method W QC
W QC
HkS
HkC
CP
CPD
T opk
11.25%
17.5%
8.75%
40%
30%
HkS
90%
-
82.5%
37.5%
83.75%
87.5%
HkC
CP
86.25%
92.5%
18.75% 63.75%
78.75%
-
27.5%
70%
73.75%
-
98.75%
90%
CPD
T opk
68.75% 76.25%
13.75
16.25
32.5%
32.5%
11.25
12.5%
57.5%
-
48.75%
-
Table 7. Comparison of keyword coherence between W QC, HkS, HkC, CP, CPD,T opk. On each line, we have
the percentage of events on which the method performed be(cid:29)er or equally well in respect to the other
approaches. For example,W QC performed be(cid:29)er or equally well on 90% of event descriptions when compared
with HkS.
period of 19 months shows that our approach outperforms state-of-the-art approaches in terms of
precision and fraction of unique events retrieved, while the description provided by our algorithm
is succinct and contains the most relevant information such as the location, what happened and
the timeframe. We also showed how to improve the results even further by incorporating results
from mainstream media. Given these results, we consider EviDense could represent a valuable
tool for analyzing both social content and news articles from mainstream media, as well as for
studying how they compare. It could also be used to boost the performance of other approaches.
For example, the dataset we released could be used to create training sets for automatic classifiers.
7 ACKNOWLEDGMENTS
Part of this work was done while Oana Balalau was a student at Télécom ParisTech University.
Carlos Castillo is partially funded by La Caixa project LCF/PR/PR16/11110009. Mauro Sozio is
partially funded by the French National Agency (ANR) under project FIELDS (ANR-15-CE23-0006).
Data and code sharing. The ids of the tweets we use in our evaluation are publicly available,
together with our code.12
REFERENCES
[1] Albert Angel, Nick Koudas, Nikos Sarkas, Divesh Srivastava, Michael Svendsen, and Srikanta Tirthapura. 2014. Dense
subgraph maintenance under streaming edge weight updates for real-time story identification. VLDB Journal (2014),
175 -- 199. https://doi.org/10.1007/s00778-013-0340-z arXiv:arXiv:1203.0060v1
[2] Yuichi Asahiro, Kazuo Iwama, Hisao Tamaki, and Takeshi Tokuyama. 2000. Greedily finding a dense subgraph. J.
Algorithms 34, 2 (2000).
[3] Farzindar Atefeh and Wael Khreich. 2015. A Survey of Techniques for Event Detection in Twitter. Comput. Intell.
(Feb. 2015), 132 -- 164. https://doi.org/10.1111/coin.12017
and Mauro
Castillo,
Balalau,
[4] Oana
Carlos
Sozio.
2018.
Method
Events with
https://aaai.org/ocs/index.php/ICWSM/ICWSM18/paper/view/17889
Unique High-Impact
Finding
for
Succinct
EviDense:
Graph-Based
Keyword-Based Descriptions.
A
[5] Carlos Castillo. 2016. Big Crisis Data: Social Media in Disasters and Time-Critical Situations. Cambridge University
Press, Cambridge. https://doi.org/10.1017/CBO9781316476840
[6] Mário Cordeiro. 2012. Twitter event detection: combining wavelet analysis and topic inference summarization. Pro-
ceedings of Doctoral Symposium on Informatics Engineering (2012).
Community detection in graphs.
[7] Santo Fortunato. 2010.
https://doi.org/10.1016/j.physrep.2009.11.002 arXiv:0906.0612
Physics Reports 486, 3-5 (2010), 75 -- 174.
12https://github.com/nyxpho/evidense
, Vol. 1, No. 1, Article . Publication date: December 2019.
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct
Keyword-based Descriptions
19
[8] David Gibson, Ravi Kumar, and Andrew Tomkins. 2005.
Discovering large dense subgraphs
in
721 -- -732.
massive graphs.
http://portal.acm.org/citation.cfm?id=1083592.1083676
International Conference
on Very Large Data Bases
(VLDB)
(2005),
[9] Av V Goldberg. 1984. Finding a maximum density subgraph.
[10] Adrien Guille and Cecile Favre. 2014. Mention-anomaly-based Event Detection and Tracking in Twitter. ASONAM
2014 - IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining Asonam (2014), 375 -- 382.
https://doi.org/10.1109/ASONAM.2014.6921613
[11] Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, and Sarah Vieweg. 2014. AIDR: Artificial intelligence for
disaster response. Proceedings of the companion publication of the 23rd international conference on World wide web
companion October (2014), 159 -- 162. https://doi.org/10.1145/2567948.2577034
[12] Samir Khuller and Barna Saha. 2009. On finding dense subgraphs. Icalp 5555 (2009), 597 -- 608.
[13] Theodoros Lappas, Benjamin Arai, Manolis Platakis, Dimitrios Kotsakos, and Dimitrios Gunopulos. 2009. On
Burstiness-Aware Search for Document Sequences. (2009), 477 -- 485.
[14] Matthaios Letsios, Oana Denisa Balalau, Maximilien Danisch, Emmanuel Orsini, and Mauro Sozio. 2016. Finding
Heaviest k-Subgraphs and Events in Social Media. In The Sixth IEEE ICDM Workshop on Data Mining in Networks
(DaMNet 2016), Barcelona Spain, 12.
[15] Chenliang Li, Aixin Sun, and a Datta. 2012.
Pro-
ceedings of the 21st ACM international conference on Information and knowledge management (2012), 155 -- 164.
https://doi.org/10.1145/2396761.2396785
Twevent: Segment-based Event Detection from Tweets.
[16] Bruce R Lindsay. 2011. Social media and disasters: Current uses, future options, and policy considerations.
[17] Amina Madani and Omar Boussaid. 2014. What's Happening : A Survey of Tweets Event Detection. INNOV 2014 :
The Third International Conference on Communications, Computation, Networks and Technologies (2014), 16 -- 22.
[18] David Mimno, Hanna M Wallach, Edmund Talley, and Miriam Leenders. 2011. Optimizing Semantic Coherence in
Topic Models. 2 (2011), 262 -- 272.
[19] Robert G Newcombe. 1998. Two-sided confidence intervals for the single proportion: comparison of seven methods.
Statistics in medicine 17, 8 (1998), 857 -- 872.
[20] A Nurwidyantoro and E Winarko. 2013. Event detection in social media: A survey. ICT for Smart Society (ICISS), 2013
International Conference on (2013), 1 -- 5. https://doi.org/10.1109/ICTSS.2013.6588106
[21] Alexandra Olteanu, Carlos Castillo, Nicholas Diakopoulos, and Karl Aberer. 2015. Comparing events coverage in
online news and social media: The case of climate change.
[22] Alexandra Olteanu, Carlos Castillo, Fernando Diaz, and Sarah Vieweg. 2014. CrisisLex: A Lexicon for Collecting
and Filtering Microblogged Communications in Crises. In In Proceedings of the 8th International AAAI Conference on
Weblogs and Social Media (ICWSM'14).
[23] Patric R J Östergård. 1999. A New Algorithm for the Maximum-Weight Clique Problem. Electronic Notes in Discrete
Mathematics 3 (1999), 153 -- 156. https://doi.org/10.1016/S1571-0653(05)80045-9
[24] Chi-Chun Pan and Prasenjit Mitra. 2011. Event Detection with Spatial Latent Dirichlet Allocation. In Proceedings of
the 11th Annual International ACM/IEEE Joint Conference on Digital Libraries (JCDL '11). ACM, New York, NY, USA,
349 -- 358. https://doi.org/10.1145/1998076.1998141
[25] Ana-Maria Popescu, Marco Pennacchiotti, and Deepa Paranjpe. 2011. Extracting events and event descriptions from
Twitter. Proceedings of the 20th international conference companion on World wide web - WWW '11 (2011), 105 -- 106.
https://doi.org/10.1145/1963192.1963246
[26] Alan Ritter, Sam Clark, Mausam, and Oren Etzioni. 2011. Named Entity Recognition in Tweets: An Experimental
Study. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP '11). Association
for Computational Linguistics, Stroudsburg, PA, USA, 1524 -- 1534. http://dl.acm.org/citation.cfm?id=2145432.2145595
[27] Alan Ritter, Evan Wright, William Casey, and Tom Mitchell. 2015. Weakly Supervised Extraction of Computer Security
Events from Twitter. WWW 2015 i (2015).
[28] Barna Saha, Allison Hoch, Samir Khuller, Louiqa Raschid, and Xiao Ning Zhang. 2010.
Dense subgraphs
with restrictions and applications to gene annotation graphs.
Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6044 LNBI (2010), 456 -- 472.
https://doi.org/10.1007/978-3-642-12683-3_30
[29] Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: real-time event detection
by social sensors. In Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North
Carolina, USA, April 26-30, 2010. 851 -- 860.
[30] Mauro Sozio and Aristides Gionis. 2010. The community-search problem and how to plan a successful cocktail party.
In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington,
DC, USA, July 25-28, 2010. 939 -- 948.
, Vol. 1, No. 1, Article . Publication date: December 2019.
20
Oana Balalau, Carlos Castillo, and Mauro Sozio
[31] Charalampos Tsourakakis, Francesco Bonchi, Aristides Gionis, Francesco Gullo, and Maria Tsiarli. 2013. Denser Than
the Densest Subgraph: Extracting Optimal Quasi-cliques with Quality Guarantees. In KDD. 104 -- 112.
[32] Takeaki Uno.
2010.
An Efficient Algorithm for
Solving
Pseudo Clique.
(2010),
3 -- 16.
https://doi.org/10.1007/s00453-008-9238-3
[33] Andreas Weiler, Michael Grossniklaus, and Mh Scholl. 2014.
Identification and Tracking in So-
cial Media Streaming Data. Workshop Proceedings of the EDBT/ICDT 2014 Joint Conference (2014), 282 -- 287.
http://ceur-ws.org/Vol-1133/paper-46.pdf
Event
[34] Andreas Weiler, Marc H. Scholl, Franz Wanner, and Christian Rohrdantz. 2013. Event identification for local areas
using social media streaming data. Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks -
DBSocial '13 (2013), 1 -- 6. https://doi.org/10.1145/2484702.2484703
[35] Mark Weiler, Andreas, Grossniklaus, Michael and Scholl. 2015. Evaluation Measures for Event Detection Techniques
on Twitter Data Streams. Bicod (2015), 1 -- 157. https://doi.org/10.1007/978-3-319-20424-6
[36] Jianshu Weng and Bu-Sung Lee. 2011. Event Detection in Twitter. In International Conference on Weblogs and Social
Media.
[37] Yunyue Zhu and Dennis Shasha. 2003. Efficient Elastic Burst Detection in Data Streams. In Proceedings of the Ninth
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '03). ACM, New York, NY, USA,
336 -- 345. https://doi.org/10.1145/956750.956789
, Vol. 1, No. 1, Article . Publication date: December 2019.
|
1703.06988 | 1 | 1703 | 2017-03-20T22:19:22 | The Fake News Spreading Plague: Was it Preventable? | [
"cs.SI"
] | In 2010, a paper entitled "From Obscurity to Prominence in Minutes: Political Speech and Real-time search" won the Best Paper Prize of the Web Science 2010 Conference. Among its findings were the discovery and documentation of what was termed a "Twitter-bomb", an organized effort to spread misinformation about the democratic candidate Martha Coakley through anonymous Twitter accounts. In this paper, after summarizing the details of that event, we outline the recipe of how social networks are used to spread misinformation. One of the most important steps in such a recipe is the "infiltration" of a community of users who are already engaged in conversations about a topic, to use them as organic spreaders of misinformation in their extended subnetworks. Then, we take this misinformation spreading recipe and indicate how it was successfully used to spread fake news during the 2016 U.S. Presidential Election. The main differences between the scenarios are the use of Facebook instead of Twitter, and the respective motivations (in 2010: political influence; in 2016: financial benefit through online advertising). After situating these events in the broader context of exploiting the Web, we seize this opportunity to address limitations of the reach of research findings and to start a conversation about how communities of researchers can increase their impact on real-world societal issues. | cs.SI | cs | The Fake News Spreading Plague: Was it Preventable?
Eni Mustafaraj
Department of Computer Science
Wellesley College
Wellesley, MA, USA
[email protected]
Panagiotis Takis Metaxas
Department of Computer Science
Wellesley College
Wellesley, MA, USA
[email protected]
7
1
0
2
r
a
M
0
2
]
I
S
.
s
c
[
1
v
8
8
9
6
0
.
3
0
7
1
:
v
i
X
r
a
ABSTRACT
In 2010, a paper entitled "From Obscurity to Prominence
in Minutes: Political Speech and Real-time search" [8] won
the Best Paper Prize of the Web Science 2010 Conference.
Among its findings were the discovery and documentation
of what was termed a "Twitter-bomb", an organized effort
to spread misinformation about the democratic candidate
Martha Coakley through anonymous Twitter accounts. In
this paper, after summarizing the details of that event, we
outline the recipe of how social networks are used to spread
misinformation. One of the most important steps in such
a recipe is the "infiltration" of a community of users who
are already engaged in conversations about a topic, to use
them as organic spreaders of misinformation in their ex-
tended subnetworks. Then, we take this misinformation
spreading recipe and indicate how it was successfully used
to spread fake news during the 2016 U.S. Presidential Elec-
tion. The main differences between the scenarios are the use
of Facebook instead of Twitter, and the respective motiva-
tions (in 2010: political influence; in 2016: financial benefit
through online advertising). After situating these events
in the broader context of exploiting the Web, we seize this
opportunity to address limitations of the reach of research
findings and to start a conversation about how communi-
ties of researchers can increase their impact on real-world
societal issues.
Keywords
fake news; misinformation spreading; Facebook; Twitter;
Google
INTRODUCTION
1.
1.1 The Anatomy of a political Twitter-Bomb
It was January 15, 2010, when a group of nine Twit-
ter accounts, all created within an interval of 15 minutes,
with names such as "CoakleyAgainstU", "CoakleyCatholic",
etc. These were accounts with names starting with the
Figure 1: The journalist John Carney (at that time
with CNBC), received one of these "reply-tweets",
which he retweeted adding a comment expressing
his surprise, "<Wow! Political Tweetbots!–JC>",
because this was an unknown phenomenon at that
time on Twitter. Carney deleted the URL of the
original tweet.
name of the democratic candidate Martha Coakley who was
running in the Special Election for the Massachusetts U.S.
Senate seat. The newly minted accounts sent 929 tweets
addressed to 573 unique users in the course of 138 min-
utes. All the tweets contained a URL to the same website
http://coakleysaidit.com, (also registered on January 15,
2010), that showed video and audio from a speech by Martha
Coakley, taken out of context, to advance the false claim that
she is against the employment of Catholics in the emergency
room.
The nine accounts were sending a tweet per minute and
repeating more or less the same content a A¸S reasons to
be flagged as a spamming account. Twitter discovered the
automated tweets and consequently suspended all nine ac-
counts. Their existence and their misinformation attack
would have gone unnoticed had it not been for one fortunate
circumstance: we were collecting all tweets containing the
names a AIJcoakleya AI and a AIJbrown," for Martha Coak-
ley and Scott Brown respectively who were the two candi-
dates for the senate election, in real-time during the week
leading to the election. But, the tweets sent by these anony-
mous accounts were not simple tweets, they were so-called
"reply tweets", tweets directed to particular users. Why?
Because a new account on Twitter doesn't have any follow-
ers. Tweets sent by such an account will not be read by
anyone. Thus, addressing the tweets to a particular user
makes it likely that the tweet will be read. But to what
user do you send the tweet, out of the millions that are on
Twitter? This is when a common spamming technique on
Twitter comes in handy: reply to users who used certain
desired keywords in their tweets, that is, to users already
attuned to the topic. Our analysis of the recipients of these
"reply tweets" revealed that 96% of them had been tweeting
about the MA senate race in the four-hour interval between
the time the anonymous accounts were created and when
they started to send the "reply tweets". Almost 25% of the
users who received a tweet (143 out of 573) retweeted the
message. A screenshot from one of the retweets is shown in
Figure 1. We chose to show this tweet, because the user is
a well known journalist1 and experienced user who joined
Twitter on March 2007. His surprise at the message indi-
cates the novelty of this technique at the time. The retweets
had the effect that the followers of the retweeters were likely
exposed to the misinformation, which they would have not
seen otherwise. This is because the messages didn't include
hashtags, a common way to group together tweets about a
topic. Our estimation of the audience size, based on the fol-
lowers of the retweeters, amounted to 61,732 Twitter users.
1.2 A recipe for spreading misinformation on
Twitter
All the facts presented in the previous subsection were
part of [8]. What we didn't do in that paper was to summa-
rize our findings in an easily memorable recipe, which con-
tains the steps used by the propagandists in spreading their
misinformation on Twitter. We're providing this recipe for
the first time in this paper.
Step 1 Register a domain name for a new website,
for example: http://coakleysaidit.com
Step 2 Create anonymous accounts, for example:
Step 3
CoakleySaidWhat, etc.
Identify a community of users interested
in the topic, for example, the MA Senate
Election race.
Step 4 Target members of this community with
messages, for example, reply to users pro-
viding link to website.
Step 5 Wait for members of community to spread
message via retweets in their organic sub-
networks.
Table 1: A recipe for spreading misinformation on
Twitter via a "Twitter-Bomb".
Our discovery attracted the attention of both journalists
and other researchers. A team at Indiana University, headed
by Fil Menczer, developed Truthy 2, a system that collects
Twitter data to analyze discourse in near real-time [13]. In
addition, our team at Wellesley developed Twitter Trails 3, a
system that can be used to monitor the spreading of rumors
on Twitter [7]. This focus on Twitter is justified by the fact
that it provides APIs for researchers to collect and analyze
its data, as well as the public nature of conversations on
Twitter. Both these features are missing on Facebook (not
entirely, but they are severely limited), thus, only Facebook
employees are able to study them. As evidence, see [2].
Meanwhile, researchers not affiliated with the company have
almost no opportunities to study information spreading on
1John Carney, https://twitter.com/carney.
2Truthy, now known as OSoMe, http://truthy.indiana.edu
3TwitterTrails.com, http://twittertrails.com
Facebook, especially that of rumors, hoaxes, and recently
fake news, a topic to which we turn our focus now.
The term "fake news" refers to lies presented as news, that
is, falsehoods online formatted and circulated in such a way
that a reader might mistake them for legitimate news arti-
cles. "Fake news" has been around since ancient times, but
information technology has made it possible to produce and
consume it on a massive scale. Such articles appear on a vari-
ety of little known websites, then turn a profit by competing
for clicks as advertisements on social media sites. In order to
be successful in attracting user attention, they present a fake
story of political nature, religious nature, or anything with
an emotional appeal. Typically, fake news stories, which
may or may not have some remote connection to reality, are
planted on social media sites using provocative titles and
images. "Click bait" attracts the attention of unsuspecting
social media users who click on links to these stories think-
ing they are visiting a legitimate news site. These engaged
users are drawn in by the emotional appeal, while fake news
providers get a share of advertising money from each click.
1.3 Spreading Fake News on Facebook
After the surprise results of the 2016 U.S. Presidential
Election, the American media directed its ire at Facebook
and Google, as in this NY Times piece [20] written by the
Editorial Board, on November 19, 2016:
Most of the fake news stories are produced by
scammers looking to make a quick buck. The
vast majority of them take far-right positions.
But a big part of the responsibility for this scourge
rests with internet companies like Facebook and
Google, which have made it possible for fake news
to be shared nearly instantly with millions of
users and have been slow to block it from their
sites.
This criticism is only partly correct. Facebook had been
working toward fixing (or containing) the spread of hoaxes
on the site at least since January 2015, almost two years be-
fore the election [12]. They defined a hoax as a form of News
Feed spam report that includes scams ("Click here to win a
lifetime supply of coffee"), or deliberately false or mislead-
ing news stories ("Man sees dinosaur on hike in Utah"). As
we can notice from this definition, in 2015, the phrase "fake
news" wasn't being applied yet to the kind of false stories
that flooded Facebook in the weeks before the election.
However, since it was difficult for independent researchers
to know the extent to which Facebook users were affected
by this issue, everything continued more or less as before,
and Facebook was alone in its fight. This changed in early
2016, when the online publication BuzzFeed took an interest
on Facebook's unsuccessful efforts to deal with the problem.
In an article published in April 2016, BuzzFeed proclaims:
"it is the golden age of fake news" [5]. The article reveals
that BuzzFeed had conducted a study of fake news that was
spreading via nine known fake news sites such as the Na-
tional Report, Huzlers, or Empire News, using the services
of the company Crowdtangle, specialized in measuring so-
cial engagement. The findings revealed that while traffic
for these sites had gone down for a while during 2015, in
early 2016, it had started picking up again. The article also
interviewed Allen Montgomery – a fake identity for Jestin
Coler, the creator of a factory of fake news websites, as [19]
Figure 3: Screenshot from Google search results
about Donald Trump on Jan 23, 2017. In addition to
the many sections to the page (such as the "featured
snippet" on the right column), notice how the tweets
shown above the fold belong to Trump himself.
(and others on the same topic), we noticed the clear similar-
ities to the process that lead to the Twitter-bomb against
Martha Coakley in 2010. In fact, we are able to map the
steps in the two recipes one to one, as shown in Table 2.
Step 1 Register web domains for lots of related
websites, with catchy names such as:
http://TrumpVision365.com, see [17].
Step 3
Step 2 Create Facebook accounts of fictitious
people, e.g, Elena Nikolov or Antonio
Markoski, see [18].
Identify and join a Facebook group about
a political candidate, e.g., "Hispanics for
Trump" or "San Diego Bernicrats", see [18].
Step 4 Target members of the Facebook group
with posts, by linking to the fake news
website stories, see [18].
Step 5 Wait for members of the group to spread
the fake news in their organic subnetworks,
by sharing and liking it.
Table 2: The recipe for spreading "fake news" on
Facebook in the wake of the 2016 U.S. Presidential
election.
It contains the same steps as the recipe
shown in Table 1.
Figure 2: Screenshot from Google search results
about Martha Coakley on Jan 12, 2010. Notice in
highlighted red, the tweets attacking Coakley. This
was a finding from [8] on how Google was inadver-
tently giving premium space to political propagan-
dists, in an effort to have "fresh" and relevant search
results.
revealed after the election. Coler's interview reveals some of
the tricks of the trade of fake news, and points out why he
believes he can win over Facebook:
Coler believes Facebook is fighting a losing
battle, doomed to fail no matter what it does.
"They can shut down National Report. Of course
they can do that," he said. "But I could have 100
domains set up in a week, and are they going to
stop every one of those? Are they now going to
read content from every site and determine which
ones are true and which ones are selling you a lie?
I don't see that happening. That's not the way
that the Internet works." [19]
Despite this sounding of alarm bells by BuzzFeed (as early
as April 2016), things got only worse with fake news on Face-
book. We counted at least 25 articles published on the topic
of fake news from April to November 2016 on BuzzFeed,
culminating with the story of "How teens in the Balkans
are duping Trump supporters with fake news", published on
November 3, 2016 and followed up by the related piece on
"How Macedonian spammers are using Facebook groups to
feed you fake news". These two articles provide details about
one of the fake news factories operated by young people in
the small town of Ceres, Macedonia, that targeted Facebook
users in the United States. After reading these news articles
This similarity should not be surprising. Once a spam-
ming technique has been proven successful, it is easily repli-
cated, since the knowledge about its working is also shared
on the Internet. What should surprise and worry us is the
fact that researchers and web platform developers may also
know about such techniques, but they do little to warn and
educate the public of the consequences. It is also unfortu-
nate that tech companies who have been used to facilitate
this practice, do not act pro-actively or effectively in stop-
ping it. As an example of ineffective action we refer to the
way Facebook handled the accusation that its news verifica-
tion was not balanced. We discuss it in a next section.
2. FROM PROPAGANDA TO FAKE NEWS
We should not give the reader the impression that on-
line propaganda started with Twitter-bombs or Facebook
fake news. In fact, it is much older than Social Media, it
is as old as the Web itself. However, before the develop-
ment of search engines it was not easy for propaganda to
discover you. Search engines made it easy for propagandists
to spread their message using techniques we now call Web
Spam [6]. Advertisers, political activists and religious zealots
of all kinds have been busy modifying the structure of the
Web in an effort to promote their own biased results over
the organic, unbiased results. The Search Engine Optimiza-
tion (SEO) industry has grown out of this effort, sometimes
using unethical techniques to promote their message, and
search engines have been continuously evolving to fend off
these attacks.
In much of the first decade of the new millennium, search
engines tried to defend against Web Spam, but the spam-
mers were successful in circumventing their defenses by using
first "Link Farms" and later "Mutual Admiration Societies",
collections of web sites that would intentionally link to each
other in order to increase everyone's PageRank [6]. Even
when Google was reportedly using up to 200 different sig-
nals to measure quality [14], professional SEOs would man-
age to get sites like JC Penney's at the top of search results
[15]. Google's ingenious solution to the problem of "unfair
competition for high placement on a page" was the introduc-
tion of the advertising model of AdWords and AdSense that
gave spammers an opportunity to make money while follow-
ing rules. That seemed to work for a while. However, these
financial incentives were so lucrative that they provided a
reason for anyone to have a presence on the Web, especially
if that Web presence managed to attract clicks and thus,
ad dollars. This led to "click bait" and to the creation of
ads masquerading as outrageous (fake) news stories, as we
discussed in the previous section.
But as Search Engines and Social Media evolve, so do the
propagandistic techniques. The rise of three recent methods
of spamming in the wake of the U.S. presidential elections,
"fake news", "featured snippets" manipulation [4], and "auto-
completion revelations" [3] are the latest chapters in spread-
ing propaganda through search engines and social media so
that it will find you. As a community of researchers we need
to embrace the challenge of documenting and understand-
ing these phenomena as well as finding ways to make these
issues known to the platforms providers. Journalists and
non-specialists also need to be informed, as they sometimes
give credence to conspiracy theories, confusing the public
[21].
3. RESEARCH THAT INFORMS DESIGN
It is important for researchers, journalists and web users
to continue to pay attention to the information and misinfor-
mation they encounter on the Web, be it on Google, Twitter,
or Facebook. In this section, we discuss how research results
and their publicizing lead over time to changes in the design
features of these systems, addressing the exhibited weak-
nesses.
3.1 The Evolution of Real-Time Search Re-
sults
The central finding that gave the title to [8] was the ma-
nipulation of Google real-time search results through repe-
tition of Twitter posts by accounts (real users or bots) sup-
porting a particular candidate. In December 2009 (just one
month before the MA special election for the U.S. Senate
seat in 2010), Google followed Bing in introducing "real-
time search results", placing social media messages in one of
the top positions search results for a relevant search query.
These messages came mostly from Twitter, which had an
easy-to-use API to pull the tweets. Tweets appearing in
the search results were those that had been recently posted.
That created the opportunity for political propagandists to
exploit the search rankings creating a Twitter-enabled Google
Bomb. As we documented in our paper, the manipulators
were repeating the same messages, something also allowed
by Twitter, over and over to increase the volume of conver-
sation about a particular topic and keep it fresh for search
engines to include in their real-time results. Repetition of
a message would be annoying to the propagandist followers,
but the target was not their followers' feed; it was Google
and Bing, and through them, the public.
We can see these highly-placed tweet messages from ran-
dom Twitter accounts in a screen shot for Martha Coakley's
search results, taken in January 2010 (Figure 2). During
2010, Google eventually recognized that giving anonymous
social media accounts a premium spot in its search results
was not in line with its goals for reliable information and for
a few years this feature disappeared. However, it has come
back again, but in a different format: when searching for a
person, it will pull up tweets from their timeline, as opposed
to tweets about them, as exemplified in Figure 3. This is
a great improvement, because it prevents actors who have
an interest to promote their adversarial messages about an
individual or product to receive an unearned spot at the top
of the search results.
3.2 The Evolution of Retweeting
In [8], we included the following observation at the end of
Section 4:
Our experiments with Google real-time search
have shown that, even though Google doesn't dis-
play tweets from users that have a spammer sig-
nature, it does display tweets from non-suspected
users, even when these are retweets coming from
spammers. Thus, simply suspending spamming
attacks is not sufficient. There should be some
mechanism that allows for retroactively deleting
retweets of spam and some mechanism that la-
bels some Twitter users as enablers of spam.
At that time (in 2010), Twitter didn't have an easy way
to quote a tweet and it allowed users to edit the original
tweet text when retweeting, as the tweet shown in Figure 1
indicated. That design feature turned out to be very prob-
lematic, among others for the reason mentioned in the quote
above: deleted spam tweets lived in the retweets of other
Twitter users. However, it was also problematic because
users often were purposefully changing the meaning of the
text they were retweeting [10]. Most of this re-purposing was
possible via third-party applications that were very popular
in the early years of Twitter. These applications were shut
down over the years and nowadays Twitter doesn't allow the
editing of a tweet that is being retweeted. Additionally, if
the original is deleted, the retweet is also deleted, while in
a quoted retweet, the text "This tweet is unavailable." will
4. DISCUSSION
What is the moral of the story? In the past, researchers
were the ones discovering and documenting the misuse and
abuse of socio-technical platforms by the hands of dubious
actors with dubious agendas. [8] is only one such example.
However, our discovery was possible only because we were
collecting data in real-time, after having noticed some evi-
dence of foul play. When we think about Twitter's approach
to combating spammers,
it seems reasonable that tweets
created by misinformation-spreading accounts are automat-
ically deleted and retracted from the entire network, once
the accounts are suspended. However, the downside of such
an approach is that it makes it impossible for researchers
and fact-checkers to go back in time and study the origin of
misinformation campaigns and the mechanism for spreading
them. That is a severe limitation to research. The problem
becomes even more pronounced in the content of fake news
spreading on Facebook. Most Facebook groups are private
and if they are the source for starting certain cascades of
fake news, outside researchers cannot observe them in their
early stages, missing crucial information that would lead to
their understanding.
Thus, it is not surprising that in the current situation
created by the fake news plague, researchers didn't play a
leading role in their discovery. It were journalists and not
researchers in academia or Facebook and Google who raised
concerns, but were not heard. This is worrisome. Facebook,
by replacing humans with algorithms, has played a crucial
role in fueling the fake news spreading phenomenon. Simi-
larly, the ease with which Google enables earning ad money
for page impression provided the financial incentives for the
creation of the fake news industry.
In light of what we know so far, here is our open ques-
tion to the research communities interested in information
retrieval:
in the context of the now omnipresent, web-based,
socio-technical systems such as Facebook, Google,
and Twitter, what tasks should be performed by
humans and what tasks by algorithms?
Our communities should lead the way in providing answers
to this question.
5. REFERENCES
[1] S. Frenkel. Renegade facebook employees form task
force to battle fake news. BuzzFeed,
http:// bzfd.it/ 2mITL31 , 2016-11-14.
[2] A. Friggeri, L. Adamic, D. Eckles, and J. Cheng.
Rumor Cascades. In Proc. of ICWSM, 2014.
[3] Q. Hardy and M. Richtel. Don't ask? internet still
tells. New York Times, http:// nyti.ms/ 2nyWnSx ,
year = 2012-11-21.
[4] A. Jeffries. Google's featured snippets are worse than
fake news. The Outline, http:// bit.ly/ 2n5vgB2 ,
2017-03-05.
[5] A. Kantrowitz. Facebook wanted a fight against fake
news. it got one. Facebook Newsroom,
http:// bzfd.it/ 2nLCmsl , 2015-01-20.
[6] P. Metaxas. Web Spam, Social Propaganda and the
Evolution of Search Engine Rankings. Lecture Notes
BIP, Springer-Verlag, 2010.
Figure 4: Facebook recently moved into implement-
ing a system of warning towards sharing news items
that have been disputed.
show in place of the deleted tweet.
3.3 The Evolution of Fake News on Facebook
The proliferation of fake news on Facebook achieved new
levels once Facebook made a big change in how its algorithm
for the Trending News feature worked. Before August 2016,
when this change took effect, the Trending News feature was
being curated by human editors, who filtered out unreliable
sources and chose neutral or balanced sources for breaking
news stories. However, when the online tech blog Gizmodo
posted an article in May 2016 [11], in which former employ-
ees of the Trending News lamented anti-conservative bias,
Facebook reacted hastily and clumsily. Worried about po-
tential lawsuits for suppressing freedom of speech, it fired
its team of human editors and replaced them with Machine
Learning algorithms. Given their prior research on rumor
cascades on facebook [2] one would expect that technical
experts had a better understanding on the limitations of AI
algorithms, but maybe they were not involved in the deci-
sion [1]. It didn't take long after that change for fake news to
start achieving Trending News status, as BuzzFeed reported
on August 30, 2016 [16]. Despite BuzzFeed's relentless re-
porting on the fake news plague throughout the pre-election
season, the rest of the media and the public didn't tune in
into this conversation until after the election.
Facebook initially disputed that it had a fake news prob-
lem, claiming that it accounts for only 1% of the news sto-
ries. However, the company changed course under the in-
creased and sustained public pressure and introduced new
features in its interface and the algorithms to address the
issue [9].
One important feature that has rolled out recently is the
labeling of news posts as "Disputed" via fact-checking, third-
party providers such as Snopes or PolitiFact. The screens
hot in Figure 4 is an example of this feature in action. In
addition to adding this label, Facebook warns users with an
alert box before they try to share a disputed story, but they
are still allowed to share [9].
It remains to be seen how this new feature will affect fake
news spreading. Again, access to Facebook data that could
allow independent researchers to evaluate the effectiveness
of such interventions. Without it, our understanding of
changes in human behavior correlated with or caused by
changes in the socio-technical platforms they inhabit, will
be limited. This is a reason of concern for our research com-
munities.
[7] P. T. Metaxas, S. Finn, and E. Mustafaraj. Using
twittertrails.com to investigate rumor propagation.
CSCW'15 Companion, http://bit.ly/2n1CkMH, pages
69–72, 2015.
[8] P. T. Metaxas and E. Mustafaraj. From obscurity to
prominence in minutes: Political speech and real-time
search. In Proceedings of the WebSci10: Extending the
Frontiers of Society On-Line, http:// bit.ly/ 2n1IEUC ,
April 2010.
[9] A. Mosseri. News feed fyi: Addressing hoaxes and fake
news. Facebook Newsroom, http:// bit.ly/ 2mzv8pe,
2016-12-15.
[10] E. Mustafaraj and P. T. Metaxas. What edited
retweets reveal about online political discourse. In
AAAI Workshop on Analyzing Microtext,
http:// bit.ly/ zWSeMF , 2011.
[11] M. Nunez. Former facebook workers: We routinely
suppressed conservative news. Gizmodo,
http:// bit.ly/ 2ngF2k5 , 2016-05-09.
[12] E. Owens and U. Weinsberg. News feed fyi: Showing
fewer hoaxes. Facebook Newsroom,
http:// bit.ly/ 2mBUnIF , 2015-01-20.
[13] J. Ratkiewicz, M. Conover, M. Meiss, B. Goncalves,
S. Patil, A. Flammini, and F. Menczer. Truthy:
Mapping the spread of astroturf in microblog streams.
In WWW'11, 2011.
[14] Google Keeps Tweaking Its Search Engine, 2007.
URL: http://nyti.ms/2n5JjGx [accessed: 2007-06-03].
[15] D. Segal. The dirty little secrets of search. New York
Times, http:// nyti.ms/ 2nXfSE0 , 2012-02-12.
[16] C. Silverman. Facebook must either innovate or admit
defeat at the hands of fake news hoaxsters. BuzzFeed,
http:// bzfd.it/ 2nMvfia, 2016-08-30.
[17] C. Silverman and L. Alexander. How teens in the
balkans are duping trump supporters with fake news.
BuzzFeed, http:// bzfd.it/ 2mC6tBm, 2016-11-03.
[18] C. Silverman and L. Alexander. How macedonian
spammers are using facebook groups to feed you fake
news. BuzzFeed, http:// bzfd.it/ 2mzvCM0 , 2016-11-08.
[19] L. Sydell. We tracked down a fake-news creator in the
suburbs. here's what we learned. NPR,
http:// n.pr/ 2nuHN1T .
[20] The Editorial Board. Facebook and the digital virus
called fake news. New York Times, 2016-11-19.
[21] C. Timberg. Could google rankings skew an election?
new group aims to find out. Washington Post,
http:// wapo.st/ 2mNa0wY , 2017-03-14.
|
1707.03608 | 1 | 1707 | 2017-07-12T09:11:58 | A Probabilistic Embedding Clustering Method for Urban Structure Detection | [
"cs.SI",
"physics.soc-ph"
] | Urban structure detection is a basic task in urban geography. Clustering is a core technology to detect the patterns of urban spatial structure, urban functional region, and so on. In big data era, diverse urban sensing datasets recording information like human behaviour and human social activity, suffer from complexity in high dimension and high noise. And unfortunately, the state-of-the-art clustering methods does not handle the problem with high dimension and high noise issues concurrently. In this paper, a probabilistic embedding clustering method is proposed. Firstly, we come up with a Probabilistic Embedding Model (PEM) to find latent features from high dimensional urban sensing data by learning via probabilistic model. By latent features, we could catch essential features hidden in high dimensional data known as patterns; with the probabilistic model, we can also reduce uncertainty caused by high noise. Secondly, through tuning the parameters, our model could discover two kinds of urban structure, the homophily and structural equivalence, which means communities with intensive interaction or in the same roles in urban structure. We evaluated the performance of our model by conducting experiments on real-world data and experiments with real data in Shanghai (China) proved that our method could discover two kinds of urban structure, the homophily and structural equivalence, which means clustering community with intensive interaction or under the same roles in urban space. | cs.SI | cs | A Probabilistic Embedding Clustering Method for Urban Structure Detection
Xin Lina,b, Haifeng Lib*, Yan Zhangb, Lei Gaob, Ling Zhaob, Min Dengb
a School of Civil Engineering, Central South University, Changsha, China
b School of Geosciences and info-physics, Central South University, Changsha, China
Commission IV, WG IV/3
KEY WORDS: Urban Structure, Embedding, Clustering Method, Probabilistic Model, Feature Representation
ABSTRACT:
Urban structure detection is a basic task in urban geography. Clustering is a core technology to detect the patterns of urban spatial
structure, urban functional region, and so on. In big data era, diverse urban sensing datasets recording information like human
behaviour and human social activity, suffer from complexity in high dimension and high noise. And unfortunately, the state-of-the-
art clustering methods does not handle the problem with high dimension and high noise issues concurrently. In this paper, a
probabilistic embedding clustering method is proposed. Firstly, we come up with a Probabilistic Embedding Model (PEM) to find
latent features from high dimensional urban sensing data by "learning" via probabilistic model. By latent features, we could catch
essential features hidden in high dimensional data known as patterns; with the probabilistic model, we can also reduce uncertainty
caused by high noise. Secondly, through tuning the parameters, our model could discover two kinds of urban structure, the
homophily and structural equivalence, which means communities with intensive interaction or in the same roles in urban structure.
We evaluated the performance of our model by conducting experiments on real-world data and experiments with real data in
Shanghai (China) proved that our method could discover two kinds of urban structure, the homophily and structural equivalence,
which means clustering community with intensive interaction or under the same roles in urban space.
1. INTRODUCTION
Urban structure detection is a basic task in urban geography,
beneficial to urban planning, government management and so
on (Bourne, 1963). In big data era, there are diverse urban
sensing data to describe the city on different preservatives.
Those data help us analysis and understand the process of urban
structure in some aspects, such as urban functional regions
(Yuan et al., 2012), socioeconomic environment (Liu et al.,
2015), and sentiment computing (Xue et al., 2014). How to
uncover the urban structures and discover patterns behind
massive human behave data in unbans is vital. Clustering is one
of core technique which utilizes the similarity between samples
in a dense and short representation.
From a large body of clustering techniques (spectral clustering
method (Luxburg, 2007; Ng et al., 2001), hierarchical clustering
method (Rokach and Maimon, 2005), Fuzzy Clustering (Bezdek
et al., 1984; Gustafson and Kessel, 1978), self-organization
mapping (Kohonen and Honkela, 2007), etc.), it derives many
relative works in urban structure exploration. For example,
spectral clustering has already been used with success in urban
land segmentation with social media data (Frias-Martinez and
Frias-Martinez, 2014; Noulas et al., 2011); Hierarchical
clustering method has been adopted to model urban structure
with commuting flow data (Fusco and Caglioni, 2011); Google
word2vec model also has been utilized to discover spatial
distribution of urban land use with the data of points of interest
(POI) (Yao et al., 2016).
However, some of the state-of-the-art clustering methods are
expensive for large real-world networks since they invlove
* Corresponding author: [email protected]
eigendecomposition of the appropriate data matrix. Secondly,
most of the methods rely on a rigid notion of a network
neighbourhood, which fails to allow a flexible algorithm for a
network mixed by complex structures (Tang and Liu, 2011).
Moreover, the noise in real-world data calls for a robust
algorithm. Consequently, facing
the complexity in high-
dimensional data, the key problem is how to find a compact and
expressive feature, i.e. an embedding representation in low
dimension feature space from a high-dimensional data space.
And the approach needs to be flexible and robust.
In this paper, we proposed a probabilistic embedding clustering
method to meet the need. Our contributions are listed as
following.
Firstly, we proposed a Probabilistic Embedding Model (PEM)
to learn embedded representation of high dimensional urban
sensing data. With the probabilistic model, we can reduce
uncertainty caused by high noise and high dimension. Then, by
the representations, we do clustering and could catch essential
features hidden in the data known as patterns of urban structure.
Secondly, our model could discover two kinds of urban
structures, the homophily (Fortunato and Santo, 2010; Hoff et
al., 2002) and structural equivalence (Henderson et al., 2012).
The homophily contains nodes with intensive interaction or
belonging to similar communities, while structural equivalence
includes nodes having the same roles in urban structure.
The rest of the paper is structured as follows. We present the
details of our method in Section 2. In Section 3, we evaluate the
clustering performance of our method by conducting
everything else, but near things are more related than distant
things" (Tobler, 1970). To determine the neighborhood, PEM
uses a biased random walk of 2nd order Markovian. It defines
two types of search strategies, the breadth-first search (BFS)
(Kurant et al., 2010; Skiena, 2008) and the depth-first search
(DFS) (Tarjan, 1972). BFS samples immediate neighbors of the
source node while DFS samples neighbors sequentially at
increasing distances from the source node. The strategies are
controlled by hyperparameters p and q.
Figure 1. Urban data matrix (a): information of parcels is stored
in arrays and thus the urban data matrix is formed. There are 2
types of urban data matrix. One is to describe intrinsic
properties of parcels (b) and the other one is to describe the
interaction among parcels (c).
Given a source node t, and that the walk just sampled the node v
as the neighbour and is now carrying out its next step, the
biased random walk works as Figure 2 and it shows how
hyperparameters p and q drive the walk.
Figure 2. Illustration of the biased 2nd random walk procedure
in node2vec: It shows that how hyper-parameters p and q guide
the walk between BFS and DFS.
there
Besides the hyperparameters, there are also other global
parameters involved in the random walk and effective in the
clustering results (Table 1). Unfortunately,
is no
systematic study investigating the effects of parameters and
hyperparameters on clustering and coming up with well-
justified rules of thumb. As a general recommendation, we
suggest to set p to a lower value and q to a higher value for BFS
while set p to a higher value and q to a lower value for DFS. If
you want to balance the walk between BFS and DFS, a low q
and a low p (a high q and a high p) are recommended. When (p,
q) = 1, the random walk is just driven by the weights in SRG.
Other parameters are suggested to be set higher for a more
experiments on real-world data, including parameter sensitivity
and perturbation analysis. In Section 4, we carry on a case study
in Shanghai as an example for the detection urban structure. In
Section 5, we conclude our work and illuminated some
directions for future works.
2. PROBABILISTIC EMBEDDING CLUSTERING (PEC)
METHOD
In this section, we will present the details of our method, the
Probabilistic Embedding Clustering (PEC) Method. PEC is
based on the algorithm, Node2vec (Grover and Leskovec, 2016),
which is initiated to learn continuous feature representations for
nodes in networks. By extending the meaning of networks
(directed and weighted) and combining with a clustering
method, we have developed the node embedding method into a
general embedding-clustering method without changing its
basic idea. There are three components of PEC method: (1)
Construction of Space Relation Graph (SRG), (2) Probabilistic
Embedding Model (PEM), (3) Clustering. We would discuss
each of these in detail in the remaining part.
2.1 Construction of Space Relation Graph (SRG)
When recording the information of a city, we are used to divide
the city into spatial parcels and the data stream is transformed to
a set of arrays which describe the features of each parcel (Figure
1(a)). As known, the features could be intrinsic properties, like
the size, population, number of Point of Interests (POIs) and so
on (Figure 1(b)), but also the interaction with other parcels, like
orientation-destination flow (Figure 1(c)). The set of arrays is
called Urban Data Matrix. With such a matrix, we aim to find
urban structure.
In essence, the goal requires us to summarize the similarity or
dissimilarity among different parcels according to their features.
Thus, we proposed the Space Relation Graph (SRG). In the
graph, each node presents the parcel of the city and each edge
denotes the relationship between parcels. As the features, the
relationship could represent for the similarity of intrinsic
properties among parcels (SRG-I), but also the degree of
interaction among parcels (SRG-II). The only restriction is that
the graph ought to be undirected.
For SRG-I, we measure the similarity by pairwise distance or
other similarity function, such as Euclidean distance, cosine
distance or Gaussian similarity function. While for SRG-II,
since it is naturally a network, we simply normalize the pairwise
interaction volume as the weight of edges.
2.2 Probabilistic
Hyperparameters
Embedding Model
(PEM) &
After obtaining SRG, we learn a probabilistic embedding
representation (PER) for each node based on Node2vec(Grover
and Leskovec, 2016) which is to maximize the likelihood of
preserving network neighbourhoods of nodes and learn a
mapping of nodes to a low-dimensional space for obtaining
feature representations. PER is such a feature representation
existing in a low-dimensional space for each node.
The basic idea of PEM is utilizing the relationship between a
node and the neighbours of it to represent the node itself. A
fundamental hypothesis is the representation of a node in a
network should be decided by its neighbourhood. The idea is
similar to the Tobler's First Law, "Everything is related to
accurate clustering result. It would saturate around some values
definitely but no firm theoretic ground is proposed towards
various networks. All
these recommendations would be
examined in Section 3.
Parameters
Definition
d
l
r
k
Number of dimensions of the embedding
vector for feature representation.
Walk length which determines the length of
sampling from a source node.
Number of walks which denotes the times
of sampling from a source node.
Neighbourhood size which restricts the size
of neighbourhood.
Table 1. Global parameters involved in the biased random walk:
Setting them to higher values would help obtain a more accurate
clustering result.
2.3 Clustering
We use k-means algorithms on PER to get final results.
Speaking from experience, when adopting BFS (p≤1, q>1), we
could uncover the community where the subjects have intensive
interaction, named as homophily. While with DFS (p≥1, q<1),
we could divide the subjects into a hierarchical pattern where
the subjects play the same role within a grade, named as
structural equivalence. The two types of structure make great
sense in urban space: The homophily could help describe the
phenomenon of spatial separation and the structural equivalence
is conducive to find the urban hierarchy.
Though the search strategy and other parameters influences the
detection of urban structure, the network itself restricts the
detection. For example, for SRG with actual interaction, we are
likely to find the homophily and structural equivalence. For
SRG with virtual similarity between the property like functions
of places, we utilize BFS mainly to explore the urban functional
regions.
To determine the number of clusters, we use several clustering
criteria: Davies-Bouldin index (Davies and Bouldin, 1979),
Dunn index (Dunn, 1973), Silhouette index (Rousseeuw, 1987)
and so on. Of course, other clustering criteria is welcomed as
well. In certain cases, the number of clusters could be also
decided by priori knowledge.
3. EVALUATION
In this section, we mainly evaluate the performance of our
method on a real-world network, Metro Line Network in
Shanghai (China), including parameter sensitivity, perturbation
analysis and so on.
3.1 Experimental Setup
Dataset: Line 1 to 11 of Shanghai metro network are used in
this section and we transformed the metro line network in
Shanghai to an urban data matrix in this way: if the two subway
stations
are connected directly, the pairwise distance is
and
denoted as 1. Otherwise, we regard the distance is infinitely big.
Thus, the connection among subway stations is used to
represent the stations themselves. Here, SRG is equal to the data
matrix.
3.1.1 Dataset: Line 1 to 11 of Shanghai metro network are
used in this section and we transformed the metro line network
in Shanghai to an urban data matrix in this way: if the two
are connected directly, the pairwise
subway stations
and
distance is denoted as 1. Otherwise, we regard the distance is
infinitely big. Thus, the connection among subway stations is
used to represent the stations themselves. Here, SRG is equal to
the data matrix.
3.1.2 Ground-truth: The metro line network is mixed with
homophily and structural equivalence. With using SRG of
metro line network in the way mentioned above, it is much
easier to discover the structural equivalence. The network only
has a hierarchy of two levels: transfer station or not. Thus, the
number of clusters (n) are taken as 2 and the corresponding
ground-truth have two kinds of labels marking transfer station
or not. For another thing, the homophily definitely means
clusters with subway stations on the same line. Thus, the
number of clusters are taken as 11 and the corresponding
ground-truth has 11 unique labels marking which line the
subway station is on. With using this SRG, it needs to catch
information at a larger neighbourhood for obtaining structure of
homophily.
3.1.3 Comparison groups: Our experiments evaluate the
embedding vectors obtained by PEM on clustering. For the task,
we compare the performance of PEM with that of the following
clustering algorithms:
Spectral clustering (SC) (Frias-Martinez and Frias-Martinez,
2014; Luxburg, 2007): SC is a clustering method which also
construct a similarity graph at first. However, it is a naturally
factorization approach where we take the top d eigenvectors of
the normalized Laplacian matrix of the graph as the embedding
vector for nodes. And then it uses k-means to do clustering.
Hierarchical clustering analysis (HCA) (Fusco and Caglioni,
2011; Rokach and Maimon, 2005): HCA is a clustering method
which seeks to build a hierarchy of clusters. There are 2 types of
strategies: Agglomerative (a bottom-up approach merging
observations from each one) and Divisive (a top-down approach
dividing the observations from one cluster). Here, we adopt
Agglomerative HCA.
All the experiments would be repeated 20 times (if possible)
and the average is taken as the final results.
3.2 Hyperparameters
We regard that BFS and DFS are guided by hyperparameters p
and q and thus influence whether the detected result of urban
structure is homophily or structural equivalence. We now
empirically show this phenomenon. The other parameters are
set as d=5, l=10, r=10 and k=5.
As mentioned in Section 3.1.2, we could deduce that adopting
BFS helps discover the structural equivalence (when n=2) while
using DFS helps find the homophily (when n=11) in this
network. Figure 3 shows that when the search strategy is more
inclined to BFS (p<1 or q >1), Macro-F1 scores of structural
equivalence get higher and when the search strategy is more
inclined to DFS (p>1 or q<1), Macro-F1 of homophily get
higher. Additionally, with most settings of hyperparameters,
PEM outperforms SC and HCA in both cases. Thus, it proves
that PEM is flexible, which is able to discover different kinds of
structure through tuning hyperparameters. And it is also
accurate when the values of p and q is proper.
Figure 3. Changes of Macro-F1 versus hyperparameters p and q:
when the search strategy is more inclined to BFS (p<1 or q >1),
Macro-F1 scores of structural equivalence get higher and when
the search strategy is more inclined to DFS (p>1 or q<1),
Macro-F1 of homophily get higher. Additionally, with most
settings of hyperparameters, PEM outperforms SC and HCA in
3.3 Parameter Sensitivity
both cases.
PEM involves a set of parameters and we examine the
recommendations about how to choose the parameters in
Section 2.2. Here, the basic parameters are set as d=5, l=10,
r=10, k=5 and the hyperparameters are set as p=4, q=1. The
influences of parameters on the detection of homophily and
structural equivalence in this network are shown as Figure 4.
As seen in Figure 4, the overall effect of parameters is positive:
Macro-F1 scores are on the rise despite the fluctuations. It is
also could be seen that the parameters have little effect on the
results when n=2. As mentioned above, when p=4 and q=1, it's
DFS guiding the random walk and we are likely to discover
structure of homophily in this network. Thus, under the
significant influence of hyperparameters, it is reasonable that
Macro-F1 scores are not hardly affected by the parameters when
n=2 while Macro-F1 scores rise obviously. Among
the
parameters, k has a significant influence on the clustering, and d
as well as r follows. The influence of l is limited.
3.4 Perturbation Analysis
Since many real-world datasets co-exists with uncertain noise,
we perform a perturbation study where we added noise data.
The distribution of noise obeys Gaussian distribution Ν(0,σ2) (σ
∈ (0.2,0.5,1,2,4)) and Poisson distribution P(λ)
(λ ∈
(1,2,4,8,16)) respectively and the value of created noise
matrices is processed into [0, 1]. The experimental results are
shown as following. It could be seen that Macro-F1 scores
change little whatever the distribution of noise is. Thus, PEM is
proved to be able to handle the problem with high noise.
4. CASE STUDY: URBAN STRUCTURE IN
SHANGHAI USING TAXI TRAJECTORY DATA
4.1 Experimental Setup
Figure 4. Parameter Sensitivity: the overall effect of
parameters is positive: Macro-F1 scores are on the rise
despite the fluctuations1.
Figure 5. Perturbation analysis: The steady Macro-F1 results
show that PEM could handle the problem with high noise
Figure 6. The studied area: We take the central area within the
outer ring of Shanghai as the studied area and divide the area
into 4422 uniform grids whose size is 500m×500m.
4.1.1 Dataset: We use the dataset containing trajectories of
over 160 million records created by more than 4,000 taxis from
December 2nd to December 5th in 2013 (a four-day pattern).
Derived from the trajectory datasets, we obtain the orientation-
destination matrix about 4422 grids.
The studied area: We take the central area within the outer ring
of Shanghai as the studied area and divide the area into 4422
uniform grids whose size is 500m×500m (Figure 6).
1 Since the accurate values of experimental results are not
repeatable, the Macro-F1 scores have a little difference. But the
trends reflected by the experiments are provable.
0.247
0.147
0.165
0.413
0.021
ACKNOWLEDGEMENTS
5. CONCLUSION AND FUTURE WORKS
structure
through
tuning hyperparameters
Through the evaluation on the real-world network (the metro
line network in Shanghai, China), PEM is flexible to explore
urban
and
outperforms Spectral Clustering and Hierarchical Clustering
Analysis with proper settings of parameters. In usual, when p is
lower or q is higher, it is inclined to adopt BFS. In contrast, it is
inclined to adopt DFS. In different networks, BFS (or DFS)
would find different type of structure. While in general, the
influence of parameters (dimension d, walk of length l, number
of walks r and context size k) have a positive influence on the
accuracy. Additionally, the perturbation analysis verifies that
PEM is able to learn feature presentations for nodes and do
clustering under high dimension and high noise.
Based on the study, with the taxi dataset in Shanghai, we
utilized PEM to explore the structure of region distributions
successfully. However, to improve the theory and method, there
is still a long way to go.
In the future work, we would add more experiments with
different urban sensing data and other 2vec models and fully
utilize the flexibility of PEM to explore urban structure. And
the systematic study of setting parameters and link with other
theories would be extended.
This research has also been supported by National Natural
Science Foundation of China (41571397 and 41501442) and
Natural Science Foundation of Hunan Province (2016JJ3144) .
This research has also been supported in part by the Open
Research Fund Program of Shenzhen Key Laboratory of Spatial
Smart Sensing and Services (Shenzhen University), and the
Scientific Research Foundation for the Returned Overseas
Chinese Scholars, State Education Ministry (50-20150618).
REFERENCES
Bezdek, J.C., Ehrlich, R., Full, W., 1984. FCM: The fuzzy c-
means clustering algorithm. Computers & Geosciences 10, 191-
203.
Bourne, L.S., 1963. Internal structure of the city : readings on
urban form, growth, and policy. Historian 26, 1–18.
Davies, D.L., Bouldin, D.W., 1979. A Cluster Separation
Measure. IEEE Computer Society.
Dunn, J.C., 1973. A fuzzy relative of the ISODATA Process
and Its Use in Detecting Compact Well-Separated Clusters.
Journal of Cybernetics 3, 32-57.
Fortunato, Santo, 2010. Community detection in graphs.
Physics Reports 486, 75-174.
Frias-Martinez, V., Frias-Martinez, E., 2014. Spectral clustering
for sensing urban land use using Twitter activity. Engineering
Applications of Artificial Intelligence 35, 237-245.
Fusco, G., Caglioni, M., 2011. Hierarchical Clustering through
Spatial Interaction Data. The Case of Commuting Flows in
South-Eastern France. Springer Berlin Heidelberg.
4.1.2 Experimental settings: We set hyperparameters and
parameters as p=1, q=1, d=64, l=80, r=10 and k=5. The number
of clusters is determined to be 5 according to the fast unfolding
algorithm.
4.2 Result and Discussion
As p=1 and q=1, the random walk is balanced between BFS and
DFS. The detection result (Figure 7) of urban structure would
thus reflect the interaction between regions faithfully. As Figure
7(a) shows, the regions are cohesive and have clear boundary.
Figure 7(b) shows that it almost confirms to the boundary of
administrative districts. It could be seen that people seldom take
taxi for a further place and the interaction frequency within a
region are much higher than that between regions (Table 2).
Consequently, PEM discovered the homophily structure of the
studied area successfully.
Region
Region
Region
Region
Region
1
2
3
4
5
0.502
0.082
0.204
0.137
0.073
0.228
0.376
0.162
0.212
0.016
0.177
0.053
0.611
0.082
0.077
Freq.
Region
1
Region
2
Region
3
Region
4
Region
0.257
0.023
0.314
5
Table 2. The interaction frequency between regions: the
0.044
0.362
interaction frequency within a region are much higher than that
between regions.
Figure 7. The detection result of urban structure in the studied
area: (a) the visualization by ARCGIS; (b) the detection result
compared with the administrative map: the regions are cohesive
and have clear boundary which almost confirms to the boundary
of administrative districts.
Grover, A., Leskovec, J., 2016. node2vec: Scalable Feature
Learning for Networks, The ACM SIGKDD International
Conference.
Areas and Users in Location-based Social Networks. AAAI
Workshop - Technical Report.
Gustafson, D.E., Kessel, W.C., 1978. Fuzzy clustering with a
fuzzy covariance matrix, Decision and Control Including the
Symposium on Adaptive Processes, 1978 IEEE Conference on,
pp. 761-766.
Henderson, K., Gallagher, B., Eliassi-Rad, T., Tong, H., Basu,
S., Akoglu, L., Koutra, D., Faloutsos, C., Li, L., 2012.
RolX:structural role extraction & mining in large graphs, ACM
Knowledge Discovery and Data Mining, pp. 1231-1239.
Hoff, P.D., Raftery, A.E., Handcock, M.S., 2002. Latent Space
Approaches to Social Network Analysis. Journal of the
American Statistical Association 97, 1090-1098.
Rokach, L., Maimon, O., 2005. Clustering Methods. Springer
US.
Rousseeuw, P.J., 1987. Silhouettes: A graphical aid to the
interpretation and validation of cluster analysis. Journal of
Computational & Applied Mathematics 20, 53-65.
Skiena, S.S., 2008. The Algorithm Design Manual. Springer
London.
Tang, L., Liu, H., 2011. Leveraging social media networks for
classification. Data Mining and Knowledge Discovery 23, 447-
478.
Kohonen, T., Honkela, T., 2007. Kohonen network. 2, 1568.
Tarjan, R., 1972. Depth first search and linear graph algorithms.
SIAM JORNAL ON COMPUTNG 1.
Kurant, M., Markopoulou, A., Thiran, P., 2010. On the bias of
BFS (Breadth First Search). Teletraffic Congress, 1-8.
Liu, Y., Liu, X., Gao, S., Gong, L., Kang, C., Zhi, Y., Chi, G.,
Shi, L., 2015. Social Sensing: A New Approach
to
Understanding Our Socioeconomic Environments. Annals of
the Association of American Geographers 105, 512-530.
Luxburg, U.V., 2007. A tutorial on spectral clustering. Statistics
& Computing 17, 395-416.
Ng, A.Y., Jordan, M.I., Weiss, Y., 2001. On Spectral Clustering:
Analysis and an algorithm. Advances in Neural Information
Processing Systems, 849--856.
Noulas, A., Scellato, S., Mascolo, C., Pontil, M., 2011.
Exploiting Semantic Annotations for Clustering Geographic
Tobler, W.R., 1970. A Computer Movie Simulating Urban
Growth in the Detroit Region. Economic Geography 46, 234-
240.
Xue, B., Fu, C., Zhan, S., 2014. A Study on Sentiment
Computing and Classification of Sina Weibo with Word2vec,
IEEE International Congress on Big Data, pp. 358-363.
Yao, Y., Li, X., Liu, X., Liu, P., Liang, Z., Zhang, J., Mai, K.,
2016. Sensing spatial distribution of urban land use by
integrating points-of-interest and Google Word2Vec model. 1-
24.
Yuan, J., Zheng, Y., Xie, X., 2012. Discovering regions of
different functions in a city using human mobility and POIs,
ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, pp. 186-194.
|
1906.05143 | 1 | 1906 | 2019-06-12T13:59:51 | A decentralized trust-aware collaborative filtering recommender system based on weighted items for social tagging systems | [
"cs.SI",
"cs.IR"
] | Recommender systems are used with the purpose of suggesting contents and resources to the users in a social network. These systems use ranks or tags each user assign to different resources to predict or make suggestions to users. Lately, social tagging systems, in which users can insert new contents, tag, organize, share, and search for contents are becoming more popular. These systems have a lot of valuable information, but data growth is one of its biggest challenges and this has led to the need for recommender systems that will predict what each user may like or need. One approach to the design of these systems which uses social environment of users is known as collaborative filtering (CF). One of the problems in CF systems is trustworthy of users and their tags. In this work, we consider a trust metric (which is concluded from users tagging behavior) beside the similarities to give suggestions and examine its effect on results. On the other hand, a decentralized approach is introduced which calculates similarity and trust relationships between users in a distributed manner. This causes the capability of implementing the proposed approach among all types of users with respect to different types of items, which are accessed by unique id across heterogeneous networks and environments. Finally, we show that the proposed model for calculating similarities between users reduces the size of the user-item matrix and considering trust in collaborative systems can lead to a better performance in generating suggestions. | cs.SI | cs | A decentralized trust-aware collaborative filtering
recommender system based on weighted items for social
tagging systems
Hossein Monshizadeh Naeen1,2, Mehrdad Jalali3
1 Department of Computer Engineering Neyshabur Branch, Islamic Azad University, Neyshabur, Iran, monshizadeh@iau-
neyshabur.ac.ir
2 Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin,Iran,
[email protected]
3 Department of Computer Engineering, Islamic Azad University of Mashhad, Mashhad, Iran, [email protected]
Abstract
Recommender systems are used with the purpose of suggesting contents and resources for users in a social
network. These systems use ranks or tags each user assign to different resources to predict or make suggestions
to users. Lately, social tagging systems, in which users can insert new contents, tag, organize, share, and search
for contents are becoming more popular. These systems have a lot of valuable information, but data growth is
one of its biggest challenges and this has led to the need for recommender systems that will predict what each user
may like or need. One approach to the design of these systems which uses social environment of users is known as
collaborative filtering (CF). One of the problems in CF systems is trustworthy of users and their tags. In this work,
we consider a trust metric (which is concluded from users tagging behavior) beside the similarities to give
suggestions and examine its effect on results. On the other hand, a decentralized approach is introduced which
calculates similarity and trust relationships between users in a distributed manner. This causes the capability of
implementing the proposed approach among all types of users with respect to different types of items, which are
accessed by unique id across heterogeneous networks and environments. Finally, we show that the proposed model
for calculating similarities between users reduces the size of the user-item matrix and considering trust in
collaborative systems can lead to a better performance in generating suggestions.
Keywords: Recommender Systems, Collaborative filtering, Trust, Social Tagging.
1.
Introduction
Social networks and multimedia content sharing web sites have become increasingly popular in recent
years [1], and then recommender systems (RS) have emerged as an important response to the so-called
information overload problem in which users are finding it difficult to locate the right information at the
right time [2]. These systems are applied in a variety of applications and fields. Social tagging systems
such as Delicious, CiteULike, Flickr, etc., allow users to assign personal labels to resources based on their
own background knowledge with a purpose to manage, organize, share, discover and recover resources,
1
utilize recommender systems for their suggestion and prediction process [3]. In different types of RSs,
they aggregate users' reviews of products, services, and each other, into valuable information. Notable
commercial examples include Amazon, Google's page ranking system [e.g. 4], and the Epinions web of
trust/reputation system [e.g. 5]. One of RS implementation models which we use in this work are known
as Collaborative Filtering (CF) recommender systems. CFs have some weaknesses; data sparsity is the
first serious issue of collaborative filtering, i.e. the most active users will only have tagged or rated a small
subset of the overall database. Thus, even the most popular items have been viewed by very few users.
This weakness is especially evident on cold start users, users who are new in the system or we have very
little existing data about them, so we have problems providing good recommendations to these users. The
other weakness is Scalability problem. Usually there are millions of users and products. Thus, a large
amount of computation power is often necessary to calculate recommendations. The last weakness we
mention here is noisy or spam tags, users may make mistakes when they are using the system, or CF results
can easily be affected by malicious users' attacks or some agents give wrong tags on purpose for
advertisement [6].
In this article in general, we use collaborative filtering, and we try to give more accurate recommendations
to users, in particular. For this we assign a degree of trust to each user, according to their tagging behavior
in the network. Some neighbors of a user, who are similar to them, based on the resources they have
tagged, might not be trustworthy enough to participate in recommendation process. Briefly, Similarity
metric on its own is not reliable, so beside similarity of a user, credibility should be considered too. To
compute trust values, we study user's behavior in the system based on tags they assigned to different
resources and comparing their view with global views.
The remainder of the paper is organized as follows. In Section 2 we introduce the background of
recommender systems. In Section 3 we define the problem. We describe proposed model Section 4.
Section 5 includes results and evaluation. In Section 6 we talk about conclusions and future works.
2.
Background
As the number of recommender systems is increasing and more users are getting interested in social
networking sites, and also because of information explosion in these systems, many approaches on
recommender systems have been studied and proposed. In this section we will review related works on
recommender systems with tag orientation and also the studies that are done in the trust field.
2.1. Context-based studies
There have already been a reasonable amount of researches in using different attributes that exist in social
networks as background knowledge to give recommendation in RS such as [7,8,9], but none of them did
2
not use tags as an attribute to decide on predictions. Some other studies work on using tagging information
for recommendation purposes based on the recommendation of tags for assisting the user in annotation
related tasks, or to predict tags for contents of the site[10,11]. But Contextual information has been proved
to be efficient in recommender systems. Adomavicius et al. [12] presented a reduction-based approach for
multidimensional recommendation model that incorporates contextual information, such as place and time,
Companion, into the process of recommendation. Vig et al. [13] used tags given to movies of MovieLens
site and defined two different metrics, tag relevance and tag preference. tag relevance describes the
relationship between a tag and an item, and tag preference shows the user's sentiment towards a tag. They
give a list of suggested movies to each client, using basic CF based on ratings users give to movies. Then
they show relevance and preference scales to help the user understand why an item was recommended
(justification) and also to help users make good decisions by this information.
2.2. Tag-based CF
Interests in involving tags in collaborative filtering recommender systems have been increased in recent
years. Tso-Sutter et al.[14] proposed an approach to integrate tags in recommender systems by first
extending the user-item matrix and then applying an algorithm that fuses two popular RS algorithms, item
based CF and user based CF, such that the correlations between users, items and tags can be captured
simultaneously. But they have not mentioned the scalability in their work, as long as they extend matrix
in two dimensions, it seems the scalability problem gets much worse in this case. Nakamoto et al. [15]
introduced a tag based CF which uses tags overlaps to compute similarities between users in two different
approaches. However their work may have problem if there are not sufficient overlaps of tags. In another
work, Zheng et al. [16] worked on a tag and trust based recommender system, in which they try to get
better results by giving weight to temporal information and then combine the time weights with similarity
weights.
2.2. Trust-based CF
In trust field there are different works done according to information and facilities that exist in the social
network which we will review some of them in the follow. O'Donovan et al. [17] proposed a number of
computational models of trust based on the past rating behavior of individual profiles, these models operate
at the profile-level (average trust for the profile overall) and at the profile-item-level (average trust for a
particular profile when it comes to making recommendations for a specific item) and then they discuss
about 3 different ways to incorporate these trust values into the recommendation process, and the results
show that prediction error has been reduced when trust is considered, by the way their approach is only
based on ratings and does not involve tags. In other article [18] users can review items (such as cars, books,
movies, software, etc.) and also assign them numeric ratings in the range 1 (min) to 5 (max). Users can
3
also express their Web of Trust, i.e. reviewers whose reviews and ratings they have consistently found to
be valuable or not valuable, then they aggregate all the trust statements to produce a trust network then to
interfere trust values between users who have not directly declare their trust to other users (trust
propagation). Their work as you see, considers trust and also covers cold start problem so can calculate
similarity between more users, even new users. But it needs users in the system declare their degree of
trust to other users, which is not supported by all social networking sites. Jin et al. [19] have used similarity
of friends as a trust metric, and then defined a modified random walk algorithm on the friends trust network
to recommend top-k items to each user. Their work needs a social network with the ability to add users as
friends. Noll et al. [20] introduced the time of tagging as an additional dimension for assessing the trust of
a user in Delicious. They proposed a graph-based algorithm, called spammingresistant expertise analysis
and ranking (SPEAR). It computes the expertise score of a user and the quality score of a content which
are dependent on each other. The time of tagging is considered so that the earlier a user tags a content, the
more expertise score he/she receives. These two scores are calculated iteratively in a similar way to that
of the HITS algorithm. It was shown that SPEAR produces better ranking of users than the HITS method.
SPEAR was able to demote different types of spammers and remove them from the top of the ranking.
3.
Problem definition
3.1. Collaborative Filtering Systems
Recommender systems (RS) predict ratings of items or suggest a list of items that is unknown to the
user[14]. They take the users, items as well as the ratings or tags of items into account. In general there
are two types of Recommender Systems, content-based and collaborative filtering [18]. Content-Based
approaches use the characteristics of items and try to recommend items that are similar to those that a user
liked in the past[20]. Collaborative Filtering considers users' social environment i.e. they collect and
analyzing a large amount of information on users' behaviors, activities or preferences in the social network
and predict what each user will like. The underlying assumption of the collaborative filtering approach is
that if a person A has the same opinion as a person B on an issue, A is more likely to have B's opinion on
a different issue [21]. Collaborative filtering has been widely used in applications which produce a
predicted likeliness score or a list of top-N recommended resources for a given user [22]. User-item matrix
acts as a basic part in CF, user similarity are discovered from matrix and resource recommendation is also
calculated based on the matrix [16]. In rating based systems values of the matrix are fulfilled with the user
given ratings, but in tag based approaches traditional log-based ratings are generated based on user's log
behaviors with each element taken a binary value 1 or 0, indicating whether a user has viewed a resource
[23]. In this case, each viewed resource plays an equal role for a user and ratings are static over time,
which may be against the common sense that people tend to present different preferences towards different
4
resources. As we will explain later in this paper we estimate a degree of users interests to each different
item that they tag rather than binary values.
3.2. Trust
Across most current research, definitions of trust fall into various categories, and a solid definition for it,
in many cases can be quite elusive [17], because there are different trust views between users. There are
algorithms whose goal is to predict, based on the trust network, the trustworthiness of "unknown" users,
i.e. users in which a certain user didn't express a trust statement [18]. There are many different trust
metrics, an important classification of trust metrics is global and local ones [24]. Local trust metrics take
into account the very personal and subjective views of the users and predict different values of trust in
other users for every single user. Instead global trust metrics predict a global "reputation" value that
approximates how the community as a whole considers a certain user. From another point of view in a
social tagging system, spam or noise can be injected at three different levels: spam content, spam tag-
content association, and spammer [26]. Trust modeling can be performed at each level separately or
different levels can be considered jointly to produce trust models, for example, to assess a user's reliability,
one can consider not only the user profile, but also the content that the user uploaded to a social system
(e.g., [27]). So from this aspect trust can get categorized into two classes according to the target of trust,
i.e., user and content trust modeling[1]
The distribution of the trust values of the users or contents in a social network can be used to represent the
health of that network. Content trust modeling is used to classify content (e.g., Web pages, images, and
videos) as spam or legitimate. In this case, the target of trust is a content (resource), and thus a trust score
is given to each content based on its content and/or associated tags. In user trust modeling, trust is given
to each user based on the information extracted from a user's account, their interaction with other
participants within the social network, and/or the relationship between the content and tags that the user
contributed to the social tagging system [28]. There are other classifications for trust, for example a trust
value can be static, it means trust values are given by users or an administrator assign trust values to the
clients, or it can be dynamic, i.e., a user's trust in a social tagging system is dynamic and it changes over
time according to the user behavior in the social environment, our proposed model which is explained in
the next section is based on a dynamic trust model, in which we conclude users' trust values from the
transactions they have had in the system.
4.
Proposed model
Our goal is to introduce a model for collaborative filtering systems which can find similarities and can
create trust relationships among all types of similar users, with respect to different types of items,
5
accessible through unique id (e.g. URL) across heterogeneous social tagging systems. Fig.1. shows the
proposed model scheme. For this purpose our system is made up of 4 main modules. The first module is
profile manager, which either creates or updates profiles of users and items. The second module will find
the similarities between users by an item-weighing strategy in a distributed manner. The third part
estimates trust between a user and its neighbors, also done in a decentralized manner. Finally the
recommendation module selects k neighbors with highest ranks (i.e. with high similarity and trust values)
and makes suggestions. Note that there is no global view of a trust network for users and they are only
provided with information regarding their neighbors and their tagging history. Therefore, it is possible to
maintain user and item profiles in different groups on several servers to achieve better scalability. To cope
with privacy requirements, these servers can be located in different organizations, while profiles of users
and items are accessible only through their URL.
Fig. 1. Proposed model scheme -- A collaborative filtering system works based on similarity and trust in a decentralized manner.
4.1. Profile Manager
Profile manager responsibility is to create or update user and item profiles when a user tags an item. It
consists of two parts: User Profile Manager and Item Profile Manager.
4.1.1. User Profile Manager
User profile manager task is to create or update a user profile, when the user tags an item. In each user
profile we store item URLs tagged by the user, tags assigned by the user to the item and the item weight
that will be calculated for that user.
4.1.1.1. Item weight
We want to fulfill the user-item matrix values [discussed in section 3.1] with item weights based on the
6
Items NetworksUsers NetworksUser Tags ItemsSimilar UsersPartial Trust NetworkUsing TagsRecommendation Profile ManagerItem ProfilesUser Profilestags each user assigns to different items, instead of using basic 0 and 1 values. In general, the more a tag
has been used, the more interest the user has in the related resources. So we assume that users are more
likely to prefer the resources bookmarked with the tags of high usage by them. And we also assume that a
single user will use the same tags when describing similar resources to express his interests. Therefore we
define tag weigh as follows.
𝑊𝑡𝑎𝑔(𝑢, 𝑟) = ∑
𝑡𝑎∈𝑡𝑎𝑔(𝑢,𝑟)
𝑊𝑢,𝑡𝑎
(1)
Where tag(u,r) denotes the set of tags with which a user u has given to a resource r, 𝑊𝑢,𝑡𝑎 denotes tag score
of each tag ta in tag(u,r). Tag weight, 𝑊𝑡𝑎𝑔(𝑢, 𝑟), measures how much a user u is interested in a tagged
resource r, which implies a user's preference to for a resource.
Tag score, Wu,ta, of each tag is calculated as follows.
𝑊𝑢,𝑡𝑎 =
∑
𝑓𝑟𝑒𝑞(𝑢,𝑡𝑎)
𝑘
𝑙=1
𝑓𝑟𝑒𝑞(𝑢,𝑡𝑙)
(2)
𝑓𝑟𝑒𝑞 (𝑢, 𝑡𝑎) represents the times a tag ta has been used by a user u, k is the total number of tags a user u has
tagged with any resources. According to the definition of tag score, tag weight takes a real number between
0 and 1, and the higher the weight is, the more interested a user is in a resource.
This approach does not suffer from natural language issues, such as ambiguity and synonym tags, which
are the main problems when dealing with tags [29], since tag weight is generated within a single user's tag
space. It goes without saying, each time a user applies a new tag in the system their profile will be
updated, i.e. Wtag(u,r) values for different resources are dynamic and may change when a new resource
is tagged.
4.1.2. Item Profile Manager
Item profile manager creates or updates an item's profile when a user tags an item. In each item's profile
we store URLs of users who have tagged the item, list of tags each user has assigned to the item and the
transaction trust value that we calculate for the related transaction. These values are dynamic and change
with a new tag assignment. We define a transaction in a social tagging network as a triple (u,TTR,r), denotes
a transaction in the system for user u, annotating resource r with a set of tags TTR.
4.1.2.1. Transaction-level trust
Trust: If we take a deeper step towards the collaborative nature of social tagging systems, we will find
that knowledge on the tagging scheme does exists in the way numerous users annotating resources with
tags. Halpin et al. [30] have pointed out, if there are sufficient active users, over time, a stable distribution
with a limited number of stable tags and a much larger "long-tail" of more idiosyncratic tags will develop.
So we can consider this stabilized distribution as a convergence of the tagging scheme. We believe we can
use the collaborative knowledge that implicitly exists in social tagging networks. In this work we estimate
7
a degree of trust for users in two steps. In the first step a trust value is calculated for each transaction a
user has within the system, based on comparing the assigned tags by the user, with those assigned by other
users, which is the item profile manager task, which we will explain in this section. In the second step we
shall find users trust values that will be discussed in section 4.4 in detail.
Trust to a transaction: Information value or trust value of a transaction TR can be calculated as the average
of the tags' tagging information values in TTR.
𝑉𝑇𝑅 =
∑
𝑡∈𝑇𝑇𝑅
𝑉𝑟(𝑡)
𝑇𝑇𝑅
Where Vr(t) is tag t's tagging information value.
𝑉𝑟(𝑡) =
𝑆𝑟(𝑡)
𝑆𝑟(𝑡′)
∑
𝑡′∈𝑇𝑟
(3)
(4)
Where Sr(t) is the number of times the tag t is used by separate users to annotate the resource r. A
transaction with low information value indicates a divergence from crowd and a poor value of tagging
information.
4.2. Neighbors and Candidate Items
Before we calculate similarity and user trust values in a decentralized approach we will define two terms,
neighbors and candidate items that are needed for this purpose in the following.
4.2.1. Neighbors
Rating (or weighting) matrix in collaborative filtering systems has two demotions: user and item. This
matrix is used to find similarities between users. If you take a look at the matrix you will realize that if the
union of items between a user u with a user x is null, i.e. users u and x have not tagged any common item
yet, similarity value between these two users is equal to 0. So in practice to make this matrix for user u in
the item dimension we don't need users like x.
Therefor the neighbors of a user include users who have tagged at least one common item with the user.
For this reason to specify the neighbors of a user u, we collect list of users that are recorded in profiles of
items that u has already tagged (e.g. fig. 2).
8
Fig. 2. An example of specifying neighbors of a user in a decentralized approach. (a) Shows a user u and other users and items
tagged by each user in the system. (b) Shows how this system finds neighbors of the user u through items tagged by him.
4.2.2. Neighbors
As we mentioned, each user that has a nonzero similarity value with a user u, is counted as u's neighbor
(e.g. fig. 3(a)). So the only users that participate in recommendation for user u are his neighbors, they
represent the items already tagged by them, as candidate items that will be suggested to the user u. We
define the union of all items that are recommended by a user's neighbors as candidate items (e.g. fig. 3(b)).
It is obvious that we don't consider the set of items that are already visited by the user, as candidate items
that will be recommended to them(marked by * in Fig. 3 (b)).
Fig 3. (a) Shows neighbors of a user which we specify in a decentralized approach. (b) Shows how we find candidate items
using neighbors' profiles.
4.3. Similarity
User similarity calculation aims to mine the relationship among users. According to the approach we
explained above, after we specify neighbors of a user and set of candidate items, we form user-item matrix
with neighbors in user dimension and item dimension which is made up of candidate items and other
9
resources that are tagged by the user. Matrix is filled with item weights which we keep in each item's
profile. Since we don't need to collect all users and items information to make the weighting matrix to
calculate similarities, this method leads to a noticeable size reduction in both dimensions compared to
matrixes that are used in basic methods. There are a number of techniques to calculate the similarity
between users, such as Pearson correlation coefficient, Spearman correlation coefficient, cosine similarity
and Jaccard similarity. In this work we use cosine similarity method to compute the similarity value
between user u and user v which is defined as follows.
𝑠𝑖𝑚 (𝑢, 𝑣) =
∑
𝑥∈𝑋(𝑢,𝑣)
𝑊𝑡𝑎𝑔(𝑢,𝑥)×𝑊𝑡𝑎𝑔(𝑣,𝑥)
√∑
𝑥∈𝑋(𝑢,𝑣)
𝑊2
𝑡𝑎𝑔(𝑢,𝑥)
×√∑
𝑥∈𝑋(𝑢,𝑣)
𝑊2
𝑡𝑎𝑔(𝑣,𝑥)
(5)
Where X(u,v) is the set of resources that both user u and user v have tagged. 𝑊𝑡𝑎𝑔 is the weight we
calculated in equation 3.
4.4. User Level Trust
The straightforward idea is to use the average transaction information value, which we compute in equation
3 and store in related item profiles to represent a user trustworthiness, but this method does not take the
resources importance into account. Since the popularity of resources in social tagging systems directly
reflect the collaborative knowledge on resources quality, we define an importance value for each resource
as follows,
𝐼(𝑟) =
𝑈𝑟
𝑈𝑟′
(6)
Where Ur is the set of users who have tagged resource r and Ur' is the set of users in the similarity matrix.
Finally, we define a user u trust value as the weighted average of transaction information value, with
resource importance as weight,
𝑇𝑟𝑢𝑠𝑡𝑢(𝑛) =
4.5. Recommendation
∑
𝑇𝑅′∈𝑇𝑅𝑛
𝐼(𝑟)∗𝑉𝑇𝑅′
𝑇𝑅𝑛
(7)
In this section we use trust and similarity values to select best neighbors for item recommendation and
then give our suggestions based on these users information.
Selecting neighbors: As our objective is to provide a resource-recommendation model with both similarity
and trust information, we combine the two weights into a single one in two steps. First, as the measured
10
values of trust and similarity have different scales we normalize them to adjust them to a notionally
common scale. For this purpose we find similarity values of the nearest and the farthest neighbors to a user
u {Maxu(similarity), Minu(similarity)} and by using min-max normalization (equation 8) we change the
similarity values of neighbors so the nearest neighbor will get the value 1 and the farthest one value will
become 0.
∀𝑛 ∈ 𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟(𝑢): 𝑉𝑎𝑙𝑢𝑒𝑛 =
𝑆𝑖𝑚(𝑢,𝑛)−𝑀𝑖𝑛𝑢(𝑠𝑖𝑚𝑖𝑙𝑎𝑟𝑖𝑡𝑦)
𝑀𝑎𝑥𝑢(𝑠𝑖𝑚𝑖𝑙𝑎𝑟𝑖𝑡𝑦)−𝑀𝑖𝑛𝑢(𝑠𝑖𝑚𝑖𝑙𝑎𝑟𝑖𝑡𝑦)
(8)
In the same way we normalize trust values as follows.
𝑛 ∈ 𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟(𝑢): 𝑇𝑛 =
𝑇𝑟𝑢𝑠𝑢(𝑛)−𝑀𝑖𝑛𝑢(𝑇𝑟𝑢𝑠𝑡)
𝑀𝑎𝑥𝑢(𝑇𝑟𝑢𝑠𝑡)−𝑀𝑖𝑛𝑢(𝑇𝑟𝑢𝑠𝑡)
(9)
Where Maxu(Trust)and Minu(Trust) are minimum and maximum trust values of user u's neighbors
respectively.
In the second step we define the rank value for each neighbor n of user u as their total weight which is
given in equation 10.
𝑅𝑎𝑛𝑘𝑉𝑎𝑙𝑢𝑒𝑢(𝑛) = 𝜆(𝑉𝑎𝑙𝑢𝑒𝑛) + (1 − 𝜆)𝑇𝑛
(10)
Where parameter λ is introduced to adjust the significance of the two normalized weights. In contrast to
the traditional log-based ratings, our item-recommendation model uses both similarity and trust
information to select better neighbors.
Generating recommendations: Finally the recommendation module selects k neighbors with the highest
rank values for resource suggestion. We use equation (11) to calculate each recommended item score,
𝑆𝑐𝑜𝑟𝑒(𝑢, 𝑟) =
∑
𝑣∈𝑇𝑜𝑝𝑁𝑒𝑖𝑔ℎ𝑏𝑜𝑟(𝑢)
𝑊𝑡𝑎𝑔(𝑣,𝑟)×𝑠𝑖𝑚(𝑢,𝑣)
𝑇𝑜𝑝𝑁𝑒𝑖𝑔ℎ𝑏𝑜𝑟(𝑢)
(11)
Where TopNeighbor(u) denotes the number of top-n neighbors of a user u.
11
5.
Experiments
5.1. Data set
The data set we have used in our experiments is the MovieLens data. In MovieLens site users can rate, tag
and search for their favorite movies. This data set was published in May 2011 by GroupLens research
group. It includes 2112 users, 10197 movies (include tagging and rating information), it has 13222 distinct
tags and 47957 tag assignments (tas), i.e. tuples [user, tag, movie] to 5908 different movies. Average tas
per user is 22.696 and distinct movies tagged by each user is 12.13 on average. The data set is divided into
2 parts: 20% of each user transactions form the testing set and the remaining 80% of transactions form the
training set. We removed the movies that had not been bookmarked more than once, since they don't
represent valuable information for us.
5.2. Implementation and results
We implemented our program with four different methods, The first set of experiments we conduct aims
to analyze the impact of basic CF, it means similarity based in which user-item matrix is filled with 0 and
1 values. In the second set of experiments, we evaluate the impact of tag weight alone, i.e. similarity based
model in which user-item matrix is filled with item weights to calculate similarities between users. In the
third time we combined basic CF method with trust values estimated for neighbors of each user. Finally
we evaluate our proposed model, the combination of similarity matrix (using item weighting approach)
and the trust method we explained in section 4. We vary neighborhood sizes from 5 to 50 by an interval
of 5 and recommended 10 top items to each user. To evaluate our results we used Recall, Precision and
Coverage.
Recall and precision are used to evaluate system accuracy in top-10 recommended items for each user.
Similar to Sarwar et al. [23], our evaluations consider any item in the recommendation set that matches
any item in the testing set as a "hit". Note that we use mean average recall and mean average precision in
our evaluations.
Fig. 4. (a) Recall and (b) precision results for the first and second experiments -- Impact of item-weight strategy on
recommendation quality.
12
Figure 4 shows the positives impact of item-weight strategy on precision and recall values. It is usually
expected that recall decrease where precision increase and vice versa, but since we suggest only top 10
items to each user, both precision and recall accuracy get better when we increase the number of neighbors
for recommendation process; so in the rest of this section we only show the results of calculated recalls
for our different experiments.
The effect of trust-aware approaches (experiments 3 and 4) on recall are illustrated in Fig.5. These
methods have led to better quality in recall for every number of neighbors compared to models based on
only similarity values.
Fig 5. . Recall results - Impact of trust on recommendation quality.
Not surprisingly, our computational approaches with trust information outperform both traditional log-
based (basic CF) model and item-weight model. As shown in Fig. 6.(a) weighting strategy has noticeable
effect on recall results while trust strategy has led to slight improvement in accuracy of the recommender
system.
Coverage is used for recommendation suitability [31], which measures the percentage of a dataset that
the recommender system is able to provide predictions for; systems with lower coverage may be less
valuable to users, since they will be limited in the decisions they are able to help with. Coverage is
particularly important for the Find All Good Items task, since systems that cannot evaluate many of the
items in the domain cannot find all of the good items in that domain. Fig. 6 (b) shows coverage results of
the four implemented approaches.
Fig. 6. (a) Recall results for 4 implemented approaches. (b) Coverage results for 4 implemented approaches
13
Comparing the results as we expected methods using weighted tags and items (experiment 2 and 4) have
better accuracy than the methods which use basic user-item matrix for their similarity calculation. As it
can be seen in coverage graph, there are significant improvements in trust based approaches. We can
conclude from recall results that in the selected MovieLens data set there are not noticeable malicious
users or spam tags, but in total, trust-aware models have led to selecting better neighbors, so we have
improvement in finding all good items and the total recommended items set covers more elements in the
testing set.
6.
Conclusion and future works
We proposed a collaborative filtering system which uses trust beside similarity to select neighbors of users
with more accuracy; it is a novel approach of calculating trusts based on users tagging behaviors alone.
Trust in recommender systems is used to protect system against malicious users and noisy or spam tags
which is one of the weaknesses of these systems. Another advantage of the proposed system is that it
calculates user interests toward their bookmarked items independently and makes user-item matrix based
on their interests. So the system does not suffer from some natural language problems such as synonym
words or ambiguity in tags. The proposed model aslo leads to matrix size reduction which helps to lessen
scalability issue in these kind of systems.
In our work, there is a limitation that we used only MovieLens dataset for experiments. It is needed to
evaluate our computational approach using other datasets. Therefore, for the future work, we want to
evaluate our item recommendation model with other data sets, such as Delicious, Flickr and Citeulike. We
also plan to find other ways of aggregating trust with the standard collaborative filtering method and also
to work on other weaknesses of these systems such as cold start users.
References
[1]
Ivanov, Ivan, Peter Vajda, Jong-Seok Lee, and Touradj Ebrahimi. "In tags we trust: Trust
modeling in social tagging of multimedia content." Signal Processing Magazine, IEEE 29, no. 2 (2012):
98-107.
[2]
Fazili, Soude, Alireza Zarghami, Nima Dokoohaki, and Mihhail Matskin. "Elevating Prediction
Accuracy n Trust-aware Collaborative Filtering Recommenders through T-index Metric and TopTrustee
Lists." Journal of Emerging Technologies in Web Intelligence 2, no. 4 (2010): 300-309.
[3]
Xu, Zhichen, Yun Fu, Jianchang Mao, and Difu Su. "Towards the semantic web: Collaborative
tag suggestions." In Collaborative web tagging workshop at WWW2006, Edinburgh, Scotland. 2006.
14
[4]
Page, Lawrence, Sergey Brin, Rajeev Motwani, and Terry Winograd. "The PageRank citation
ranking: Bringing order to the web." (1999).
[5]
Pennock, David M., Eric Horvitz, and C. Lee Giles. "Social choice theory and recommender
systems: Analysis of the axiomatic foundations of collaborative filtering." In AAAI/IAAI, pp. 729-734.
2000.
[6]
Massa, Paolo, and Paolo Avesani. "Trust metrics on controversial users: Balancing between
tyranny of the majority." International Journal on Semantic Web and Information Systems (IJSWIS) 3, no.
1 (2007): 39-64.
[7]
Basilico, Justin, and Thomas Hofmann. "Unifying collaborative and content-based filtering." In
Proceedings of the twenty-first international conference on Machine learning, p. 9. ACM, 2004.
[8]
Li, Qing, and Byeong Man Kim. "An approach for combining content-based and collaborative
filters." In Proceedings of the sixth international workshop on Information retrieval with Asian languages-
Volume 11, pp. 17-24. Association for Computational Linguistics, 2003.
[9]
Tso, Karen HL, and Lars Schmidt-Thieme. "Evaluation of attribute-aware recommender system
algorithms on data with varying characteristics." In Advances in Knowledge Discovery and Data Mining,
pp. 831-840. Springer Berlin Heidelberg, 2006.
[10] Marinho, Leandro Balby, and Lars Schmidt-Thieme. "Collaborative tag recommendations." In
Data Analysis, Machine Learning and Applications, pp. 533-540. Springer Berlin Heidelberg, 2008.
[11] Mishne, Gilad. "Autotag: a collaborative approach to automated tag assignment for weblog posts."
In Proceedings of the 15th international conference on World Wide Web, pp. 953-954. ACM, 2006.
[12] Adomavicius, Gediminas, Ramesh Sankaranarayanan, Shahana Sen, and Alexander Tuzhilin.
"Incorporating contextual information in recommender systems using a multidimensional approach."
ACM Transactions on Information Systems (TOIS) 23, no. 1 (2005): 103-145.
[13] Vig, Jesse, Shilad Sen, and John Riedl. "Tagsplanations: explaining recommendations using tags."
In Proceedings of the 14th international conference on Intelligent user interfaces, pp. 47-56. ACM, 2009.
[14]
Tso-Sutter, Karen HL, Leandro Balby Marinho, and Lars Schmidt-Thieme. "Tag-aware
recommender systems by fusion of collaborative filtering algorithms." In Proceedings of the 2008 ACM
symposium on Applied computing, pp. 1995-1999. ACM, 2008.
[15] Nakamoto, Reyn, Shinsuke Nakajima, Jun Miyazaki, and Shunsuke Uemura. "Tag-based
contextual collaborative filtering." In Proceedings of the 18th IEICE Data Engineering Workshop. 2007.
[16]
Zheng, Nan, and Qiudan Li. "A recommender system based on tag and time information for social
tagging systems." Expert Systems with Applications 38, no. 4 (2011): 4575-4587.
[17] O'Donovan, John, and Barry Smyth. "Trust in recommender systems." In Proceedings of the 10th
international conference on Intelligent user interfaces, pp. 167-174. ACM, 2005.
[18] Massa, Paolo, and Paolo Avesani. "Trust-aware recommender systems." In Proceedings of the
2007 ACM conference on Recommender systems, pp. 17-24. ACM, 2007.
15
[19]
Jin, Jian, and Qun Chen. "A trust-based Top-K recommender system using social tagging
network." In Fuzzy Systems and Knowledge Discovery (FSKD), 2012 9th International Conference on,
pp. 1270-1274. IEEE, 2012.
[20] Noll, Michael G., Ching-man Au Yeung, Nicholas Gibbins, Christoph Meinel, and Nigel
Shadbolt. "Telling experts from spammers: expertise ranking in folksonomies." In Proceedings of the 32nd
international ACM SIGIR conference on Research and development in information retrieval, pp. 612-619.
ACM, 2009.
[21]
Ricci, Francesco, Lior Rokach, and Bracha Shapira. Introduction to recommender systems
handbook. Springer US, 2011.
[22]
Chin, Chun Ming. "Mobile Health Monitoring: The Glucose Intelligence Solution." University of
California, Berkeley, USA (2012).
[23]
Sarwar, Badrul, George Karypis, Joseph Konstan, and John Riedl. "Item-based collaborative
filtering recommendation algorithms." In Proceedings of the 10th international conference on World Wide
Web, pp. 285-295. ACM, 2001.
[24]
Lee, Jong-Seok, Chi-Hyuck Jun, Jaewook Lee, and Sooyoung Kim. "Classification-based
collaborative filtering using market basket data." Expert Systems with Applications 29, no. 3 (2005): 700-
704.
[25] Massa, Paolo, and Paolo Avesani. "Trust metrics on controversial users: Balancing between
tyranny of the majority." International Journal on Semantic Web and Information Systems (IJSWIS) 3, no.
1 (2007): 39-64.
[26] Markines, Benjamin, Ciro Cattuto, and Filippo Menczer. "Social spam detection." In Proceedings
of the 5th International Workshop on Adversarial Information Retrieval on the Web, pp. 41-48. ACM,
2009.
[27] Krause, Beate, Christoph Schmitz, Andreas Hotho, and Gerd Stumme. "The anti-social tagger:
detecting spam in social bookmarking systems." In Proceedings of the 4th international workshop on
Adversarial information retrieval on the web, pp. 61-68. ACM, 2008.
[28] Naeen, Hossein Monshizadeh, Mehrdad Jalali, and Ali Monshizadeh Naeen. "A trust-aware
collaborative filtering system based on weighted items for social tagging systems." In Intelligent Systems
(ICIS), 2014 Iranian Conference on, pp. 1-5. IEEE, 2014.
[29] De Gemmis, Marco, Pasquale Lops, Giovanni Semeraro, and Pierpaolo Basile. "Integrating tags
in a semantic content-based recommender." In Proceedings of the 2008 ACM conference on
Recommender systems, pp. 163-170. ACM, 2008.
[30] Halpin, Harry, Valentin Robu, and Hana Shepherd. "The complex dynamics of collaborative
tagging." In Proceedings of the 16th international conference on World Wide Web, pp. 211-220. ACM,
2007.
16
[31] Herlocker, Jonathan L., Joseph A. Konstan, Loren G. Terveen, and John T. Riedl. "Evaluating
collaborative filtering recommender systems." ACM Transactions on Information Systems (TOIS) 22, no.
1 (2004): 5-53.
17
|
1504.06672 | 1 | 1504 | 2015-04-25T00:58:33 | Locating influential nodes via dynamics-sensitive centrality | [
"cs.SI",
"physics.data-an",
"physics.soc-ph"
] | With great theoretical and practical significance, locating influential nodes of complex networks is a promising issues. In this paper, we propose a dynamics-sensitive (DS) centrality that integrates topological features and dynamical properties. The DS centrality can be directly applied in locating influential spreaders. According to the empirical results on four real networks for both susceptible-infected-recovered (SIR) and susceptible-infected (SI) spreading models, the DS centrality is much more accurate than degree, $k$-shell index and eigenvector centrality. | cs.SI | cs | Locating influential nodes via
dynamics-sensitive centrality
Jian-Hong Lin1, Qiang Guo1, Jian-Guo Liu1* Tao Zhou2
,
3*
September 25, 2018
1Research Center of Complex Systems Science, University of Shanghai for Science and Technology, Shanghai 200093, PR China; 2CompleX Lab, Web Sciences
Center, University of Electronic Science and Technology of China, Chengdu 611731, PR China; 3Big Data Research Center, University of Electronic Science and
Technology of China, Chengdu 611731, PR China.
With great theoretical and practical significance, locating influential nodes of complex networks is a promising issues. In this paper, we propose
a dynamics-sensitive (DS) centrality that integrates topological features and dynamical properties. The DS centrality can be directly applied
in locating influential spreaders. According to the empirical results on four real networks for both susceptible-infected-recovered (SIR) and
susceptible-infected (SI) spreading models, the DS centrality is much more accurate than degree, k-shell index and eigenvector centrality.
5
1
0
2
r
p
A
5
2
]
I
S
.
s
c
[
1
v
2
7
6
6
0
.
Spreading dynamics represents many important processes in nature and society 1,2, such as the propagation of computer virus 3 and traffic conges-
tion 4, the reaction diffusion 5, the spreading of infectious diseases 6 and the cascading failures 7. The estimation of nodes' spreading influences can help
in hindering the epidemics or accelerating the innovation 8, and similar methods can be further applied in identifying the influential spreader in social
networks 9, quantifying the influence of scientists and their publications 10, evaluating the impacts of injection points in the diffusion of microfinance 11,
finding drug targets in directed pathway networks 12, predicting essential proteins in protein interaction networks 13, and so on.
The significance of this issue triggers a variety of novel approaches in identifying influential spreaders in networks, which can be roughly categorized
into three classes. Firstly, some scientists argued that the location of a node is more important than its immediate neighbors, and thus proposed k-shell
index 14,15 and its variants 16 -- 18 as indicators of spreading influences. Secondly, some scientists quantified a node's influence only accounting for its
local surroundings 19 -- 21. Thirdly, some scientists evaluated nodes' influences according to the steady states of some introduced dynamical processes,
such as random walk 22,23 and iterative refinement 24.
4
0
5
1
:
v
i
X
r
a
The above-mentioned approaches only take into account the topological features, while recent experiments indicate that the performance of struc-
tural indices is very sensitive to the specific dynamics on networks 25 -- 27. For example, when the spreading rate is very small, the degree usually performs
better than the eigenvector centrality 28 and k-shell index 14, while when the infectivity is very high, the eigenvector centrality is the best one among
the three (see figures 1 and 2, with details shown later). To the best of our knowledge, there are few works taking into account the properties of the
underlying spreading dynamics 29 -- 31. Via a Markov chain analysis, Klemm et al. 29 suggested that the eigenvector centrality can be used in estimating
nodes' dynamical influences in the susceptible-infected-recovered (SIR) spreading model (also called susceptible-infected-removed model) 32. Li et
al. 30 provided complementary explanation of the suitability of eigenvector centrality based on perturbation around the equilibrium of the epidemic
dynamics and discussed the limitations of eigenvector centrality for homogeneous community networks. Both the above two works did not pay enough
attention to the specific parameters in the spreading models, and thus their suggested index only works well in a limited range of the parameter space.
Bauer and Lizier 31 directly counted the number of possible infection walks with different lengths. Their method is very effective but less efficient due
to the considerable computational cost, in addition, for the fundamental complexity in counting the number of paths connecting two nodes, their method
can not be formulated in a compact analytical form.
In this paper, we describe the infectious probabilities of nodes by a matrix differential function that accounts both topological features and dynamical
properties. Accordingly, we propose a dynamics-sensitive (DS) centrality, which can be directly applied in quantifying the spreading influences of nodes.
According to the empirical results on four real networks, for both the SIR model 32 and the susceptible-infected (SI) model 33,34, the DS centrality is
more accurate than degree, k-shell index and eigenvector centrality in locating influential nodes. The method proposed in this paper can be extended to
other Markov processes on networks.
1 Dynamics-Sensitive Centrality
An undirected network G = (V, E) with n = V nodes and e = E edges could be described by an adjacent matrix A = {aij} where aij = 1
if node i is connected with node j, and aij = 0 otherwise. A is binary and symmetric with zeros along the main diagonal, and thus its eigenvalues are
real and can be arrayed in a descending order as λ1≥λ2≥. . .≥λn. Since A is a symmetric and real-valued matrix, it can be factorized as A = QΛQT ,
where Λ = diag(λ1, λ2, . . ., λn), Q = [q1, q2, . . . , qn] and qi is the eigenvector corresponding to λi.
Considering a spreading model where an infected node would infect its neighbors with spreading rate β and recover with recovering rate µ (see
Materials and Methods for details). We denote x(t) (t ≥ 0) as an n × 1 vector whose components are the probabilities of nodes to be ever infected no
later than the time step t, and then x(t) − x(t − 1) (t > 1) is the probabilities of nodes to be infected at time step t. Notice that, x(t) is the cumulative
probability that can be larger than 1, and we use the term probability just for simplicity. For example, if i is the only initially infected node, then
1
xi(0) = 1 and xj6=i(0) = 0. In the first time step, x(1) = βAx(0), and for t > 1, we have (see the derivation in Materials and Methods)
where I is an n × n unit matrix. Denoting H = βA + (1 − µ)I, then βAHt−1x(0) represents the probabilities of nodes to be infected at time step t,
and thus the probabilities of nodes to be ever infected no later than t can be rewritten as
x(t) − x(t − 1) = βA[βA + (1 − µ)I]t−1x(0),
(1)
x(t) =
t
X
r=2
[x(r) − x(r − 1)] + x(1) =
t−1
X
r=0
βAHrx(0).
(2)
We define Si(t) the spreading influence of node i at time step t, which can be quantified by the sum of infected probabilities of all nodes, given i
the initially infected seed. According to Eq. (2), the infected probabilities can be written as
x(t) =
t−1
X
r=0
βAHrei,
(3)
where ei = (0, · · · , 0, 1, 0, · · · , 0)T is an n × 1 vector with only the ith element being 1. As all elements other than the ith one of ei are zero, x(t)
is indeed the sum of all the ith columns of βA, βAH, · · · , βAHt−1. Given x(0) = ei, Si(t) is defined as the sum of all elements of x(t), which is
equal to the sum of all elements in the ith columns of βA, βAH, · · · , βAHt−1, as
where L = (1, 1, · · · , 1)T is an n × 1 vector whose components are all 1. Obviously, AT = A, HT = H and AH = HA, then the spreading
influence of all nodes can be described by the vector
Si(t) = h(cid:0)βA + βAH + · · · + βAHt−1(cid:1)T Lii
,
(4)
S(t) =
t−1
X
r=0
βAHrL.
(5)
i=1 Pt−1
r=0 βAHrL = Pt−1
r=0 βAHr (cid:0)Pn
Notice that, Pt−1
r=0 βAHrei is the infected probabilities of all nodes given
node i the only initially infected seed according to Eq. (2), so S(t) can also be roughly explained as the sum of infected probabilities over the n cases
with every node being the infected seed once. This relationship shows an underlying symmetry, that is, in an undirected network, the node having
higher influence is also the one apt to be infected. The readers are warned that such conclusion is not mathematically rigorous since we have ignore the
complicated entanglement by allowing the elements of x(t) being larger than 1.
r=0 βAHrei, and Pt−1
i=1 ei(cid:1) = Pn
According to the Perro-Frobenius Theorem 35, the eigenvectors of H is the same to the ones of A and βλi + 1 − µ is the ith eigenvalue of H,
corresponding to qi. When βλ1 + 1 − µ < 1, i.e. β/µ < 1/λ1 (for the case µ 6= 0), HtL could converge to null vector when t → ∞ and S(t) could
be written by the following way
For SIR model, without loss of generality, we set µ = 1, and then
S(t) = βA(I − H)−1L = [(β/µ)A + (β/µ)2A2 + · · · + (β/µ)tAt]L.
S(t) = (βA + β 2A2 + · · · + βtAt)L,
(6)
(7)
where (AtL)i counts the total number of walks of length t from node i to all nodes in the network, weighted by βt that decays as the increase of the
length t. As S(t) quantifies nodes' spreading influences, we call it dynamics-sensitive (DS) centrality, where the term dynamics-sensitive emphasizes
the fact that S(t) is determined not only by the network structure (i.e., A), but also the dynamical parameters (i.e., β and t). In particular, when t = 1,
the initially infected node only has the chance to infect its neighbors and Si(1) = (βAL)i with (AL)i being exactly the degree of node i. When µ = 0
(corresponding to the SI model) or β ≥ 1/λ1, S(t) would be infinite when t → ∞, which could not reflect the spreading influences. In fact, as we
allow the infected probability of a node to be cumulated and exceed 1, the DS centrality may considerably deviate from the real spreading influences at
large β and large t. It is because that our theoretical deviation contains an underlying approximation that 1 − (1 − β)m ≈ mβ, where the left-hand side
characterizes the real spreading process with any infected probability smaller than 1 and the right-hand side could exceed 1 when β and m are large.
Since m denotes the number of contacts from infected nodes, the larger t will result in larger m before the end of epidemic spreading. Notice that, our
main goal is to find out the ranking of spreading influences of nodes, namely to identify influential nodes, and thus we are still not aware of the impacts
on the ranking from the above deviation because every node's influence is over estimated. Fortunately, as we will show later, the DS centrality performs
much better than other well-known indices for a very broad ranges of β and t that cover most practical scenarios.
2 Results
We test the performance of DS centrality in evaluating the nodes' spreading influences according to the SIR model and SI model, with varying
spreading rate β. Four real networks, including a scientific collaboration network, an email communication network, the Internet at the router level
and a protein-protein interaction network, are used for the empirical analysis (see data description in Materials and Methods), and three well-known
indices, including degree, k-shell index and eigenvector centrality, are used as benchmark methods for comparison (see Materials and Methods for the
definitions of those indices). Given the time step t, the spreading influence of an arbitrary node i is quantified by the number of infected nodes (for SI
model) or the number of infected and recovered nodes (for SIR model) at t, where the spreading process starts with only node i being initially infected.
Here we use Kendall's Tau τ 36 to measure the correlation between nodes' spreading influences and the considered centrality measure, where τ is in the
range [−1, 1] and the larger τ corresponds to the better performance (see Materials and Methods for the definition of τ ).
As shown in Fig. 1, the Kendall's Tau τ for the DS centrality is between 0.968 and 0.995 for β ∈ [0.01, 0.1], indicating that the ranking lists
generated by the DS centrality and the real SIR spreading process are highly identical to each other. In comparison, the DS centrality performs much
2
1.0
0.9
0.8
τ
0.7
1.0
0.9
τ
0.8
0.6
0.00
Erdös
0.7
Email
0.02
0.04
0.06
0.08
0.10
0.00
0.02
0.04
0.06
0.08
0.10
β
β
1.0
0.9
0.8
0.7
0.6
τ
1.0
0.9
0.8
0.7
0.6
0.5
τ
Router
Protein
0.00
0.02
0.04
0.06
0.08
0.10
0.00
0.02
0.04
0.06
0.08
0.10
β
β
degree
k-shell
eigenvector
DS
Figure 1 The accuracy of four centrality measures in evaluating nodes' spreading influences according to the SIR model (µ = 1) in the four real networks,
quantified by the Kendall's Tau. The spreading rate β varies from 0.01 to 0.10, and the time step is set as t = 5. Each data point is obtained by averaging over
104 independent runs.
better than degree, k-shell index and eigenvector centrality. As shown in Fig. 2, similar result is also observed for the SI model where the DS centrality
performs much better than others. The results for larger β and t are respectively shown in Fig. S1 and Fig. S2 of Supplementary Information, where
the DS centrality still performs the best.
Since A is a symmetric, real-valued matrix, the DS centrality S(t) can be written in the following way by decomposing A
Si(t) = m1q1i
n
X
j=1
q1j +
n
X
r=2
mrqri
n
X
j=1
qrj,
where mr = βλr[1 − (βλr + 1 − µ)t](µ − βλr)−1 for 1 ≤ r ≤ n. Rewriting Eq. (8) into
Si(t)
m1
= q1i
n
X
j=1
q1j +
n
X
r=2
mr
m1
qri
n
X
j=1
qrj.
(8)
(9)
will converge to 0, and thus the ranking lists generated by S(t) will be identical to q1, which is exactly the same to the
With the increase of t and β, mr
m1
eigenvector centrality. This relationship is in accordance with the results presented in Fig. S1 and Fig. S2, where the difference between the eigenvector
centrality and DS centrality gets smaller as the increase of β and t.
3 Discussion
Estimating the spreading influences and then identifying the influential nodes are fundamental task before any regulation on the spreading process.
For such task, most known works only took into account the topological information 8. Recently, Aral and Walker 37 showed that the attributes of nodes
are highly correlated with nodes' influences and tendencies to be influenced. In this paper, in addition to the topological information, we get down to the
underlying spreading dynamics and propose a dynamics-sensitive (DS) centrality, which is a kind of weighted sum of walks ending at the target node,
where both the spreading rate and spreading time are accounted in the weighting function. The DS centrality can be directly applied in quantifying the
spreading influences of nodes, which remarkably outperforms degree, k-shell index and eigenvector centrality according to the empirical analyses of
SIR model and SI model on four real networks. The DS centrality performs particular well in the early stage of spreading, which provides a powerful
tool in early detection of potential super-spreaders for epidemic control.
The DS centrality tells us an often ignored fact that the most influential nodes are dependent not only on the network topology but also on the
spreading dynamics. Given different models and parameters, the relative influences of nodes are also different. Roughly speaking, if the spreading
rate is small, we can focus on the close neighborhood of a node since it is not easy to form a long spreading pathway (i.e., βt decays very fast as the
increase of t when β is small) while if the spreading rate is high, the global topology should be considered. A clear limitation of this work is that
before calculating the DS centrality, we have to know the spreading rate that is usually a hidden parameter. This parameter can be effectively estimated
according to the early spreading process 38 and then we can calculate the DS centralities by varying the spreading rates over the estimated range and
see which nodes are the most influential ones in average.
Some other centralities related to specific dynamical processes have also been proposed recently, including routing centrality 39, epidemic central-
ity 40, diffusion centrality 41, percolation centrality 42 and game centrality 43. Comparing with these centralities, similar to the works by Klemm et
3
1.0
0.9
0.8
τ
0.7
1.0
0.9
τ
0.8
0.6
0.00
Erdös
0.7
Email
0.02
0.04
0.06
0.08
0.10
0.00
0.02
0.04
0.06
0.08
0.10
β
β
1.0
0.9
0.8
0.7
0.6
τ
Router
1.0
0.9
0.8
0.7
0.6
0.5
τ
Protein
0.00
0.02
0.04
0.06
0.08
0.10
0.00
0.02
0.04
0.06
0.08
0.10
β
β
degree
k-shell
eigenvector
DS
Figure 2 The accuracy of four centrality measures in evaluating nodes' spreading influences according to the SI model (µ = 0) in the four real networks,
quantified by the Kendall's Tau. The spreading rate β varies from 0.01 to 0.10, and the time step is set as t = 5. Each data point is obtained by averaging over
104 independent runs.
al. 29,44,45, this paper provides a more general framework that could in principle deal with all networked Markov processes and thus can be extended and
applied in many other important dynamics, such as the Ising model 46, Boolean dynamics 47, voter model 48, synchronization 49, and so on. Furthermore,
the DS centrality can also be directly extended to asymmetrical networks and weighted networks. We hope this work could highlight the significant
role of underlying dynamics in quantifying the individual nodes' importance, and then the difference between lists of critical nodes may give us novel
insights into the hardly notices distinguishing properties of different dynamical processes.
4 Materials and Methods
Derivation of Eq. (1). The probabilities of nodes to be infected at time step t = 2 can be approximated as
x(2) − x(1) = βAx(1) + βA(1 − µ)x(0) = βA[βA + (1 − µ)I]x(0).
(10)
We assume that when t ≤ p, x(p) − x(p − 1) = βA[βA + (1 − µ)I]p−1x(0), then for t = p + 1, we have
p−2
x(p + 1) − x(p) = βA{
X
r=0
p−2
= βA{
X
r=0
p−3
= βA{
X
r=0
(1 − µ)r[x(p − r) − x(p − r − 1)] + (1 − µ)p−1x(1) + (1 − µ)px(0)}
(1 − µ)rβA[βA + (1 − µ)I]p−r−1 + (1 − µ)p−1[βA + (1 − µ)I]}x(0)
(1 − µ)rβA[βA + (1 − µ)I]p−r−1 + (1 − µ)p−2[βA + (1 − µ)I]2}x(0)
(11)
· · ·
= βA{βA[βA + (1 − µ)I]p−1 + (1 − µ)[βA + (1 − µ)I]p−1}x(0)
= βA[βA + (1 − µ)I]px(0).
Therefore, according to the mathematical induction, Eq. (1) is established.
Spreading Model. Here we apply the standard susceptible-infected-recovered (SIR) model (also called the susceptible-infected-removed model) 32. In
the SIR model, there are three kinds of individuals: (i) susceptible individuals that could be infected, (ii) infected individuals having been infected and
being able to infect susceptible individuals, and (iii) recovered individuals that have been recovered and will never be infected again. In this paper, the
spreading process starts with only one seed node being infected initially, and all other nodes are initially susceptible. At each time step, each infected
node makes contact with its neighbors and each susceptible neighbor is infected with a probability β. Then each infected node enters the recovered
state with a probability µ. Without loss of generality, we set µ = 1. In the standard SI model, nodes can only be susceptible or infected, corresponding
to the case with µ = 0.
4
Table 1 Basic statistical features of Erdos, Email, Router and Protein networks, including the number of nodes n, the number of the edges e, the average
degree hki and the reciprocal of the largest eigenvalue 1/λ1.
Network
Erdos
Email
Router
Protein
n
456
1133
2114
2783
e
1314
5451
6632
6007
hki
5.763
9.622
6.274
4.317
1/λ1
0.079
0.048
0.036
0.063
Benchmark Methods. The degree of an arbitrary node i is defined as the number of its neighbors, namely
ki =
n
X
j=1
aij ,
(12)
where aij is the element of matrix A. Degree is widely applied for its simplicity and low computational cost, which works especially well in evaluating
nodes' spreading influences when the spreading rate is small.
The main idea of eigenvector centrality is that a node's importance is not only determined by itself, but also affected by its neighbors' importance 28.
Accordingly, eigenvector centrality of node i, vi, is defined as
where λ is a constant. Obviously, Eq. (13) can be written in a compact form as
Av = λv,
vi =
1
λ
n
X
j=1
aijvj ,
(13)
(14)
where v = (v1, v2, · · · , vn)T . That is to say, v is the eigenvector of the adjacent matrix A and λ is the corresponding eigenvalue. Since the influences
of nodes should be nonnegative, according to Perro-Frobenius Theorem 35, v must be the largest eigenvector of A, say v = q1.
Kitsak et al. 14 argued that k-shell index (i.e., coreness) is a better index than degree to locate the influential nodes. The k-shell can be obtained
by the so-called k-core decomposition 50. The k-core decomposition process is initiated by removing all nodes with degree k = 1. This causes new
nodes with degree k ≤ 1 to appear. These are also removed and the process is continued until all remaining nodes are of degree k > 1. The removed
nodes (together with associated links) form the 1-shell, and their k-shell indices are all one. We next repeat this pruning process for the nodes of degree
k = 2 to extract the 2-shell, that is, in each step the nodes with degree k ≤ 2 are removed. We continue with the process until we have identified all
higher-layer shells and all network nodes have been removed. Then each node i is assigned a k-shell index ci.
Kendall's Tau. For each node i, we denote yi as its spreading influence and zi the target centrality measure (e.g., degree, k-shell index, eigenvector
centrality and DS centrality), the accuracy of the target centrality in evaluating nodes' spreading influences can be quantified by the Kendall's Tau 36, as
τ =
2
n(n − 1) X
i<j
sgn[(yi − yj )(zi − zj)],
(15)
where sgn(y) is a piecewise function, when y > 0, sgn(y) = +1; y < 0, sgn(y) = −1; when y = 0, sgn(y) = 0. τ measures the correlation between
two ranking lists, whose value is in the range [−1, 1] and the larger τ corresponds to the better performance.
Data description. Four real networks are studied in this paper as follows. (i) Erdos, a scientific collaboration network, where nodes are scientists and
edges represent the co-authorships. The data set can be freely downloaded from the web site http://wwwp.oakland.edu/enp/thedata/. (ii) Email 51, which
is the email communication network of University Rovira i Virgili (URV) of Spain, involving faculty members, researchers, technicians, managers,
administrators, and graduate students. (iii) Router 52, the Internet at the router level, where each node represents a router and an edge represents a
connection between two routers. (iv) Protein 53, an initial version of a proteome-scale map of human binary protein-protein interaction. Basic statistical
properties of the above four networks are presented in Table 1.
References
1. Zhou, T., Fu, Z. Q. & Wang, B. H. Epidemic dynamics on complex networks. Porg. Nat. Sci. 16, 452 (2006).
2. Pastor, R., Satorras, C. C., Van Mieghem, P. & Vespignani, A. Epidemic processes in complex networks. arXiv: 1408.2701 (2014).
3. Kephart, J. O., Sorkin, G. B., Chess, D. M. & White, S. R. Fighting computer viruses. Sci. Am. 277, 56 (1997).
4. Li, D., Fu, B., Wang, Y., Lu, G., Berezin, Y., Stanley, H. E. & Havlin, S. Percolation transition in dynamical traffic network with evolving critical bottlenecks. Proc. Nat. Acad.
Sci. U.S.A. 112, 669 (2015).
5. Colizza, V., Pastor-Satorras, R. & Vespignani, A. Reaction-diffusion processes and metapopulation models in heterogeneous networks. Nat. Phys. 3, 276 (2007).
6. Keeling, M. J. & Rohani, P. Modeling Infectious Diseases in Humans and Animals. Princeton University Press, Princeton (2008).
7. Motter, A. E. Cascade control and defense in complex networks. Phys. Rev. Lett. 93, 098701 (2004).
8. Pei, S. & Makse, H. A. Spreading dynamics in complex networks. Journal of Statistical Mechanics: Theory and Experiment 2013, P12002 (2013).
9. Gonz´alez-Bail´on, S., Borge-Holthoefer, J., Rivero, A. & Moreno, Y. The dynamics of protest recruitment through an online network. Sci. Rep. 1, 197 (2011).
10. Zhou, Y. B., Lu, L. & Li, M. Quantifying the influence of scientists and their publications: distinguishing between prestige and popularity. New. J. Phys. 14, 033033 (2012).
11. Banerjee, A., Chandrasekhar, A. G., Duflo, E. & Jackson, M. O. The diffusion of microfinance. Science 341, 1236498 (2013).
12. Csermely, P., Korcsm´aros, T., Kiss, H. J., London, G. & Nussinov, R. Structure and dynamics of molecular networks: a novel paradigm of drug discovery: a comprehensive
review. Pharmacol. Ther. 138, 333 (2013).
13. Li, M., Zhang, H., Wang, J. H. & Pan, Y. A new essential protein discovery method based on the integration of protein-protein interaction and gene expression data. BMC Syst.
Biol. 6, 15 (2012).
5
14. Kitsak, M., Gallos, L. K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H. E. & Makse, H. A. Identification of influential spreaders in complex networks. Nat. Phys. 6, 888
(2010).
15. Castellano, C. & Pastor-Satorras, R. Competing activation mechanisms in epidemics on networks. Sci. Rep. 2, 371 (2012).
16. Zeng, A. & Zhang, C. J. Ranking spreaders by decomposing complex networks. Phys. Lett. A 377, 1031 (2013).
17. Liu, J. G., Ren, Z. M. & Guo, Q. Ranking the spreading influence in complex networks. Physica A 392, 4154 (2013).
18. Lin, J. H., Guo, Q., Dong, W. Z., Tang, L. Y. & Liu, J. G. Identifying the node spreading influence with largest k-core values. Phys. Lett. A 378, 3279 (2014).
19. Chen, D. B., Lu, L., Shang, M. S., Zhang, Y. C. & Zhou, T. Identifying influential nodes in complex networks. Physica A 391, 1777 (2012).
20. Chen, D. B., Gao, H., Lu, L. & Zhou, T. Identifying influential nodes in large-scale directed networks: the role of clustering. PLoS ONE 8, e77455 (2013).
21. Pei, S., Muchnik, L., Andrade Jr, J. S., Zheng, Z. & Makse, H. A. Searching for superspreaders of information in real-world social media. Sci. Rep. 4, 5547 (2014).
22. Lu, L., Zhang, Y. C. & Zhou, T. Leaders in social networks, the delicious case. PLoS ONE 6, e21202 (2011).
23. Li, Q., Zhou, T., Lu, L. & Chen, D. B. Identifying influential spreaders by weighted LeaderRank. Physica A 404, 47 (2014).
24. Ren, Z. M., Zeng, A., Chen, D. B., Liao, H. & Liu, J. G. Iterative resource allocation for ranking spreaders in complex networks. EPL 106, 48005 (2014).
25. Borge-Holthoefer, J., Rivero, A. & Moreno, Y. Locating privileged spreaders on an online social network. Phys. Rew. E 85, 066123 (2012).
26. Borge-Holthoefer, J. & Moreno, Y. Absence of influential spreaders in rumor dynamics. Phys. Rew. E 85, 026116 (2012).
27. Liu, Y., Tang, M., Zhou, T. & Do, Y. Core-like groups resulting in invalidation of k-shell decomposition analysis. Sci. Rep. 5, 9602 (2015).
28. Borgatti, S. P. Centrality and network flow. Soc. Netw. 27, 55 (2005).
29. Klemm, K., Serrano, M., Eguiluz, V. & Miguel, M. A measure of individual role in collective dynamics. Sci. Rep. 2, 292 (2012).
30. Li, P., Zhang, J., Xu, X. K. & Small M. Dynamical Influence of Node Revisited: A Markov Chain Analysis of Epidemic Process on Networks. Chin. Phys. Lett. 29, 048903
(2012).
31. Bauer, F. & Lizier, J. T. Identifying influential spreaders and efficiently estimating infection numbers in epidemic models: a walk counting approache. EPL 99, 68007 (2012).
32. Hethcote, H. W. The mathematics of infectious diseases. SIAM Rev. 42, 599 (2000).
33. Barth´elemy, M., Barrat, A., Pastor-Satorras, R., & Vespignani, A. Velocity and hierarchical spread of epidemic outbreaks in scale-free networks. Phys. Rev. Lett. 92, 178701
(2004).
34. Zhou, T., Liu, J. G., Bai, W. J., Chen, G. & Wang, B. H. Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity. Phys. Rev. E 74, 056109
(2006).
35. Hom, R. A. & Johnson, C. R. Matrix analysis. Cambridge University Press, Cambridge (1985).
36. Kendall, M. G. A New Measure of Rank Correlation. Biometrika 30, 81 (1938).
37. Aral, S. & Walker, D. Identifying influential and susceptible members of social networks. Science 68, 337 (2012).
38. Chen, D. B., Xiao, R. & Zeng, A. Predicting the evolution of spreading on complex networks. Sci. Rep. 4, 6108 (2014).
39. Dolev, S., Elovici, Y. & Puzis, R. Routing betweenness centrality. J. ACM 57(4), 25 (2010).
40.
Siki´c, M., Lanci´c, A., Antulov-Fantulin, N. & Stefanci´c, H. Epidemic centralityłis there an underestimated epidemic impact of network peripheral nodes?. Eur. Phys. J. B 86,
440 (2013).
41. Ide, K., Zamami, R. & Namatame, A. Diffusion Centrality in Interconnected Networks. Proc. Comput. Sci. 24 227 (2013).
42. Piraveenan, M., Prokopenko, M. & Hossain, L. Percolation centrality: Quantifying graph-theoretic impact of nodes during percolation in networks. PLoS ONE 8, e53095 (2013).
43. Simko, G. I. & Csermely, P. Nodes having a major influence to break cooperation define a novel centrality measure: game centrality. PLoS ONE 8, e67159 (2013).
44. Ghanbarnejad, F. & Klemm, K. Impact of individual nodes in Boolean network dynamics. EPL 99, 58006 (2012).
45. Klemm, K. Searchability of Central Nodes in Networks. J. Stat. Phys. 151, 707 (2013).
46. Dorogovtsev, S. N., Goltsev, A. V. & Mendes, J. F. Critical phenomena in complex networks. Rev. Mod. Phys. 80, 1275 (2008).
47. Kauffman, S. A. The Origins of Order. Oxford University Press, New York, 1993.
48. Castellano, C., Fortunato, S. & Loreto, V. Statistical physics of social dynamics. Rev. Mod. Phys. 81, 591 (2009).
49. Arenas, A., D´ıaz-Guilera, A., Kurths, J., Moreno, Y. & Zhou, C. Synchronization in complex networks. Phys. Rep. 469 93 (2008).
50. Seidman, S. B. Network structure and minimum degree. Soc. Netw. 5, 269 (1983).
51. Guimera, R., Diaz-Guilera, A., Giralt, F. & Arenas, A. Self-similar community structure in a network of human interactions. Phys. Rew. E 68, 065103 (2003).
52. Rossi, R. A. & Ahmed, N. K. The Network Data Repository with Interactive Graph Analytics and Visualization. Proceedings of the Twenty-Ninth AAAI Conference on Artificial
Intelligence (2015).
53. Rual, J. F., et al. Towards a proteome-scale map of the human protein-protein interaction network. Nature 437, 1173 (2005).
Acknowledgements The authors acknowledge the valuable discussion with Wen-Xu Wang and Liming Pan, as well as the Erdos Number Project in Oakland
University for the data set. This work is supported by the National Natural Science Foundation of China (Nos. 71171136, 61374177, 112222543 and 61433014),
the Shanghai Leading Academic Discipline Project of China (No. XTKX2012), JGL is supported by the Program for Professor of Special Appointment (Eastern
Scholar) at Shanghai Institutions of Higher Learning.
Author Contributions
wrote the paper. Correspondence and requests for materials should be addressed to J.G.L. ([email protected]) or T.Z. ([email protected]).
JHL, JGL and TZ designed research, JHL, JGL and QG perform research, JHL, JGL and TZ analysed data, and JHL, JGL, QG and TZ
Competing Interests The authors declare that they have no competing financial interests.
6
|
1704.00386 | 2 | 1704 | 2018-09-14T04:07:32 | Local Algorithms for Hierarchical Dense Subgraph Discovery | [
"cs.SI",
"cs.DS"
] | Finding the dense regions of a graph and relations among them is a fundamental problem in network analysis. Core and truss decompositions reveal dense subgraphs with hierarchical relations. The incremental nature of algorithms for computing these decompositions and the need for global information at each step of the algorithm hinders scalable parallelization and approximations since the densest regions are not revealed until the end. In a previous work, Lu et al. proposed to iteratively compute the $h$-indices of neighbor vertex degrees to obtain the core numbers and prove that the convergence is obtained after a finite number of iterations. This work generalizes the iterative $h$-index computation for truss decomposition as well as nucleus decomposition which leverages higher-order structures to generalize core and truss decompositions. In addition, we prove convergence bounds on the number of iterations. We present a framework of local algorithms to obtain the core, truss, and nucleus decompositions. Our algorithms are local, parallel, offer high scalability, and enable approximations to explore time and quality trade-offs. Our shared-memory implementation verifies the efficiency, scalability, and effectiveness of our local algorithms on real-world networks. | cs.SI | cs | Local Algorithms for Hierarchical Dense Subgraph
Discovery
Ahmet Erdem Sarıyuce
University at Buffalo
[email protected]
C. Seshadhri
Univ. of California, Santa Cruz
[email protected]
Ali Pinar
Sandia National Laboratories
[email protected]
8
1
0
2
p
e
S
4
1
]
I
S
.
s
c
[
2
v
6
8
3
0
0
.
4
0
7
1
:
v
i
X
r
a
ABSTRACT
Finding the dense regions of a graph and relations among
them is a fundamental problem in network analysis. Core
and truss decompositions reveal dense subgraphs with hi-
erarchical relations. The incremental nature of algorithms
for computing these decompositions and the need for global
information at each step of the algorithm hinders scalable
parallelization and approximations since the densest regions
are not revealed until the end. In a previous work, Lu et al.
proposed to iteratively compute the h-indices of neighbor
vertex degrees to obtain the core numbers and prove that the
convergence is obtained after a finite number of iterations.
This work generalizes the iterative h-index computation for
truss decomposition as well as nucleus decomposition which
leverages higher-order structures to generalize core and truss
decompositions. In addition, we prove convergence bounds
on the number of iterations. We present a framework of
local algorithms to obtain the core, truss, and nucleus de-
compositions. Our algorithms are local, parallel, offer high
scalability, and enable approximations to explore time and
quality trade-offs. Our shared-memory implementation ver-
ifies the efficiency, scalability, and effectiveness of our local
algorithms on real-world networks.
PVLDB Reference Format:
Ahmet Erdem Sarıyuce, C. Seshadhri, and Ali Pinar. Local Al-
gorithms for Hierarchical Dense Subgraph Discovery. PVLDB,
12(1): xxxx-yyyy, 2019.
DOI: https://doi.org/10.14778/3275536.3275540
INTRODUCTION
1.
A characteristic feature of the real-world graphs is sparsity
at the global level yet density in the local neighborhoods [15].
Dense subgraphs are indicators for functional units or un-
usual behaviors. They have been adopted in various ap-
plications, such as detecting DNA motifs in biological net-
works [12], identifying the news stories from microblogging
streams in real-time [2], finding price value motifs in finan-
cial networks [10], and locating spam link farms in web [24,
13, 9]. Dense regions are also used to improve efficiency of
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee. Articles from this volume were invited to present
their results at The 45th International Conference on Very Large Data Bases,
August 2019, Los Angeles, California.
Proceedings of the VLDB Endowment, Vol. 12, No. 1
Copyright 2018 VLDB Endowment 2150-8097/18/09 $ 10.00.
DOI: https://doi.org/10.14778/3275536.3275540
compute-heavy tasks like distance query computation [21]
and materialized per-user view creation [14].
Detecting dense structures in various granularities and
finding the hierarchical relations among them is a funda-
mental problem in graph mining. For instance, in a citation
network, the hierarchical relations of dense parts in various
granularities can reveal how new research areas are initiated
or which research subjects became popular in time [38]. k-
core [39, 27] and k-truss decompositions [34, 6, 44, 48] are
effective ways to find many dense regions in a graph and
construct a hierarchy among them. k-core is based on the
vertices and their degrees, whereas k-truss relies on the edges
and their triangle counts.
Higher-order structures, also known as motifs or graphlets,
have been used to find dense regions that cannot be detected
with edge-centric methods [4, 42]. Computing the frequency
and distribution of triangles and other small motifs is a sim-
ple yet effective approach used in data analysis [19, 30, 1,
33]. Nucleus decomposition is a framework of decomposi-
tions that is able to use higher-order structures to find dense
subgraphs with hierarchical relations [37, 38]. It generalizes
the k-core and k-truss approaches and finds higher-quality
dense subgraphs with more detailed hierarchies. However,
existing algorithms in the nucleus decomposition framework
require global graph information, which becomes a perfor-
mance bottleneck for massive networks. They are also not
amenable for parallelization or approximation due to their
interdependent incremental nature. We introduce a frame-
work of algorithms for nucleus decomposition that uses only
local information. Our algorithms provide faster and ap-
(a) Convergence rates
(b) Scalability performance
Figure 1: On the left, we present the convergence rates for k-
truss decomposition on five graphs. Kendall-Tau similarity
score compares the obtained and the exact decompositions;
becomes 1.0 when they are the same. Our local algorithms
compute the almost-exact decompositions in around 10 it-
erations. On the right, we show the runtime performances
w.r.t. partially parallel peeling algorithms. On average, k-
truss computations are 4.8x faster when we switch from 4
threads to 24 threads.
-1.0-0.50.00.51.0 0 5 10 15 20 25 30Kendall Taunumber of iterationsFBSSETWWNWIKI0.01.02.03.04.05.06.07.0 4 6 12 24speedupnumber of threadsASKFRIHGORKSLJWIKIPeeling-24t57.3s30.8s2794sproximate solutions and their local nature enables query-
driven processing of vertices/edges.
1.1 Problem and Challenges
The standard method to compute a k-core decomposition
is a sequential algorithm, known as the peeling process. To
find a k-core, all vertices with degree less than k are re-
moved repeatedly until no such vertex remains. This process
is repeated after incrementing k until no vertices remain.
Batagelj and Zaversnik introduced a bucket-based O(E)
algorithm for this process [3]. It keeps track of the vertex
with the minimum degree at each step, thus requires global
information about the graph at any time. k-truss decom-
position has a similar peeling process with O((cid:52)) complex-
ity [6]. To find a k-truss, all edges with less than k triangles
are removed repeatedly and at each step, algorithm keeps
track of the edge with the minimum triangle count, which
requires information from all around the graph. Nucleus de-
composition [37] also facilitates the peeling process on the
given higher-order structures. The computational bot-
tleneck in the peeling process is the need for the
global graph information. This results in inherently se-
quential processing. Parallelizing the peeling process in a
scalable way is challenging since each step depends on the
results of the previous step. Parallelizing each step in itself is
also infeasible since synchronizations are needed to decrease
the degrees of the vertices that are adjacent to multiple ver-
tices being processed in that step.
Iterative h-index computation: Lu et al. introduced an
alternative formulation for k-core decomposition [26]. They
proposed iteratively computing h-indices on the vertex de-
grees to find the core numbers of vertices (even though they
do not call out the correspondence of their method to h-
indices). Degrees of the vertices are used as the initial core
number estimates and each vertex updates its estimate as
the h-index value for its neighbors' core number estimates.
This process is repeated until convergence. At the end, each
vertex has its core number. They prove that convergence
to the core numbers is guaranteed, and analyze the conver-
gence characteristics of the real-world networks and show
runtime/quality trade-offs.
We generalize Lu et al.'s work for any nucleus decom-
position, including k-truss. We show that convergence is
guaranteed for all nucleus decompositions and prove the
first upper bounds for the number of iterations. Our frame-
work of algorithms locally compute any nucleus decompo-
sition. We propose that iteratively computing h-indices of
vertices/edges/r-cliques based on their degrees/triangle/s-
clique counts converges in the core/truss/nucleus numbers
(r < s). Local formulation also enables the parallelization.
Intermediate values provide an approximation to the ex-
act nucleus decomposition to trade-off between runtime and
quality. Note that this is not possible in the peeling process,
because no intermediate solution can provide an overall ap-
proximation to the exact solution, e.g., the densest regions
are not revealed until the end.
1.2 Contributions
Our contributions can be summarized as follows:
• Generalizated nucleus decomposition: We general-
ize the iterative h-index computation idea [26] for any nu-
cleus decomposition by using only local information. Our
approach is based on iteratively computing the h-indices
on the degrees of vertices, triangle counts of edges, and
s-clique counts of r-cliques (r < s) until convergence. We
prove that the iterative computation by h-indices guaran-
tees exact core, truss, and nucleus decompositions.
• Upper bounds for convergence: We prove an upper
bound for the number of iterations needed for conver-
gence. We define the concept of degree levels that models
the worst case for convergence. Our bounds are applicable
to any nucleus decomposition and much tighter than the
trivial bounds that rely on the total number of vertices.
• Framework of parallel local algorithms: We intro-
duce a framework of efficient algorithms that only use
local information to compute any nucleus decomposition.
Our algorithms are highly parallel due to the local com-
putation and are implemented in OpenMP for shared-
memory architectures.
• Extensive evaluation on real-world networks: We
evaluate our algorithms and implementation on various
real-world networks. We investigate the convergence char-
acteristics of our new algorithms and show that close ap-
proximations can be obtained only in a few iterations.
This enables exploring trade-offs between time and ac-
curacy. Figure 1a presents the convergence rates for the
k-truss decomposition. In addition, we present a metric
that approximates solution quality for informed decisions
on accuracy/runtime trade-offs. We also evaluate run-
time performances of our algorithms, present scalability
results, and examine trade-offs between runtime and ac-
curacy. Figure 1b has the results at a glance for the k-truss
case. Last, but not least, we highlight a query-driven sce-
nario where our local algorithms are used on a subset of
vertices/edges to estimate the core and truss numbers.
2. BACKGROUND
We work on a simple undirected graph G = (V, E) where V
is the set of vertices and E is the set of edges. We define
r-clique as a complete graph among r vertices for r > 0, i.e.,
each vertex is connected to all the other vertices. We use
R (and S) to denote r-clique (and s-clique).
2.1 Core, Truss, and Nucleus Decompositions
Definition 1. k-core of G is a maximal connected sub-
graph of G, where each vertex has at least degree k.
A vertex can reside in multiple k-cores, for different k
values, which results in a hierarchy. Core number of a vertex
is defined to be the the largest k value for which there is a
k-core that contains the vertex. Maximum core of a vertex
is the maximal subgraph around it that contains vertices
with equal or larger core numbers.
It can be found by a
traversal that only includes the vertices with larger or equal
core numbers. Figure 2a illustrates k-core examples.
Definition 2. k-truss of G is a maximal connected sub-
graph of G where each edge is in at least k triangles.
Cohen [6] defined the standard maximal k-truss as one-
component subgraph such that each edge participates in at
least k − 2 triangles, but here we just assume it is k tri-
angles for the sake of simplicity. An edge can take part in
multiple k-trusses, for different k values, and there are also
hierarchical relations between k-trusses in a graph. Similar
to the core number, truss number of an edge is defined to
(a) k-cores
(b) k-trusses
Figure 2: Illustrative examples for k-core and k-truss. On
the left, red, blue, and green regions show the 3-, 2-, and
1-cores. Core numbers are also shown for each vertex. For
the same graph, trusses are presented on the right. Entire
graph is a 0-truss. Five vertices on the right form a 1-truss,
in blue. There are also two 2-trusses and one of them is a
subset of the 1-truss. Truss numbers of the edges are also
shown.
be the largest k value for which there exists a k-truss that
includes the edge and maximum truss of an edge is the max-
imal subgraph around it that contains edges with larger or
equal truss numbers. We show some truss examples in Fig-
ure 2b. Computing the core and truss numbers are known
as the core and truss decomposition.
Unifying k-core and k-truss: Nucleus decomposition is a
framework that generalizes core and truss decompositions [37].
k-(r, s) nucleus is defined as the maximal subgraph of the r-
cliques where each r-clique takes part in at least k s-cliques.
We first give some basic definitions and then formally define
the k-(r, s) nucleus subgraph.
Definition 3. Let r < s be positive integers.
• R(G)and S(G) are the set of r-cliques and s-cliques in
G, respectively (or R and S when G is unambigous).
• S-degree of R ∈ R(G) is the number of S ∈ S(G)
such that S contains R (R ⊂ S). It is denoted as
dsG(R) (or ds(R) when G is obvious).
(cid:48)
• Two r-cliques R, R
are S-connected if there exists
in R such
a sequence R = R1, R2, . . . , Rk = R
that for each i, some S ∈ S contains Ri ∪ Ri+1.
• Let k, r, and s be positive integers such that r < s. A
which contains the
k-(r, s) nucleus is a subgraph G
edges in the maximal union S of s-cliques such that
) is at least
(cid:48)
(cid:48)
(cid:48)
-- S-degree of any r-clique R ∈ R(G
-- Any r-clique pair R, R
k.
(cid:48)
(cid:48)
) are S-connected.
For r = 1, s = 2, k-(1, 2) nucleus is a maximal (induced)
connected subgraph with minimum vertex degree k. This is
∈ R(G
(a) k-trusses
(b) k-(3,4) nuclei
Figure 3: Illustrative examples for k-truss and k-(3, 4) nu-
cleus. On the left, entire graph is a single 1-truss and all
except vertex g forms a 2-truss. For the same graph, k-(3, 4)
nuclei are shown on the right. Entire graph is a 0-(3,4) nu-
cleus and there are two 1-(3,4) nuclei (in red): subgraph
among vertices a, b, c, d and subgraph among c, d, e, f, h.
Note that those two subgraphs are reported as separate, not
merged, since there is no four-clique that contains a triangle
from each nuclei (breaking S-connectedness).
Table 1: Notations
Description
graph
r-clique
s-clique
Symbol
G
R
S
R(G) (or R) set of r-cliques in graph G
S(G) (or S)
set of s-cliques in graph G
C(G) (or C) R(G) ∪ S(G)
S-degree of R: number of s-cliques
dsG(R)
that contains R in graph G
(or ds(R))
minimum S-degree of an r-clique in graph G
δr,s(G)
neighbor R(cid:48)s s.t. ∃ an s-clique S ⊇ (R ∪ R(cid:48))
Ns(R)
largest k s.t. R is contained in a k-(r, s) nucleus
κs(R)
κ2(u), κ3(e) Core number of vertex u, truss number of edge e
largest h s.t. at least h numbers in set K are ≥ h
H(K)
U
update operator, (τ : R → N) → (U τ : R → N)
exactly the k-core. Setting r = 2, s = 3 gives maximal sub-
graphs where every edge participates in at least k triangles,
which corresponds to k-truss, and all edges are triangle con-
nected, which is also introduced as a k-truss community [18].
Note that the original k-truss definition is different from
(2, 3) nucleus since it does not require triangle connectiv-
ity.
In this work, we focus on core, truss, and κs indices
(Definition 4) and our algorithms work for any connectivity
constraint. We skip details for brevity.
Nucleus decomposition for r = 3 and s = 4 has been
shown to give denser (and non-trivial) subgraphs than the
k-cores and k-trusses, where density of G = (V, E) is de-
(cid:1) [37]. Figure 3 presents the difference
fined as 2E/(cid:0)V 2
between k-truss and k-(3, 4) nucleus on a toy graph. It is
used to analyze citation networks of APS journal papers
and discovered hierarchy of topics i.e., a large subgraph on
complex networks has children subgraphs on synchroniza-
tion networks, epidemic spreading and random walks, which
cannot be observed with core and truss decompositions [38].
Nucleus decomposition for larger r and s values are costly
and only affordable for small networks with a few thousand
edges. Enumerating r-cliques and checking their involve-
ments in s-cliques for r, s > 4, can become intractable for
larger graphs, making k-(3, 4) is a sweet spot.
In graph G, minimum S-degree of an r-clique R ∈ R(G)
is denoted as δr,s(G), e.g., the minimum degree of a vertex
in G is δ1,2(G). We also use Ns(R) to denote the set of
neighbor r-cliques of R such that R(cid:48) ∈ Ns(R) if ∃ an s-
clique S s.t. S ⊃ R and S ⊃ R(cid:48). As in k-core and k-
truss definitions, an r-clique can take part in multiple k-
(r, s) nuclei for different k values. We define the κs index of
r-clique analogous to the core numbers of vertices and truss
numbers of edges [37].
Definition 4. For any r-clique R ∈ R(G), the κs-index
of R, denoted as κs(R), is the largest k value such that R
is contained in a k-(r, s) nucleus.
Core number of a vertex u is denoted by κ2(u) and the
truss number of an edge e is denoted by κ3(e). We use
the notion of k-(r, s) nucleus and κs-index to introduce our
generic theorems and algorithms for any r, s values. The set
of k-(r, s) nuclei is found by the peeling algorithm [37] (given
in Algorithm 1). It is a generalization of the k-core and k-
truss decomposition algorithms, and finds the κs indices of
r-cliques in non-decreasing order.
The following lemma is standard in the k-core literature
and we prove the analogue for k-(r, s) nucleus. It is a con-
venient characterization of the κs indices.
3333333321312 02222221222222012012efcabdh21gefcabdh10g1Algorithm 1: Peeling(G, r, s)
Input: G: graph, r < s: positive integers
Output: κs(·): array of κs indices for r-cliques
Enumerate all r-cliques in G
For every r-clique R, set ds(R) (S-degrees)
Mark every r-clique as unprocessed
for each unprocessed r-clique R with minimum ds(R)
do
κs(R) = ds(R)
Find set S of s-cliques containing R
for each C ∈ S do
if any R ⊂ C is processed then continue
for each r-clique R(cid:48) ⊂ C, R(cid:48) (cid:54)= R do
if ds(R(cid:48)) > ds(R) then ds(R(cid:48)) = ds(R(cid:48)) − 1
Mark R as processed
return array κs(·)
Lemma 1. ∀ R ∈ R(G), κs(R) = maxR(G(cid:48))(cid:51)Rδr,s(G(cid:48)),
where G(cid:48) ⊆ G.
Proof. Let T be the κs(R)-(r, s) nucleus containing R.
By definition, δr,s(T ) = κs(R), so maxG(cid:48) δr,s(G(cid:48)) ≥ κs(R).
Assume the contrary that there exists some subgraph T (cid:48) (cid:51) R
such that δr,s(T (cid:48)) > κs(R) (WLOG, we can assume T (cid:48) is
connected; otherwise, we denote T (cid:48) to be the component
containing R). There must exist some maximal connected
T (cid:48)(cid:48) ⊇ T (cid:48) that is a δr,s(T (cid:48))-nucleus. This would imply that
κs(R) ≥ δr,s(T (cid:48)) > κs(R), a contradiction.
2.2 h-index computation
The main idea in our work is the iterative h-index com-
putation on the S-degrees of r-cliques. h-index metric is
introduced to measure the impact and productivity of re-
searchers by the citation counts [17]. A researcher has an
h-index of k if she has at least k papers and each paper is
cited at least k times such that there is no k(cid:48) > k that satis-
fies these conditions. We define the function H to compute
the h-index as follows:
Definition 5. Given a set K of natural numbers, H(K)
is the largest k ∈ N such that ≥ k elements of K are ≥ k.
Core number of a vertex can be defined as the largest k such
that it has at least k neighbors whose core numbers are also
at least k. In the following section, we formalize this obser-
vation, and build on it to design algorithms to compute not
only core decompositions but also truss or nucleus decom-
position for any r and s values.
3. FROM THE h-INDEX TO THE κs-INDEX
Our main theoretical contribution is two-fold. First, we in-
troduce a generic formulation to compute the k-(r, s) nucleus
by an iterated h-index computation on r-cliques. Secondly,
we prove convergence bounds on the number of iterations.
We define the update operator U. This takes a function
τ : R → N and returns another function Uτ : R → N, where
R is the set of r-cliques in the graph.
Definition 6. The update U is applied on the r-cliques
(cid:54)=R τ (R(cid:48)).
in a graph G such that for each r-clique R ∈ R(G):
1. For each s-clique S ⊃ R, set ρ(S, R) = minR(cid:48)
⊂S,R(cid:48)
2. Set Uτ (R) = H({ρ(S, R)}S⊃R).
Observe that Uτ can be computed in parallel over all r-
cliques in R(G). It is convenient to think of the S-degrees
(ds) and κs indices as functions R → N. We initialize τ0 =
ds, and set τt+1 = Uτt.
The results of Lu et al. [26] prove that, for the k-core case
(r = 1, s = 2), there is a sufficiently large t such that τt = κ2
(core number). We generalize this result for any nucleus
decomposition. Moreover, we prove the first convergence
bounds for U.
The core idea of [26] is to prove that the τt(·) values never
increase (monotonicity) and are always lower bounded by
core numbers. We generalize their proof for any (r, s) nu-
cleus decomposition.
⊂S,R(cid:48)
Theorem 1. For all t and all r-cliques R:
• (Monotonicity) τt+1(R) ≤ τt(R).
• (Lower bound) τt(R) ≥ κs(R).
Proof. (Monotonicity) We prove by induction on t. Con-
sider the base case t = 0. Note that for all R, τ1(R) =
Uds(R) ≤ ds(R). This is because in Step ?, the H operator
acts on a set of ds(R), and this is largest possible value it
can return. Now for induction (assume the property is true
up to t). Fix an r-clique R, and s-clique S ⊃ R. For τt(R),
one computes the value ρ(S, R) = minR(cid:48)
(cid:54)=R τt−1(R).
By the induction hypothesis, the values ρ(S, R) computed
for τt+1 is at most the value computed for τt. Note that
the H operator is monotone; if one decreases values in a set
K, then H(K) cannot increase. Since the ρ values cannot
increase, τt+1(R) ≤ τt(R).
(Lower bound) We will prove that for any G(cid:48) ⊆ G, R(G(cid:48)) (cid:51)
R, τt(R) ≥ δr,s(G(cid:48)). Lemma 1 completes the proof.
We prove the above by induction on t. For the base case,
τ0(R) = dsG(R) ≥ dsG(cid:48) (R) ≥ δr,s(G(cid:48)). Now for induc-
tion. By the induction hypothesis, ∀ R ∈ R(G(cid:48)), τt(R) ≥
δr,s(G(cid:48)). Consider the computation of τt+1(R), and the val-
ues ρ(S, R) computed in Step ?. For every s-clique S, note
(cid:54)=R τt(R(cid:48)). By the induction hy-
that ρ(S, R) = minR(cid:48)
pothesis, this is at least δr,s(G(cid:48)). By definition of δr,s(G(cid:48)),
dsG(cid:48) (R) ≥ δr,s(G(cid:48)). Thus, in Step ?, H returns at least
δr,s(G(cid:48)).
⊂S,R(cid:48)
Note that this is an intermediate result and we will present
our final result in Lemma 2 at the end.
3.1 Convergence bounds by the degree levels
A trivial upper bound for convergence is the number of r-
cliques in the graph, R(G), because after n iterations n r-
cliques with the lowest κs indices will converge. We present
a tighter bound for convergence. Our main insight is to de-
fine the degree levels of r-cliques, and relate these to the
convergence of τt to κs. We prove that the κs indices in the
i-th level converge within i iterations of the update opera-
tion. This gives quantitative bounds on the convergence.
cliques.
Definition 7. For a graph G,
• C(G) = R(G) ∪ S(G), i.e., set of all r-cliques and s-
• S ∈ C(G) if and only if R ∈ C(G),∀ R ⊂ S.
• If R is removed from C(G), all S ⊃ R are also removed
from C(G).
• Degree levels are defined recursively as follows. The
i-th level is the set Li.
− L0 is the set of r-cliques that has the minimum S-
− Li is the set of r-cliques that has the minimum S-
degree in C.
degree in C \
(cid:83)
j<i Lj.
Figure 4: Illustration of degree levels for the k-core decom-
position. L0 = {a} since it has the minimum degree initially
and the only such vertex. Its removal makes the b with the
minimum degree, so L1 = {b}. After removing vertex b,
there are two vertices with the least degree; L2 = {c, g}.
Lastly, removing those leaves three vertices with the same
degree and L3 = {d, e, f}.
Figure 4 shows the degree levels for k-core decomposition
on a toy graph. We first prove the κs indices cannot decrease
as the level increases. The following proof is closely related
to the fact the minimum degree removal algorithm (peeling)
finds all cores/trusses/nuclei.
Theorem 2. Let i ≤ j. For any Ri ∈ Li and Rj ∈ Lj,
Proof. Let L(cid:48) = (cid:83)
κs(Ri) ≤ κs(Rj).
r≥i Lr, the union of all levels i and
above, and G(cid:48) is the graph such that L(cid:48) = R(G(cid:48)). By def-
inition of the levels, dsG(cid:48) (Ri) = δr,s(G(cid:48)) and dsG(cid:48) (Rj) ≥
dsG(cid:48) (Ri). There exists some κs(Ri)-nucleus T containing
Ri. We split into two cases.
Case 1: R(T ) ⊆ L(cid:48). Thus, κs(Ri) = δr,s(T ) ≤ δr,s(G(cid:48)) =
dsG(cid:48) (Ri). Note that κs(Rj) = minP(cid:51)Rj δr,s(P ), so κs(Rj) ≥
δr,s(G(cid:48)). Hence, κs(Ri) ≤ κs(Rj).
Case 2: R(T ) \ L(cid:48) (cid:54)= ∅. Thus, there exists some r-clique
R(cid:48) ∈ R(T )∩ Lb, where b < i. Choose the R(cid:48) that minimizes
this value of b. Since T is a κs(Ri)-nucleus, dsT (R(cid:48)) ≥
r≥b Lr. Note that R(T ) ⊆ M ,
since we chose R(cid:48) to minimize b. Let Q is the graph such
that M = R(Q). We have dsQ(R(cid:48)) ≥ dsT (R(cid:48)) ≥ κs(Ri).
Since R(cid:48) ∈ Lb, dsQ(R(cid:48)) = δr,s(Q). Since j > b and Rj ∈
M , κs(Rj) ≥ δr,s(Q). Combining the above, we deduce
κs(Ri) ≤ κs(Rj).
κs(Ri). Consider M = (cid:83)
The main convergence theorem is the following. As ex-
plained earlier, it shows that the i-th level converges within
i iterations.
Theorem 3. Fix level Li. For all t ≥ i and R ∈ Li,
τt(R) = κs(R).
(cid:83)
κs(R). Select arbitrary Ra ∈ Li+1, and set L(cid:48) =(cid:83)
Proof. We prove by induction on i. For the base case
i = 0; note that for any R of minimum S-degree in G, κs(R) =
dsG(R) = τ0(R). For induction, assume the theorem is true
up to level i. Thus, for t ≥ i and ∀ R ∈
j≤i Lj, τt(R) =
j≥i+1 Lj.
We partition the s-cliques containing Ra into the "low" set
S(cid:96) and "high" set Sh. s-cliques in S(cid:96) contain some r-clique
outside L(cid:48), and those in Sh are contained in L(cid:48). For every s-
clique S ∈ S(cid:96), there is a Rb ⊂ S such that Rb ∈ Lk for k≤ i.
By the inductive hypothesis, τt(Rb) = κs(Rb). By Theorem 2
applied to Rb ∈ Lk and Ra∈ Li+1, κs(Rb)≤ κs(Ra).
Now we focus on the computation of τt+1(Ra), which
starts with computing ρ(S, Ra) in Step ? of Definition 6.
For every S ∈ S(cid:96), by the previous argument, there is some
r-clique Rb ⊂ S, Rb (cid:54)= Ra, such that τt(Rb)≤ κs(Ra). Thus,
∀ S ∈ S(cid:96), ρ(S, Ra) ≤ κs(Ra). This crucially uses the min in
the setting of ρ(S, Ra), and is a key insight into the general-
ization of iterated H-indices for any nucleus decomposition.
The number of edges in Sh is exactly dsG(cid:48) (Ra) = δr,s(G(cid:48)).
Applying Lemma 1 to Ra ∈ L(cid:48), we deduce κs(Ra) ≥ dsG(cid:48) (Ra).
All in all, for all S ∈ S(cid:96), ρ(S, Ra) is at most κs(Ra). On the
other hand, there are at most κs(Ra) s-cliques in Sh. The
application of the H function in Step ? yields τt+1(Ra) ≤
κs(Ra). But the lower bound of Theorem 1 asserts τt+1(Ra) ≥
κs(Ra), and hence, these are equal. This completes the in-
duction.
We have the following lemma to show that convergence is
guaranteed in a finite number of iterations.
Lemma 2. Given a graph G let l be the maximum i, such
that Ll (cid:54)= ∅ and τl(R) ≥ κs(R) for all r-cliques (e.g., τ0 =
ds) and set τt+1 = Uτt. For some t ≤ l, τt(R) = κs(R), for
all r-cliques.
4. LOCAL ALGORITHMS
We introduce generalized local algorithms to find the κs in-
dices of r-cliques for any (r, s) nucleus decomposition. For
each r-clique, we iteratively apply h-index computation. Our
local algorithms are parallel thanks to the independent na-
ture of the h-index computations. We also explore time and
quality trade-offs by using the iterative nature. We first
present the deterministic synchronous algorithm which does
not depend on the order of processing the r-cliques. It im-
plements the U operator in Definition 6. Then we adapt
our algorithm to work in an asynchronous manner that con-
verges faster and uses less space. For those familiar with lin-
ear algebra, the synchronous and asynchronous algorithms
are analogous to Jacobi and Gauss-Seidel iterations for it-
erative solvers. At the end, we discuss some heuristics and
key implementation details for shared-memory parallelism
in OpenMP.
4.1 Synchronous Nucleus Decomposition (Snd)
We use the update operator U to compute the k-(r, s) nuclei
of a graph G in a synchronous way. Algorithm 2 (Snd)
implements the Definition 6 for functions τ0 = ds and τt+1 =
Uτt to find the κs indices of r-cliques in graph G.
Snd algorithm iterates until no further updates occur for
any τ index, which means all the τ indices converged to
κs. Computation is performed synchronously on all the r-
cliques and at each iteration i, τi indices are found for all
r-cliques. We declare two arrays, τ (·) and τ p(·), to store the
indices being computed and the indices that were computed
in the previous iteration, respectively (Lines 1 and 4). τ (·)
are initialized to the S-degrees of the r-cliques since τ0 = ds
(Line 2). At each iteration, newly computed τ (·) indices
are backed up in τ p(·) (Line 7), and the new τ (·) indices
are computed. During the iterative process, convergence
is checked by the flag F (Line 5), which is initially set to
true (Line 3) and stays true as long as there is an update
on a τ index (Lines 6, 13, and 14).
Computation of the new τ (·) indices for each r-clique can
be performed in parallel (Lines 8 to 15). For each r-clique
R, we apply the two step process in the Definition 6. First,
for each s-clique S that contains R, we compute the ρ values
that is the minimum τ p index of an r-clique R(cid:48) ⊂ S (R(cid:48) (cid:54)= R)
and collect them in a set L (Lines 10 to 12). Then, we
assign the h-index of the set L as the new τ index of the
r-clique (Line 15). The algorithm continues until there are
no updates on the τ index ' (Lines 13 and 14). Once the
dgcebfaL0L1L2L3abcgdefAlgorithm 2: Snd: Synchronous Nucleus Decomp
Algorithm 3: And: Asynchronous Nucleus Decomp.
6
7
8
9
10
11
12
13
14
15
16
17
Input: G: graph, r, s: positive integers (r < s)
Output: κs(·): array of κs indices for r-cliques
1 τ (·) ← indices ∀ R ∈ R(G)
// current iteration
2 τ (R) ← ds(R) ∀ R ∈ R(G) // set to the S-degrees
3 F ← true
// stays true if any τ (R) is updated
4 τ p(·) ← backup indices ∀ R ∈ R(G) // prev.
iter.
5 while F do
6
7
8
9
10
11
12
F ← false
τ p(R) ← τ (R) ∀ R ∈ R(G)
for each R ∈ R(G) in parallel do
L ← empty set
for each s-clique S ⊃ R do
∈Ns(R) τ p(R(cid:48))
ρ ← minR(cid:48)
L . add (ρ)
15
13
14
if τ p(R) (cid:54)= H(L) then
F ← true
τ (R) ← H(L)
16 κs(·) ← τ (·)
17 return array κs(·)
τ indices converge, we assign them to κs indices and finish
(Lines 16 and 17).
Time complexity: Snd algorithm starts with enumer-
ating the r-cliques (not shown in the pseudocode) and its
runtime is denoted by RTr(G) (this part can be parallelized
as well, but we ignore that for now). Then, each itera-
tion (Lines 5 to 15) is performed t times until convergence
where t is the total number of iterations for which we pro-
vided bounds in Section 3.1. In each iteration, each r-clique
R ∈ R is processed once, which is parallelizable. Suppose
R has vertices v1, v2,··· , vr . We can find all s-cliques con-
taining R by looking at all (s − r)-tuples in each of the
neighborhoods of vi (Indeed, it suffices to look at just one
v∈R d(v)s−r)/p =
v∈V dR(v)d(v)s−r)/p time if
p threads are used for parallelism. Note that the h-index
computation can be done incrementally without storing all
ρ values in set L (see Section 4.4). Overall, the time com-
plexity of Snd using p threads is:
such neighborhood). This takes ((cid:80)
((cid:80)
R(cid:51)v d(v)s−r)/p = ((cid:80)
(cid:80)
(cid:80)
v∈V
R
Figure 5: Snd (Algorithm 2) for the k-truss decomposition
(r = 2, s = 3). We find the κ3 indices. Triangle counts
of all the edges are computed (d3) and set as their τ0 val-
ues (blue). For each edge, we first compute τ1 indices (red)
based on the τ0 indices. The bc edge, for instance, has three
triangles and for each of those we find the neighbor with the
minimum τ0 index and compute the h-index. So, τ1(bc) =
H{min(τ0(ba), τ0(ca)), min(τ0(bd), τ0(cd)), min(τ0(be),
τ0(ce))} = H{3, 2, 2} = 2. No updates happen in the sec-
ond iteration (green), so convergence is obtained in a single
iteration.
Input: G: graph, r, s: positive integers (r < s)
Output: κs(·): array of κs indices for r-cliques
1 τ (·) ← indices ∀ R ∈ R(G)
// current iteration
2 τ (R) ← ds(R) ∀ R ∈ R(G) // set to the S-degrees
3 F ← true
// stays true if any τ (R) is updated
4 c(R) ← true ∀ R ∈ R(G)
5 while F do
F ← false
for each R ∈ R(G) in parallel do
if c(R) is false then cont. else c(R) ← false
L ← empty set
for each s-clique S ⊃ R do
∈Ns(R) τ (R(cid:48))
ρ ← minR(cid:48)
L . add (ρ)
if τ (R) (cid:54)= H(L) then
F ← true, c(R) ← true
for each R(cid:48) ∈ Ns(R) do
if H(L) ≤ τ (R(cid:48)) then
c(R(cid:48)) ← true
18
τ (R) ← H(L)
19 κs(·) ← τ (·)
20 return array κs(·)
(cid:16)
RTr(G) + t(cid:0)(cid:88)
dR(v)d(v)s−r(cid:1)/p
(cid:17)
(1)
O
v∈V
When t = p, complexity is same as the sequential peeling
algorithm's (Algorithm 1) and Snd is work-efficient.
Space complexity:
In addition to the space that is
needed to store r-cliques (taking O(r R(G))), we need to
store τ indices for the current and the previous iterations,
which takes O(R(G)) space, i.e., number of r-cliques. ρ
values are not need to be stored in set L since the h-index
computation can be done incrementally. So, the total space
complexity is O(R(G)) (since r = O(1)).
Figure 5 illustrates the Snd algorithm for k-truss decom-
position (r = 2, s = 3) on a toy graph, where the partici-
pations of edges (2-cliques) in triangles (3-cliques) are ex-
amined. Triangle counts of all the edges (d3) are computed
and set as their τ0 values (in blue). For each edge, first we
compute τ1 indices (in red) based on the τ0 indices (Lines 5
to 15). For instance, the ae edge has four triangles and for
each of those we find the neighbor with minimum τ0 index
(Lines 10 to 12); thus L = {(min(τ0(eb), τ0(ab)), min(τ0(ec),
τ0(ac)), min(τ0(eg) , τ0(ag)), min(τ0(ef ), τ0(af ))} = {2, 2, 1,
1} and τ1(ae) = H(L) = 2 (Line 15). Since the τ in-
dex is updated, we set flag F true to continue iterations.
In the second iteration (τ2 indices), no update occurs, i.e.,
τ2(e) = τ1(e) for all edges, thus the algorithm termnates.
So, one iteration is enough for the convergence and we have
κ3 = τ1 for all the edges.
4.2 Asynchronous Nucleus Decomposition (And)
In the Snd algorithm, updates on the τ indices are syn-
chronous and all the r-cliques are processed by using the
same snapshot of τ indices. However, when an r-clique R
is being processed in iteration i, a neighbor r-clique R(cid:48) ∈
Ns(R) might have already completed its computation in that
iteration and updated its τ index. By Theorem 1, we know
that the τ index can only decrease as the algorithm pro-
ceeds. Lower τ (R(cid:48)) indices in set L can decrease H(L), and
becdagf2 2 21 1 12 1 11 1 12 2 23 2 23 2 22 2 22 2 24 2 23 2 23 2 21 1 11 1 1becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure5:Trussexampleplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Thus,itisnotpossibletodeducewhether⌧(R)hascon-vergedto(R)byjustlookingatconsecutive⌧(R)indices.Inordertoskiptheintermediateorfinalplateausduringtheconvergence,weintroduceanotificationmechanismwhereanr-cliquenotifiesitsneighborswhenits⌧indexisupdated.OrangelinesinAlgorithm3presentsthenotificationmech-anismweplugintotheasynchronouscomputation.c(·)arrayisdeclaredinline4totrackwhetheranR2R(G)hasupdatedits⌧indexornot.c(R)=falsemeansthatRisanidler-cliqueandthereisnoneedtorecomputeits⌧value,asshowninline8.Thus,allc(·)issettotrueatthebeginningtoinitiatethecomputationsforallther-cliques.Eachr-cliquemarksitselfidleattheendofaniteration(line17)andwaitsuntilanupdatehappensinthe⌧in-dexofaneighbor.Wheneverthe⌧indexofanr-cliqueisupdated,allitsneighborsarenotifiedandwokenupsincetheir⌧indicesmightbea↵ected(line15).Notethatsomeneighborsmightalreadybeactiveatthattimeandmissesthenewupdate,butitisoksincethefollowingiterationswillhandleit -- intheworstcaseitwillbeasynchronouscomputation.⌧0⌧1⌧2⌧3⌧0⌧1⌧2d33⌧0⌧1d22Figure5illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9MHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-toconverge.Indeed,aistheonlyvertexthathasnotreachedits2valueattheendoffirstiteration.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.4.2.1SkippingtheplateausAndalgorithmconvergeswhennoneofther-cliquesup-datetheir⌧indicesanymore.Consequently,computationsareperformedforallther-cliquesevenwhenonlyoneup-dateoccurs.Figure5showsthe⌧indicesofsomeedgesinthefacebookgraphduringthek-trussdecomposition(r=2,s=3).Therearewideplateauswhere⌧indicesstayconstant.However,thosecomputationsareredundant.When⌧(R)convergestos(R)foranr-cliqueR,nomorecomputationsareneededforRanymore.Butwedonotknowifthe⌧(R)hasconvergedornotbyonlywatchingtheplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Thus,itisnotpossibletodeducewhether⌧(R)hascon-vergedto(R)byjustlookingatconsecutive⌧(R)indices.Inordertoskiptheintermediateorfinalplateausduringtheconvergence,weintroduceanotificationmechanismwhereanr-cliquenotifiesitsneighborswhenits⌧indexisupdated.OrangelinesinAlgorithm3presentsthenotificationmech-anismweplugintotheasynchronouscomputation.c(·)arrayisdeclaredinline4totrackwhetheranR2R(G)hasupdatedits⌧indexornot.c(R)=falsemeansthatRisanidler-cliqueandthereisnoneedtorecomputeits⌧value,asshowninline8.Thus,allc(·)issettotrueatthebeginningtoinitiatethecomputationsforallther-cliques.Eachr-cliquemarksitselfidleattheendofaniteration(line17)andwaitsuntilanupdatehappensinthe⌧in-dexofaneighbor.Wheneverthe⌧indexofanr-cliqueisupdated,allitsneighborsarenotifiedandwokenupsincetheir⌧indicesmightbea↵ected(line15).Notethatsomeneighborsmightalreadybeactiveatthattimeandmissesthenewupdate,butitisoksincethefollowingiterationswillhandleit -- intheworstcaseitwillbeasynchronouscomputation.⌧0⌧1⌧2⌧3⌧0⌧1⌧2d3322cdbfea1132211222112222degree (d2) 1 in SND & AND alph. ordercore number ( 2)22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexample22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:Weapplythek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).Sndalgorithmconvergesintwoiterations(⌧1sinred,⌧2=2singreen).SamehappenswhenweuseAndalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,Andconvergesinasingleiteration.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedintheprevi-ousiterationanditisexactlytheSNDalgorithm.ErdemSAYS:Iactuallybelievethatprocessingtheverticesinnon-increasingorderoftheirindiceswillgivetheworstcaseforAndalgorithm.It'sjustanintuitionbasedonthebestcasetheorem,notsureifIcanprove.Ifyoucanprove,Icanincludesomeworstcasenumbersinexp.sectionFigure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1. 0 10 20 30 40 50 60 70 80 90 0 2 4 6 8 10 12 14 16t indicesnumber of iterationsFigure3:ChangesasdIfwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2value.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.01020304050607080900246810121416⌧indicesnumberofiterations4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)indicesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.Additional22cdbfea1132211222112222degree (d2) 1 in SND & AND alph. ordercore number ( 2)22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexample22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:Weapplythek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).Sndalgorithmconvergesintwoiterations(⌧1sinred,⌧2=2singreen).SamehappenswhenweuseAndalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,Andconvergesinasingleiteration.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedintheprevi-ousiterationanditisexactlytheSNDalgorithm.ErdemSAYS:Iactuallybelievethatprocessingtheverticesinnon-increasingorderoftheirindiceswillgivetheworstcaseforAndalgorithm.It'sjustanintuitionbasedonthebestcasetheorem,notsureifIcanprove.Ifyoucanprove,Icanincludesomeworstcasenumbersinexp.sectionFigure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1. 0 10 20 30 40 50 60 70 80 90 0 2 4 6 8 10 12 14 16truss valuesnumber of iterationsFigure3:asdIfwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2value.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)indicesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheotherFigure5:Changesinthe⌧indicesofsomeedgesinfacebookgraphduringthek-trussdecomposition(r=2,s=3).Notethattherearewideplateausduringtheconvergence,especiallyattheend,whereedgesdonotchangetheir⌧indices.Plateauscanbealsoobservedinthemiddleofthecomputationlikethetoptwolines.⌧0⌧1d22Figure2illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].OurSND : triangle count :truss number : toconverge.Indeed,aistheonlyvertexthathasnotreachedits2valueattheendoffirstiteration.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.4.2.1SkippingtheplateausAndalgorithmconvergeswhennoneofther-cliquesup-datetheir⌧indicesanymore.Consequently,computationsareperformedforallther-cliquesevenwhenonlyoneup-dateoccurs.Figure5showsthe⌧indicesofsomeedgesinthefacebookgraphduringthek-trussdecomposition(r=2,s=3).Therearewideplateauswhere⌧indicesstayconstant.However,thosecomputationsareredundant.When⌧(R)convergestos(R)foranr-cliqueR,nomorecomputationsareneededforRanymore.Butwedonotknowifthe⌧(R)hasconvergedornotbyonlywatchingtheplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Thus,itisnotpossibletodeducewhether⌧(R)hascon-vergedto(R)byjustlookingatconsecutive⌧(R)indices.Inordertoskiptheintermediateorfinalplateausduringtheconvergence,weintroduceanotificationmechanismwhereanr-cliquenotifiesitsneighborswhenits⌧indexisupdated.OrangelinesinAlgorithm3presentsthenotificationmech-anismweplugintotheasynchronouscomputation.c(·)arrayisdeclaredinline4totrackwhetheranR2R(G)hasupdatedits⌧indexornot.c(R)=falsemeansthatRisanidler-cliqueandthereisnoneedtorecomputeits⌧value,asshowninline8.Thus,allc(·)issettotrueatthebeginningtoinitiatethecomputationsforallther-cliques.Eachr-cliquemarksitselfidleattheendofaniteration(line17)andwaitsuntilanupdatehappensinthe⌧in-dexofaneighbor.Wheneverthe⌧indexofanr-cliqueisupdated,allitsneighborsarenotifiedandwokenupsincetheir⌧indicesmightbea↵ected(line15).Notethatsomeneighborsmightalreadybeactiveatthattimeandmissesthenewupdate,butitisoksincethefollowingiterationswillhandleit -- intheworstcaseitwillbeasynchronouscomputation.⌧0⌧1⌧2⌧3⌧0⌧1⌧2d3322cdbfea1132211222112222degree (d2) 1 in SND & AND alph. ordercore number ( 2)22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexample22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:Weapplythek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).Sndalgorithmconvergesintwoiterations(⌧1sinred,⌧2=2singreen).SamehappenswhenweuseAndalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,Andconvergesinasingleiteration.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedintheprevi-ousiterationanditisexactlytheSNDalgorithm.ErdemSAYS:Iactuallybelievethatprocessingtheverticesinnon-increasingorderoftheirindiceswillgivetheworstcaseforAndalgorithm.It'sjustanintuitionbasedonthebestcasetheorem,notsureifIcanprove.Ifyoucanprove,Icanincludesomeworstcasenumbersinexp.sectionFigure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1. 0 10 20 30 40 50 60 70 80 90 0 2 4 6 8 10 12 14 16t indicesnumber of iterationsFigure3:ChangesasdIfwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2value.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.01020304050607080900246810121416⌧indicesnumberofiterations4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)indicesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.Additional22cdbfea1132211222112222degree (d2) 1 in SND & AND alph. ordercore number ( 2)22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexample22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:Weapplythek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).Sndalgorithmconvergesintwoiterations(⌧1sinred,⌧2=2singreen).SamehappenswhenweuseAndalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,Andconvergesinasingleiteration.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedintheprevi-ousiterationanditisexactlytheSNDalgorithm.ErdemSAYS:Iactuallybelievethatprocessingtheverticesinnon-increasingorderoftheirindiceswillgivetheworstcaseforAndalgorithm.It'sjustanintuitionbasedonthebestcasetheorem,notsureifIcanprove.Ifyoucanprove,Icanincludesomeworstcasenumbersinexp.sectionFigure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1. 0 10 20 30 40 50 60 70 80 90 0 2 4 6 8 10 12 14 16truss valuesnumber of iterationsFigure3:asdIfwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2value.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)indicesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheotherFigure5:Changesinthe⌧indicesofsomeedgesinfacebookgraphduringthek-trussdecomposition(r=2,s=3).Notethattherearewideplateausduringtheconvergence,especiallyattheend,whereedgesdonotchangetheir⌧indices.Plateauscanbealsoobservedinthemiddleofthecomputationlikethetoptwolines.⌧0⌧1d22Figure2illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourcdbfea1 1 1 1SND & AND {a,b,c,d,e,f} : AND {f,e,a,b,d,c} :degree, core number : becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.2 1 1 12 2 1 13 2 2 22 2 2 22 2 2 2becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.Figure3:Wedothek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).SNDalgorithmconvergesintwoit-erations(⌧1sinred,⌧2singreen).SamehappenswhenweusetheANDalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,ANDconvergesinasingleiteration.So,setL={(min(⌧0(eb),⌧0(ab)),min(⌧0(ec),⌧0(ac)),min(⌧0(eg),⌧0(ag)),min(⌧0(ef),⌧0(af))}={2,2,1,1}and⌧1(ae)=H(L)=2(line14).Sincethe⌧indexisupdated,wesetflagFtruetocontinueiterations.Af-tercompleting⌧1computations,wegofor⌧2indices(ingreen)andobservethatthereisnoupdateinanyedge,i.e.,⌧2(e)=⌧1(e)foralledges,thuscompletingthealgorithm.Oneiterationisenoughfortheconvergenceandwehave3=⌧1foralledges.4.2AsynchronousNucleusDecomposition(AND)InSndalgorithm,updatesonthe⌧indicesaresynchronousandallther-cliquesareprocessedbasedonthesamesnap-shotof⌧indices.However,whenanr-cliqueRisbeingprocessediniterationi,anotherr-cliqueR0participatinginthesames-cliquewithR(i.e.,S3R^R02S)mighthavealreadycompleteditscomputationinthatiterationandup-datedits⌧index.ByTheorem1,weknowthatthe⌧indexcanonlydecreasebythetime.Lower⌧(R0)indicesinsetLmightdecreaseH(L),anditcanhelp⌧(R)toconverges(R)faster.So,itisbettertousetheup-to-date⌧indicesforfasterconvergence.Inaddition,therewouldbenoneedtostorethe⌧indicescomputedinthepreviousiteration,savingR(G)space.WeintroduceAndalgorithm(Algorithm3)toleveragetheup-to-date⌧indicesforfasterconvergence(Orangelinescanbeignoredfornow).Ateachiteration,weproposetousethelatestavailableinformationaroundanr-clique.Re-movingthegreenlinesinSndalgorithmandputtingthebluelinesinAndalgorithmaresu cienttoswitchfromsynchronoustoasynchronouscomputation.Wedonotneedtousethe⌧p(·)tobackuptheindicesinthepreviousitera-tionanymore,solines4and7inAlgorithm2areremoved.Computationisdoneonthelatest⌧indices,soweadjustthelines11and13(inAlgorithm2and3)accordingly,tousetheup-to-date⌧indices.Inthesameiteration,eachr-cliquecanhaveadi↵erentviewofthe⌧(·)andupdatesaredoneasynchronouslyinsomeorder.Theconvergencelength,Lr,s(G),dependsonthecomputationorderofther-cliques,whichisusedinline7inAlgorithm3.Consideringthesequentialcomputation,wehavethefollowingtheoremregardingthebestorderingthatwillresultinconvergence.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure3illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(de-grees).WefirstapplySnd.Vertexdegreesaresetas⌧0indices(blue).Foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'de-grees,(red).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainsincesomeupdateshappenedin⌧indices.⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1andcontinueiterations.Noupdateisobservedin⌧3indices(yellow),whichmeanss=⌧2forallverticesandSndconvergesintwoitera-tions.RegardingtheAndalgorithm,saywechoosetofol-lowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisorderenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,3})=1.However,ifwechoosetoprocesstheverticesinthealphabeticalorder,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,3})=2,andneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2valueattheendoffirstiteration.Intheseconditeration,weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,anupdate,thuscontinueiterat-ing.Thirditerationdoesnotchangethe⌧indices,soAndwith{a,b,c,d,e,f}orderconvergesintwoiterations,sameasSnd.(3)4.2.1SkippingtheplateausSndandAndalgorithmsconvergewhennoneofther-cliquesupdatetheir⌧indicesanymore.Consequently,com-putationscontinuetobeperformedforallther-cliquesevenwhenonlyoneupdateoccursandwealsoneedanextraitera-tiontoinfertheconvergence.Figure4showsthe⌧indicesofsomeedgesinthefacebookgraphduringthek-trussdecom-position(r=2,s=3).Thereareplentyofwideplateauswhere⌧indicesstayconstant.However,thosecomputationsareredundant.Forexample,when⌧(R)convergestos(R)foranr-cliqueR,nomorecomputationsareneededforRanymore.Butwedonotknowifthe⌧(R)hasconvergedornotbylookingattherepeating⌧indicesorwatchingtheplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Inordertoinfertheconvergencee cientlyandskipanyFigure 6: Snd (Algorithm 2) and And (Algorithm 3, w/o
orange lines) for the k-core decomposition (r = 1, s = 2).
We find the κ2 indices (core numbers) of vertices (edge is 2-
clique). τ0 indices are initialized to the degrees (d2 in blue).
Snd algorithm uses the τi−1 indices to compute the τi indices
and converges in two iterations (τ1 in red, τ2 in green, τ3
in orange). Same happens when we use And and follow
the {a,b,c,d,e,f} order to process the vertices. On the other
hand, if we choose the order by degree levels, {f,e,a,b,c,d},
convergence is obtained in a single iteration.
it can help τ (R) to converge faster. So, it is better to use
the up-to-date τ indices for faster convergence. In addition,
there would be no need to store the τ indices computed in
the previous iteration, saving R(G) space.
We introduce the And algorithm (Algorithm 3) to lever-
age the up-to-date τ indices for faster convergence (ignore
the orange lines for now). At each iteration, we propose
to use the latest available information in the neighborhood
of an r-clique. Removing the green lines in the Snd algo-
rithm and inserting the blue lines in the And algorithm are
sufficient to switch from synchronous to asynchronous com-
putation. We do not need to use the τp(·) to back up the
indices in the previous iteration anymore, so Lines 4 and 7 in
Algorithm 2 are removed. Computation is done on the latest
τ indices, so we adjust the Lines 11 and 13 in Algorithm 2
accordingly, to use the up-to-date τ indices.
In the same iteration, each r-clique can have a different
view of the τ (·) and updates are done asynchronously in
an arbitrary order. Number of iterations for convergence
depends on the processing order (Line 7 in Algorithm 3)
and never more than the Snd algorithm.
Time complexity: The worst case for And happens
when all the r-cliques see the τ indices of their neighbors
that are computed in the previous iteration, which exactly
corresponds to the Snd algorithm. Thus the time complex-
ity of And is same as Snd's (Equation (1)). However, in
practice we expect fewer iterations.
Space complexity: The only difference with Snd is that
we do not need to store the τ values in the previous iteration
anymore. So, it is still O(R(G)).
Figure 6 illustrates And algorithm with two different or-
derings and the Snd algorithm on the k-core case (r =
1, s = 2). Focus is on vertices (1-cliques) and their edge
(2-clique) counts (degrees). We start with Snd. Vertex de-
grees are set as τ0 indices (blue). For each vertex u we
compute the τ1(u) = H({τ0(v) : v ∈ N2(u)} (red), i.e.,
h-index of its neighbors' degrees. For instance, vertex a
has two neighbors, e and b, with degrees 2 and 3. Since
H({2, 3}) = 2, we get τ1(a) = 2. For vertex b, we get
τ1(b) = H({2, 2, 2}) = 2. After computing all the τ1 indices,
τ values of vertices e and b are updated, thus we compute
the τ2 indices, shown in green. We observe an update for
the vertex a; τ2(a) = H({τ1(e), τ1(b)}) = H({1, 2}) = 1 and
Figure 7: Changes in τ indices of randomly selected edges
in facebook graph during the k-truss decomposition. Wide
plateaus appear during the convergence, especially at the end.
continue computation. For τ3 indices (orange), no update is
observed which means that κs = τ2, and Snd converges in
two iterations. Regarding the And algorithm, say we choose
to follow the increasing order of degree levels (noted in pur-
ple) where L0 = {f}, L1 = {e}, L2 = {a}, L3 = {b,c,d}.
Computing the τ1 indices on this order enables us to reach
the convergence in a single iteration. For instance, τ1(a) =
H({τ1(e), τ0(b)}) = H({1, 3}) = 1. However, if we choose to
process the vertices in a different order than the degree lev-
els, say {a,b,c,d,e,f}, we have τ1(a) = H({τ0(e), τ0(b)}) =
H({2, 3}) = 2, and need more iteration(s) to converge. In-
deed, a is the only updated vertex.
In the second itera-
tion, we get τ2(a) = H({τ1(e), τ1(b)}) = H({1, 2}) = 1, an
update, thus continue iterating. Third iteration does not
change the τ indices, so And with {a,b,c,d,e,f} order con-
verges in two iterations, just as the Snd.
4.3 Avoiding redundant work by notifications
Snd and And algorithms converge when no r-clique updates
its τ index anymore. Consequently, update on all r-cliques
continue even when only one update occurs and we need an
extra iteration to detect convergence. Figure 7 shows the
τ indices of randomly selected edges in the facebook graph
during k-truss decomposition (r = 2, s = 3). There are
plenty of wide plateaus where τ indices stay constant, which
implies redundant computations. How can we avoid this re-
dundancy? Observe that repeating τ indices or plateaus are
not sufficient, because an update can still occur after main-
taining the same τ index for a number of iterations, creating
a plateau. In order to efficiently detect the convergence and
skip any plateaus during the computation, we introduce a
notification mechanism where an r-clique is notified to re-
compute its τ index, if any of its neighbors has an update.
Orange lines in Algorithm 3 present the notification mech-
anism added to And. c(·) array is declared in (Line 4)
to track whether an R ∈ R(G) has updated its τ index.
c(R) = false means R did not update its τ index, it is an
idle r-clique, and there is no need to recompute its τ value
for that iteration (Line 8). A non-idle r-clique is called ac-
tive. Thus, all c(·) is set to true at the beginning to initiate
the computations for all r-cliques. Each r-clique marks itself
idle at the beginning of an iteration (Line 8) and waits for
an update in a neighbor. When the τ (R) is updated, τ in-
dices of some neighbor r-cliques in Ns(R) might be affected
and they should be notified. If R(cid:48) ∈ Ns(R), if τ (R(cid:48)) < H(L)
(new τ (R)) then τ (R(cid:48)) ≤ τ (R) already in the previous iter-
ation (Theorem 1), and thus no change can happen in the
h-index computation. Therefore, we only need to notify the
neighbors that have τ indices greater than or equal to H(L)
(Lines 15 to 17). This version of our algorithm requires an
additional O(R(G)) space for c(·) array and does not of-
fer a theoretical improvement in time-complexity. However,
cdbfea1 1 1 1SND & AND {a,b,c,d,e,f} : AND {f,e,a,b,d,c} :degree, core number : becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.2 1 1 12 2 1 13 2 2 22 2 2 22 2 2 2becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.L0L1L2L3 0 20 40 60 80 0 2 4 6 8 10 12 14 16tau indicesnumber of iterationsFigure 8: k-core decomposition (r = 1, s = 2) by And (Al-
gorithm 3) that uses the notification mechanism. After the
first iteration, the only active vertex is a. In the second it-
eration, computation updates τ (a) and thus notifies vertices
b and e. In the third iteration, their τ indices are recom-
puted and no update happens. All the vertices become idle,
thus convergence is obtained. 9 τ computations performed
in 3 iterations by And with notification mechanism, while
24 τ computations are done in 4 iterations if notification
mechanism is not used (Figure 6).
avoiding redundant computations yields faster runtimes in
practice.
Figure 8 illustrates the notification mechanism on the
graph in Figure 6, processing the vertices in the a,b,c,d,e,f
order. Again, vertex degrees are set as τ0 indices (blue)
and we compute τ1(u) = H({τ0(v) : v ∈ N2(u)}, i.e., h-
index of its neighbors' degrees, (red) for each vertex u. No
update happens for vertex a and no vertices are notified.
τ (b) is updated as 2 and we check if any neighbors of b
has a τ index ≥ 2 (Line 16). All its neighbors have such
τ indices, thus all are notified: a, c, d. Vertices c and d
do not update their τ indices. Then, τ (e) is updated as 1
and since τ0(e) ≥ τ1(a) > τ1(e), vertices a and f are noti-
fied for recomputing its τ index. At that instant, vertices
a and f are active. Next, vertex f is processed and does
not change its τ index, so all the vertices except a are idle
now. In the second iteration, we only process a and com-
pute τ2(a) = H{τ1(e), τ1(b)} = H{1, 2} = 1. Update in
τ (a) notifies vertices b and e since both have ≥ τ indices.
In the third iteration, we recompute τ indices for b and
e, but there is no update. So all the vertices become idle,
implying convergence. Overall, it takes 9 τ computations
and 3 iterations for the And with notification mechanism,
while 24 τ computations and 4 iterations are needed without
the notification mechanism (Figure 6). So the notification
mechanism is helpful to avoid redundant computations.
PartialAnd on a set of r-cliques: Local nature of the
And algorithm enables selection of a set of r-cliques and its
application only to this set until convergence. This is useful
in query-driven scenarios where the focus is on a single (or a
few) vertex/edge. We define PartialAnd as the application
of And algorithm on a set of given r-cliques, say P . We only
modify the orange lines in Algorithm 3 where c of an r-clique
is re-computed only if it is in set P . This way we just limit
the And computation on a small set. We give an application
of PartialAnd in Section 5.3 where the computation is
limited on a given r-clique and its neighbors.
4.4 Heuristics and implementation
We introduce key implementation details for the shared-
memory parallelism and heuristics for efficient h-index com-
putation. We used OpenMP [7] to utilize the shared-memory
architectures. The loops, annotated as parallel in Algo-
rithms 2 and 3, are shared among the threads, and each
Table 2: Statistics about our dataset; number of vertices,
edges, triangles and four-cliques (K4).
V
E
(cid:52)
65.6M
4K 88.2K
1.8B
as-skitter (ask)
facebook (fb)
friendster (fri)
soc-LiveJournal (slj)
soc-orkut (ork)
K4
1.7M 11.1M 28.8M 148.8M
1.6M 30.0M
8.9B
4.1B
9.9B
4.8M 68.5M 285.7M
2.9M 106.3M 524.6M
2.4B
soc-sign-epinions (sse) 131.8K 711.2K
4.9M 58.6M
soc-twitter-higgs (hg) 456.6K 12.5M 83.0M 429.7M
1.3M 13.1M 104.9M
4.3M 13.4M 39.9M
1.1M
8.9M 231.9M
3.1M 37.0M 88.8M 162.9M
twitter (tw)
81.3K
web-Google (wgo) 916.4K
web-NotreDame (wnd) 325.7K
wiki-200611 (wiki)
thread is responsible for its partition of r-cliques. No syn-
chronization or atomic operation is needed. Default schedul-
ing policy in OpenMP is static and it distributes the iter-
ations of the loop to the threads in chunks, i.e., for two
threads, one takes the first half and the other takes the sec-
ond. This approach does not work well for our algorithms,
since the notification mechanism may result in significant
load imbalance among threads. If most of the idle r-cliques
are assigned to a certain thread, this thread quickly finishes,
and remains idle until the iteration ends. To prevent this,
we adopted the dynamic scheduling where each thread is
given a new workload once it idle. We set chunk size to 100
and observed no significant difference for other values. No
thread stays idle this way, improving parallel efficiency.
h-index computation for a list of numbers is traditionally
done by sorting the numbers in the non-increasing order and
checking the values starting from the head of the list to find
the largest h value for which at least h items exist with at
least h value. Main bottleneck in this routine is the sorting
operation which takes O(nlogn) time for n numbers. We
use a linear time algorithm that uses a hashmap and does
not include sorting to compute the h-index. h is initialized
as zero and we iterate over the items in the list. At each
step, we attempt to increase the current h value based on
the inspected item. For the present h value in a step, we
keep track of the number of items examined so far that have
value equal to h. We use a hashmap to keep track of the
number of items that has at least h value, and ignore values
smaller than h. This enables the computation of the h-
index in linear time and provides a trade-off between time
and space. In addition, after the initialization, we check to
see if the current τ index can be preserved. Once we see at
least τ items with index at least τ , no more checks needed.
5. EXPERIMENTS
We evaluate our algorithms on three instances of the (r, s)
nucleus decomposition: k-core ((1, 2)), k-truss ((2, 3)), and
(3, 4) nucleus, which are shown to be the practical and ef-
fective [37, 38]. We do not store the s-cliques during the
computation for better scalability in terms of the mem-
ory space.
Instead, we find the participations of the r-
cliques in the s-cliques on-the-fly [37]. Our dataset con-
tains a diverse set of real-world networks from SNAP [25]
and Network Repository [32] (see Table 2), such as internet
topology network (as-skitter), social networks (facebook,
friendster, soc-LiveJournal, soc-orkut), trust network
(soc- sign-epinions), Twitter follower-followee networks
(soc-twitter -higgs, twitter), web networks (web-Google,
web- NotreDame), and a network of wiki pages (wiki-200611).
cdbfea1 1 12 1 12 2 13 2 22 2 22 2 2AND with notification {a,b,c,d,e,f} becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R) ⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure5:Trussexampleplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Thus,itisnotpossibletodeducewhether⌧(R)hascon-vergedto(R)byjustlookingatconsecutive⌧(R)indices.Inordertoskiptheintermediateorfinalplateausduringtheconvergence,weintroduceanotificationmechanismwhereanr-cliquenotifiesitsneighborswhenits⌧indexisupdated.OrangelinesinAlgorithm3presentsthenotificationmech-anismweplugintotheasynchronouscomputation.c(·)arrayisdeclaredinline4totrackwhetheranR2R(G)hasupdatedits⌧indexornot.c(R)=falsemeansthatRisanidler-cliqueandthereisnoneedtorecomputeits⌧value,asshowninline8.Thus,allc(·)issettotrueatthebeginningtoinitiatethecomputationsforallther-cliques.Eachr-cliquemarksitselfidleattheendofaniteration(line17)andwaitsuntilanupdatehappensinthe⌧in-dexofaneighbor.Wheneverthe⌧indexofanr-cliqueisupdated,allitsneighborsarenotifiedandwokenupsincetheir⌧indicesmightbea↵ected(line15).Notethatsomeneighborsmightalreadybeactiveatthattimeandmissesthenewupdate,butitisoksincethefollowingiterationswillhandleit -- intheworstcaseitwillbeasynchronouscomputation.⌧0⌧1⌧2⌧3⌧0⌧1⌧2d33⌧0⌧1d22Figure5illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9MHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoree ciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee ⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-Table 3: Number of iterations for the theoretical upper
bound, Degree Levels (DL)(Section 3.1), Snd, and And al-
gorithms.
21
11
23
14
slj ork
ask
DL 1195
63
Snd
And
33
DL 1605
118
Snd
And
58
fb
352 3479 5165 1713
73
37
859 5401 4031 2215
101
53
DL 1734 1171 7426 3757 2360
Snd
109
51
And
hg wgo wiki
384 2026
55
30
254 2824
562
410
157 1559
122
107
33
19
38
23
20
11
11
6
99
51
86
44
123
73
147
73
207
103
196
116
k-core
k-truss
(3, 4)
72
41
All experiments are performed on a Linux operating sys-
tem running on a machine with Intel Ivy Bridge processor at
2.4 GHz with 64 GB DDR3 1866 MHz memory. There are
two sockets on the machine and each has 12 cores, making
24 cores in total. Algorithms are implemented in C++ and
compiled using gcc 6.1.0 at the -O2 level. We used OpenMP
v4.5 for the shared-memory parallelization. Code is avail-
able at http://sariyuce.com/pnd.tar.
We first investigate the convergence characteristics of our
new algorithms in Section 5.1. We compare the number of
iterations that our algorithms need for the convergence and
also examine the convergence rates for the κ values. In ad-
dition, we investigate how the densest subgraphs evolve and
present a metric that can be monitored to determine the
"good-enough" decompositions so that trade-offs between
quality and runtime can be enjoyed. Then, we evaluate the
runtime performance in Section 5.2. In particular, we exam-
ine the impact of notification mechanism (Section 4.3) on the
And algorithm, show the scalability for our best performing
method, and compare it with respect to the partially par-
allel peeling algorithms. We also examine the runtime and
accuracy trade-off for our algorithms. Last, but not least,
we highlight a query-driven scenario in Section 5.3 where our
algorithms are used on a subset of vertices/edges to estimate
the core and truss numbers.
5.1 Convergence Analysis
Here we study the following questions:
How quickly do they approach to the κ values?
• How does the number of iterations change between asyn-
chronous computation (And) and synchronous (Snd)? How
do they relate to our theoretical bounds of Section 3.1?
• What is the rate of convergence regarding the τ values?
• How is the evolution of the important subgraphs (with
• Is there a generic way to infer the "good-enough" decom-
positions so that the computation can be halted for trade-
off between runtime and quality?
high density) during the convergence?
5.1.1 Number of iterations
As described in Section 4.2, the number of iterations for
convergence can (only) be decreased by the asynchronous
algorithm And. We compare Snd (Algorithm 2) and And
(Algorithm 3) for three nucleus decompositions. All runs
are performed in sequential, and for And we use the natural
ordering of the r-cliques in datasets that is the order of ver-
tices/edges/triangles given or computed based on the ids in
the data files. Note that, we also checked And with random
(a) k-core
(b) (3, 4) nucleus
Figure 9: Convergence rates for five graphs in our dataset.
Kendall-Tau similarity score compares the τ values in a
given iteration with the exact decomposition (κ values); be-
comes 1.0 when they are equal. Our algorithms compute
almost-exact decompositions in around 10 iterations for k-
core, k-truss (in Figure 1), and (3, 4) nucleus decomposi-
tions.
r-clique orderings and did not observe significant differences.
We also compute the number of degree levels (Definition 7)
that we prove as an upper bound in Section 3.1.
Table 3 presents the results for k-core, k-truss, and (3, 4)
nucleus decompositions. Number of degree levels gives much
tighter bounds than the obvious limits -- number of r-cliques.
We observe that both algorithms converge in far fewer iter-
ations than our upper bounds -- Snd converges in 5% of the
bounds given for all decompositions, on average. Regarding
the comparison, And algorithm converges in 50% fewer iter-
ations than the Snd for k-core and k-truss decompositions
and 35% fewer iterations for (3, 4) nucleus decomposition.
Overall, we see the clear benefit of asynchronous computa-
tion on all the decompositions, thus use And algorithm in
the following experiments.
5.1.2 Convergence rates for the τ values
In the previous section, we studied the number of itera-
tions required for exact solutions. Now we will investigate
how fast our estimates, τ values converge to the exact, κ
values. We use Kendall-Tau similarity score to compare the
τ and κ values for each iteration, which becomes 1, when
they are equal. Figure 9 and Figure 1 present the results for
five representative graphs in our dataset. We observe that
our local algorithms compute almost exact decompositions
in less than 10 iterations for all decompositions, and we need
5, 9, and 6 iterations to achieve 0.90 similarity for k-core,
k-truss, and (3, 4) nucleus decompositions, respectively.
5.1.3 Evolution of the densest regions
In the hierarchy of dense subgraphs computed by our algo-
rithms, the leaves are the most important part (see Figure 2
and Figure 3), since those subgraphs have the highest edge
(cid:1)), pointing to the significant regions. Note
density (E/(cid:0)V 2
that the r-cliques in a leaf subgraph have same κ values
and they are the local maximals, i.e., have greater-or-equal
κ value than all their neighbors. For this reason, we mon-
itor how the nodes/edges in the leaf subgraphs form their
0.00.51.0 0 5 10 15 20 25 30Kendall Taunumber of iterationsFBSSETWWNWIKI0.00.51.0 0 5 10 15 20 25 30Kendall Taunumber of iterationsFBSSETWWNWIKI(a) k-core on fb
(b) k-core on wnd
(c) k-truss on fb
(d) k-truss on sse
Figure 10: Evolution of densest subgraphs (leaves). Each
line shows the evolution of a leaf. We limit to subgraphs
with at least 10 vertices to filter out the trivial ones. Almost
all leaves are captured in the first few iterations.
leaf L in iteration i, i.e.,(cid:80)
max-cores/max-trusses during the convergence process. In
the k-core decomposition; for a given leaf subgraph L, we
find the max-cores, M i
v, of all v ∈ L at each iteration i with
respect to the τi values. Then we measure the F1 score
between each M i
v and L, and report the averages for each
v/L. We follow a similar
way for the k-truss case; find the max-trusses for all edges
in each leaf, track their F1 scores during convergence with
respect to the leaf, and report the averages.
v∈L M i
Figure 10 presents the results for a representative set of
graphs (similar trends observed for other graphs). Each line
shows the evolution of a leaf subgraph during the conver-
gence process and we only considered the subgraphs with at
least 10 vertices to filter out the trivial ones. We observe
that almost all leaves are captured in the first few itera-
tions. Regarding the facebook network, it has 3 leaves in
the k-core case and all can be found in 7 iterations, and 5
iterations are enough to identify 28 of 33 leaves in k-truss
decomposition. This trend is also observed for the other
graphs; 5 iterations find 78 of the 85 leaves in k-core de-
composition of web-NotreDame, and 39 of the 42 leaves in
k-truss decomposition of soc-sign-epinions.
5.1.4 Predicting Convergence
Number of iterations for convergence depends on the graph
structure, as shown in Table 3. We cannot know whether
a particular r-clique has converged by tracking the stability
of its τ index since there can be temporary plateaus (see
Figure 7). However, we know which r-cliques are active or
idle in each iteration thanks to the notification mechanism
in And algorithm. We propose using the ratio of active
r-cliques as an indicator.
Table 4:
Impact of the notification mechanism. And-nn
does not use notifications. Using 24 threads, notification
mechanism yields speedups up to 3.98 and 3.16 for k-truss
and (3, 4) cases.
(seconds)
Graphs And-nn And Speedup And-nn And Speedup
1.55
3.00
2.13
1.53
3.16
34.4
178.7
105.5
25.7
220.5
1.29
1.74
1.72
2.52
3.98
0.45
3.89
2.50
3.15
2.38
(3, 4)
22.2
59.6
49.6
16.9
69.8
fb
tw
sse
wgo
wnd
k-truss
0.35
2.23
1.46
1.25
0.60
We examine the relation between the ratio of active r-
cliques and the accuracy ratios of the r-cliques. Figure 11
presents the results for a set of graphs on all decompositions.
We observe that when the ratio of active r-cliques goes below
40% during the computation, 91%, 89%, and 92% accurate
results are obtained for k-core, k-truss, and (3, 4) nucleus de-
compositions, on average. When the ratio goes below 10%,
over 98% accuracy is achieved in all decompositions. The
results show the ratio of active r-cliques is a helpful guide
to find almost-exact results can be obtained faster. Watch-
ing for 10 or 40% of active r-cliques yields nice trade-offs
between runtime and quality. Watching the 40% threshold
provides 3.67, 4.71, and 4.98 speedups with respect to full
computation in k-core, k-truss, and (3, 4) nucleus decompo-
sitions, respectively, and the speedups for 10% threshold are
2.26, 2.81, and 3.25 (more details in Section 5.2.3).
5.2 Runtime performance
We evaluate the performance of our algorithms and seek to
answer the following questions:
tion 4.3) on And algorithm?
• What is the impact of the notification mechanism (in Sec-
• How does the And algorithm scale with more threads?
• What speedups are achieved when a certain amount of
How does it compare to sequential peeling?
accuracy is sacrificed?
Impact of the notification mechanism
5.2.1
We check the impact of the notification mechanism for
k-truss and (3, 4) cases. We use 24 threads and Table 4
presents the results where And is the entire Algorithm 3
with notification mechanism and And-nn does not have the
notifications -- missing the orange lines in Algorithm 3. We
observe that Algorithm 3 brings great improvements, reach-
ing up to 3.98 and 3.16 over speedups over And-nn for k-
truss and (3, 4) cases. We use And algorithm (with notifi-
cation mechanism) in the rest of the experiments.
(a) as-skitter
(b) soc-LiveJournal
(c) soc-orkut
(d) web-Google
(e) wiki-200611
Figure 11: Changes in the ratio of active r-cliques and the accuracy of τ indices during the computation, When the ratio of
active r-cliques goes below 40%, τ indices provide 91%, 89% and 92% accurate results on average for k-core, k-truss and (3, 4)
nucleus decompositions, respectively. If the ratio is below 10%, more than 98% accuracy is achieved in all decompositions.
0.00.20.40.60.81.0 0 2 4 6 8 10 12 14F1 scorenumber of iterations0.00.20.40.60.81.0 0 5 10 15 20 25 30F1 scorenumber of iterations0.00.20.40.60.81.0 0 2 4 6 8 10 12 14 16 18F1 scorenumber of iterations0.00.20.40.60.81.0 0 5 10 15 20 25F1 scorenumber of iterations 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4)(a) k-core
(b) (3, 4)
Scalability and comparison with peeling
Figure 12: Speedups of the parallel computations with re-
spect to the peeling computations (with 24 threads) for the
k-core and (3, 4) nucleus decompositions. We used 4, 6, 12,
and 24 threads where each thread is assigned to a single core.
On average, k-core computations are performed 3.83x faster
when the number of threads goes from 4 to 24. This increase
is 4.7x for (3, 4) case. Runtimes with 24 threads are anno-
tated for some graphs. Speedup numbers increase with more
threads and faster solutions are possible with more cores.
5.2.2
Given the benefit of notification mechanism, we now com-
pare the runtime performances of And (Algorithm 3) and
the peeling process (Algorithm 1) on three decompositions.
Our machine has 24 cores in total (12 in each socket) and
we perform full computations until convergence with 4, 6,
12, and 24 threads. Note that our implementations for the
baseline peeling algorithms are efficient; for instance [46]
computes the truss decomposition of as-skitter graph in
281 secs where we can do it in 74 secs, without any paral-
lelization. In addition, for soc-orkut and soc-LiveJournal
graphs, we compute the truss decompositions in 352 and
81 secs whereas [18] needs 2291 and 1176 secs (testbeds
in [46] and [18] are similar to ours). For the k-truss and
(3, 4) nucleus decompositions, triangle counts per edge and
four-clique counts per triangle need to be computed and we
parallelize these parts for both the peeling algorithms and
And, for a fair comparison. Rest of the peeling computation
is sequential. Figure 12 and Figure 1 present the speedups
by And algorithm over the (partially parallel) peeling com-
putation with 24 threads on k-core, k-truss, and (3, 4)
nucleus decompositions. For all, And with 24 threads ob-
tains significant speedups over the peeling computation. In
particular, with 24 threads And is 8.77x faster for the k-core
case on the soc-LiveJournal, 6.3x faster for the k-truss de-
composition on as-skitter, and 4.3x faster for the (3, 4) nu-
cleus case on wiki-200611 graph. In addition, our speedup
numbers increase by more threads. On average, k-core com-
putations are performed 3.83x faster when the number of
threads are increased from 4 to 24. This increase is 4.8x
and 4.7x for k-truss and (3, 4) cases. Our speedup numbers
increase with more threads and faster solutions are possible
with more cores.
Recent results: There is a couple recent studies, concur-
rent to our work, that introduced new efficient parallel algo-
rithms for k-core [8] and k-truss [41, 45, 22] decompositions.
Dhulipala et al. [8] have a new parallel bucket data structure
for k-core decomposition that enables work-efficient paral-
lelism, which is not possible with our algorithms. They
present speedups to 23.6x on friendster graph with 72
threads. Regarding the k-truss decomposition, the HPEC
challenge [35] attracted interesting studies that parallelize
(a) k-truss
(b) (3, 4)-nucleus
Figure 13: Runtime/accuracy tradeoff. We show the poten-
tial for speedups with respect to the peeling computations for
the k-truss and (3, 4) nucleus decompositions. Speedups at
full accuracy correspond to the speedups with 24 threads in
Figure 12. Number of iterations (and accuracy) decrease on
the x-axis. We reach up to 15x and 9x speedups on k-truss
and (3, 4) cases when 0.8 accuracy is allowed.
the computation [41, 45, 22]. In particular, Shaden et al. [41]
reports competitive results with respect to the earlier version
of our work [36]. Note that our main focus in this work
is a generic framework that enables local computa-
tion for k-core, k-truss, and (3, 4) nucleus decomposi-
tions, which has not been discussed in the previous works.
Although our algorithms are not work-efficient and more
specialized solutions can give better speedups, our local al-
gorithms are more generally applicable, enable trade-offs be-
tween runtime and accuracy, and also enable query-driven
scenarios that can be used to analyze smaller subgraphs.
5.2.3 Runtime and accuracy trade-off
We check the speedups for the approximate decomposi-
tions in the intermediate steps during the convergence. We
show how the speedups (with respect to peeling algorithm
with 24 threads) change when a certain amount of accuracy
in κs indices is sacrificed. Figure 13 presents the behavior
for k-truss and (3, 4) nucleus decompositions on some repre-
sentative graphs. We observe that speedups for the k-truss
decomposition can reach up to 15x when 0.8 accuracy is al-
lowed. For (3, 4) nucleus decomposition, up to 9x speedups
are observed for the same accuracy score. Overall, our local
algorithms are enable to enjoy different trade-offs between
the runtime and accuracy.
5.3 PartialAnd to estimate κ2 and κ3 values
So far, we have studied the performance of our algorithms on
the full graph. Now, we will look at how we can apply sim-
ilar ideas to a portion of the graph using the PartialAnd
algorithm described at end of Section 4.3. We will apply
PartialAnd to the ego networks and show that it can be
used to estimate κ2 values (core number) of vertices and κ3
values (truss number) of edges. Ego network of a vertex u is
defined as the induced subgraph among u and its neighbors.
It has been shown that ego networks in real-world networks
exhibit low conductance [15] and also can be used for friend
suggestion in online social networks [11]. Accurate and fast
estimation of core numbers [29] is important in the context
of network experiments (A/B testing) [43] where a random
subset of vertices are exposed to a treatment and responses
are analyzed to measure the impact of a new feature in on-
line social networks.
For the core number estimation of a vertex u, we apply
PartialAnd on u and its neighbor vertices, i.e., u ∪ N2(u),
0.01.02.03.04.05.06.07.08.09.0 4 6 12 24speedupnumber of threadsASKFRIHGORKSLJWIKIPeeling-24t1.31s0.84s223s0.01.02.03.04.05.0 4 6 12 24speedupnumber of threadsASKHGORKSLJWIKIPeeling-24t706s147s9923s 1 10 100 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1speedupaccuracy 1 10 100 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1speedupaccuracyASKHGORKSLJWIKI(a) Core number estimations for wgo and ask
(b) Truss number estimations for tw and hg
Figure 14: Accuracy of core and truss number estimations by PartialAnd. Top two charts present the core number estimations
by PartialAnd and degree with respect to the ground-truth (green line) on web-Google and as-skitter. Bottom two present
the truss number estimations for twitter and soc-twitter-higgs (green line is the ground-truth). PartialAnd estimates
the core and truss numbers accurately for a wide range. Results for other graphs are similar and omitted for brevity.
and report κ2(u). Indeed, the application of PartialAnd
on ego-network for core number estimation is the same as
the propagating estimator in [29] for distance-1 neighbor-
hood. Here we generalize the same concept to estimate truss
numbers of edges. Regarding the truss number estimations,
we define the ego network of an edge e as the set of neigh-
bor edges that participates in a common triangle (N3(e)).
Thus, we apply PartialAnd on e ∪ N3(e) and report κ3(e)
as a truss number estimate. Figures 14a and 14b present the
results for core and truss number estimations. We selected
vertices/edges with varying core/truss numbers (on the x-
axis) and check the accuracy of PartialAnd estimations.
Ground-truth values are shown with green lines (note that
y-axes in Figure 14a are log-scale). We also show the de-
grees/triangle counts of the vertices/edges in red as a base-
line. Overall, PartialAnd yields almost exact estimations
for a wide range of core/truss numbers. On the other hand,
degree of a vertex gives a close approximation to the core
number for smaller degrees, but it fails for large values. This
trend is similar for the truss numbers and triangle counts.
Regarding the runtime, PartialAnd on ego networks only
takes a fraction of a second -- way more efficient than com-
puting the entire core/truss decomposition. For instance, it
takes only 0.23 secs on average to estimate the core number
of any vertex in the soc-orkut network whereas the full k-
core decomposition needs 11.4 secs. It is even better in the
k-truss case; PartialAnd takes 0.017 secs on average to
estimate a truss number of an edge in soc-twitter-higgs
network where the full k-truss computation takes 73 secs.
6. RELATED WORK
Previous attempts to find the approximate core numbers (or
k-cores) focus on the neighborhood of a vertex within a cer-
tain radius [29]. It is reported that if the radius is at least
half of the diameter, close approximations can be obtained.
However, given the small-world nature of the real-world net-
works, the local graph within a distance of half the diameter
is too large to compute. In our work, we approximate the k-
core, k-truss, and (r, s) nucleus decompositions in a rigorous
and efficient way that does not depend on the diameter.
Most related study is done by Lu et al. [26], where they
show that iterative h-index computation on vertices result
in the core numbers. Their experiments on smaller graphs
also show that h-index computation provides nice trade-offs
for time and quality of the solutions. In our work, we gen-
eralized the iterative h-index computation approach for any
nucleus decomposition that subsumes the k-core and k-truss
algorithms. Furthermore, we give provable upper bounds on
the number of iterations for convergence. Apart from that
work, Govindan et al. [16] use the iterative h-index com-
putation to design space-efficient algorithms for estimating
core numbers. Distributed algorithms in [28] and out-of-core
approaches in [23, 47, 5] also make use of similar ideas, but
only for core decomposition. Montresor et al. [28] present a
bound for the number of iterations, which is basically V −1,
much looser than ours.
Regarding the parallel computations, Jiang et al. [20] in-
troduced parallel algorithms to find the number of iterations
needed to find the empty k-core in random hypergraphs.
Their work relies on the assumption that the edge density
is below a certain threshold and the focus is on the number
of iterations only. Our local algorithms present an alterna-
tive formulation for the peeling process, and work for any
k value. For the k-truss decomposition, Quick et al. [31]
introduced algorithms for vertex-centric distributed graph
processing systems. For the same setup, Shao et al. [40]
proposed faster algorithms that can compute k-trusses in
a distributed graph processing system. Both papers make
use of the peeling-based algorithms for computation. Our
focus is on the local computation where the each edge has
access to only its neighbors and no global graph information
is necessary, thus promise better scalability.
7. CONCLUSION
We introduced a generalization of the iterative h-index com-
putations to identify any nucleus decomposition and prove
convergence bounds. Our local algorithms are highly paral-
lel and can provide fast approximations to explore time and
quality trade-offs. Experimental evaluation on real-world
networks exhibits the efficiency, scalability, and effectiveness
of our algorithms for three decompositions. We believe that
our local algorithms will be beneficial for many real-world
applications that work in challenging setups. For example,
shared-nothing systems can leverage the local computation.
100101102103104 0 5 10 15 20 25 30 35 40 45estimationcore numberPartialANDdegree100101102103104105 0 20 40 60 80 100 120estimationcore numberPartialANDdegree 0 20 40 60 80 100 120 0 10 20 30 40 50 60 70 80estimationtruss numberPartialANDtriangle count 0 50 100 150 200 250 0 10 20 30 40 50 60 70estimationtruss numberPartialANDtriangle count8. REFERENCES
[1] N. K. Ahmed, J. Neville, R. A. Rossi, and N. G.
Duffield. Efficient graphlet counting for large
networks. In IEEE International Conference on Data
Mining, ICDM, pages 1 -- 10, 2015.
[2] A. Angel, N. Sarkas, N. Koudas, and D. Srivastava.
Dense subgraph maintenance under streaming edge
weight updates for real-time story identification.
PVLDB, 5(6):574 -- 585, 2012.
[3] V. Batagelj and M. Zaversnik. An o (m) algorithm for
cores decomposition of networks. arXiv preprint
cs/0310049, 2003.
[4] A. R. Benson, D. F. Gleich, and J. Leskovec.
Higher-order organization of complex networks.
Science, 353(6295):163 -- 166, 2016.
[5] J. Cheng, Y. Ke, S. Chu, and M. T. Ozsu. Efficient
core decomposition in massive networks. In IEEE
International Conference on Data Engineering ,
ICDE, pages 51 -- 62, 2011.
[6] J. Cohen. Trusses: Cohesive subgraphs for social
network analysis. Technical report, National Security
Agency Technical Report, Fort Meade, MD, 2008.
[7] L. Dagum and R. Menon. Openmp: an industry
standard api for shared-memory programming.
Computational Science & Engineering, IEEE,
5(1):46 -- 55, 1998.
[8] L. Dhulipala, G. Blelloch, and J. Shun. Julienne: A
framework for parallel graph algorithms using
work-efficient bucketing. In ACM Symposium on
Parallelism in Algorithms and Architectures ,SPAA,
pages 293 -- 304, 2017.
memory algorithm for estimating core numbers. In
IEEE/ACM International Conference on Advances in
Social Networks Analysis and Mining, ASONAM,
pages 207 -- 214, 2016.
[17] J. E. Hirsch. An index to quantify an individual's
scientific research output. Proceedings of the National
Academy of Sciences of the United States of America,
102(46):16569 -- 16572, 2005.
[18] X. Huang, H. Cheng, L. Qin, W. Tian, and J. X. Yu.
Querying k-truss community in large and dynamic
graphs. In ACM SIGMOD International Conference
on Management of Data, pages 1311 -- 1322, 2014.
[19] M. Jha, C. Seshadhri, and A. Pinar. Path sampling: A
fast and provable method for estimating 4-vertex
subgraph counts. In International Conference on
World Wide Web, WWW, pages 495 -- 505, 2015.
[20] J. Jiang, M. Mitzenmacher, and J. Thaler. Parallel
peeling algorithms. In ACM Symposium on
Parallelism in Algorithms and Architectures, SPAA,
pages 319 -- 330, 2014.
[21] R. Jin, Y. Xiang, N. Ruan, and D. Fuhry. 3-hop: a
high-compression indexing scheme for reachability
query. In ACM SIGMOD International Conference on
Management of Data, pages 813 -- 826, 2009.
[22] H. Kabir and K. Madduri. Shared-memory graph
truss decomposition. In IEEE International
Conference on High Performance Computing, HiPC,
pages 13 -- 22, 2017.
[23] W. Khaouid, M. Barsky, S. Venkatesh, and A. Thomo.
K-core decomposition of large networks on a single
PC. PVLDB, 9(1):13 -- 23, 2015.
[9] Y. Dourisboure, F. Geraci, and M. Pellegrini.
[24] R. Kumar, P. Raghavan, S. Rajagopalan, and
Extraction and classification of dense communities in
the web. In International Conference on World Wide
Web, WWW, pages 461 -- 470, 2007.
[10] X. Du, R. Jin, L. Ding, V. E. Lee, and J. H. T. Jr.
Migration motif: a spatial-temporal pattern mining
approach for financial markets. In ACM SIGKDD
International Conf. on Knowledge Discovery and Data
Mining, pages 1135 -- 1144, 2009.
[11] A. Epasto, S. Lattanzi, V. Mirrokni, I. O. Sebe,
A. Taei, and S. Verma. Ego-net community mining
applied to friend suggestion. PVLDB, 9(4):324 -- 335,
2015.
[12] E. Fratkin, B. T. Naughton, D. L. Brutlag, and
S. Batzoglou. Motifcut: regulatory motifs finding with
maximum density subgraphs. Bioinformatics,
22(14):e150 -- e157, 2006.
[13] D. Gibson, R. Kumar, and A. Tomkins. Discovering
large dense subgraphs in massive graphs. In
International Conference on Very Large Data Bases,
VLDB, pages 721 -- 732, 2005.
[14] A. Gionis, F. Junqueira, V. Leroy, M. Serafini, and
I. Weber. Piggybacking on social networks. PVLDB,
6(6):409 -- 420, 2013.
[15] D. F. Gleich and C. Seshadhri. Vertex neighborhoods,
low conductance cuts, and good seeds for local
community methods. In ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining,
pages 597 -- 605, 2012.
[16] P. Govindan, S. Soundarajan, T. Eliassi-Rad, and
C. Faloutsos. Nimblecore: A space-efficient external
A. Tomkins. Trawling the web for emerging
cyber-communities. In International Conference on
World Wide Web, WWW, pages 1481 -- 1493, 1999.
[25] J. Leskovec and A. Krevl. SNAP Datasets, June 2014.
[26] L. Lu, T. Zhou, Q.-m. Zhang, and H. E. Stanley. The
h-index of a network node and its relation to degree
and coreness. Nature Communications, 7:10168, 2016.
[27] D. W. Matula and L. L. Beck. Smallest-last ordering
and clustering and graph coloring algorithms. Journal
of the ACM, 30(3):417 -- 427, July 1983.
[28] A. Montresor, F. D. Pellegrini, and D. Miorandi.
Distributed k-core decomposition. IEEE Transactions
on Parallel and Distributed Systems, 24(2):288 -- 300,
2013.
[29] M. P. O'Brien and B. D. Sullivan. Locally estimating
core numbers. In IEEE International Conference on
Data Mining, ICDM, pages 460 -- 469, 2014.
[30] A. Pinar, C. Seshadhri, and V. Vishal. Escape:
Efficiently counting all 5-vertex subgraphs. In
International Conference on World Wide Web,
WWW, pages 1431 -- 1440, 2017.
[31] L. Quick, P. Wilkinson, and D. Hardcastle. Using
pregel-like large scale graph processing frameworks for
social network analysis. In IEEE/ACM International
Conference on Advances in Social Networks Analysis
and Mining, ASONAM, pages 457 -- 463, 2012.
[32] R. A. Rossi and N. K. Ahmed. The network data
repository with interactive graph analytics and
visualization. In AAAI Conference on Artificial
Intelligence, pages 4292 -- 4293, 2015.
[41] S. Smith, X. Liu, N. K. Ahmed, A. S. Tom, F. Petrini,
[33] R. A. Rossi, R. Zhou, and N. K. Ahmed. Estimation
of graphlet statistics. CoRR, abs/1701.01772, 2017.
[34] K. Saito and T. Yamada. Extracting communities
from complex networks by the k-dense method. In
IEEE International Conference on Data Mining
Workshops, ICDMW, pages 300 -- 304, 2006.
[35] S. Samsi, V. Gadepally, M. Hurley, M. Jones, E. Kao,
S. Mohindra, P. Monticciolo, A. Reuther, S. Smith,
W. Song, D. Staheli, and J. Kepner. Static graph
challenge: Subgraph isomorphism. In IEEE High
Performance Extreme Computing Conference, HPEC,
2017.
[36] A. E. Sariyuce, C. Seshadhri, and A. Pinar. Parallel
local algorithms for core, truss, and nucleus
decompositions. CoRR, abs/1704.00386, 2017.
[37] A. E. Sarıyuce, C. Seshadhri, A. Pınar, and U. V.
C¸ atalyurek. Finding the hierarchy of dense subgraphs
using nucleus decompositions. In International
Conference on World Wide Web, WWW, pages
927 -- 937, 2015.
[38] A. E. Sarıyuce, C. Seshadhri, A. Pınar, and U. V.
C¸ atalyurek. Nucleus decompositions for identifying
hierarchy of dense subgraphs. ACM Transactions on
Web, 11(3):16:1 -- 16:27, 2017.
[39] S. B. Seidman. Network structure and minimum
degree. Social Networks, 5(3):269 -- 287, 1983.
[40] Y. Shao, L. Chen, and B. Cui. Efficient cohesive
subgraphs detection in parallel. In ACM SIGMOD
International Conference on Management of Data,
pages 613 -- 624, 2014.
and G. Karypis. Truss decomposition on
shared-memory parallel systems. In IEEE High
Performance Extreme Computing Conference, HPEC,
pages 1 -- 6, 2017.
[42] C. Tsourakakis. The k-clique densest subgraph
problem. In International Conference on World Wide
Web, WWW, pages 1122 -- 1132, 2015.
[43] J. Ugander, B. Karrer, L. Backstrom, and
J. Kleinberg. Graph cluster randomization: Network
exposure to multiple universes. In ACM SIGKDD
International Conference on Knowledge Discovery and
Data Mining, pages 329 -- 337, 2013.
[44] A. Verma and S. Butenko. Network clustering via
clique relaxations: A community based. Graph
Partitioning and Graph Clustering, 588:129, 2013.
[45] C. Voegele, Y. Lu, S. Pai, and K. Pingali. Parallel
triangle counting and k-truss identification using
graph-centric methods. In IEEE High Performance
Extreme Computing Conference, HPEC, pages 1 -- 7,
2017.
[46] J. Wang and J. Cheng. Truss decomposition in
massive networks. PVLDB, 5(9):812 -- 823, 2012.
[47] D. Wen, L. Qin, Y. Zhang, X. Lin, and J. Yu. I/o
efficient core graph decomposition at web scale. In
IEEE International Conference on Data Engineering,
ICDE, pages 133 -- 144, 2016.
[48] Y. Zhang and S. Parthasarathy. Extracting analyzing
and visualizing triangle k-core motifs within networks.
In IEEE International Conference on Data
Engineering, ICDE, pages 1049 -- 1060, 2012.
|
1201.4145 | 2 | 1201 | 2012-02-28T00:35:56 | The Role of Social Networks in Information Diffusion | [
"cs.SI",
"physics.soc-ph"
] | Online social networking technologies enable individuals to simultaneously share information with any number of peers. Quantifying the causal effect of these technologies on the dissemination of information requires not only identification of who influences whom, but also of whether individuals would still propagate information in the absence of social signals about that information. We examine the role of social networks in online information diffusion with a large-scale field experiment that randomizes exposure to signals about friends' information sharing among 253 million subjects in situ. Those who are exposed are significantly more likely to spread information, and do so sooner than those who are not exposed. We further examine the relative role of strong and weak ties in information propagation. We show that, although stronger ties are individually more influential, it is the more abundant weak ties who are responsible for the propagation of novel information. This suggests that weak ties may play a more dominant role in the dissemination of information online than currently believed. | cs.SI | cs |
The Role of Social Networks in Information Diffusion
Eytan Bakshy∗
Facebook
1601 Willow Rd.
Menlo Park, CA 94025
[email protected]
Cameron Marlow
Facebook
1601 Willow Rd.
Menlo Park, CA 94025
[email protected]
Itamar Rosenn
Facebook
1601 Willow Rd.
Menlo Park, CA 94025
[email protected]
Lada Adamic
University of Michigan
105 S. State St.
Ann Arbor, MI 48104
[email protected]
ABSTRACT
Online social networking technologies enable individuals to
simultaneously share information with any number of peers.
Quantifying the causal effect of these mediums on the dis-
semination of information requires not only identification
of who influences whom, but also of whether individuals
would still propagate information in the absence of social sig-
nals about that information. We examine the role of social
networks in online information diffusion with a large-scale
field experiment that randomizes exposure to signals about
friends’ information sharing among 253 million sub jects in
situ. Those who are exposed are significantly more likely to
spread information, and do so sooner than those who are
not exposed. We further examine the relative role of strong
and weak ties in information propagation. We show that,
although stronger ties are individually more influential, it
is the more abundant weak ties who are responsible for the
propagation of novel information. This suggests that weak
ties may play a more dominant role in the dissemination of
information online than currently believed.
Categories and Subject Descriptors
H.1.2 [Models and Principles]: User/Machine Systems;
J.4 [Social and Behavioral Sciences]: Sociology
General Terms
Experimentation, Measurement, Human Factors
Keywords
social influence, tie strength, causality
1.
INTRODUCTION
Social influence can play a crucial role in a range of behav-
ioral phenomena, from the dissemination of information, to
the adoption of political opinions and technologies [23, 42],
which are increasingly mediated through online systems [17,
∗Part of this research was performed while the author was
a student at the University of Michigan.
Preprint version. Copyright is held by the International World Wide Web
Conference Committee (IW3C2). Distribution of these papers is limited to
classroom use, and personal use by others.
WWW 2012, April 16–20, 2012, Lyon, France.
ACM 978-1-4503-1229-5/12/04.
38]. Despite the wide availability of data from online social
networks, identifying influence remains a challenge.
Indi-
viduals tend to engage in similar activities as their peers, so
it is often impossible to determine from observational data
whether a correlation between two individuals’ behaviors ex-
ists because they are similar or because one person’s behav-
ior has influenced the other [5, 32, 39].
In the context of
information diffusion, two people may disseminate the same
information as each other because they possess the same in-
formation sources, such as web sites or television, that they
consume regularly [3, 38].
Moreover, homophily – the tendency of individuals with
similar characteristics to associate with one another [1, 28,
34] – creates difficulties for measuring the relative role of
strong and weak ties in information diffusion, since peo-
ple are more similar to those with whom they interact of-
ten [22, 34]. On one hand, pairs of individuals who interact
more often have greater opportunity to influence one an-
other and have more aligned interests, increasing the chances
of contagion [11, 27]. However, this commonality ampli-
fies the potential for confounds: those who interact more
often are more likely to have increasingly similar informa-
tion sources. As a result, inferences made from observa-
tional data may overstate the importance of strong ties in
information spread. Conversely, individuals who interact
infrequently have more diverse social networks that provide
access to novel information [12, 22]. But because contact
between such ties is intermittent, and the individuals tend
to be dissimilar, any particular piece of information is less
likely to flow across weak ties [14, 37]. Historical attempts to
collect data on how often pairs of individuals communicate
and where they get their information have been prone to
biases [10, 33], further obscuring the empirical relationship
between tie strength and diffusion.
Confounding factors related to homophily can be addressed
using controlled experiments, but experimental work has
thus far been confined to the spread of highly specific in-
formation within limited populations [6, 13].
In order to
understand how information spreads in a real-world envi-
ronment, we wish to examine a setting where a large pop-
ulation of individuals frequently exchange information with
their peers. Facebook is the most widely used social net-
working service in the world, with over 800 million people
using the service each month. For example, in the United
States, 54% of adult Internet users are on Facebook [26].
Those American users on average maintain 48% of their real
world contacts on the site [26], and many of these individuals
regularly exchange news items with their contacts [38]. In
addition, interaction among users is well correlated with self-
reported intimacy [18]. Thus, Facebook represents a broad
online population of individuals whose online personal net-
works reflect their real-world connections, making it an ideal
environment to study information contagion.
We use an experimental approach on Facebook to mea-
sure the spread of information sharing behaviors. The ex-
periment randomizes whether individuals are exposed via
Facebook to information about their friends’ sharing behav-
ior, thereby devising two worlds under which information
spreads: one in which certain information can only be ac-
quired external to Facebook, and another in which informa-
tion can be acquired within or external to Facebook. By
comparing the behavior of individuals within these two con-
ditions, we can determine the causal effect of the medium
on information sharing.
The remainder of this paper is organized as follows. We
further motivate our study with additional related work in
Section 2. Our experimental design is described in Section 3.
Then, in Section 4 we discuss the causal effect of exposure
to content on the newsfeed, and how friends’ sharing behav-
ior is correlated in time, irrespective of social influence via
the newsfeed. Furthermore, we show that multiple sharing
friends are predictive of sharing behavior regardless of expo-
sure on the feed, and that additional friends do indeed have
an increasing causal effect on the propensity to share.
In
Section 5 we discuss how tie strength relates to influence and
information diffusion. We show that users are more likely
to have the same information sources as their close friends,
and that simultaneously, these close friends are more likely
to influence sub jects. Using the empirical distribution of tie
strength in the network, we go on to compute the overall
effect of strong and weak ties on the spread of information
in the network. Finally, we discuss the implications of our
work in Section 6.
2. RELATED WORK
Online networks are focused on sharing information, and
as such, have been studied extensively in the context of in-
formation diffusion. Diffusion and influence have been mod-
eled in blogs [2, 20, 25], email [31], and sites such as Twitter,
Digg, and Flickr [8, 21, 29]. One particularly salient charac-
teristic of diffusion behavior is the correlation between the
number of friends engaging in a behavior and the proba-
bility of adopting the behavior. This relationship has been
observed in many online contexts, from the joining of Live-
Journal groups [7], to the bookmarking of photos [15], and
the adoption of user-created content [9]. However, as Anag-
nostopoulos, et al. [4] point out, individuals may be more
likely to exhibit the same behavior as their friends because
of homophily rather than as a result of peer influence. Sta-
tistical techniques such as permutation tests and matched
sampling [5] help control for confounds, but ultimately can-
not resolve this fundamental problem [39].
Not all diffusion studies must infer whether one individ-
ual influenced another. For example, Leskovec et al. [30]
study the explicit graph of product recommendations, Sun
et al. [41] study cascading in page fanning, and Bakshy et
al. [9] examine the exchange of user-created content. How-
ever, in all these studies, even if the source of a particular
contagion event is a friend, such data does not tell us about
the relative importance of social networks in information dif-
fusion. For example, consider the spread of news. In Bradley
Greenberg’s classsic study of media contagion [24], 50% of
respondents learned about the Kennedy assassination via
interpersonal ties. Despite the substantial word-of-mouth
spread, it is clear that all of the respondents would have
gotten the news at a slightly later point in time (perhaps
from the very same media outlets as their contacts), had
they not communicated with their peers. Therefore, a com-
plete understanding of the importance of social networks in
information diffusion not only requires us to identify sources
of interpersonal contagion, but also requires a counterfactual
understanding of what would happen if certain interactions
did not take place.
Figure 1:
explain
that
relationships
Causal
diffusion-like phenomena. Information presented in
users’ news feeds and other sharing behavior on
facebook.com are observed. External events that
cause users to be exposed to information outside of
Facebook cannot be observed and may explain their
sharing behavior. Our experiment blocks the causal
relationship (dashed arrow) between the Facebook
newsfeed and user visitation by randomly removing
stories about friends’ sharing behavior in sub jects’
feeds. Thus, our experiment allows us to compare
situations where both influence via the feed and ex-
ternal correlations exist (the feed condition), to situ-
ations in which only external correlations exist (the
no feed condition).
3. EXPERIMENTAL DESIGN AND DATA
Facebook users primarily interact with information through
an aggregated history of their friends’ recent activity (sto-
ries), called the News Feed, or simply feed for short. Some of
these stories contain links to content on the Web, uniquely
identified by URLs. Our experiment evaluates how much
exposure to a URL on the feed increases an individual’s
propensity to share that URL, beyond correlations that one
might expect among Facebook friends. For example, friends
with whom a user interacts more often may be more likely
to visit sites that the user also visits. As a result, those
friends may be more likely to share the same URL as the
Facebook FeedStory 1Story 2...Story linking to page X...External CorrelationRegular visitation to web sitesE-Mail...User visits page X User shares page X on Facebook ObservableUnobservableInstant Messaging(a)
(b)
Figure 2: An example of the Facebook News Feed interface for a hypothetical sub ject who has a link (high-
lighted in red) assigned to the (a) feed or (b) no feed condition.
user before she has the opportunity to share that content
herself. Additional unobserved correlations may arise due to
external influence via e-mail, instant messaging, and other
social networking sites. These causal relationships are illus-
trated in Figure 1. From the figure, one can see that all
unobservable correlations can be identified by blocking the
causal relationship between the Facebook feed and sharing.
Our experiment therefore randomizes sub jects with respect
to whether they receive social signals about friends’ sharing
behavior of certain Web pages via the Facebook feed.
3.1 Assignment Procedure
Sub ject-URL pairs are randomly assigned at the time of
display to either the no feed or the feed condition. Stories
that contain links to a URL assigned to the no feed condi-
tion for the sub ject are never displayed in the sub ject’s feed.
Those assigned to the feed condition are not removed from
the feed, and appear in the sub ject’s feed as normal (Fig-
ure 2). Pairs are deterministically assigned to a condition at
the time of display, so any subsequent share of the same URL
by any of a sub ject’s friends is also assigned to the same con-
dition. To improve the statistical power of our results, twice
as many pairs were assigned to the no feed condition. Be-
cause removal from the feed occurs on a sub ject-URL basis,
and we include only a small fraction of sub ject-URL pairs in
the no feed condition, a shared URL is on average delivered
to over 99% of its potential targets.
All activity relating to sub ject-URL pairs assigned to ei-
ther experimental condition is logged, including feed expo-
sures, censored exposures, and clicks to the URL (from the
feed or other sources, like messaging). Directed shares, such
as a link that is included in a private Facebook message or
explicitly posted on a friend’s wall, are not affected by the
assignment procedure. If a sub ject-URL pair is assigned to
an experimental condition, and the sub ject clicks on con-
tent containing that URL in any interface other than the
feed, that sub ject-URL pair is removed from the experiment.
Our experiment, which took place over the span of seven
weeks, includes 253,238,367 sub jects, 75,888,466 URLs, and
1,168,633,941 unique sub ject-URL pairs.
3.2 Ensuring Data Quality
Threats to data quality include using content that was
or may have been previously seen by sub jects on Facebook
prior to the experiment, content that sub jects may have seen
through interfaces on Facebook other than feed, spam, and
malicious content. We address these issues in a number of
ways. First, we only consider content that was shared by
the sub jects’ friends only after the start of the experiment.
This enables our experiment to accurately capture the first
time a sub ject is exposed to a link in the feed, and ensures
Demographic Feature
(% of sub jects)
Gender
Female
Male
Unspecified
Age
17 or younger
18-25
26-35
36-45
46 or older
Country (top 10 & other)
United States
Turkey
Great Britain
Italy
France
Canada
Indonesia
Philippines
Germany
Mexico
226 Others
feed
no feed
51.6% 51.4%
46.7% 47.0%
1.5% 1.5%
12.8% 13.1%
36.4% 36.1%
27.2% 26.9%
13.0% 12.9%
10.6% 10.9%
28.9% 29.1%
6.1% 5.8%
5.1% 5.2%
4.2% 4.1%
3.8% 3.9%
3.7% 3.8%
3.7% 3.5%
2.1% 2.3%
2.3% 2.3%
2.0% 2.1%
37.5% 37.7%
Table 1: Summary of demographic features of sub-
jects assigned to the feed (N = 160, 688, 092) and no
feed (N = 218, 743, 932) condition. Some sub jects may
appear in both columns.
that URLs in our experiment more accurately reflect content
that is primarily being shared contemporaneously with the
timing of the experiment. We also exclude potential sub ject-
URL pairs where the sub ject had previously clicked on the
URL via any interface on the site at any time up to two
months prior to exposure, or any interface other than the
feed for content assigned to the no feed condition. Finally, we
use the Facebook’s site integrity system [40] to classify and
remove URLs that may not reflect ordinary users’ purposeful
intentions of distributing content to their friends.
3.3 Population
The experimental population consists of a random sample
of all Facebook users who visited the site between August
14th to October 4th 2010, and had at least one friend sharing
a link. At the time of the experiment, there were approxi-
mately 500 million Facebook users logging in at least once a
month. Our sample consists of approximately 253 million of
these users. All Facebook users report their age and gender,
and a user’s country of residence can be inferred from the IP
address with which she accesses the site. In our sample, the
median and average age of sub jects is 26 and 29.3, respec-
tively. Sub jects originate from 236 countries and territories,
44 of which have one million or more sub jects. Additional
summary statistics are given in Table 1, and show that sub-
jects are assigned to the conditions in a balanced fashion.
3.4 Evaluating Outcomes
The assignment procedure allows us to directly compare
the overall probability that sub jects share links they were
or were not exposed to on the feed. The causal effect of
exposure via the Facebook feed on sharing is simply the ex-
pected probability of sharing in the feed condition minus the
expected probability in the no feed condition. This quantity,
known as the average treatment effect on the treated (or al-
ternatively, the absolute risk increase), can vary when con-
ditioning on other variables, including the number of friends
and tie strength, which are analyzed in Sections 4 and 5. Al-
ternatively, the difference in probabilities can be viewed as
a ratio (the relative risk ratio), which quantifies how many
times more likely an individual is to share as a result of being
exposed to content on the feed.
Although the assignment is completely random, sub jects
and URLs may differ in ways that impact our measurements.
For example, certain users may be highly active on Face-
book, so that they are assigned to experimental conditions
more often than other users. If these users were to vary sig-
nificantly in terms of their information sharing propensities,
such as sharing or re-sharing greater or fewer links than oth-
ers, the disproportionate inclusion of these users may bias
our measurements and threaten the population validity of
our findings. Similarly, very popular URLs may also intro-
duce biases; they may be more or less likely to be re-shared
because of their inherent appeal or more likely to be dis-
covered independently of Facebook because of their relative
popularity amongst friends.
To provide control for these biases, we use bootstrapped
averages clustered by the sub ject or URL. We find that in all
of our analyses, clustering by the URL rather than the sub-
ject yields nearly identical probability estimates that have
marginally wider confidence intervals, so we have chosen to
present our results using means and 95% confidence inter-
vals clustered by URL. Risk ratios are obtained using the
95% bootstrapped confidence intervals of likelihood of shar-
ing in the feed and no feed conditions. To compute the lower
bound of the ratio, we divide the lower bound of the prob-
ability of sharing in the feed condition by the upper bound
for the no feed condition. The upper bound of the ratio is
computed by dividing the upper bound in the feed condition
by the lower bound of the no feed condition. The additive
analog of the same procedure is used to obtain confidence
intervals for probability differences.
4. HOW EXPOSURE TO SOCIAL SIGNALS
AFFECTS DIFFUSION
We find that sub jects who are exposed to signals about
friends’ sharing behavior are several times more likely to
share that same information, and share sooner than those
who are not exposed. To measure the relative increase in
sharing due to exposure, we compute the risk ratio: the like-
lihood of sharing in the feed condition (0.191%) divided by
the likelihood of sharing in the no feed condition (0.025%),
and find that individuals in the feed condition are 7.37 times
more likely share (95% C I = [7.23, 7.72]). Although the
probability of sharing upon exposure may appear small, it
is important to note that individuals have hundreds of con-
tacts online who may see their link, and that on average
one out of every 12.5 URLs that are clicked on in the feed
condition are subsequently re-shared.
4.1 Temporal Clustering
Contemporaneous behavior among connected individuals
is commonly used as evidence for social influence processes
(e.g. [4, 9, 8, 15, 16, 19, 20, 25, 29, 36, 43]). We find that
sub jects who share the same link as their friends typically do
so within a time that is proximate to their friends’ sharing
To evaluate how exposure on the Facebook feed relates
to the speed at which URLs appear to diffuse, we consider
URLs that were assigned to both the feed and no feed condi-
tion. We first match the share time of each URL in the feed
condition with a share time of the URL in the no feed con-
dition, sampling URLs in proportion to their relative abun-
dances in the data. From this set of contrasts, we find that
the median sharing latency after a friend has already shared
the content is 6 hours in the feed condition, compared to
20 hours when assigned to the no feed condition (Wilcoxon
rank-sum test, p < 10−16 ). The presence of strong tempo-
ral clustering in both experimental conditions illustrates the
problem with inferring influence processes from observations
of temporally proximate behavior among connected individ-
uals: regardless of access to social signals within a particular
online medium, individuals can still acquire and share the
same information as their friends, albeit at a slightly later
point in time.
4.2 Effect of Multiple Sharing Friends
Classic models of social and biological contagion (e.g. [23,
35]) predict that the likelihood of “infection” increases with
the number of infected contacts. Observational studies of
online contagion [4, 9, 15, 30] not only find evidence of tem-
poral clustering, but also observe a similar relationship be-
tween the likelihood of contagion and the number of infected
contacts. However, it is important to note that this corre-
lation can have multiple causes that are unrelated to social
influence processes. For example, if a website is popular
among friends, then a particularly interesting page is more
likely to be shared by a users’ friends independent of one
another. The positive relationship between the number of
sharing friends and likelihood of sharing may therefore sim-
ply reflect heterogeneity in the “interestingness” of the con-
tent, which is clustered along the network: the more popular
a page is for a group of friends, the more likely it is that one
would observe multiple friends sharing it.
We first show that, consistent with prior observational
studies, the probability of sharing a link in the feed condi-
tion increases with the number of contacts who have already
shared the link (solid line, Figure 4a). But the presence of a
similar relationship in the no feed condition (grey line, Fig-
ure 4a) shows that an individual is more likely to exhibit the
sharing behavior when multiple friends share, even if she
does not necessarily observe her friends’ behavior. There-
fore, when using observational data, the naıve conditional
probability (which is equivalent to the probability of shar-
ing in the feed condition) does not directly give the proba-
bility increase due to influence via multiple sharing friends.
Rather, such an estimate reflects a mixture of internal influ-
ence effects and external correlation.
Our experiment allows us to directly measure the effect of
the feed relative to external factors, computed as either the
difference or ratio between the probability of sharing in the
feed and no feed conditions (Figure 4bc). While the differ-
ence in sharing likelihood grows with the number of sharing
friends, the relative risk ratio falls. This contrast suggests
that social information in the feed is most likely to influence
a user to share a link that many of her friends have shared,
but the relative impact of that influence is highest for con-
tent that few friends are sharing. The decreasing relative
effect is consistent with the hypothesis that having multi-
ple sharing friends is associated with greater redundancy in
(a)
(b)
Figure 3: Temporal clustering in sharing the same
link as a friend in the feed and no feed conditions. (a)
The difference in sharing time between a sub ject and
their first sharing friend. (b) The difference between
the time at which a sub ject was first to exposed (or
was to be exposed) to the link and the time at which
they shared. Vertical lines indicate one day and one
week.
time, even when no exposure occurs on Facebook. Figure 3
illustrates the cumulative distribution of information lags
between the sub ject and their first sharing friend, among
sub jects who had shared a URL after their friends. The top
panel shows the latency in sharing times between the sub ject
and their friend for users in the feed and no feed condition.
While a larger proportion of users in the feed condition share
a link within the first hour of their friends, the distribution
of sharing times is strikingly similar. The bottom panel
shows the differences in time between when sub jects shared
and when they were (or would have been) first exposed to
their friends’ sharing behavior on the Facebook feed. The
horizontal axis is negative when a sub ject had shared a link
after a friend but had not yet seen that link on the feed.
From this comparison, it is easy to see that users in the feed
condition are most likely to share a link immediately upon
exposure, while those who share it without seeing it in their
feed will do so over a slightly longer period of time.
share time − alter's share time (days)cumulative density0.00.20.40.60.81.0051015202530feedno feedshare time − exposure time (days)cumulative density0.00.20.40.60.81.0−5051015202530feedno feed(a)
(b)
(c)
Figure 4: Users with more friends sharing a Web link are themselves more likely to share. (a) The probability
of sharing for sub jects that were (feed) and were not (no feed) exposed to content increases as a function of the
number sharing friends. (b) The causal effect of the feed is greater when sub jects have more sharing friends
(c) The multiplicative impact of the feed is greatest when few friends are sharing. Error bars represent the
95% bootstrapped confidence intervals clustered on the URL.
information exposure, which may either be caused by ho-
mophily in visitation and sharing tendencies, or external
influence.
5. TIE STRENGTH AND INFLUENCE
Next, we examine the relationship between tie strength,
influence, and information diversity by combining the ex-
perimental data with users’ online and offline interactions.
Following arguments originally proposed by Mark Granovet-
ter’s seminal 1973 paper, The Strength of Weak Ties [22],
empirical work linking tie strength and diffusion often uti-
lize the number of mutual contacts as proxies of interaction
frequency. Rather than using the number of mutual con-
tacts, which can be large for pairs of individuals who no
longer communicate (e.g.
former classmates), we directly
measure the strength of tie between a sub ject and her friend
in terms of four types of interactions: (i) the frequency of
private online communication between the two users in the
form of Facebook messages1 ; (ii) the frequency of public on-
line interaction in the form of comments left by one user
on another user’s posts; (iii) the number of real-world coin-
cidences captured on Facebook in terms of both users be-
ing labeled by users as appearing in the same photograph;
and (iv) the number of online coincidences in terms of both
users responding to the same Facebook post with a com-
ment. Frequencies are computed using data from the three
months directly prior to the experiment. The distribution of
tie strengths among sub jects and their sharing friends can
be seen in Figure 5.
5.1 Effect of Tie Strength
We measure how the difference in the likelihood of sharing
a URL in the feed versus no feed conditions varies according
1We quantify message and comment interactions as the
number of communication events the sub ject received from
their friend. The number of messages and comments sent,
and the geometric mean of communications sent and re-
ceived, yielded qualitatively similar results, so we plot only
the single directed measurement for the sake of clarity.
Figure 5: Tie strength distribution among friends
displayed in sub jects’ feeds using the four measure-
ments. Points are plotted up to the 99.9th percentile.
Note that the vertical axis is collapsed.
to tie strength. To simplify our estimate of the effect of tie
strength, we restrict our analysis to sub jects with exactly
one friend who had previously shared the link. In both con-
ditions, a sub ject is more likely to share a link when her
sharing friend is a strong tie (Figure 6a). For example, sub-
jects who were exposed to a link shared by a friend from
whom the sub ject received three comments are 2.83 times
more likely to share than sub jects exposed to a link shared
by a friend from whom they received no comments. For
those who were not exposed, the same comparison shows
that sub jects are 3.84 times more likely to share a link that
was previously shared by the stronger tie. The larger ef-
number of sharing friends probability of sharing0.0000.0050.0100.0150.0200.0250.030123456conditionfeedno feed number of sharing friendspfeed−pno feed0.0000.0050.0100.0150.0200.0250.030123456 number of sharing friendspfeedpno feed0246810123456tie strength cumulative fraction of ties in feed0.880.900.920.940.960.981.0001020304050typecomments receivedmessages receivedphoto coincidencesthread coincidences(a)
(b)
Figure 6: Strong ties are more influential, and weak ties expose friends to information they would not have
otherwise shared. (a) The increasing relationship between tie strength and the probability of sharing a link
that a friend shared in the feed and no feed conditions. (b) The multiplicative effect of feed diminishes with
tie strength, suggesting that exposure through strong ties may be redundant with external exposure, while
weak ties carry information one might otherwise not have been exposed to.
fect in the no feed condition suggests that tie strength is a
stronger predictor of externally correlated activity than it is
for influence on feed. From Figure 6a, it is also clear that
individuals are more likely to be influenced by their stronger
ties via the feed to share content that they would not have
otherwise spread.
Furthermore, our results extend Granovetter’s hypothesis
that weak ties disseminate novel information into the con-
text of media contagion. Figure 6b shows that the risk ratio
of sharing between the feed and no feed conditions is highest
for content shared by weak ties. This suggests that weak
ties consume and transmit information that one is unlikely
to be exposed to otherwise, thereby increasing the diversity
of information propagated within the network.
5.2 Collective Impact of Ties
Strong ties may be individually more influential, but how
much diffusion occurs in aggregate through these ties de-
pends on the underlying distribution of tie strength (i.e.
Figure 5). Using the experimental data, we can estimate
the amount of contagion on the feed generated by strong
and weak ties. The causal effect of exposure to information
shared by friends with tie strength k is given by the average
treatment effect on the treated:
ATET(k) = p(k , feed) − p(k , no feed)
To determine the collective impact of ties of strength k ,
we multiply this quantity by the fraction of links displayed
in all users’ feeds posted by friends of tie strength k , denoted
by f (k). In order to compare the impact of weak and strong
ties, we must set a cutoff value for the minimum amount
of interaction required between two individuals in order to
consider that tie strong. Setting the cutoff at k = 1 (a
single interaction) provides the most generous classification
of strong ties while preserving some meaningful distinction
between strong and weak ties, thereby giving the most in-
fluence credit to strong ties.
Under this categorization of strong and weak ties, the esti-
mated total fraction of sharing events that can be attributed
to weak and strong ties is the average treatment effect on
the treated weighted by the proportion of URL exposures
from each tie type:
Tweak = ATET(0) ∗ f (0)
N(cid:88)
ATET(i) ∗ f (i)
i=1
Tstrong =
We illustrate this comparison in Figure 7, and show that
by a wide margin, the ma jority of influence is generated by
weak ties2 . Although we have shown that strong ties are
individually more influential, the effect of strong ties is not
large enough to match the sheer abundance of weak ties.
6. DISCUSSION
Social networks may influence an individual’s behavior,
but they also reflect the individual’s own activities, inter-
ests, and opinions. These commonalities make it nearly im-
possible to determine from observational data whether any
particular interaction, mode of communication, or social en-
2Note that for the purposes of this study, it is not neces-
sary to model the effect of tie strength for users with multi-
ple sharing friends, since stories of this kind only constitute
4.2% of links in the newsfeed, and their inclusion would not
dramatically alter the balance of aggregate influence by tie
strength.
comments received probability of sharing0.0000.0020.0040.0060.008024681012conditionfeedno feed messages received probability of sharing0.0000.0020.0040.0060.00801234567 photo coincidences probability of sharing0.0000.0020.0040.0060.00801234 thread coincidences probability of sharing0.0000.0020.0040.0060.00802468101214 comments receivedpfeedpno feed0246810024681012 messages receivedpfeedpno feed024681001234567 photo coincidencespfeedpno feed024681001234 thread coincidencespfeedpno feed024681002468101214propensities, diffuse novel information that would not have
otherwise spread.
Although weak ties can serve a critical bridging func-
tion [22, 37], the influence that weak ties exert has never
before been measured empirically at a systemic level. We
find that the ma jority of influence results from exposure to
individual weak ties, which indicates that most information
diffusion on Facebook is driven by simple contagion. This
stands in contrast to prior studies of influence on the adop-
tion of products, behaviors or opinions, which center around
the effect of having multiple or densely connected contacts
who have adopted [6, 7, 14, 13]. Our results suggest that in
large online environments, the low cost of disseminating in-
formation fosters diffusion dynamics that are different from
situations where adoption is sub ject to positive externalities
or carries a high cost.
Because we are unable to observe interactions that occur
outside of Facebook, a limitation of our study is that we
can only fully identify causal effects within the site. Cor-
related sharing in the no feed condition may occur because
friends independently visit and share the same page as one
another, or because one user is influenced to share via an ex-
ternal communication channel. Although we are not able to
directly evaluate the relative contribution of these two po-
tential causes, our results allow us to obtain a bound on the
effect on sharing behavior within the site. The probability
of sharing in the no feed condition, which is a combination of
similarity and external influence, is an upper bound on how
much sharing occurs because of homophily-related effects.
Likewise, the difference in the probability of sharing within
the feed and no feed condition gives a lower bound on how
much on-site sharing is due to interpersonal influence along
any communication medium.
The mass adoption of online social networking systems
has the potential to dramatically alter an individual’s ex-
posure to new information. By applying an experimental
approach to measuring diffusion outcomes within one of the
largest human communication networks, we are able to rig-
orously quantify the effect of social networks on information
spread. The present work sheds light on aggregate trends
over a large population; future studies may investigate how
properties of the individual, such as age, gender, and nation-
ality, or features of content, such as popularity and breadth
of appeal, relate to the influence and its confounds.
7. ACKNOWLEDGMENTS
We would like to thank Michael D. Cohen, Dean Eckles,
Emily Falk, James Fowler, and Brian Karrer for their discus-
sions and feedback on this work. This work was supported
in part by NSF IIS-0746646.
8. REFERENCES
[1] L. A. Adamic and E. Adar. Friends and neighbors on
the web. Social Networks, 25:211–230, 2001.
[2] E. Adar and A. Adamic, Lada. Tracking information
epidemics in blogspace. In 2005 IEEE/WIC/ACM
International Conference on Web Intel ligence,
Compiegne University of Technology, France, 2005.
[3] E. Adar, J. Teevan, and S. T. Dumais. Resonance on
the web: web dynamics and revisitation patterns. In
Proceedings of the 27th International Conference on
Human factors in Computing Systems, CHI ’09, pages
1381–1390, New York, NY, USA, 2009. ACM Press.
Figure 7: Weak ties are collectively more influen-
tial than strong ties. Panels show the percentage
of information spread by strong and weak ties for
all four measurements of tie strength. Although
the probability of influence is significantly higher
for those that interact frequently, most contagion
occurs along weak ties, which are more abundant.
vironment is responsible for the apparent spread of a behav-
ior through a network. In the context of our study, there are
three possible mechanisms that may explain diffusion-like
phenomena: (1) An individual shares a link on Facebook,
and exposure to this information on the feed causes a friend
to re-share that same link. (2) Friends visit the same web
page and share a link to that web page on Facebook, inde-
pendently of one another. (3) An individual shares a link
within and external to Facebook, and exposure to the ex-
ternally shared information causes a friend to share the link
on Facebook. Our experiment determines the causal effect
of the feed on the spread of sharing behaviors by comparing
the likelihood of sharing under the feed condition (possible
causes 1-3) with the likelihood under the no feed condition
(possible causes 2-3).
Our experiment generalizes Mark Granovetter’s predic-
tions about the strength of weak ties [22] to the spread of
everyday information. Weak ties are argued to have access
to more diverse information because they are expected to
have fewer mutual contacts; each individual has access to
information that the other does not. For information that
is almost exclusively embedded within few individuals, like
job openings or future strategic plans, weak ties play a nec-
essarily role in facilitating information flow. This reason-
ing, however, does not necessarily apply to the spread of
widely available information, and the relationship between
tie strength and information access is not immediately obvi-
ous. Our experiment sheds light on how tie strength relates
to information access within a broader context, and sug-
gests that weak ties, defined directly in terms of interaction
% influence on feed tie strength strong weak strong weak strong weak strong weak020406080commentsmessagesphotosthreads[4] A. Anagnostopoulos, R. Kumar, and M. Mahdian.
Influence and correlation in social networks. In
Proceedings of the 14th Internal Conference on
Know ledge Discover & Data Mining, pages 7–15, New
York, NY, USA, 2008. ACM Press.
[5] S. Aral, L. Muchnik, and A. Sundarara jan.
Distinguishing influence-based contagion from
homophily-driven diffusion in dynamic networks. Proc.
Natl. Acad. Sci., 106(51):21544–21549, December
2009.
[6] S. Aral and D. Walker. Creating social contagion
through viral product design: A randomized trial of
peer influence in networks. Management Science,
57(9):1623–1639, Aug. 2011.
[7] L. Backstrom, D. Huttenlocher, J. Kleinberg, and
X. Lan. Group formation in large social networks:
membership, growth, and evolution. In KDD ’06:
Proceedings of the 12th ACM SIGKDD international
conference on Know ledge discovery and data mining,
pages 44–54, New York, NY, USA, 2006. ACM.
[8] E. Bakshy, J. M. Hofman, W. A. Mason, and D. J.
Watts. Everyone’s an influencer: Quantifying influence
on twitter. In 3rd ACM Conference on Web Search
and Data Mining, Hong Kong, 2011. ACM Press.
[9] E. Bakshy, B. Karrer, and L. Adamic. Social influence
and the diffusion of user-created content. In
Proceedings of the tenth ACM conference on Electronic
commerce, pages 325–334. ACM, 2009.
[10] H. R. Bernard, P. Killworth, D. Kronenfeld, and
L. Sailer. The problem of informant accuracy: The
validity of retrospective data. Annu. Rev. Anthropol.,
13:495–517, 1984.
[11] J. J. Brown and P. H. Reingen. Social ties and
word-of-mouth referral behavior. J. Consumer
Research, 14(3):pp. 350–362, 1987.
[12] R. S. Burt. Structural holes: The social structure of
competition. Harvard University Press, Cambridge,
MA, 1992.
[13] D. Centola. The Spread of Behavior in an Online
Social Network Experiment. Science,
329(5996):1194–1197, September 2010.
[14] D. Centola and M. Macy. Complex contagions and the
weakness of long ties. Am. J. Sociol., 113(3):702–734,
Nov. 2007.
[15] M. Cha, A. Mislove, and K. P. Gummadi. A
measurement-driven analysis of information
propagation in the flickr social network. In Proceedings
of the 18th international conference on World wide
web, WWW ’09, pages 721–730, New York, NY, USA,
2009. ACM.
[16] N. A. A. Christakis and J. H. H. Fowler. The spread
of obesity in a large social network over 32 years. N.
Engl. J. Med., 357(4):370–379, July 2007.
[17] S. Fox. The social life of health information. Technical
report, Pew Internet & American Life Pro ject, 2011.
[18] E. Gilbert and K. Karahalios. Predicting tie strength
with social media. In Proceedings of the 27th
International Conference on Human Factors in
Computing Systems, CHI ’09, pages 211–220, New
York, NY, USA, 2009. ACM.
[19] M. Gladwell. The Tipping Point: How Little Things
Can Make a Big Difference. Little Brown, New York,
2000.
[20] M. Gomez Rodriguez, J. Leskovec, and A. Krause.
Inferring networks of diffusion and influence. In
Proceedings of the 16th ACM SIGKDD international
conference on Know ledge discovery and data mining,
KDD ’10, pages 1019–1028, New York, NY, USA,
2010. ACM.
[21] A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning
influence probabilities in social networks. In
Proceedings of the third ACM international conference
on Web search and data mining, WSDM ’10, pages
241–250, New York, NY, USA, 2010. ACM.
[22] M. S. Granovetter. The strength of weak ties. Am. J.
Sociol., 78(6):1360–1380, May 1973.
[23] M. S. Granovetter. Threshold models of collective
behavior. Am. J. Sociol., 83(6):1420–1443, 1978.
[24] B. S. Greenberg. Person to person communication in
the diffusion of news events. Journalism Quarterly,
41:489–494, 1964.
[25] D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins.
Information diffusion through blogspace. In
Proceedings of the 13th international conference on
World Wide Web, pages 491–501. ACM, 2004.
[26] K. Hampton, L. S. Goulet, L. Rainie, and K. Purcell.
Social networking sites and our lives. Technical report,
Pew Internet & American Life Pro ject, 2011.
[27] S. Hill, F. Provost, and C. Volinsky. Network-Based
marketing: Identifying likely adopters via consumer
networks. Stat. Sci., 21(2):256–276, May 2006.
[28] G. Kossinets and D. J. Watts. Origins of homophily in
an evolving social network. Am. J. Sociol.,
115(2):405–450, September 2009.
[29] K. Lerman and R. Ghosh. Information contagion: An
empirical study of the spread of news on digg and
twitter social networks. In Proceedings of 4th
International Conference on Weblogs and Social Media
(ICWSM), 2010.
[30] J. Leskovec, L. A. Adamic, and B. A. Huberman. The
dynamics of viral marketing. In EC ’06: Proceedings
of the 7th ACM conference on Electronic commerce,
pages 228–237, New York, NY, USA, 2006. ACM.
[31] D. Liben-Nowell and J. Kleinberg. Tracing
information flow on a global scale using internet
chain-letter data. Proceedings of the National Academy
of Sciences, 105(12):4633, 2008.
[32] C. F. Manski. Identification of endogenous social
effects: The reflection problem. Rev. Econ. Stud.,
60(3):531–42, July 1993.
[33] A. Marin. Are respondents more likely to list alters
with certain characteristics? Implications for name
generator data. Social Networks, 26(4):289–307, Oct.
2004.
[34] M. McPherson, L. S. Lovin, and J. M. Cook. Birds of
a Feather: Homophily in Social Networks. Annu. Rev.
Sociol., 27(1):415–444, 2001.
[35] M. E. J. Newman. Spread of epidemic disease on
networks. Phys. Rev. E, 66(1):016128, Jul 2002.
[36] J.-P. Onnela and F. Reed-Tsochas. Spontaneous
emergence of social influence in online systems.
Proceedings of the National Academy of Sciences,
107(43):18375–18380, 2010.
[37] J. P. Onnela, J. Saramaki, J. Hyvonen, G. Szab´o,
D. Lazer, K. Kaski, J. Kert´esz, and A. L. Barab´asi.
Structure and tie strengths in mobile communication
networks. Proceedings of the National Academy of
Sciences, 104(18):7332–7336, May 2007.
[38] K. Purcell, L. Rainie, A. Mitchell, T. Rosenstiel, and
K. Olmstead. Understanding the participatory news
consumer. Technical report, Pew Internet & American
Life Pro ject, 2010.
[39] C. R. Shalizi and A. C. Thomas. Homophily and
Contagion Are Generically Confounded in
Observational Social Network Studies. Sociological
Methods and Research, 27:211–239, 2011.
[40] T. Stein, E. Chen, and K. Mangla. Facebook Immune
System. In EuroSys Social Network Systems, 2011.
[41] E. S. Sun, I. Rosenn, C. A. Marlow, and T. M. Lento.
Gesundheit! modeling contagion through facebook
news feed. In Proceedings of the 3rd Int’l AAAI
Conference on Weblogs and Social Media, San Jose,
CA, 2009. AAAI.
[42] D. J. Watts and S. H. Strogatz. Collective dynamics of
‘small-world’ networks. Nature, 393(6684):440–442,
June 1998.
[43] S. Wu, J. M. Hofman, W. A. Mason, and D. J. Watts.
Who says what to whom on twitter. In ACM
Conference on the World Wide Web, Hyderbad, India,
2011. ACM Press.
|
1703.08365 | 1 | 1703 | 2017-03-24T11:31:20 | The Emergence of Crowdsourcing among Pok\'emon Go Players | [
"cs.SI",
"cs.HC"
] | Since its launching, Pok{\'e}mon Go has been pointed as the largest gaming phenomenon of the smartphone age. As the game requires the user to walk in the real world to see and capture Pok{\'e}mons, a new wave of crowdsourcing apps have emerged to allow users to collaborate with each other, sharing where and when Pok{\'e}mons were found. In this paper we characterize one of such initiatives, called PokeCrew. Our analyses uncover a set of aspects of user behavior and system usage in such emerging crowdsourcing task, helping unveil some problems and benefits. We hope our effort can inspire the design of new crowdsourcing systems. | cs.SI | cs | The Emergence of Crowdsourcing among Pokémon Go
Players∗
Priscila Martins
UFMG, Brazil
[email protected]
Fabrício Benevenuto
UFMG, Brazil
[email protected]
Manoel Miranda
UFMG, Brazil
[email protected]
Jussara Almeida
UFMG, Brazil
[email protected]
7
1
0
2
r
a
M
4
2
]
I
S
.
s
c
[
1
v
5
6
3
8
0
.
3
0
7
1
:
v
i
X
r
a
ABSTRACT
Since its launching, Pok´emon Go has been pointed as the
largest gaming phenomenon of the smartphone age. As the
game requires the user to walk in the real world to see and
capture Pok´emons, a new wave of crowdsourcing apps have
emerged to allow users to collaborate with each other, shar-
ing where and when Pok´emons were found. In this paper we
characterize one of such initiatives, called PokeCrew. Our
analyses uncover a set of aspects of user behavior and system
usage in such emerging crowdsourcing task, helping unveil
some problems and benefits. We hope our effort can inspire
the design of new crowdsourcing systems.
1.
INTRODUCTION
The mobile games industry experienced an exponential
growth in the past decade, motivated mainly by (i) an ever
increasing worldwide penetration of smartphones and mobile
devices, (ii) the ability of such devices to deliver quality
audio and video; and (iii) the increasing capacity of network
transmissions of these devices, allowing users to download
larger and more complex games [Soh and Tan 2008].
The largest gaming phenomenon of the smartphone age so
far has been the augmented reality game Pok´emon Go. It
was launched in July 2016, firstly in Australia, New Zeland,
and USA. Yet, in one week after launching, it had already
reached seven million users, accounting for three to six times
more downloads of the most popular games in history at
that time [Makuch ]. The game makes use of GPS, camera,
and position sensors of smartphones which allow its users to
capture, battle and train virtual creatures called Pok´emons.
These creatures appear on the phone screen as if they were
in the real world. The set of technologies that allow this
kind of experience support the so-called augmented reality,
a field that has received a lot of attention after the game
success.
∗This is a preprint of an article submitted to a conference.
ACM ISBN 978-1-4503-2138-9.
DOI: 10.1145/1235
There has been a number of recent studies exploiting
behavioral changes among Pok´emon Go players. Nigg et
al. [Nigg et al. 2017] suggest that Pok´emon Go may in-
crease physical activity and decrease sedentary behaviors.
Other efforts [Tateno et al. 2016, Dorward et al. 2016,
de Oliveira Roque 2016] argue that the game may represent
a new shift in perspective: players tend to socialize more
while playing as they tend to concentrate in popular areas
of the game, often called Pok´eStops.
Since the game requires the user to walk in the real world
to see and capture the Pok´emons nearby, a new wave of
supporting apps has emerged.
In these apps, players can
collaborate with each other, sharing where and when Pok´e-
mons were found. They represent the emergence of a crowd-
sourcing effort of the game players to find rare and valuable
Pok´emons. PokeCrew1, one such app of great popularity, is
a crowdsourced Pok´emon Go map. It shows reports of lo-
cations of Pok´emon posted by players in real time in a map
and it became quite popular among the most active users.
For example, this website was ranked among the top 15000
domains in the Web, according to Alexa.com [ale ] and its
IOS and android versions had hundreds of thousands down-
loads.
In this paper, we characterize the crowdsourcing effort of
Pok´emon Players through PokeCrew. Crowdsourcing sys-
tems enlist a multitude of humans to help solve a wide va-
riety of problems. Over the past decade, numerous such
systems have appeared on the Web. Prime examples in-
clude Wikipedia, Yahoo! Answers, Mechanical Turk-based
systems, and many more [Howe 2006]. Our effort consists
in characterizing an emerging type of crowdsourcing sys-
tem, identifying many interesting technical and social chal-
lenges. To that end, we obtained a near two-month log of
reports from the game players, containing 39,895,181 reports
of Pok´emon locations. Our analyses uncover a set of aspects
of user behavior and system usage in an emerging crowd-
sourcing task. We hope our effort can inspire the design of
emerging crowdsourcing systems.
In the following, we first describe the data used in our
study and then analyze how users collaboratively help each
other within the Pokecrew platform. We finish this paper
with our conclusions and possible directions for future work.
2. DATASET
With the increasing popularity of Pok´emon Go in the
1https://www.pokecrew.com/
whole world, many applications emerged with the purpose of
enhancing the players experience with the game. Among the
most popular ones are Pokecrew2, PokeRadar3, and Poke-
Vision4. The idea is to share Pok´emon maps and their loca-
tions in a crowdsourced way: after finding Pok´emons in the
game itself users may report them in the supporting app,
making the creatures visible to other players that are not in
that specific location and time. This can be very useful to
players, since, in the game, it is not possible to see Pok´emons
far from where the player is currently physically located.
We have obtained data from Pokecrew, a popular app that
offers to users a map containing the location of Pok´emons
reported by other users. The application can be found in the
PlayStore, AppStore, as well as on the Web. Our dataset
contains 39,895,181 reports, from July 12th to August 24th
2016. Each report contains several information fields, in-
cluding: a report id, reported Pok´emon id, geographic co-
ordinates, time when the report was created and, in some
registers, a username.
Our results show that most reports in our dataset (98.7%)
do not include a valid username, since the app does not re-
quire the user to identify itself in order to create reports.
Thus, although we report general statistics computed over
the whole dataset in the next section, we focus on the subset
of reports with valid usernames to study user behavior. We
note that, despite the small percentage, there is still a con-
siderable amount of identifiable reports (over 500k) on which
we can perform such analysis. Finally, we also note that the
spatial information in our dataset refers to geographic coor-
dinates of the reports.
3. REPORTED POKÉMONS AND THEIR
LOCATIONS
We start our characterization by analyzing which Pok´e-
mons are the most reported ones and where they were re-
ported. We then discuss the application adoption on specific
locations.
3.1 Most Reported Pokémons
Table 1 shows the top-10 most reported Pok´emons in our
dataset. We note that these Pok´emons are evolutions or
difficult to find in the game. An evolution of a given Pok´e-
mon consists of a similar monster but with a higher power,
which is very important to battle with other Pok´emons in
the so called 'gyms', popular places across the world where
a user (a Pok´emon master) battles with other users in or-
der to take control of that gym. Besides that, having these
evolutions contributes to the user's Pokedex, which is a list
containing detailed stats for every creature from the Pok´e-
mon games. The more Pok´emons a user has in her list, more
experience she has on the game, which is also important to
battle with other players at the gyms. Capturing an evo-
lution is attractive to players because the only alternative
way to obtain them is to use an egg, which is earned as the
player progress in the game. With this egg, the Pok´emon
master can put it to crash, which is achieved by walking.
The distance required to crash an egg may vary (2, 5 or 10
kilometers). The higher the distance, the more valuable the
Pok´emon that comes out of the egg is. Thus, it is much
2www.pokecrew.com
3https://www.Pokemonradargo.com/
4www.pokevision.com
more convenient to catch the evolved Pok´emon right away
than it is to walk waiting for the egg to crack and, luckily,
be rewarded with a powerful Pok´emon.
This observation shows the great contribution of Poke-
crew to Pok´emon players: the interest in rare Pok´emons or
evolutions is what drive players to appeal to these crowd-
sourced apps. These Pok´emons are more valuable than the
most commonly found, which normally have less power to
battle.
Pok´emon's Name Number of Reports
4,957,913
Fearow
Raichu
3,910,515
2,395,383
Slowbro
2,150,770
Golduck
2,051,487
Pidgeot
1,507,741
Nidoran
Tentacool
1,199,451
1,044,395
Nidoqueen
938,829
Magnemite
Clefable
928,105
Table 1: Top 10 reported Pok´emons
3.2 Pokémon Location
We note that our dataset contains only geographic coor-
dinates of the reports. In order to characterize the location
where these reports were made, we first converted the co-
ordinates to the cities and countries where the reports are
made. Our approach to do that consisted of using a reliable
Python library, namely geopy5, which allows us to retrieve
the nearest town/city for a given latitude/longitude coordi-
nate.
Most of the reports (almost 34%) come from the U.S, fol-
lowed by Singapore and Malyasia. We also noticed that
three American cities -- New York City, San Francisco and
Santa Monica -- are included in the top 10 cities.
3.3 Crowdsourcing Adoption
In this kind of application, the initial stage of its lifespan
can be unattractive to the users due to the lack of data in the
system. In PokeCrew and other competing apps, this aspect
is even more critical, since the adoption of Pok´emon GO was
fast and user engagement was very strong. In an applica-
tion like Pokecrew, if the user does not encounter Pok´emon
reports, it is very likely she will not be motivated to use
the system and therefore won't be encouraged to create new
reports.
To assess whether the previous presence of Pok´emons in
the application influences the user to create new reports, we
compared the amount of reports in a popular area among
the days. To that end, we focused on the reports in the
city of New York, which concentrates most part of reports.
The city geographic area was first divided into 800 regions of
approximately 500m2 , and for each region we counted the
total number of reports created on each day. Besides that,
we considered the period from August 14th to 26th, which
concentrates a larger number of reports. It is possible to see
in Figure 1, most of the reports made in New York City,
were created in the Central Park area, a very popular place
in the game itself. Figure 2 shows a heat map correlating
5https://pypi.python.org/pypi/geopy/
engagement within this crowdsourced system. The dataset
collected presents 39,895,181 reports, but only 452,359
(1.3%) are registered users (non-anonymous). We focus the
next analysis on the behavior of this identified group of users.
4.1 User Engagement
Analyzing the reports made by registered users, we can
notice that some of them, mostly users who contributed
with the largest amounts of reports, reported a large num-
ber of sightings in just one day. For example, the top 1 user
reported 184,615 times, being her reports concentrated be-
tween July 21st and 24th. Specifically, reported 13,007 times
on July 21st and 75,574 on July 22nd, which are very expres-
sive numbers. Similarly, 31,656 reports made by the second
most active user, which corresponds to almost 99.7% of his
contribution to the Pokecrew system, were concentrated on
a single day, August 12th. The 10 most active users in the
Pokecrew system, in terms of reports of Pok´emon sightings,
are shown in Table 2. We note that some users have re-
ported far many sightings than others, especially the 4 most
active ones. Given the large amount of reports associated
with these users, and the short time interval during which
they were made, we speculate that these reported sightings
may not have been made by "legitimate" Pokecrew users.
Based on the amount of reports that the top 5 have made,
and the fact that these reports are, in general, concentrated
in a few set of days, we've disregarded this data for some
analysis. Just a few number of users have reported from
30 to 261 times. Most of users have reported from 1 to 20
times. We have categorized users who have reported from
1 to 5 times as less active users, representing 80% of the
database.
Given that for each report we have the information about
the time when it was created and its location, we can cal-
culate for each pair of reports of a single user the speed in
which he would have to dislocate in order to make both re-
ports. Calculating the speed for each pair of user's report,
we obtained a set of speeds from the identified user's re-
ports. The chart bellow shows the speed distribution across
the total identifiable users:
As we can see in the plot above, a considerable number
of reports made by the users in the system reveal that they
would have to move at abnormally high speeds for this kind
of game. Even if we consider the case where a user report a
Pok´emon in one place, go on an airplane trip and then report
another in the destination, which although maybe uncom-
mon, is possible, some speeds are not feasible to achieve.
The problem is that, even though the PokeCrew app uses
Counting reports
184615
31766
609
413
270
261
255
239
236
235
User name
yay1199
hi
mongrelo
luchocadaingles
maestroPok´emonbelloto
rooty
srdandrea
crescenttough
ceryatec
guantoresp
Table 2: Top 10 users and their counting reports
Figure 1: Geographical Location of Top 20 regions
from NY
the number of reports in each region showed in Figure 1 in
each date.
Figure 2: Heat Map of Top 20 regions from NY
4. USER BEHAVIOR
Next, we provide a characterization of the crowdsourced
Pokecrew data, exploring aspects of user behavior and their
This paper explores one out of a new wave of applications
that rely on collaborative databases in the mobile gaming
environment. Pok´emon Go was a huge phenomenon in this
area and motivated the creation of innumerable initiatives to
help gamers with the task of catching, training and battling
Pok´emons across the city. Since the game requires the user
to walk and visit places in order to succeed at being a Pok´e-
mon master, this kind of support showed to be extremely
useful to players, because they could go straight to the ex-
act location where a desired Pok´emon is located instead of
randomly walk hoping to find some valuable monster, as we
could see with the most reported Pok´emons. One important
aspect in this work was to show how vulnerable such systems
are to spoofed data.
Inconsistent locations over time for
some users and the noticeably high amount of reports these
users pushed to the system certainly had a negative impact
over the legit final user experience, who could encounter fake
reports on the map. Although the app lacks mechanisms to
prevent these fake reports, the establishment of a trustful
relation with the user is difficult to achieve
6. ACKNOWLEDGMENTS
We would like to thank Pokecrew for kindly sharing its
data with our research group. This work is supported by
author's individual grants from Capes, Fapemig, and CNPq.
F. Benevenuto is also supported by Humboldt Foundation.
7. REFERENCES
[ale ] Pokecrew Traffic Statistics. (2017).
http://www.alexa.com/siteinfo/pokecrew.com
Available at
http://www.alexa.com/siteinfo/pokecrew.com.
[de Oliveira Roque 2016] Fabio de Oliveira Roque. 2016.
Field studies: Could Pokemon Go boost birding?
Nature 537, 7618 (2016), 34 -- 34.
[Dorward et al. 2016] Leejiah J Dorward, John C
Mittermeier, Chris Sandbrook, and Fiona Spooner.
2016. Pok´emon Go: Benefits, Costs, and Lessons for
the Conservation Movement. Conservation Letters
(2016).
[Howe 2006] Jeff Howe. 2006. The rise of crowdsourcing.
Wired magazine 14, 6 (2006), 1 -- 4.
[Makuch ] Eddie Makuch. Pokemon Go Reaches $600
Million, Faster Than Any Mobile Game in History -
Report. (2016). http://www.gamespot.com/articles/
pokemon-go-reaches-600-million-faster-than-any-mob/
1100-6444687/ Available at
http://www.gamespot.com/articles/pokemon-go-
reaches-600-million-faster-than-any-mob/1100-
6444687.
[Nigg et al. 2017] Claudio R Nigg, Desiree Joi Mateo, and
Jiyoung An. 2017. Pok´emon Go may increase physical
activity and decrease sedentary behaviors. (2017).
[Soh and Tan 2008] Jason O. B. Soh and Bernard C. Y.
Tan. 2008. Mobile Gaming. Commun. ACM 51, 3
(March 2008), 35 -- 39. DOI:
https://doi.org/10.1145/1325555.1325563
[Tateno et al. 2016] Masaru Tateno, Norbert Skokauskas,
Takahiro A Kato, Alan R Teo, and Anthony PS
Guerrero. 2016. New game software (Pok´emon Go)
Figure 3: Speed distribution across identified users
the GPS data from the smartphone and places the map in
the user current location, the player has the ability to move
the map to any place in the world and therefore report a
sighting from anywhere. There is no validation in the app
if the report being created is trustful. This opens a serious
flaw in the system, because malicious users and even bots
could create fake sightings to spoof the system and degrade
the legit user experience. Even if the user could not change
the location in the map, it would still be possible to report a
Pok´emon that does not exist in the game itself at that given
time and location. This kind of validation is a key problem
in collaborative systems, and can be very challenging due to
the lack of mechanisms to control whether the information
being supplied to the database is true or not.
4.2 Temporal Analysis
The created at field represents the date when the the sight-
ing was reported by a user. The chart below shows an anal-
yse about how many reports were made in each day. From
July 12th, when Pokecrew was created, to August 7th there
were not many users contributing to the system. This sce-
nario changes after August 8th, with a peak of reports on
August 21st.
Figure 4: Amount of reports per date
5. CONCLUDING DISCUSSION
may help youth with severe social withdrawal,
hikikomori. Psychiatry Research (2016).
|
1804.02101 | 2 | 1804 | 2018-04-10T21:41:16 | Modeling Popularity in Asynchronous Social Media Streams with Recurrent Neural Networks | [
"cs.SI",
"stat.ML"
] | Understanding and predicting the popularity of online items is an important open problem in social media analysis. Considerable progress has been made recently in data-driven predictions, and in linking popularity to external promotions. However, the existing methods typically focus on a single source of external influence, whereas for many types of online content such as YouTube videos or news articles, attention is driven by multiple heterogeneous sources simultaneously - e.g. microblogs or traditional media coverage. Here, we propose RNN-MAS, a recurrent neural network for modeling asynchronous streams. It is a sequence generator that connects multiple streams of different granularity via joint inference. We show RNN-MAS not only to outperform the current state-of-the-art Youtube popularity prediction system by 17%, but also to capture complex dynamics, such as seasonal trends of unseen influence. We define two new metrics: promotion score quantifies the gain in popularity from one unit of promotion for a Youtube video; the loudness level captures the effects of a particular user tweeting about the video. We use the loudness level to compare the effects of a video being promoted by a single highly-followed user (in the top 1% most followed users) against being promoted by a group of mid-followed users. We find that results depend on the type of content being promoted: superusers are more successful in promoting Howto and Gaming videos, whereas the cohort of regular users are more influential for Activism videos. This work provides more accurate and explainable popularity predictions, as well as computational tools for content producers and marketers to allocate resources for promotion campaigns. | cs.SI | cs |
Modeling Popularity in Asynchronous Social Media Streams
with Recurrent Neural Networks
Swapnil Mishra, Marian-Andrei Rizoiu and Lexing Xie
The Australian National University, Data 61, CSIRO, Australia
{swapnil.mishra,marian-andrei.rizoiu,lexing.xie}@anu.edu.au
Abstract
Understanding and predicting the popularity of online items
is an important open problem in social media analysis. Con-
siderable progress has been made recently in data-driven pre-
dictions, and in linking popularity to external promotions.
However, the existing methods typically focus on a single
source of external influence, whereas for many types of on-
line content such as YouTube videos or news articles, atten-
tion is driven by multiple heterogeneous sources simultane-
ously – e.g. microblogs or traditional media coverage. Here,
we propose RNN-MAS, a recurrent neural network for mod-
eling asynchronous streams. It is a sequence generator that
connects multiple streams of different granularity via joint in-
ference. We show RNN-MAS not only outperforms the cur-
rent state-of-the-art Youtube popularity prediction system by
17%, but also captures complex dynamics, such as seasonal
trends of unseen influence. We define two new metrics: the
promotion score quantifies the gain in popularity from one
unit of promotion for a Youtube video; the loudness level cap-
tures the effects of a particular user tweeting about the video.
We use the loudness level to compare the effects of a video
being promoted by a single highly-followed user (in the top
1% most followed users) against being promoted by a group
of mid-followed users. We find that results depend on the type
of content being promoted: superusers are more successful in
promoting Howto and Gaming videos, whereas the cohort of
regular users are more influential for Activism videos. This
work provides more accurate and explainable popularity pre-
dictions, as well as computational tools for content producers
and marketers to allocate resources for promotion campaigns.
1
Introduction
Popularity refers to the total attention that a digital item
receives. Understanding popularity has been an important
problem since the early days of social media research. Im-
portant open questions include explaining observed popu-
larity, predicting popularity in the future, and being able to
reason about the cause and effect of intervention from indi-
viduals and groups. Insights into popularity dynamics can
help content producers to better prioritize production and
schedule promotions, and help content providers to allocate
resources for hosting and advertising.
Copyright c(cid:13) 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
Successful recent models of popularity fall into two cat-
egories. The first describes individual user actions, or dis-
crete events in continuous time (e.g. tweets) (Du et al. 2016;
2013; Mishra, Rizoiu, and Xie 2016; Shen et al. 2014;
Yu et al. 2016; Zhao et al. 2015). The second is based
on aggregate metrics of user actions (Cheng et al. 2014;
Martin et al. 2016) or aggregated event volumes (e.g.
the number of daily views) (Szabo and Huberman 2010;
Pinto, Almeida, and Gonc¸alves 2013; Rizoiu et al. 2017;
Yu, Xie, and Sanner 2015). Each of these models specialise
in a distinct data type, but it is common to observe data of
different types for the same online item. It is desirable to
develop a model that accounts for multiple heterogeneous
series.
Furthermore, many popularity models provide black-box
predictions (Zhao et al. 2015; Martin et al. 2016; Mishra,
Rizoiu, and Xie 2016). In practice one often demands simu-
lations on various what-if scenarios, such as to quantify the
effect of a unit amount of promotions, to capture seasonality
or the response to outliers, to name a few. Lastly, the influ-
ence users have on popularity has been subject to constant
debate in this research area. The view that one or a few in-
fluential champions can make or break a cascade (Budak,
Agrawal, and El Abbadi 2011) contrasts with the view that
popularity largely results from a large number of moderately
influential users (Bakshy et al. 2011). It is desirable to have
one model on which the future effect of different users can
be comparably studied.
This work aims to explain and predict the popularity of an
online item under the influence of multiple external sources,
in different temporal resolutions – such as both promotion
events (e.g. tweets) and volumes (e.g. number of shares per
day). In particular, we propose RNN-MAS1 (Recurrent Neu-
ral Networks for Multiple Asynchronous Streams), a flexi-
ble class of models learnable from social cascades that can
describe heterogeneous information streams, explain pre-
dictions, and compare user effects for both individuals and
groups. Recurrent neural network is an effective tool for
sequence modeling in natural language and multiple other
domains (Elman 1990; Graves 2013; Sutskever, Vinyals,
and Le 2014). We link multiple recurrent neural networks
by allowing them to exchange information across different
1Download data and code here: https://git.io/vx7Tk.
asynchronous streams. This is an extension to the recent
RMTPP (Du et al. 2016) for a single social event sequence.
We illustrate the effectiveness of this model for predicting
popularity of YouTube videos under the influence of both
tweeting events and sharing volumes – improving state of
the art prediction by 17%.
We propose several new ways to interpret and simulate
popularity, and implement them for RNN-MAS. The first is
a unit promotion response metric, measures the gain in pop-
ularity per unit of promotion. Measured at different times
and promotion scales, it can describe the time-varying and
nonlinear effect of online promotions. The second measure,
unseen response, captures the effect of unobserved external
influence. Since neural nets is a flexible function approxi-
mator, we show that this measure can successfully capture
seasonal effects. To understand the influence of users, we
compute a new metric, loudness level, as the log-ratio of
marginal gain from users. It is used to quantify the popu-
larity gain from powerful users and moderately influential
groups of users for each video. We observe that for supe-
rusers are more effective in a minority (37%) of Nonprofit
and activism videos, whereas superusers dominate in other
video categories such as HowTo & style and Gaming.
The main contributions of this paper include:
• RNN-MAS, a new and flexible model that links multiple
asynchronous streams for predicting online popularity.
• New measures, unseen response and promotion score,
to quantify content virality and explain different factors
that affect popularity.
• A method for quantifying Twitter user influence on dis-
seminating content on YouTube, proposing a new loud-
ness metric and a set of observations across diverse con-
tent types on the relative influence of superusers versus
everyday users.
2 Background
Our proposal is at intersection of three distinct bodies of
literature: Hawkes process (Hawkes 1971), Hawkes inten-
sity process (Rizoiu et al. 2017) and Recurrent neural net-
works (Elman 1990; Hochreiter and Schmidhuber 1997;
Graves 2013) .
Hawkes Process. (Hawkes and Oakes 1974) Self-exciting
point processes are a special case of point processes (Da-
ley and Vere-Jones 2008) where the arrival of an event in-
creases the probability of observing future events. A well
known self-exciting process is the Hawkes process (Hawkes
1971) where the intensity of arrival of new events – the event
rateλ (t) –, depends explicitly on all past events as:
λ(t) = µ(t) +Xti<t
φ(t − ti) ,
(1)
where µ(t) is the rate of arrival of external events (indepen-
dent of the arrival of past events). Each previous event ob-
served at time ti affects the rate of future events through
the kernel φ(t − ti), making the process self-exciting. This
kernel is known as the memory kernel. Previous literature
mainly uses three families of functions as memory ker-
nels: power-law functions φp(τ ) = (τ + c)−(1+θ), used in
geophysics (Helmstetter and Sornette 2002) and social net-
works (Crane and Sornette 2008; Zhao et al. 2015; Mishra,
Rizoiu, and Xie 2016) ; exponential functions φe(τ ) =
e−θτ , used in financial data (Filimonov and Sornette 2013);
2 θτ 2, used in epidemiol-
Rayleigh functions φr(τ ) = e− 1
ogy (Wallinga and Teunis 2004). All three families of ker-
nels ensure that more recent events have higher influence on
the current event rate at time t – the kernels are known as
time-decaying.
One of the limitations of employing Hawkes point pro-
cesses to model popularity is the parametric design of the
kernel function. For real-world data, the kernel function is
unknown and it needs to be approximated in a bottom-up
approach based on prior and intuition.
The model proposed in Section 3.1 can non-
parametrically learn the event rate function from observed
data.
Hawkes Intensity Processes (HIP) (Rizoiu et al. 2017) de-
scribes the volume of attention series ξ[t] as a self-consistent
equation:
t
X
τ =1
ξ[t] = u[t] + αs[t] + C
ξ[t − τ ](τ + c)−(1+θ)
(2)
where s [t] and u [t] are respectively the external promotion
and the unseen influence series at time t; α is the sensitivity
to exogenous promotions; θ modulated the power-law mem-
ory kernel, C scales with content quality and c is a thresh-
old parameter to keep the power-law kernel bounded when
τ ' 0. HIP describes the volumes of attention over fixed
time intervals (e.g. daily).
Modeling popularity with HIP has two drawbacks. First,
analogous to the Hawkes process, HIP also requires speci-
fying a parametric kernel. Second, HIP models volumes of
data over fixed time intervals, even when detailed informa-
tion about individual external promotion events is available
– e.g. which and when an user tweeted a video. The mod-
els we propose in Section 3.2 and Section 3.3 tackle these
challenges via joint inference of the volume series and point
process series.
Recurrent Neural Networks (RNN) (Elman 1990) are
common sequence models where the same feed forward
structure is replicated at each time step. They have additional
connections from the output of previous the time step to the
input of the current time step – therefore creating a recur-
rent structure. Their hidden state vector ht can be defined
recursively as:
ht = f (xt, ht−1)
where f is the feed forward network, xt is the current in-
put, ht−1 is the output from previous time step. Long short-
term memory (LSTM) (Hochreiter and Schmidhuber 1997;
Graves 2013) units are essentially recurrent networks with
additional gated structure, defined as:
it = σ (Wixt + Uiht−1 + Vict−1 + bi)
ft = σ (Wf xt + Uf ht−1 + Vf ct−1 + bf )
ct = ftct−1 (cid:12) tanh (Wcxt + Ucht−1 + bc)
ot = σ (Woxt + Uoht−1 + Voct + bo)
ht = ot (cid:12) tanh (ct)
(3)
(a)
(b)
(c)
Figure 1: Recurrent models for events and volumes. (a) RPP, (b) VolRNN-S/TS and (c) RNN-MAS. Top row: output series;
middle: block diagram for recurrent network, each circle refers to an LSTM unit; bottom: input series.
where xt is input at time t, σ is the logistic sigmoid function
and (cid:12) denotes element-wise multiplication. The notations
it, ft, ct, ot and ht stand for the input, forget, cell-state,
output and hidden state at time t. We use the following short-
hand notation for the LSTM set of equations in Equation 3:
(4)
(ht, ct) = LST M (xt, ht−1, ct−1)
LSTM and its variants have been successfully used for
modeling time series and predicting sequence, due to their
ability to capture the effects of past data in their hid-
den state (Hochreiter and Schmidhuber 1997; Graves 2013;
Chung et al. 2014). We build on this intuition to construct
based on LSTM the models proposed in Section 3.
3 RNN for Volume and Point Processes
In the following section we first introduce a recurrent model
for modeling event series in Section 3.1, followed by a re-
current model for a volume series in Section 3.2. Finally
we present a joint model for predicting attention volumes
in Section 3.3. Our notations for all the model are sumarized
in Table 1.
3.1 Recurrent Point Process (RPP)
We present a model to frame events data as point processes
in Figure 1a, where the influence of history on future events
is learned as parameters of LSTM unit.
The equation for event rate at time t for the model is writ-
ten as:
(5)
such that ht is :
hP
o hP
λ (t) = exp(cid:0)W P
t = LST M(cid:0)(mi, ti) , hP
t + α (t − ti)(cid:1)
ti , cti(cid:1)
(6)
where ti is the time for last event before time t, mi is the
magnitude of last event. In point process literature magni-
tude of an event is generally referred to as mark of an event,
where mark represent attributes of the event, e.g. magnitude
of the earthquake, or the type of a trade - bond or stock.
In our work for modeling tweets we consider mark as the
magnitude (#followers) of user tweeting. hti and cti denotes
hidden and cell state respectively at time ti, and α is a scalar
that modulates effect of current time on intensity.
Our model is similar to the one proposed by (Du et al.
2016). In their work they assume discrete values of marks
as they model different event types rather than magnitude.
Table 1: Summary of notations for RNN models
Event
Data
Volume
Data
Symbol Quantity
ei
=
(mi, ti)
λ(ti)
sd
ith event at time ti of magnitude mi
Intensity at ith event
Exogenous stimulus at fixed inter-
val d
Attention Volume at fixed interval d
Vd
We generalize their model to work for continuous marks by
modeling mark generation separately from history, as done
in (Rizoiu et al. 2017; Mishra, Rizoiu, and Xie 2016).
3.2 Volume RNN
RNN can also model volume streams. HIP can be seen as
generalization of autoregressive models, with a history size
as long as the sequence itself. Intuitively in HIP, the current
value of volume intensity can be seen as a convolution of a
memory kernel with its past values. Hence we formulate a
LSTM model in Figure 1b, for predicting attention volume
series as follows, using Equation (4):
Vd = W V ol
o hd
such that,
hd = LST M (sd, hd−1, cd−1)
(7)
(8)
where Vd is the attention volume at time d , hd is the hidden
state time d and input to the system is sd at time d, where
sd is the exogenous stimuli for the attention volume at time
d. For volume RNN model we have time points as discrete
values, spread over fixed time intervals (e.g. daily, hourly).
3.3 RNN-MAS for asynchronous streams
In real world scenarios, we have multiple streams of data
promoting a single attention series. For example, being
tweeted and being shared both lead to more views on a
YouTube video. In this section we present a combined model
to take into account the volume promotions and individual
events for predicting an attention volume series.
RNN-MAS model is shown in the Figure 1c. It has two
components: a volume RNN model as shown in Figure 1b
predicting the desired attention volume series at fixed time
Intensity
Event Series
Output
Model
Input
Volume Series
Promotion Series
Volume Series
Intensity
Promotion Series
Event Series
both models, we calculate the hidden state from RPP model
for day d using Equation 6 and hidden state for volume RNN
at day d is calculated using Equation 8. Now the combined
model is trained using RMSE for the attention volume series.
For all models, we jointly learn network parameters over
500 random sequences from Active+tweets Dataset
described in Section 5. Now for individual fittings we use the
jointly learned parameters as the initialization point. We ob-
serve faster convergence and better prediction results when
compared to running with random initializations. For more
details, see supplement (Mishra, Rizoiu, and Xie 2018).
4 Popularity Metrics
RNN-MAS describes popularity under influence of hetero-
geneous streams of shares and tweets. We propose two met-
rics based on RNN-MAS to quantify average response to
unit promotion, and the relative influence among users of
different fame. We also utilize the model to estimate a re-
sponse series to unseen influence for a video.
d
d
Simulation
We can use our learned volume prediction models to sim-
ulate a series of views V P (·)
from d = 1 to d = T days,
where V P (·)
stands for views on dth day under a promotion
function P (·). For computing views we evolve hidden states
as per the Equation 6 and Equation 8 for our models, where
the input parameter is defined by the value of function P (·)
at various time steps. At the end of each time step, views are
computed as per Equation 9 and Equation 7 for RNN-MAS
and Volume RNN respectively. We define, ν (P (·)), the cu-
mulative views generated by promotion function P (·) from
d = 1 to d = T days as:
ν (P (·)) =
V P (·)
d
(13)
T
X
d=1
For all our simulations we choose T = 10, 000 days, as this
represents ≈ 27 years, longer than lifetime of any YouTube
video.
4.1 Response to unseen influence
Despite taking into account multiple sources of external in-
fluence, there are influence signals that our models, RNN-
MAS and volume RNN, do not capture explicitly. Examples
include seasonality, or discussions in forums that are known
to be an important factor for gaming videos - widely pro-
moted on forum www.minecraftforum.net.
For understanding this response to unseen influence we
set the promotion function P (·) = 0 in our simulation setup
described in Section 4 and obtain a series of V P (·)=0
The response series to unseen influence here generalizes
previous definitions. In HIP (Rizoiu et al. 2017) external in-
fluence u[t], is assumed to be an initial impulse plus a con-
stant (Equation 5 in Section 2.4). In this work the shape of
response series to latent promotions is unconstrained.
In Section 6.1 we present various case studies to illustrate
how the response series to unseen influence for our models
is able to capture richer temporal trends, such as seasonality.
.
d
Vd = W M AS
o
(cid:2)hd, hP
d(cid:3)
(9)
intervals by taking into account the promotional volume se-
ries; a second component as RPP model as shown in Fig-
ure 1a, responsible for modeling the individual promotion
series. Intuitively we would like RPP to modulate the re-
sponse of volume RNN, to make better predictions for at-
tention series. We achieve it by combining the hidden states
for individual models just before making the prediction for
attention series.
We combine individual models as follows:
where, hd and hP
d are the hidden state for volume RNN and
RPP on day d, calculated as per Equation 8 and Equation 6
respectively, shown with arrows coming from RPP model
towards the volume RNN model at regular intervals in Fig-
ure 1c.
We note another plausible setup for joint modeling is at-
tention volumes affecting the event rate of RPP. As our main
concern is predicting popularity under promotion we do not
utilize this setting.
3.4 Model Learning
RPP: For fitting our model to a sequence of events S =
{ei} where, ei is the ith event such that mi and ti stands for
magnitude and time of the ith event, we maximize the log-
likelihood of the observed sequence. Using Equation 5 and
Equation 6, we can write log-likelihood for sequence as:
(10)
o hP
ti(cid:1)
exp(cid:0)W P
ti + cτi(cid:1)(cid:21)
1 c
o hP
exp(cid:0)W P
1 c
−
λ (τ ) dτ
log (λ (ti)) −Z tS
SXi=1(cid:20)W P
o hP
0
ti + cτi +
LL (S) =
SXi=1
=⇒ LL (S) =
For predicting the time for the next event in sequence
we can utilize the relationship between conditional density
function of time, f (t), and conditional intensity function
(event rate), λ (t) (Daley and Vere-Jones 2008):
f (t) = λ (t) exp(cid:18)−Z t
ti
λ (τ ) dτ(cid:19)
(11)
In order to predict the next time step,ti+1, where ti is
event time for the last observed event, we take the expec-
tation in Equation 11 as follows:
=⇒ ti+1 =Z ∞
ti
t · f (t) dt
(12)
Volume RNN: For training volume models, we use RMSE
as the loss function and each fixed interval data is considered
as separate time steps of the given variables. This can be seen
as modeling a time-series regression with LSTM.
RNN-MAS: For training the joint model, we first train both
RPP and volume RNN models independently. After fitting
4.2 Response to unit promotion.
In linear time variant (LTI) systems such as HIP, the total
gain per unit promotion, ν,is well defined. It's calculated by
computing the impulse response (Rizoiu and Xie 2017) of
the system. In our models, RNN-MAS and volume RNN,
the notion of impulse response does not readily apply as it's
a non-linear time variant system.
We compute the average response to unit impulse in three
steps: compute response of our models to p units of pro-
motion to volume RNN at d = 0 days; subtract response
to unseen influences, calculated as per Section 4.1; normal-
ize it by p. Response to p units of promotion is calculated
using function P (d) = p1[d] in simulation setup of Sec-
tion 4, where 1[d] takes a value of 1 at d = 0, and 0 oth-
erwise. The average response to unit promotion from pro-
motion P (d) = p1[d], (p) named as promotion score, is
calculated as:
(p) =
ν(p1[d]) − ν(0)
p
(14)
In this definition, promotion score can be negative, captur-
ing cases where being promoted decreases popularity (e.g.
spam or paid tweets). Also note that (p) is a function of
p, i.e. for different simulation parameter p, the average re-
sponse to unit promotion is different. This allows us to de-
scribe phenomena of diminishing returns in may real-world
marketing scenarios (Jones 1990). We examine the effect of
p in Section 6.2 and found that (p) tend to decrease as p
grows.
4.3 Loudness level
Using simulation metrics similar to ϑ and (p), we can mea-
sure the influence of an individual or a group of users by the
responses generated by their tweeting events.
Loudness level is a relative measure of total influence for
one or a group of users. It is measured in decibels (dB). It
is computed as log-ratio of the response of the target group
ψ(S) versus that of a comparison value ψ0.
We compute ψ(S) in two steps: calculate ν(P (·)) such
that P (·) = {si} in simulation setup of Section 4, where
{si} is the set of tweets generated by user group S; subtract
response to unseen influences, calculated as per Section 4.1.
It can be written as:
ψ(S) = ν(si) − ν(0)
=⇒ ψdB(S) = log10(cid:18) ψ(S)
ψ0 (cid:19) dB
(15)
where ψ0, the comparison value, is set to 1 for experiments
in Section 6.3.
As loudness level accounts for all activity generated by a
user group, it can be used to compare the relative effects of
promotion between users of different fame in Twitter.
5 Predictive Evaluation
In this section, we evaluate the performances of predicting
the attention that videos receive in the future using RNN-
MAS and its variants, against a number of baselines.
modeling event data with recurrent point processes.
Overview of methods
Event prediction. We compare several approaches for pre-
dicting either the next event time in a series of events, or the
likelihood of a series of future (holdout) events:
• RMTPP (Du et al. 2016): State of the art system for
• RPP: Our model detailed in Section 3.1, modeling event
• PL (Mishra, Rizoiu, and Xie 2016): State of the art
model for events data utilizing Hawkes processes.
• Exp: variant of PL, that uses an exponential kernel.
• Seismic (Zhao et al. 2015): Seminal model based on
self exciting processes for predicting event data in social
networks.
data with LSTM.
Volume prediction. We use the following approaches to
predict the series of volume of attention that a video receives
during the next time-frames:
• HIP (Rizoiu et al. 2017): State of the art system for
predicting views of video by using daily shares as pro-
motions, outperforms linear regression baselines (Pinto,
Almeida, and Gonc¸alves 2013) and (Szabo and Huber-
man 2010).
• VoRNN-S: Our model detailed in Section 3.2 which like
• VoRNN-TS: A version of our model detailed in Sec-
tion 3.2, using both daily shares and tweets as promo-
tions, where tweets are aggregated daily to make it syn-
chronous to views and shares series.
• RNN-MAS: Our dual RNN model described in Sec-
tion 3.3 that combines daily shares with the event series
of tweets, modeled as point process by RPP, to make pre-
dictions.
HIP, uses only daily shares for prediction.
Dataset
We use three different datasets in our experiments.
RMTPP-Syn: synthetic data simulated with same pa-
rameters as (Du et al. 2016). It has 100,000 events from
an unmarked Hawkes process (Hawkes and Oakes 1974).
The conditional intensity for simulated data is given by
λ (t) = λo + αPti<t exp(cid:18)−
t − ti
σ (cid:19) where λo = 0.2,
α = 0.8 and σ = 1.0. We use 90% of events for training and
rest for testing.
Tweet1MO: a real world tweets dataset released by (Zhao
et al. 2015), containing all tweets between October 7 to
November 7, 2011.
Active+tweets: The YouTube videos dataset released
by (Rizoiu et al. 2017) containing 13,738 videos. All videos
in this dataset were uploaded between 2014-05-29 to 2014-
08-09 and have at least 100 views, 100 shares and 100
tweets. We augment each video with corresponding individ-
ual tweets data, emitted during same period. There are in to-
tal 30.2 million tweets in the dataset. On average each video
is tweeted 2151 times, median video was tweeted 327 times.
5.1 Event Data Results
Table 2 lists two prediction tasks, next event time and hold-
out likelihood, against competing methods for the task. We
(a)
(b)
(c)
Figure 2: (a) Error in estimated next event time for various models on RMTPP-Syn. (b) Absolute Percentile Error(APE) for
different approaches on Active dataset. All approaches use shares as promotion, VoRNN-TS and RNN-MAS use extra informa-
tion about tweets. (c) two sample fittings where error(APE) for RNN-MAS is 2.01 and 0.13 and error for HIP is 2.3 and 5.1 for
videos 'WKJoBeeSWhc' and 'dwM2XFmLEP0' respectively.
Table 2: Summary of methods and prediction tasks for event
data modelling.
Method
RMTPP
Seismic
PL
EXP
RPP
Prediction Type
Next Event
(RMTPP-Syn)
hold-out likelihood
(Tweet1MO)
present results for next event time prediction on RMTPP-
Syn as Tweet1MO has continuous marks which RMTPP
can not model. Seismic can not predict next event time
hence we compare performance for hold-out likelihood on
Tweet1MO.
We make prediction for next event time for RMTPP, PL,
Exp and RPP using Equation 12. Figure 2a reports error in
prediction as absolute error. We report error for an oracle
process that is set to the ground truth parameters generat-
ing data. Error for oracle process is difference between the
expected values and simulated values. We observe that RPP
has lower mean and median error than RMTPP. RPP shows
similar mean and median as EXP, indicating RPP is flexible
enough to capture influence of past events on future.
We compare the negative log-likelihood on hold-out data
for RPP and alternatives, lower is better. We vary the fraction
of observed events to report results on Tweet1MO in Table 3.
We observe RPP performs better than PL and Seismic
for all observed fractions. More importantly performance of
RPP increases consistently with increase in observed frac-
tion, indicating better generalization towards data.
Table 3: Results showing mean(median) of negative log-
likelihood per event for holdout set for Tweet1MO after ob-
serving a part of the cascade.
Observed Fraction
0.40
0.50
0.80
PL
8.54(7.87)
8.38(7.96)
9.22(9.29)
Seismic
7.62(6.98)
7.44(6.44)
8.02(7.3)
RPP
7.46(6.47)
7.26(6.39)
6.97(6.14)
5.2 Volume Prediction
Setup. We evaluate our volume prediction approaches in the
same a temporal holdout setup employed by (Rizoiu et al.
2017), on the Active+tweets dataset. Four data streams are
available for each video in this dataset: the views volume se-
ries, the shares volume series, the tweets volume series and
the tweet event data series. Each of the models listed in Ta-
ble 4 inputs one or several promotion streams (shares and
tweets) and predicts the views series stream. First, we train
each model using the streams data in the first 90 days, for
each video. Next, we forecast the views series during the
next 30 days (from day 91 to 120) assuming known the pro-
motions streams. Finally, we compute the gained popularity
by summing up the views series during the test period. We
evaluate performances using the Absolute Percentile Error
(APE), computed as in (Rizoiu et al. 2017). Note that out of
the approaches in Table 4, RNN-MAS is the only model that
can leverage the tweet event data stream for forecasting the
futures views series.
Figure
for
Active+tweets Dataset. We observe that VoRNN-
TS, outperforms HIP by 7% and 3% for median and
mean error, respectively. RNN-MAS performs best with
an improvement of 11% and 17% for median and mean
error respectively over HIP. We observe an increase in
Results.
results
2b
shows
the
2Not used as performance decreases
3.355
2.314
4.338
2.322
4.886
4.937
2.581
2.608
4.377
2.338
Oracle
Exp
PL
RMTPP
RPP
14
12
10
02468
Absolute Error
4.09
2.73
4.58
2.75
4.78
2.87
4.95
3.09
RNN-MAS
VoRNN-S
VoRNN-TS
HIP
14
12
10
02468
Absolute Percentile Error
Number of shares
80
60
40
0
02
30
20
0
01
WKJoBeeSWhc
observed #views
#share
#tweets
RNN-MAS fit
HIP fit
0
20
40
60
video age (day)
dwM2XFmLEP0
80
100
120
4000
3000
2000
1000
0
Number of views
200000
100000
0
Table 4: Summary of methods used in the volume evalua-
tion, and type of promotion data that each approach can use.
Method
HIP
VoRNN-S
VoRNN-TS
RNN-MAS
Type of Promotion
Shares Tweets
(daily)
(daily)
Tweets
(events)
2
3
performance of RNN-MAS when compared with VoRNN-S
whereas for VoRNN-TS performance decreases, despite
both models utilizing additional tweets data over shares
in VoRNN-S. We are modeling this extra information in
VoRNN-TS as volume of tweets wherein in RNN-MAS
we utilize the timing (and magnitude) of individual tweets.
Results show that
timing of events appears to contain
information useful for predicting views, hence necessitating
a model to jointly model event and volume data.
Figure 2c shows
two sample fittings,
for videos
WKJoBeeSWhc and dwM2XFmLEP0 where error(APE) for
RNN-MAS is 2.01 and 0.13 and error for HIP is 2.3 and
5.1 respectively. The vertical dashed line divides data into
training and testing set of 90 and 30 days respectively. The
dashed line shows the real view series where blues line
shows the fit by RNN-MAS and magenta shows the fit for
HIP. For video WKJoBeeSWhc you could see two different
phases, one before 90 days where view series (shown with
dashed black line) is showing an inherent upward trend and
one after 90 days where this inherent tendency has died. Fit-
ting for RNN-MAS (shown in blue) is able to capture this
change wherein HIP (shown in magenta) fails. For video
dwM2XFmLEP0 performance of HIP is even worse as it is
not able to model the view series in accordance with shares
(shown in red) and RNN-MAS ably models the response.
One explanation is that RNN-MAS captures latent influence
better, as shown in Section 6.1.
6 Explaining Popularity
In this section, we exemplify how the response series to un-
seen influence, and how the metrics promotion score and
loudness level described in Section 4 can be used to analyze
the popularity of online videos.
6.1 Understanding unseen influence
We present case studies on real and simulated data to illus-
trate the complex dynamics captured by the response series
to unseen influence for our models when compared to HIP.
Real data fittings. We show sample fittings for two videos
WKJoBeeSWhc and 1hTDORFb5SE in the top row of Fig-
ure 3a and Figure 3b respectively. The bottom row of
both figures shows the response series to unseen influ-
ence for RNN-MAS and HIP. Visibly, RNN-MAS can cap-
ture complex dynamics that HIP cannot explain: video
WKJoBeeSWhc (Figure 3a) exhibits a delayed response,
3Not used, theoretically it can
while 1hTDORFb5SE (Figure 3b) features a seasonal trend.
Part of the fitting performance gain of RNN-MAS can be at-
tributed to its modeling of the response to unseen influence.
Synthetic data. We further investigate on synthetic data the
ability of volume RNN models and HIP to uncover seasonal
trends. We simulate two sources of promotion for 120 days:
the first series has a weekly cyclic component, with a maxi-
mum amplitude of 24 units of promotion (shown in the bot-
tom row of Figure 4a); the second series contains random
promotions with the same maximum amplitude (shown in
the middle row of Figure 4a). Using these two promotion
series, we simulate the view series using HIP (shown in the
top row of Figure 4a). Next, we use the fitting procedure de-
scribed in Section 5.2 to train the HIP and the VoRNN-S
models on the simulated view series, using only the ran-
dom promotion as the external stimulus series. More de-
tails on the simulation can be found in the online supple-
ment (Mishra, Rizoiu, and Xie 2018).
The top row of Figure 4b shows the fitting results for both
models. Visibly, the series fitted by VoRNN-S (blue line) fol-
lows the simulated views (dashed black lines) more closely
than the series fitted by HIP (magenta line). The bottom row
of Figure 4b shows the response to unseen promotions, as
estimated by VoRNN-S (in blue) and HIP (magenta). We
see that VoRNN-S uncovers a cyclic response compatible in
phase with the unobserved promotion series. The response
of HIP shows a sharp drop followed by a near-zero constant
response, due to its simplistic external influence modeling.
6.2 Average unit promotion score
HIP was used in (Rizoiu and Xie 2017) to quantify the to-
tal amount of attention generated by a single unit of pro-
motion – dubbed the virality score ν – for an online pro-
motion application. In Figure 3c, we compare the promo-
tion score (p) of our models against ν for all the videos
in the Active+tweets Dataset. The x-axis shows the
promotion score (p) with p = 5, split into 20 percentile
bins. The y-axis shows ν in percentiles, summarized us-
ing boxplots for each bin. Overall, we observe a strong
agreement between (p) and ν – the boxplots are placed
around the main diagonal – signifying that RNN-MAS can
capture online promotability as well as HIP does. Further-
more, we observe a decrease in the value of (p) as p in-
creases: the median values are (1) = 263, (5) = 260,
(10) = 259. This suggests that, unlike HIP, our models can
capture the complex phenomenon of diminishing returns in
promotion (Jones 1990).
6.3 User Influence
Setup. Bakshy et al (Bakshy et al. 2011) showed that for
promoting content on Twitter, the most reliable and cost-
effective method is to utilize a group of individuals who
have average or even less number of followers. We evaluate
the influence of a super user against a cohort of small users.
Figure 5a shows the rank versus the number of followers in
Active+tweets Dataset. We define a super user as
having 21,368 followers, or top 1% of all users; a small user
as the median user with 120 followers. The cohort has 178
small users, as the sum total of their followers is comparable
(a)
(b)
(c)
Figure 3: (a)(b) Fittings for the attention series (top row) and the response to unseen influence (bottom row) using RNN-MAS
and HIP, for two sample videos WKJoBeeSWhc (a) and 1hTDORFb5SE (b). (c) Comparison of HIP's virality score ν (x-axis)
against the promotion response of RNN-MAS (p = 5) (y-axis).
(a)
(b)
Figure 4: (a) Simulating a views series with known unobserved influence. A view series (top row) simulated by HIP with two
sources of external stimuli: a series of random promotions (middle row) and a cyclic promotion series with weekly spikes
(bottom row). (b) Retrieving the reaction to unknown influence through fitting. The simulated views series in (a, top row) is
fitted using VoRNN-S and HIP (shown in the top row) using only the observed influence series (middle row). The reaction to
unobserved influence (bottom row) is shown for HIP (magenta) and VoRNN-S (blue).
(a)
(b)
(c)
Figure 5: (a) Quantile rank versus number of followers of an user on Active+tweets Dataset. The median user has 120
followers whereas a user with 21368 followers is in top 1%. (b) ψdb(super) versus ψdb(small) scatter plot for Nonprofits &
Activism videos. For 37% of the videos, super users have greater influence than the small user cohort. (c) View and tweet series
for video 6Ga0V1mrZDo,with ψdb(super) = 3.3 and ψdb(small) = 1.3. See Sec 6.3 for discussions.
Number of shares
80
60
40
0
02
observed #views
#share
RNN-MAS fit
HIP fit
Fitting for
WKJoBeeSWhc
20
40
60
video age (day)
80
100
Response series to unseen influence for
WKJoBeeSWhc
RNN-MAS
HIP
20
40
60
Time
80
100
0
0
4000
3000
2000
1000
0
Number of views
750
500
250
0
Views
Number of shares
400
300
200
00
01
150000
100000
50000
Fitting for
1hTDORFb5SE
observed #views
#share
RNN-MAS fit
HIP fit
0
0
20
40
60
video age (day)
80
100
100000
75000
50000
25000
0
RNN-MAS
HIP
Response series to unseen influence for
1hTDORFb5SE
0
20
40
60
Time
80
100
Number of views
Views
5
10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100
Percentile of Promotion Score((5)) with promotion = 5
100
95
90
85
80
75
70
65
60
55
50
45
40
35
30
25
20
15
10
5
PercentileofViralityScore(ν)asgivenbyHIP
200
0
20
0
20
0
0
0
0
simulated #views
20
40
60
80
100
120
observed #promotions
20
40
60
80
100
120
unobserved #promotions
20
40
60
video age (day)
80
100
120
200
0
20
0
200
0
0
20
40
60
80
simulated #views
VoRNN-S fit
HIP fit
100
120
observed #promotions
0
0
20
20
40
60
video age (day)
80
100
120
VoRNN-S Unseen Response
HIP Unseen Response
40
60
video age (day)
80
100
120
Top 1% #followers = 21368.0
median #followers = 120.0
0.4
Quantile Rank of User
0.6
0.8
1.0
0.2
107
106
105
104
103
102
101
#followers
Nonprofits & Activism
4.0
3.5
3.0
2.5
2.0
1.5
1.0
0.5
0.0
1.3 1.5
2.0
2.5
3.0
3.5
4.0
Number of tweets
80
60
40
0
02
120
100
0
0
5
10
20
15
25
video age (day)
30
35
40
observed #views
#tweets
160
140
6Ga0V1mrZDo
6000
5000
4000
3000
2000
1000
Number of views
to a super user. For each video and each user group we gen-
erate a series of tweets from the trained RPP model of the
video. This series of tweets act as promotions by each user
group. The effect for tweet series promotion is captured by
metric ψdB for each group as described in Section 4.3. Setup
details are described in the supplement (Mishra, Rizoiu, and
Xie 2018).
Results. Figure 5b shows the value of ψdB for super user
against a cohort of small users on all videos in Nonprofits &
Activism category. Plots for all categories are in the supple-
ment (Mishra, Rizoiu, and Xie 2018). We observe type of
content greatly affects the promoting capabilities of the su-
per user. For example 37% of Nonprofits & Activism videos
(above the green line) have ψdB of super user greater than
ψdB of cohort of small users. Whereas for categories HowTo
& Style and Gaming more than 50% of videos have a greater
ψdB for super user when compared to ψdB for a cohort of
small users.
We present an example video (6Ga0V1mrZDo) from Non-
profits & Activism category in Figure 5c, where ψdB(super)
is 3.3 and ψdB(small) is 1.3. The video here is uploaded by
PETA, talking about deaths of pigs in slaughter houses. In
Figure 5c, not all peaks in tweets corresponds towards the in-
crease in views of the video. On examining the data we find
that peaks where views and tweets correlates are the points
where a super user is part of the tweets. In first peak around
day 3, there is a user with 494851 followers. In the third peak
around day 12, there is a user with 23561 followers. At two
other tweeting peaks, there are cohorts of small users (all
with less than 4000 followers) tweeting about the video, but
no view count pikes. Presence of super users around peaks in
view series corroborates the loudness estimate for this video.
7 Related Work
Modeling and predicting popularity using generative
models. Popularity modeling (Crane and Sornette 2008;
Yu et al. 2016) and prediction (Shen et al. 2014; Zhao et
al. 2015; Mishra, Rizoiu, and Xie 2016) has been a partic-
ularly fertile field for point-process based generative mod-
els. In their seminal work, Crane and Sornette (Crane and
Sornette 2008) showed how a Hawkes point-process can ac-
count for popularity bursts and decays. Afterwards, more
sophisticated models have been proposed to model and sim-
ulate popularity in microblogs (Yu et al. 2016). These ap-
proaches successfully account for the social phenomena
which modulate online diffusion: the "rich-get-richer" phe-
nomenon and social contagion. Certain models can output
an estimate for the total size of a retweet cascade. Shen
et al. (Shen et al. 2014) employed reinforced Poisson pro-
cesses, modeling three phenomena: fitness of an item, a
temporal relaxation function and a reinforcement mecha-
nism. Zhao et al. (Zhao et al. 2015) proposed SEISMIC,
which employs a double stochastic process, one account-
ing for infectiousness and the other one for the arrival time
of events. The model by (Mishra, Rizoiu, and Xie 2016)
uses both hawkes process and feature driven methods to pre-
dict total tweets for a cascade. HIP (Rizoiu et al. 2017;
Rizoiu and Xie 2017), current state of the art, uses volume
point process to directly model views of a YouTube video
and then extends it for promotion and marketing.
(Wang
et al. 2017a) recently proposed a method to link macro and
micro events of a single time series to do macro prediction,
they aggregate the micro time series to get the macro time
series.
RNN for time series. Recurrent Neural Networks (El-
man 1990) in particular its variants LSTM (Hochreiter
and Schmidhuber 1997; Graves 2013) and GRU (Chung
et al. 2014) are the basic building block of our model.
They are basically a sequence learning model that gener-
ates the next output in a sequence depending upon its cur-
rent input and previous state. They have shown state of
the art results in sequence prediction/learning task in fields
text (Sutskever, Vinyals, and Le 2014), image (Vinyals et al.
2015), video (Jain et al. 2016) and time-series data (Chandra
and Zhang 2012). Recently people have also tried to model
point processes (Du et al. 2016; Xiao et al. 2017; Wang et
al. 2017b) with RNNs. Recent work by (Cao et al. 2017;
Li et al. 2017) used RNNs for modeling end to end predic-
tion of information cascades in presence of a single source
of events.
The main difference in our model with any existing work
is the use of two different streams of data, one is volume and
other is event series, about a single event. Although HIP (Ri-
zoiu et al. 2017; Rizoiu and Xie 2017) uses two series but in-
stead of using event series as it is they aggregate it and report
worse performance then using only the macro series. Recent
work by (Wang et al. 2017a) and (Xiao et al. 2017) com-
bines asynchronous streams, but they aggregate exogenous
individual events at fixed intervals rather than considering a
separate exogenous volume stream.
Influence of users of different fame. (Cha et al. 2010;
Romero et al. 2011) showed in their work that influence dif-
fers for users with topics and high number of followers is
not related to high influence in a network. Work by (Bak-
shy et al. 2011) has shown that a cohort of small users are
as powerful as a big user in case of information diffusion on
Twitter whereas work by (Budak, Agrawal, and El Abbadi
2011) has shown that in cases for limiting misinformation in
network targeting big users is more beneficial.
To the best of our knowledge there exists no prior work
in estimating a user influence across network boundaries.
Our proposed metric, loudness level, along with joint model,
RNN-MAS, helps us to estimate the influence of a Twitter
user in spreading content on YouTube.
8 Conclusion
This paper proposed RNN-MAS, a model for predicting
popularity under the influence of multiple heterogeneous
asynchronous streams – namely tweets and volumes of
shares for a YouTube video. With this model, we demon-
strated superior performance on forecasting popularity on a
large-scale YouTube video collection. We further design two
new measures, to explain the viral potential of videos, an-
other to uncover latent influences including seasonal trends.
One important application of such model is to compare ef-
fects of different kinds of promotions. We propose a new
metric, dubbed loudness, to quantify the relative effective-
ness of user groups. We show that superusers and grassroot
are effective in different content types.
While neural network are expressive function approxima-
tors that can learn nonlinear relations between input and out-
put series, RNN-MAS does not model temporal dynamics
drifts or finite population effects. We hope to extend this
work to allow different items to share parts of the model,
and eventually make better predictions as early as possible
in a digital item's lifetime.
Acknowledgments This material is based on research sponsored
by the Air Force Research Laboratory, under agreement number
FA2386-15-1-4018. We thank the National Computational Infras-
tructure (NCI) for providing computational resources, supported by
the Australian Government.
References
Bakshy, E.; Hofman, J. M.; Mason, W. A.; and Watts, D. J. 2011.
Everyone's an influencer. In WSDM '11.
Budak, C.; Agrawal, D.; and El Abbadi, A. 2011. Limiting the
spread of misinformation in social networks. In WWW '11.
Cao, Q.; Shen, H.; Cen, K.; Ouyang, W.; and Cheng, X. 2017.
Deephawkes: Bridging the gap between prediction and understand-
ing of information cascades. In CIKM'17.
Cha, M.; Haddadi, H.; Benevenuto, F.; and Gummadi, K. P. 2010.
Measuring user influence in twitter: The million follower fallacy.
In ICWSM '10.
Chandra, R., and Zhang, M. 2012. Cooperative coevolution of
elman recurrent neural networks for chaotic time series prediction.
Neurocomputing.
Cheng, J.; Adamic, L.; Dow, P. A.; Kleinberg, J. M.; and Leskovec,
J. 2014. Can cascades be predicted? In WWW '14.
Chung, J.; Gulcehre, C.; Cho, K.; and Bengio, Y. 2014. Empiri-
cal Evaluation of Gated Recurrent Neural Networks on Sequence
Modeling. ArXiv e-prints.
Crane, R., and Sornette, D. 2008. Robust dynamic classes revealed
by measuring the response function of a social system. PNAS '08
105(41).
Daley, D. J., and Vere-Jones, D. 2008. An introduction to the theory
of point processes. Vol. I, volume I.
Du, N.; Song, L.; Gomez Rodriguez, M.; and Zha, H. 2013. Scal-
able influence estimation in continuous-time diffusion networks. In
NIPS.
Du, N.; Dai, H.; Trivedi, R.; Upadhyay, U.; Gomez-Rodriguez, M.;
and Song, L. 2016. Recurrent marked temporal point processes:
Embedding event history to vector. In KDD '16.
Elman, J. L. 1990. Finding structure in time. COGNITIVE SCI-
ENCE 14(2).
Filimonov, V., and Sornette, D. 2013. Apparent criticality and
calibration issues in the Hawkes self-excited point process model:
application to high-frequency financial data. arXiv preprint.
Graves, A. 2013. Generating Sequences With Recurrent Neural
Networks. ArXiv e-prints.
Hawkes, A. G., and Oakes, D. 1974. A Cluster Process Represen-
tation of a Self-Exciting Process. J. Appl. Probab. '74 11(3).
Hawkes, A. G. 1971. Spectra of some self-exciting and mutually
exciting point processes. Biometrika 58(1).
Helmstetter, A., and Sornette, D. 2002. Subcritical and super-
critical regimes in epidemic models of earthquake aftershocks. J
GEOPHYS RES-SOL EA '02 107(B10).
Hochreiter, S., and Schmidhuber, J. 1997. Long short-term mem-
ory. Neural Comput. 9(8).
Jain, A.; Singh, A.; Koppula, H. S.; Soh, S.; and Saxena, A.
2016. Recurrent neural networks for driver activity anticipation
via sensory-fusion architecture. ICRA.
Jones, J. 1990. The double jeopardy of sales promotions. Harvard
business review 68(5):145152.
Li, C.; Ma, J.; Guo, X.; and Mei, Q. 2017. Deepcas: An end-to-end
predictor of information cascades. In WWW'17.
Martin, T.; Hofman, J. M.; Sharma, A.; Anderson, A.; and Watts,
D. J. 2016. Exploring limits to prediction in complex social sys-
tems. In WWW '16.
Mishra, S.; Rizoiu, M.-A.; and Xie, L. 2016. Feature Driven and
Point Process Approaches for Popularity Prediction. In CIKM '16.
Mishra, S.; Rizoiu, M.-A.; and Xie, L. 2018. Modeling popu-
larity in asynchronous social media streams with recurrent neural
networks. ArXiv e-prints.
Pinto, H.; Almeida, J. M.; and Gonc¸alves, M. A. 2013. Using
early view patterns to predict the popularity of youtube videos. In
WSDM '13. ACM Press.
Rizoiu, M.-A., and Xie, L. 2017. Online popularity under pro-
motion: Viral potential, forecasting, and the economics of time. In
ICWSM'17.
Rizoiu, M.-A.; Xie, L.; Sanner, S.; Cebrian, M.; Yu, H.; and Van
Hentenryck, P. 2017. Expecting to be HIP: Hawkes intensity pro-
cesses for social media popularity. In WWW'17.
Romero, D. M.; Galuba, W.; Asur, S.; and Huberman, B. A. 2011.
Influence and passivity in social media. In WWW'11.
Shen, H.-W.; Wang, D.; Song, C.; and Barab´asi, A.-L. 2014. Mod-
eling and Predicting Popularity Dynamics via Reinforced Poisson
Processes. In AAAI '14.
Sutskever, I.; Vinyals, O.; and Le, Q. V. 2014. Sequence to se-
quence learning with neural networks. In NIPS'14.
Szabo, G., and Huberman, B. A. 2010. Predicting the popularity
of online content. Communicat. of the ACM 53(8).
Vinyals, O.; Toshev, A.; Bengio, S.; and Erhan, D. 2015. Show and
tell: A neural image caption generator. CVPR'15.
Wallinga, J., and Teunis, P. 2004. Different epidemic curves for
severe acute respiratory syndrome reveal similar impacts of control
measures. Am J Epidemiol '04 160(6).
Wang, Y.; Ye, X.; Zhou, H.; Zha, H.; and Song, L. 2017a. Linking
Micro Event History to Macro Prediction in Point Process Models.
In AISTATS'17.
Wang, Y.; Liu, S.; Shen, H.; Gao, J.; and Cheng, X. 2017b. Marked
temporal dynamics modeling based on recurrent neural network.
PAKDD'17.
Xiao, S.; Yan, J.; Yang, X.; Zha, H.; and Chu, S. M. 2017. Mod-
eling the Intensity Function of Point Process Via Recurrent Neural
Networks. AAAI'17.
Yu, L.; Cui, P.; Wang, F.; Song, C.; and Yang, S. 2016. Uncovering
and predicting the dynamic process of information cascades with
survival model. Know. and Inf. Syst.
Yu, H.; Xie, L.; and Sanner, S. 2015. The lifecyle of a youtube
video: Phases, content and popularity. In ICWSM'15.
Zhao, Q.; Erdogdu, M. A.; He, H. Y.; Rajaraman, A.; and Leskovec,
J. 2015. SEISMIC: A Self-Exciting Point Process Model for Pre-
dicting Tweet Popularity. In KDD '15.
|
1910.09114 | 1 | 1910 | 2019-10-21T02:13:18 | Using machine learning and information visualisation for discovering latent topics in Twitter news | [
"cs.SI",
"cs.IR"
] | We propose a method to discover latent topics and visualise large collections of tweets for easy identification and interpretation of topics, and exemplify its use with tweets from a Colombian mass media giant in the period 2014--2019. The latent topic analysis is performed in two ways: with the training of a Latent Dirichlet Allocation model, and with the combination of the FastText unsupervised model to represent tweets as vectors and the implementation of K-means clustering to group tweets into topics. Using a classification task, we found that people respond differently according to the various news topics. The classification tasks consists of the following: given a reply to a news tweet, we train a supervised algorithm to predict the topic of the news tweet solely from the reply. Furthermore, we show how the Colombian peace treaty has had a profound impact on the Colombian society, as it is the topic in which most people engage to show their opinions. | cs.SI | cs |
Using machine learning and information
visualisation for discovering latent topics in
Twitter news
Vladimir Vargas-Calder´on1[0000−0001−5476−3300], Marlon Steibeck Dominguez2,
N. Parra-A.1[0000−0002−1829−4399], Herbert Vinck-Posada1, and Jorge E.
Camargo3
1 Grupo de Superconductividad y Nanotecnolog´ıa, Departamento de F´ısica,
Universidad Nacional de Colombia, AA 055051, Bogot´a, Colombia {vvargasc,
nparraa, hvicnkp}@unal.edu.co
2 Facultad de Ingenier´ıa, Unipanamericana Fundaci´on Universitaria, 111321, Bogot´a,
Colombia [email protected]
3 Departamento de Ingenier´ıa de Sistemas e Industrial, Universidad Nacional de
Colombia, AA 055051, Bogot´a, Colombia [email protected]
Abstract. We propose a method to discover latent topics and visualise
large collections of tweets for easy identification and interpretation of
topics, and exemplify its use with tweets from a Colombian mass media
giant in the period 2014 -- 2019. The latent topic analysis is performed in
two ways: with the training of a Latent Dirichlet Allocation model, and
with the combination of the FastText unsupervised model to represent
tweets as vectors and the implementation of K-means clustering to group
tweets into topics. Using a classification task, we found that people re-
spond differently according to the various news topics. The classification
tasks consists on the following: given a reply to a news tweet, we train a
supervised algorithm to predict the topic of the news tweet solely from
the reply. Furthermore, we show how the Colombian peace treaty has
had a profound impact on the Colombian society, as it is the topic in
which most people engage to show their opinions.
Keywords: latent topic analysis · text mining · information visualisa-
tion · machine learning.
1
Introduction
Social interaction on social networks has been a central research topic during
the last decade. It has applications in modernisation of government's Twitter-
based networking strategies [7,22,23,11,21], e-commerce [13,16,27] and business
performance [5,9]. Of particular interest is the study of how people respond to a
stimulus, forming either strong collective responses or weak, isolated responses.
For example, [4,19], studied users' influence in microblogging networks, where
implementing the InfluenceRank Algorithm for identifying people with high so-
cial media influence can be of great commercial value. An interesting area within
2
V. Vargas-Calder´on et al.
the stimulus -- response field in social networks is the response of people to the
news. In the case of Twitter, it has been identified since its early days as a
news-spreading social network [12] where mass media are central actors. Pre-
vious work in this area is typically focused on topics such as sports, politics,
health, education, travel, business, and so on [14,28,1,6].
In this work, we inquire on the recognition of the semantic structure of peo-
ple's response to news tweets by one of the largest Colombian news mass media,
Radio Cadena Nacional (RCN), with (7,7 million followers by August 2019). If
there is a distinction between how people respond to different kinds of news,
then state of the art natural language processing and machine learning tech-
niques should be able to detect this difference. Therefore, we propose a two-
stage pipeline to investigate the claimed differences. During the first stage, topic
analysis is performed over the tweets by RCN, showing the main latent topics
that they tweet about. In the second stage, we take the comments by regular
users to those tweets and ask ourselves if it is possible to predict which is the
topic of the tweet they are responding to. Our research is two-folded. On the one
hand, we investigate the characterisation of how people respond to news from
different topics. On the other hand, we pay particular attention to one of the
most critical social phenomena of the past decade worldwide: the response by
Colombian population to the peace treaty between the Colombian government
and the Colombian Revolutionary Armed Forces guerrilla (FARC) [25]. These
two entities were in a war for over 50 years, a conflict responsible for hundreds of
thousands of deaths and millions of people forced from their homes, and being
one of the largest human tragedies of modern times [3].
This paper is divided as follows: in Section 2 we describe in detail the dataset
that we used to carry out our study as well as the workflow of the proposed
method. In Section 3, we present the results and analysis of the research. Finally,
the main conclusions and future work are presented in Section 4.
2 Method and Materials
In this section, we describe in detail the two stages of our research: a topic
modelling and a topic prediction stage. The work pipeline is shown in Fig 1.
We collected tweets from the Twitter account @NoticiasRCN from 2014 to
the present using the Twitter API. During this period, the mass media giant
published 258,848 tweets, having 1,447,440 comments from their public. Then,
we proceeded to pre-process our tweet database. We removed punctuation, links,
hashtags and mentions from all the tweets. We further lemmatised the text in
lowercase.
With the pre-processed data, we trained topic modelling algorithms in order
to discover topics in the tweet corpus. Particularly we used the Latent Dirich-
let Allocation (LDA) model [8] and a combination of unsupervised FastText
model [2,10] and K-Means clustering [15].
LDA assigns K probabilities to a tweet of belonging to K different classes.
The classes are learnt in an unsupervised fashion from the co-occurrence of words
A visual analytic model for news in Twitter
3
Fig. 1: Overview of the proposed method. We crawl tweets from @NoticiasRCN
Twitter account. Then, pre-processing is made over this set of tweets. After that,
two different unsupervised topic models are trained, from which visualisations of
the tweets only from @NoticiasRCN can be built. We use the discovered latent
topics to label comments to @NoticiasRCN tweets. Finally, we train a supervised
FastText model to predict the topics of the comments.
within the tweets of the corpus. Each of the classes is called a latent topic.
Therefore, the K probabilities assigned to a tweet by LDA can be interpreted
as a vector of K components, where the k-th one shows the content percentage
of the k-th topic in a tweet. The number of latent topics K is a parameter
that one provides to the model. In principle, each latent topic corresponds to a
topic a human would understand. However, if a low number of latent topics is
provided, each latent topic may contain several real topics. On the other hand,
if a high number of latent topics is provided, many latent topics may refer to
the same real topic. To keep a good correspondence between latent topics and
human-understandable topics or real topics, the number of latent topics should
be carefully selected. Refs. [20,24] have shown that the best way to pick the
number of latent topics is by measuring the CV coherence, which has shown
a large correlation with human judgements of the interpretability of the topics
4
V. Vargas-Calder´on et al.
extracted by LDA. For the @NoticiasRCN tweets, the optimum number of latent
topics is 12, as it is shown in Fig 2.
Fig. 2: CV coherence as a function of number of topics for an LDA model trained
with tweets from @NoticiasRCN. For each number of topics, a total of 20 LDA
training runs were performed, and bars indicate a standard deviation of the
corresponding 20 measured CV coherences.
The other topic modelling algorithm consisted of training an unsupervised
FastText model and performing K-means clustering on the unsupervised learnt
vector representations for the tweets in the corpus. FastText is a memory-efficient
and fast vector embedding algorithm based on the ideas of Word2Vec [18]. An
important remark is that FastText uses sub-word information to enrich word
vectors. This is particularly useful in a language such as Spanish, because it is
largely inflected. What vector embedding algorithms do is to represent text as
vectors of N components. Again, based on the co-occurrence of words or se-
quences of characters, FastText assigns N -dimensional vectors to each tweet.
Here, the components do not have a human interpretation, as they embody ab-
stract semantic features of the tweets. Once the embedded vectors for each tweet
are learnt from FastText, the K-means clustering algorithm is used to group
vectors in the embedded vector space. This combination of a vector embedding
algorithm and a clustering algorithm has been used before with excellent results
in unsupervised community detection models [26]. In order to compare both
topic modelling algorithms (LDA and FastText + K-means), we used K-means
to form 12 clusters, where each one represents a latent topic.
After that, we labelled the comments to the news tweets. Let t(i)
N be a news
tweet from @NoticiasRCN indexed by i, which runs from 1 to M , the total
number of news tweets. Let t(ji)
C be a comment made by some Twitter user to
the news tweet t(i)
, where N (i) is the
total number of comments to the i-th news tweet t(i)
N . Then, we created a labelled
comment dataset for each of the two considered topic modelling algorithms as
N indexed by ji, which runs from 1i to N (i)
i
234567891011121314151617181920212223242526272829Number of topics0.150.200.250.300.35CV coherenceA visual analytic model for news in Twitter
5
follows,(cid:26)(cid:16)
(cid:16)
(cid:17)
,
(cid:96)1, t(21)
C
(cid:17)
, . . . ,
(cid:96)1, t(11)
C
(cid:18)
(cid:96)1, t(N (1)
1 )
C
(cid:19)
(cid:18)
, . . . ,
(cid:96)M , t(N (M )
M )
C
(cid:19)(cid:27)
,
(1)
where (cid:96)i is the latent topic (from either LDA or FastText + K-means) assigned
to the i-th news tweet t(i)
N . Recall that (cid:96)i is one of the 12 different latent topics.
From the vector representation of the tweets built with the unsupervised
FastText model, we generated visualisations of the tweets in a 2D map. To do
this, we applied a state of the art dimensionality reduction model called the
Uniform Manifold Approximation and Projection (UMAP) [17]. UMAP learns
topological relations between the FastText vectors of N components and finds
representative projections of the data onto a two-dimensional vector space.
Finally, a supervised FastText model is trained to learn to predict the labels (cid:96)i
(provided by the two topic modelling algorithms) from the vector representations
of the tweets t(ji)
C , which are efficiently learnt by FastText.
3 Results and Discussion
After performing an LDA analysis on the news tweets, each news tweet was
assigned a 12 component probability vector. We built the visualisation of such
tweets by selecting the tweets that better represented each latent topic. To do
this, we imposed a probability threshold on the LDA probability vectors. Tweets
whose maximum LDA probability for some topic is above this threshold are
called representative tweets for the corresponding latent topic. For a threshold
of 0.8, Fig 3 shows an annotated visualisation of the most representative tweets.
A couple of clusters are not annotated since their topic is not unique or simply
not clear.
Concerning the FastText and K-means combination, a different selection
mechanism for representative tweets was taken into account. K-means groups
news tweets geometrically, building 12 vectors called the cluster centroids. We
define the most representative tweets of each cluster as the set of tweets grouped
in a cluster nearest to its corresponding centroid. Therefore, after defining a max-
imum distance threshold, we can visualise the clusters and their corresponding
representative tweets. Note that this threshold does not have a probabilistic in-
terpretation, and is in general different for different datasets, depending on the
mean distance between the data points. In our case, the visualisation is shown
in Fig. 4. Topics were easier to identify, and the visualisation shows clear clus-
ters well-separated from the others. In terms of visualisation, the FastText +
K-means technique is superior for our case study.
Now, we focus on the second stage of our research, where we predict the
topic of a news tweet from a comment to that tweet. The precision and recall
at k = 1, . . . , 10 are shown in Fig. 5. From the results at k = 1 it is clear that
for both LDA and FastText + K-means, the precision and recall are well-above
the expected result of a random classifier. Again, FastText + K-means performs
better. Of course, as k gets larger, recall increases and precision decreases.
6
V. Vargas-Calder´on et al.
Fig. 3: Visualisation of topics discovered with LDA.
Fig. 4: Visualisation of topics discovered with the combination of unsupervised
FastText and K-means clustering.
Remarkably, having a 40% precision and recall at 1 means that there is a
difference between how people respond to different topics. This result is quite
good considering that topics were discovered with unsupervised learning, and
that documents for classification are single tweets. This difference in response
can be further examined with a histogram of the impact caused in the public by
each latent topic. We do so only considering the FastText + K-means method,
Venezuela/Peace treatyCorruptionSports (cycling)AdvertisementSports (football)Organised/commoncrimeExtreme violenceAccidents/NaturaldissastersInternationalEconomySportsArt/CelebritiesAdvertisementInternational(USA and Venezuela)Peace treaty politicsColombian Armed ConflictEconomy/CommerceExtreme violenceOrganised/commoncrimeAccidents/InternationaldissastersNatural/provokeddissastersPoliticsA visual analytic model for news in Twitter
7
(a) LDA
(b) FastText + K-means
Fig. 5: Precision and Recall at k = 1, . . . , 10 for the LDA and FastText + K-
means topic modelling algorithms.
as it has consistently shown to yield better results. Fig. 6 shows that the topic
identified as peace treaty politics is by far the more engaging one, having the
most number of likes, retweets and replies per news tweet related to that topic.
Therefore, our analysis confirms that the peace treaty has been the phenomenon
with the largest impact on Colombian society.
4 Conclusions and Future Work
We presented two methods to automatically detect latent topics in news tweets
and assess how significant were the differences between the response from the
public to tweets from different topics. The first method consisted on discovering
latent topics using the widely used LDA model. The second method consisted on
generating embedded vectors with FastText and performing K-means clustering
on those vectors. We visualised the most representative tweets for each latent
topic using both methods and showed that the FastText + K-means method was
superior both in the visualisation and in the interpretability of the topics.
Also, using the comments to the news tweets, we trained a supervised Fast-
Text method to predict the topic of a news tweet from a comment of that tweet.
Again, the better results were obtained with the FastText + K-means method,
yielding 40% precision and recall at 1 in a 12-class classification problem.
The examination of the impact of each topic on the news Twitter account
followers revealed that the topic identified as peace treaty politics was the most
relevant topic, having the most number of likes, retweets and replies per news
tweet, compared to the other topics.
We intend in the future to perform a sentiment analysis on the followers
response in order to measure controversiality of topics as well as study which
topics evoke positive/negative sentiment in the public.
246810k0.20.40.60.8Precision@[email protected]@kRecall@k8
V. Vargas-Calder´on et al.
Fig. 6: Bar plot of number of likes, replies and retweets for the set of all news
tweets belonging to each latent topic discovered by the FastText + K-means
method.
References
1. Almutairi, N., Alhabash, S., Hellmueller, L., Willis, E.: The effects of twit-
ter users' gender and weight on viral behavioral
intentions toward obesity-
related news. Journal of Health Communication 23(3), 233 -- 243 (2018).
https://doi.org/10.1080/10810730.2018.1423648, pMID: 29388884
2. Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with
subword information. arXiv preprint arXiv:1607.04606 (2016)
3. Cely, D.M.F.: Grupo de memoria hist´orica,¡ basta ya! colombia: Memorias de
guerra y dignidad (bogot´a: Imprenta nacional, 2013), 431 pp. 1. Historia y so-
ciedad (26), 274 -- 281 (2014)
4. Chen, W., Cheng, S., He, X., Jiang, F.: Influencerank: An efficient social in-
fluence measurement for millions of users in microblog. In: 2012 Second In-
AdvertisementPeace treaty politicsPoliticsColombian Armed ConflictSportsArt/CelebritiesAccidents/InternationaldissastersExtreme violenceInternational(Usa and Venezuela)Natural/provoked dissastersOrganised/common crimeEconomy/CommerceCluster0510152025ValueVariableLikes Replies Retweets A visual analytic model for news in Twitter
9
ternational Conference on Cloud and Green Computing. pp. 563 -- 570 (2012).
https://doi.org/10.1109/CGC.2012.31
5. Culnan, M.J., McHugh, P.J., Zubillaga, J.I.: How large u.s. companies can use
twitter and other social media to gain business value. MIS Quarterly Executive 9
(2010)
6. Garrett, R.K.:
tions
https://doi.org/10.1371/journal.pone.0213500
political mispercep-
in u.s. presidential elections. PLOS ONE 14(3), 1 -- 16 (03 2019).
Social media's
contribution
to
7. Golbeck, J., Grimes, J.M., Rogers, A.: Twitter use by the u.s. congress. Journal
of the American Society for Information Science and Technology 61(8), 1612 -- 1621
(2010). https://doi.org/10.1002/asi.21344
8. Hoffman, M.D., Blei, D.M., Bach, F.: Online learning for latent dirichlet allocation.
In: Proceedings of the 23rd International Conference on Neural Information Pro-
cessing Systems - Volume 1. pp. 856 -- 864. NIPS'10, Curran Associates Inc., USA
(2010)
9. Ioanid, A., Scarlat, C.: Factors influencing social networks use for business:
Twitter and youtube analysis. Procedia Engineering 181, 977 -- 983 (2017).
https://doi.org/https://doi.org/10.1016/j.proeng.2017.02.496, 10th International
Conference Interdisciplinarity in Engineering, INTER-ENG 2016, 6-7 October
2016, Tirgu Mures, Romania
10. Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text
classification. arXiv preprint arXiv:1607.01759 (2016)
11. Kim, S.K., Park, M.J., Rho, J.J.: Effect of the government's use of social media
on the reliability of the government: Focus on twitter. Public Management Review
17(3), 328 -- 355 (2015). https://doi.org/10.1080/14719037.2013.822530
12. Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network
or a news media? In: Proceedings of the 19th International Conference on
World Wide Web. pp. 591 -- 600. WWW '10, ACM, New York, NY, USA (2010).
https://doi.org/10.1145/1772690.1772751
13. ling Lai, L.S.: Social commerce -- e-commerce in social media context (2010)
14. Lee, K., Palsetia, D., Narayanan, R., Patwary, M.M.A., Agrawal, A., Choud-
hary, A.: Twitter trending topic classification. In: Proceedings of the 2011
IEEE 11th International Conference on Data Mining Workshops. pp. 251 --
258. ICDMW '11, IEEE Computer Society, Washington, DC, USA (2011).
https://doi.org/10.1109/ICDMW.2011.171
15. Lloyd, S.: Least squares quantization in pcm. IEEE transactions on information
theory 28(2), 129 -- 137 (1982)
16. Mata, F.J., Quesada, A.: Web 2.0, social networks and e-commerce as marketing
tools. Journal of theoretical and applied electronic commerce research 9, 56 -- 69
(2014)
17. McInnes, L., Healy, J., Melville, J.: UMAP: Uniform Manifold Approximation and
Projection for Dimension Reduction. ArXiv e-prints (Feb 2018)
18. Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed repre-
sentations of words and phrases and their compositionality. In: Advances in neural
information processing systems. pp. 3111 -- 3119 (2013)
19. Nargundkar, A., Rao, Y.S.:
to measure influence of
on Recent Trends
https://doi.org/10.1109/ICRTIT.2016.7569535
Influencerank: A machine learning approach
In: 2016 International Conference
in Information Technology (ICRTIT). pp. 1 -- 6 (2016).
twitter users.
10
V. Vargas-Calder´on et al.
20. Roder, M., Both, A., Hinneburg, A.: Exploring the space of topic coherence mea-
sures. In: Proceedings of the Eighth ACM International Conference on Web Search
and Data Mining. pp. 399 -- 408. WSDM '15, ACM, New York, NY, USA (2015).
https://doi.org/10.1145/2684822.2685324
21. de Rosario, A.H., S´aez-Mart´ın, A., del Carmen Caba-P´erez, M.: Using social media
to enhance citizen engagement with local government: Twitter or facebook? New
Media & Society 20(1), 29 -- 49 (2018). https://doi.org/10.1177/1461444816645652
22. Small, T.A.: e-government in the age of social media: An analysis of the cana-
dian government's use of twitter. Policy & Internet 4(3-4), 91 -- 111 (2012).
https://doi.org/10.1002/poi3.12
23. Sobaci, M.Z., Karkin, N.: The use of twitter by mayors in turkey: Tweets for
better public services? Government Information Quarterly 30(4), 417 -- 425 (2013).
https://doi.org/https://doi.org/10.1016/j.giq.2013.05.014
24. Syed, S., Spruit, M.: Full-text or abstract? examining topic coherence scores
using latent dirichlet allocation. In: 2017 IEEE International Conference on
Data Science and Advanced Analytics (DSAA). pp. 165 -- 174 (Oct 2017).
https://doi.org/10.1109/DSAA.2017.61
25. Tellez, J.F.: Peace agreement design and public support for peace: Evidence
from colombia. Journal of Peace Research 0(0), 0022343319853603 (2019).
https://doi.org/10.1177/0022343319853603
26. Vargas-Calder´on, V., Camargo, J.E.: Characterization of citizens using word2vec
and latent topic analysis in a large set of tweets. Cities 92, 187 -- 196 (2019)
27. Zhao, W.X., Li, S., He, Y., Chang, E.Y., Wen, J., Li, X.: Connecting social media to
e-commerce: Cold-start product recommendation using microblogging information.
IEEE Transactions on Knowledge and Data Engineering 28(5), 1147 -- 1159 (2016).
https://doi.org/10.1109/TKDE.2015.2508816
28. Zhao, W.X., Jiang, J., Weng, J., He, J., Lim, E.P., Yan, H., Li, X.: Comparing
twitter and traditional media using topic models. In: Clough, P., Foley, C., Gurrin,
C., Jones, G.J.F., Kraaij, W., Lee, H., Mudoch, V. (eds.) Advances in Information
Retrieval. pp. 338 -- 349. Springer Berlin Heidelberg, Berlin, Heidelberg (2011)
|
1508.05044 | 1 | 1508 | 2015-08-20T16:55:42 | Cultures in Community Question Answering | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | CQA services are collaborative platforms where users ask and answer questions. We investigate the influence of national culture on people's online questioning and answering behavior. For this, we analyzed a sample of 200 thousand users in Yahoo Answers from 67 countries. We measure empirically a set of cultural metrics defined in Geert Hofstede's cultural dimensions and Robert Levine's Pace of Life and show that behavioral cultural differences exist in community question answering platforms. We find that national cultures differ in Yahoo Answers along a number of dimensions such as temporal predictability of activities, contribution-related behavioral patterns, privacy concerns, and power inequality. | cs.SI | cs |
Cultures in Community Question Answering
[Please cite the Hypertext’15 version of this paper]
Imrul Kayes
University of South Florida
Tampa FL, USA
[email protected]
Nicolas Kourtellis
Telefonica Research
Barcelona, Spain
[email protected]
Daniele Quercia
University of Cambridge
Cambridge, United Kingdom
[email protected]
Adriana Iamnitchi
University of South Florida
Tampa FL, USA
[email protected]
Francesco Bonchi
Yahoo Labs
Barcelona, Spain
[email protected]
ABSTRACT
CQA services are collaborative platforms where users ask
and answer questions. We investigate the influence of na-
tional culture on people’s online questioning and answering
behavior. For this, we analyzed a sample of 200 thousand
users in Yahoo Answers from 67 countries. We measure em-
pirically a set of cultural metrics defined in Geert Hofstede’s
cultural dimensions and Robert Levine’s Pace of Life and
show that behavioral cultural differences exist in community
question answering platforms. We find that national cul-
tures differ in Yahoo Answers along a number of dimensions
such as temporal predictability of activities, contribution-
related behavioral patterns, privacy concerns, and power in-
equality.
Categories and Subject Descriptors
K.4.0 [Computers and Society]: General; J.4 [Social
and Behavioural Sciences]: Sociology
Keywords
Community question answering; cultures; crowdsourcing
1.
INTRODUCTION
Cultural differences exist in almost all aspects of social
interactions. For example, in some cultures in Asia it may be
considered disrespectful for people to express their opinions
or ask questions to authority figures (e.g., teachers, elders).
In other cultures (such as USA or Canada) asking questions
is expected or even encouraged.
Cross-country cultural variations have been studied in the
real world via small-scale experiments and opinion surveys.
Geert Hofstede [13] administered opinion surveys to a large
number of IBM employees from different countries in the
1960s and 1970s. He discovered five cultural dimensions
(individualism, power distance, uncertainty avoidance, mas-
culinity, and long term orientation), that can be attributed
to the existence of cultural variations. Three of these di-
mensions, individualism, power distance, and uncertainty
avoidance, have been used to assess cultural differences in
online contexts such as Twitter communication [8], emoticon
usage [27] and online scheduling [30]. In brief, individual-
ism reflects the extent to which an individual is integrated
into a group (e.g., individualistic cultures like USA empha-
sizes mostly on their individual goals, as opposed to col-
lectivist cultures like China that emphasizes on group har-
mony and loyalty). Power distance is the extent to which the
less powerful members of an organization or society expect
and accept that power is distributed unequally (e.g., in high
power distance countries subordinates simply comply with
their leaders). Uncertainty avoidance defines the extent to
which society members feel uncomfortable with uncertainty
and ambiguity (e.g., the stereotypical Swiss plans everything
ahead supposedly to avoid uncertainty).
Psychologist Robert V. Levine [21] proposed the Pace of
Life metric based on the walking speed of city people over
a distance of 60 feet, the service time for standard requests
for stamps, and the clock accuracy of city banks. During
the 1990s, Levine employed 19 experimenters in large cities
from 31 countries and computed country-specific Pace of Life
ranks. He found significant differences in Pace of Life across
cultures and ranked the cultures based on that.
Such cross-cultural variations that sociologists and psy-
chologists already found in the offline world lead to our
main research question: Does national culture determine
how we participate in online Community Question Answer-
ing (CQA) platforms? CQAs such as Yahoo Answers (YA),
Quora and Stack Overflow have been popular in the last
decade. These platforms are rich and mature repositories
of user-contributed questions and answers. For example,
YA, launched in December 2005, has more than one billion
posted answers,1 and Quora, one of the fastest growing CQA
sites has seen three times growth in 2013.2
National cross-cultural variations have been studied in a
number of online contexts, including social networks (e.g.,
Twitter [10], Facebook [29]),
location search and discov-
ery (e.g., Foursquare [34]) and online scheduling (e.g., Doo-
dle [30]). While CQA platforms have been intensively stud-
ied [32, 6, 28, 16], to the best of our knowledge, there has
been no study focusing on users’ cultural differences and how
they shape asking, answering, or reporting abuses in CQA
platforms.
If cultural variations exist in CQA platforms,
they could be used for more informed system design, includ-
1http://www.yanswersbloguk.com/b4/2010/05/04/1-
billion-answers-served/
2http://www.goo.gl/MfK83y
ing question recommendation, follow recommendation, and
targeted ads.
To fill this gap, we analyzed about 200 thousand sam-
pled YA users from 67 countries who were active between
2012 and 2013. We tested a number of hypotheses associ-
ated with Hofstede’s cultural dimensions and Levine’s Pace
of Life. Our results show that YA is not a homogeneous sub-
cultural community: considerable behavioral differences ex-
ist between the users from different countries. We find that
users from individualistic countries provide more answers,
have higher contribution than take away, and are more con-
cerned about their privacy than those from collective cul-
tures. Users from individualistic countries are also less likely
to provide an answer that violates community norms. We
also find that higher power distance countries show more
indegree imbalance in following relationships compared to
lower power distance countries. Finally, we find that users
from higher Pace of Life and lower uncertainty avoidance
countries have more temporally predictable activities.
The rest of the paper is structured as follows. Section 2
discusses previous analysis of CQA platforms and the exist-
ing body of work on online cultural variations. Section 3
presents the YA functionalities relevant to this study and
the dataset used. We introduce the hypotheses and present
the results relating to Levine’s Pace of Life and Hofstede’s
cultural dimensions in YA in Section 4 and Section 5, respec-
tively. We discuss the impact of these results in Section 6.
2. RELATED WORK
Golder and Macy [10] studied collective mood in Twit-
ter across countries from 509 million Twitter posts by 2.4
million users over a 2-year period. Despite having differ-
ent cultures, geographies, and religions, all countries (USA,
Canada, UK, Australia, India, and English-speaking Africa)
in their study showed similar mood rhythms—people tended
to be more positive on weekends and early in the morning.
Park et al. [27] examined the variation of Twitter users’
emoticon usage patterns in cross cultures. They used Hofst-
ede’s national culture scores of 78 countries and found that
collectivist cultures favor vertical and eye-oriented emoti-
cons, where people within individualistic cultures favor hor-
izontal and mouth-oriented emoticons. Hofstede’s cultural
dimensions have also been used to study whether culture of
a country is associated with the way people use Twitter [9].
In another study on cross-country Twitter communication,
Garcia et al. showed that cultural variables such as Hofst-
ede’s indices, language and intolerance have an impact on
Twitter communication volume [8].
Silva et al. [34] used food and drink check-ins in Foursquare
to identify cultural boundaries and similarities across pop-
ulations. They showed that online footprints of foods and
drinks are good indicators of cultural similarities between
users, e.g., lunch time is the perfect time for Brazilians to
go for slow food places more often, whereas Americans and
English people go for slow foods more at dinner time. Ex-
tracted features like these allow them to apply simple clus-
tering algorithms such as K-means to draw cultural bound-
aries across the countries.
Quercia [29] used Satisfaction With Life tests and mea-
sured happiness of 32,787 Facebook users from 12 coun-
tries (Australia, Canada, France, Germany, Ireland, Italy,
New Zealand, Norway, Singapore, Sweden, UK, USA ). He
found that despite comparative economic status, country-
level happiness significantly varies across the countries and
that it strongly correlates with official well-being scores.
Reinecke et al. [30] used about 1.5 million Doodle polls
from 211 countries and territories and studied the influence
of national culture on people’s scheduling behavior. Using
Hofstede’s cultural dimensions, they found that Doodle poll
participants from collectivist countries find more consensus
than those from predominantly individualist societies.
CQA platforms have also attracted much research inter-
est focusing on content, user behavior and applications. Re-
search on CQA content has analyzed textual aspects of ques-
tions and answers. Researchers have proposed algorithmic
solutions to automatically determine the quality of ques-
tions [23] and answers [32]. Research on CQA user behav-
ior has been mostly about understanding why users con-
tribute content: that is, why users ask questions (askers
are failed searchers, in that, they use CQA sites when web
search fails [24]); and why they don’t answer questions (e.g.,
they refrain from answering sensitive questions to avoid be-
ing reported for abuse and potentially lose access to the
community [6]). As for applications, researchers have pro-
posed effective ways of recommending questions to the most
appropriate answerers [28], automatically answering ques-
tions based on past answers [33], and retrieving factual an-
swers [1] or factual bits within an answer [39]. Our previous
work [16] used user-provided rule violation reports and user
social network features to detect the content abusers in YA.
However, there has been no empirical cross-cultural anal-
ysis of CQA platforms. This paper is a first step in this
direction and it verifies whether cultural differences are man-
ifested in one such platform, YA.
3. YAHOO ANSWERS
After 9 years of activity, YA has 56M monthly visitors
(U.S. only).3 The functionalities of the YA platform and
the dataset used in this analysis are presented next.
3.1 The Platform
YA is a CQA platform in which community members ask
and answer questions on various topics. Users ask questions
and assign them to categories selected from a predefined
taxonomy, e.g., Business & Finance, Health, and Politics &
Government. YA has about 1300 categories. Users can find
questions by searching or browsing through this hierarchy
of categories. A question has a title (typically, a short sum-
mary of the question), and a body with additional details.
A user can answer any question but can post only one
answer per question. Questions remain open for four days
for others to answer. However, the asker can select a best
answer before the end of this 4-day period, which automat-
ically resolves the question and archives it as a reference
question. The best answer can also be rated between one to
five, known as answer rating. If the asker does not choose
a best answer, the community selects one through voting.
The asker can extend the answering duration for an extra
four days. The questions left unanswered after the allowed
duration are deleted from the site. In addition to questions
and answers, users can contribute comments to questions
already answered and archived.
3http://www.listofsearchengines.org/qa-search-engines
YA has a system of points and levels to encourage and
reward participation.4 A user is penalized five points for
posting a question, but if she chooses a best answer for her
question, three points are given back. A user who posts an
answer receives two points; a best answer is worth 10 points.
A leaderboard, updated daily, ranks users based on the to-
tal number of points they collected. Users are split into seven
levels based on their acquired points (e.g., 1-249 points: level
1, 250-999 points: level 2, ..., 25000+ points: level 7). These
levels are used to limit user actions, such as posting ques-
tions, answers, comments, follows, and votes: e.g., first level
users can ask 5 questions and provide 20 answers in a day.
YA requires its users to follow the Community Guidelines
that forbid users to post spam, insults, or rants, and the
Yahoo Terms of Service that limit harm to minors, harass-
ment, privacy invasion, impersonation and misrepresenta-
tion, fraud and phishing. Users can flag content (questions,
answers or comments) that violates the Community Guide-
lines and Terms of Service using the “Report Abuse” func-
tionality. Users click on a flag sign embedded with the con-
tent and choose a reason between violation of the commu-
nity guidelines and violation of the terms of service. Re-
ported content is then verified by human inspectors before
it is deleted from the platform.
Users in YA can choose to follow other users, thus cre-
ating a follower-followee relationship used for information
dissemination. The followee’s actions (e.g., questions, an-
swers, ratings, votes, best answer, awards) are automati-
cally posted on the follower’s newsfeed. In addition, users
can follow questions, in which case all responses are sent to
the followers of that question.
3.2 Dataset
We studied a random sample of about 200k users from
YA who were active between 2012 and 2013. These users
posted about 9 million questions (about 45 questions/user),
43 million answers (about 215 answers/user), and 4.5 million
abuse reports (about 23 reports/user). They are connected
via 490k follower-followee relationships in a social network.
The indegree and outdegree distributions of the social net-
work follow power-law distributions, with an exponential fit-
ting parameter α of 1.83 and 1.85, respectively.
In our dataset, we have users from 67 countries. Figure 1
shows the number of users in our dataset as a function of the
number of Internet users taken from the World Bank.5 We
find a linear relationship between the number of users per
country in our YA dataset and the number of Internet users
in the World Bank dataset for each country. It means that
the YA users from our dataset are not skewed by country.
Instead, they represent a sample of global Internet users.
To investigate how sensitive this correlation is to the num-
ber of users per country, we computed the Pearson correla-
tion between the number of YA users in x countries and their
respective internet population. The x countries were ranked
based on the number of YA users found in the dataset, and
x was varied from top 20 to all 67 countries. Figure 2 shows
that there are several peaks in the correlation, but the values
are high and between 0.5 and 0.7. We select as a threshold
the second highest correlation peak and thus included in the
study 41 countries which have at least 150 users per country.
4https://answers.yahoo.com/info/scoring system
5http://www.data.worldbank.org/indicator/IT.NET.USER.P2
Figure 1: The number of Internet users and YA
users for 67 countries. The regression line and
95% confidence interval area are also shown. The
countries are represented by a 2-letter country code
based on ISO 3166.
Figure 2: Number of top countries based on the
number of YA users and correlation with their num-
ber of Internet users. All correlations are statisti-
cally significant with p-value<0.05.
4. LEVINE’S PACE OF LIFE
In this section, we analyze Levine’s Pace of Life cultural
dimension in the context of YA and show how it relates to
user activities such as questioning, answering and reporting.
In his book [20], psychologist Robert Levine defines Pace of
Life as “the flow or movement of time that people experi-
ence”. With the help of 19 experimenters, he collected and
compared three indicators of the Pace of Life in 36 large
cities from 31 countries around the world during a warm
summer month between 1992 and 1995 [21]. The indicators
are:
• Walking speed: They measured walking speed of
35 men and 35 women over a distance of 60 feet in
main downtown areas in each city. Measurements were
done during prime business hours after controlling a
number of variables such as sidewalks, crowd, effects
of socialization. They found significant differences in
pedestrians walking speed—for example, pedestrians
in Rio de Janeiro, Brazil walked only two-thirds as
fast as pedestrians in Zurich, Switzerland.
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●DZARAUATBDBEBOBRCACLCNCOHRCZDKDOECFIFRDEGRGTINIDIRIEILITJPKELBMYMXNLNZNGNOPKPEPHPTROSGZAESLKSECHTHTRAEGBUS VEVN23478# Internet users (log scale)#YA users (log scale)●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●0.500.550.600.650.702030405060Number of top x countriesCorrelation (# YA vs. # Internet users)• Postal speed: In each city, they measured the time
it took postal workers to serve a standard request for
stamps and considered this time as a proxy for work
speed. They handed each clerk money and a note
written in the local language requesting a common
stamp. For example, in the United States, the clerk
was handed a 5 dollar bill with a request for one 32-
cent stamp. They found that overall Western Europe
was the fastest to serve a standard request.
• Clock accuracy: To quantitatively measure time con-
cerns, the researchers checked the clock accuracy of
randomly selected 15 downtown banks in each city.
The reported times were then compared to those re-
ported by the telephone company, which was consid-
ered accurate.
Levine combined these three scores into a country-specific
Pace of Life score and concluded that “the Pace of Life was
fastest in Japan and the countries of Western Europe and
was slowest in economically undeveloped countries. The
pace was significantly faster in colder climates, economically
productive countries, and in individualistic cultures” [21].
Intuitively, to cope with the rigid perception of time, peo-
ple from the higher Pace of Life countries have to be planned
and organized in their daily activities. On the other hand,
people from lower Pace of Life countries might allow some
unstructured activities, as in those countries the expectation
of following the ‘right’ time is more relaxed.
Applying these findings to online communities such as
CQA platforms, we expect that people from higher Pace
of Life countries, such as the USA, will be less likely to ask
or answer questions during busy hours of the day, e.g., office
hours. From these ideas, we hypothesize the following in YA:
[H1] Users from countries with a higher Pace of Life
score show more temporally predictable activities.
To test this hypothesis, we calculate how probable a coun-
try’s users are in asking, answering and reporting at different
times of day and correlate that with that country’s Pace of
Life rank. For example, if a user only asks or answers ques-
tions in the evening, he is temporally more predictable than
a user who asks or answers in the morning, afternoon and
night. In a Twitter study [10], Golder and Macy also find
diurnal mood rhythms in different cultures.
In order to calculate temporal predictability, we only con-
sider working days, as weekends are less predictable. More
specifically, similar to [9], we divide the working day in
five time intervals: morning (6:00 - 8:59), office time (9:00-
17:59), evening (18:00-20:59), late night (21:00- 23:59), sleep-
ing time (00:00 - 05:59). All the reported times are users’
local time. We use information entropy [3], a measure of
disorder, to calculate the temporal predictability.
For a given activity (asking, answering, or reporting) and
C intervals, we can compute p(c), the probability of an ac-
tivity belonging to interval c. We measure the normalized
entropy for user u for all activities as:
−(cid:80)
Entropyu =
c∈C p(c)log(p(c))
logC
(1)
We calculate users’ normalized entropies for all their ques-
tions, answers and abuse reports and refer to them as ques-
tion, answer and report entropy, respectively. In our dataset,
each country has on average 134k questions, 642k answers
and 67k abuse reports. Normalized entropy ranges from 0
to 1. A normalized question entropy close to 0 indicates
that most of the questions the user asked are within one
time interval of the day, whereas the closer to 1, the more
likely is that the user asked questions during all intervals.
Finally, the question/answer/report entropy for a country
c, Entropyq/a/r,c, is defined as the geometric mean of all
Entropyq/a/r,u computed for the users of that country:
Entropyq/a/r,c =
Entropyq/a/r,u
(2)
(cid:16)(cid:89)
u∈Uc
(cid:17) 1Uc
where Uc is the set of users in country c. We use geometric
mean to account for the skewed distribution of the entropy
scores, something that the regular arithmetic mean cannot
handle.
Table 1 shows Pearson correlations between question, an-
swer, report entropy and Pace of Life ranks, where lower
ranks mean higher Pace of Life. For both questions and
answers, the overall Pace of Life ranks have positive corre-
lations with question and answer entropy with r = 0.67 and
r = 0.37, respectively. These positive relationships are seen
in the Figures 3 and 4. We find positive correlations between
walking speed rank, post office service time rank, and clock
accuracy time rank with question entropy with r = 0.48,
r = 0.60 and r = 0.48, respectively. For answers, we find
positive correlations between post office service time rank,
and clock accuracy time rank with entropy with r = 0.38
and r = 0.29, respectively. However, we do not find any
statistically significant relationships between report entropy
and Pace of Life ranks.
These results confirm that users from countries with a
higher Pace of Life score show more temporally predictable
asking and answering behavior in YA.
Entropy
Pace of Life
Overall
Walking speed
Post office
Clock accuracy
Question Answer Report
0.67***
0.48**
0.60**
0.48**
0.37*
0.18
0.38*
0.29*
0.18
0.06
0.19
0.21
Table 1: Pearson correlations between question, an-
swer, report entropy and Pace of Life rank. Lower
ranks mean higher Pace of Life. p-values are indi-
cated as: p<0.005(***), p<0.05 (**), p<0.1 (*).
5. HOFSTEDE’S CULTURAL DIMENSIONS
In this section, we analyze a number of cultural dimen-
sions in YA proposed by Geert Hofstede. We show how three
cultural dimensions defined by Hofstede—individualism, power
distance and uncertainty avoidance are manifested in the
ecosystem of YA.
Hofstede’s cultural dimensions theory is a framework for
analyzing cultural variability.
In his original model [12],
Hofstede proposed four primary dimensions by surveying
in the 1960s and 1970s a large number of IBM employ-
ees from 40 countries: power distance (PDI), individual-
ism (IDV), uncertainty avoidance (UAI) and masculinity
(MAS). Later [13], he added two more dimensions:
long-
term orientation (LTO) and indulgence versus restraint (IVR).
Figure 3: Pace of Life overall rank vs. average ques-
tion entropy per country. Countries shown are the
ones in our dataset for which a Pace of Life rank has
been published. Countries are ranked in decreasing
order of their Pace of Life value. A regression line
is also shown.
Individualism and contribution. The usage of the
Internet takes time from a number of daily activities in-
cluding face-to-face socialization.
In collectivist countries,
people are expected to give a fair amount of time on socia-
bility, hence traditionally they seem to spend less time on
the Internet compared to the people from the individualistic
cultures [5]. In YA we expect that users from individualistic
countries spend more time online, hence they can provide
more answers and eventually they can contribute more to
the community than their direct benefits from the commu-
nity. We hypothesize the following:
[H2] Users from countries with higher individualism
index provide more answers.
[H3] Users from countries with higher individualism
index contribute more to the community than what
they take away from the community.
We correlate the geometric mean of the number of answers
posted by the users from a country with that country’s indi-
vidualism index (a higher score means higher individuality).
We use geometric mean as an average because of the skewed
distributions of the number of answers. In the calculation of
the geometric mean, we exclude the users who have not pro-
vided any answers. We observe a positive correlation, shown
in Figure 5, with r = 0.46, p < 0.005. This means that, on
average, users from individualistic countries provide more
answers.
Figure 4: Pace of Life overall rank vs. average an-
swer entropy per country. Countries shown are the
ones in our dataset for which a Pace of Life rank has
been published. Countries are ranked in decreasing
order of their Pace of Life value. A regression line
is also shown.
Three of the dimensions, individualism, power distance, and
uncertainty avoidance, have been used in a number of recent
studies of online behavior [8, 27, 30]. We also use these three
Hofstede’s cultural dimensions and relate them to a number
of hypotheses in the context of YA.
5.1
Individualism (IDV)
Individualism is the extent to which an individual is inte-
grated into a group. In individualistic societies (high IDV)
such as the USA and England, personal achievements and
individual rights are emphasized; an individual is expected
to take care of only himself and his immediate family. In col-
lectivist countries such as those of India, China, and Japan,
individuals are expected to place the family and group goals
above those of self. In this work, we investigate how individ-
ualism is related to users’ contribution, (un)ethical behavior
and privacy settings in YA.
Figure 5: Individualism index vs. the average num-
ber of answers posted by users per country. A re-
gression line is also shown.
To quantify users’ contribution compared to their take
away, we compute yielding scores of the users. The yielding
score of a user is simply a difference between his contribu-
tion and his take away. For yielding scores, we consider
YA’s point system, which awards two points for an answer,
ten points for a best answer, and penalizes five points for a
question:
Yieldingu = f (contribution) − f (takeaway)
= 2.0 ∗ Au + 10.0 ∗ BAu − 5.0 ∗ Qu
(3)
where Qu is the number of questions posted by user u, Au is
the number of answers posted by u, and BAu is the number
of best answers posted by u.
Finally, a country’s yielding score Y ieldingc is defined as
the geometric mean of all Y ieldingu computed for the users
●●●●●●●●●●●●●●●●●●●ATBRCNCZSVFRDEGRIDIEITJPKEMXNLSGSECHUS 0.550.600.650.700102030Overall rank of Pace of LifeQuestion entropy●●●●●●●●●●●●●●●●●●●ATBRCNCZSVFRDEGRIDIEITJPKEMXNLSGSECHUS 0.550.600.650.700.750102030Overall rank of Pace of LifeAnswer entropy●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●ARAUATBEBRCLCNCOECSVFRDEINIDIEILITJPKEKWMYMXNLNGPKPEPHPTSGZAESSECHTHTRGBUS UYVE6.06.57.07.58.0255075Individualism indexAvg. answer (log scale)of each country c:
Y ieldingc =
(cid:17) 1Uc
Y ieldingu
(cid:16)(cid:89)
u∈Uc
(4)
where Uc is the set of users in country c and we take only
those users having yielding scores more than zero. We cor-
relate a country’s geometric mean of the yielding score with
the country’s individualism index and we obtain a positive
correlation (Figure 6) with r = 0.37, p < 0.05. This result
suggests that the more individualistic a country is, the more
its users contribute to YA than what they take away from
the community.
that the countries with higher collectivist scores show the
most corruption.
Based on this online and offline user unethical behavior
that is influenced by culture, our intuition is that we could
observe a similar trend in YA. In CQA platforms, the expec-
tation is that users would provide helpful answers to posted
questions. As such, users are required to follow the Com-
munity Guidelines and the Yahoo Terms of Service while
answering. When users post bad answers, community mem-
bers flag them. Later, human moderators check whether
these flags are applied correctly or not. We expect that the
more collective a culture is, the more probable the answers
from its users will be flagged as abusive. Formally, we hy-
pothesize that:
[H4] Users from more collective (less individualis-
tic) cultures have higher probability to violate CQA
norms.
To this end, for each user u, we first calculate pu, the
probability that his answers violate community norms (and
thus are correctly flagged by other users):
pu =
# correctly flagged answers from u
# total answers from u
(5)
Figure 6: Individualism index vs. yielding score per
country. A regression line is also shown.
There might be multiple explanations about why users
from individualistic countries contribute more to the com-
munity as reflected by hypotheses H2 and H3. One expla-
nation is that individualistic cultures have a more favorable
collaborative environment [35], so individuals feel the urge
to contribute to the community. Another explanation could
be that users from individualistic cultures simply want more
points than collectivist cultures. As points are awarded for
contribution (e.g., an answer earns two points) and partic-
ipation (e.g., each login earns one point), users might be
tempted to contribute more. In fact, we obtain a positive
and significant correlation (r = 0.42, p < 0.01) between a
country’s points (calculated as geometric mean of the coun-
try’s user points) and its individualism index. Finally, there
might be other confounding factors (e.g., internet penetra-
tion) that affect the contribution of a country’s users on the
platform. Thus, it is difficult to confirm whether the users’
behavioral differences on contribution are due to their cul-
tural differences.
Individualism and (un)ethical behavior. The degree
to which a culture is collectivist or individualistic has an im-
plication on its users’ online (un)ethical behavior. For ex-
ample, the more individualistic (less collectivistic) a culture,
the lower the rate of software piracy [14] and online music
piracy [19]. Personal rights are paramount in individualis-
tic cultures, where people do not feel obligated to engage
in group cooperation that involves conspiracy. Group co-
operation and conspiracy are two key elements for the real
world unethical behaviors such as corruption [26]. Trian-
dis et al. [37] used Hofstede’s individualism index and found
Finally, Pc, the geometric average of all pu probabilities
computed for each country c:
(cid:17) 1Uc
(cid:16)(cid:89)
u∈Uc
Pc =
pu
(6)
where Uc is the set of users in country c.
The Pearson correlation r = −0.48, p < 0.05 shows that
the probability of abuses in answers provided by the users
from a particular country is negatively correlated with that
country’s individualism index. Figure 7 indeed shows that
the probability decreases with an increasing individualism
index, meaning that if an answer comes from an individual-
istic country, it is less probable to violate community rules.
Figure 7: Individualism index vs.
the probability
that an answer from a country is correctly flagged.
A regression line is also shown.
Individualism and privacy concerns. Although on-
line privacy concerns are global, the extent to which people
perceive these concerns as real varies across cultures. For
example, in the United States, privacy is a basic human
right, endorsed by the American Bill of Rights, while Asian
countries show little or no recognition on privacy in their
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●ARAUATBEBRCLCNCOECSVFRDEINIDIEILITJPKEKWMYMXNLNGPKPEPHPTSGZAESSECHTHTRGBUS UYVE3.23.64.04.4255075Individualism indexAvg. yielding score (log scale)●●●●●●●●●●●●●●●●●●ARAUBRCLFRDEINIDIEITKEMXPKPEPHESGBUS 0.0050.0100.0150.020255075Individualism indexProb. of flagged answerslegal systems [5]. A survey of 1261 Internet users from five
big cities—Bangalore, Seoul, Singapore, Sydney and New
York—shows that Internet users from individualistic cul-
tures are more concerned about privacy than those in collec-
tive cultures [2]. We expect that a similar trend also exists
in CQA platforms. We hypothesize that:
[H5] Users from higher individualism index countries
exhibit higher level of concern about their privacy.
We use the modifications of the privacy settings on users’
YA accounts as a proxy of privacy concern.
In YA, pri-
vacy settings are typically available for users to personalize
for content (questions or answers) and follower-followee net-
work.
Intuitively, privacy-concerned users would take the
opportunity to change the default privacy settings. So, we
consider the fraction of public privacy profiles in a coun-
try to draw a conclusion on how concerned its users are
about their privacy. However, the default privacy in YA is
public. It might be possible that many of the users in the
public group are dormant: users who signed up, asked and
answered some questions, and disappeared quickly. These
users might skew the results of our study, thus, we only con-
sider active users from our dataset— users who have asked
and answered more than 10 questions during our observation
interval. These active users are about 79% of our dataset.
We note that our conclusions remain the same if we con-
sider more active users by filtering users who have asked
and answered more than 20 questions.
Based on Hofstede’s Individualism index, the Hofstede
Centre6 has tagged countries as individualistic or collec-
tivist.
In our study, we use this classification. Figure 8
shows the percentage of user profiles with public privacy set-
tings in a country, as function of the country’s ranking in the
collectivist and individualistic class. The figure shows that,
on average, collectivist countries have a higher percentage
of public profiles: collectivist countries such as Spain, Peru,
Argentina, and Mexico have higher percentage of public pro-
files than individualistic countries such as United Kingdom,
United States, Australia or Italy.
Figure 8: Percentage of public privacy settings vs.
rank of collectivist and individualistic countries, re-
spectively. Country ranks are based on the percent-
age of public privacy settings and they are sepa-
rately done for collectivist and individualistic coun-
tries.
6http://geert-hofstede.com/countries.html
5.2 Power Distance Index (PDI)
PDI is the extent to which the less powerful members of
an organization or society expect and accept that power is
distributed unequally. This dimension sheds light on how
a society handles inequalities among its members. In coun-
tries with high PDI, such as countries from Latin, Asian,
African and Arab world, everybody has a place in the social
hierarchy and people accept the situation without question-
ing it. However, in Anglo and Germanic countries, which
are low power distance countries, people seek distribution of
power and ask for justifications of power inequality.
PDI essentially measures the distribution of wealth and
power between people in a country or culture. In YA, we
can use the indegree (number of followers) as a proxy of
wealth and power. For example, the larger the number of
followers users have, the larger an audience they have for di-
rect communication. Higher indegree users are also found to
be more central (thus more retained [18]) across a number
of network centrality metrics [17]. Moreover, these users’
questions are forwarded to more users, hence more likely to
be getting an answer. A study [16] on YA shows that users
receive more answers from close neighborhoods. Given the
high number of questions that remain unanswered (42% in
YA reported by a study [31]) in CQA platforms, bringing
answers not only shows a user’s potential capability, but
also makes the platform mature and informative. Taking
ideas from the unequal distribution of wealth and power in
higher power distance countries, we expect that in YA, users
from those countries also have inequality in their indegrees.
Garcia et al. [8] have found similar indegree inequality in
Twitter. We hypothesize the following in YA:
[H6] Users from higher power distance countries show
a larger indegree imbalance in follow relationships.
We correlate countries power distance index (higher in-
dex means power distance is high) with their users’ inde-
gree imbalance. A user’s indegree imbalance is calculated
as the difference between her friends’ average indegree and
her indegree. Finally, a country’s indegree imbalance is the
geometric mean of the indegree imbalance of its users.
For all countries, except Panama and Philippines, we ob-
tained a positive indegree imbalance, meaning that for those
countries, on average, a user’s contacts have more contacts
than the user. This supports a well-known hypothesis friend-
ship paradox in sociology. The friendship paradox states
that your friends have on average more friends than you
have, however, most people think that they have more friends
than their friends have [7]. It has been shown that the para-
dox holds for both Twitter [11] and Facebook [38]. Now we
also show it for YA.
Figure 9 shows the relation between PDI and indegree
imbalance (excluding Panama and Philippines). The figure
indeed shows a positive correlation. We obtained a positive
correlation r = 0.65, p < 0.005 between indegree imbalance
and PDI for all countries (including Panama and Philip-
pines). This supports the hypothesis that users from coun-
tries with higher PDI are more comfortable with indegree
imbalance.
5.3 Uncertainty Avoidance Index (UAI)
UAI is the extent to which people feel uncomfortable with
uncertainty and ambiguity. Individuals from countries ex-
●●●●●●●●●●ARAUBRFRDEINIDITKEMXPKPEPHESGBUS 304050602.55.07.510.0Country rankPercentage of public privacy settings●CollectivistIndividualistFigure 9: Power distance index vs. indegree imbal-
ance. A regression line is also shown.
Figure 11: Answer entropy vs. uncertainty avoid-
ance index. Only countries having more than 300
users are plotted. A regression line is also shown.
hibiting strong UAI tend to minimize uncertainty and am-
biguity by careful planning, and enforcing rules and regula-
tions. On the other hand, low uncertainty avoidance cultures
maintain a more relaxed attitude in unstructured situations.
For example, Switzerland has a reasonably high uncer-
tainty avoidance index (58) compared to countries such as
Singapore (8) and Sweden (29). In fact, an online scheduling
behavior study [30] on Doodle (http://doodle.com/) shows
that Switzerland and Germany have a high advance plan-
ning time of 28 days. In YA, our related hypothesis is:
[H7] Users from countries with higher uncertainty
avoidance index exhibit more temporally predictable
activities.
Figures 10, 11, 12 show the relationship between question,
answer and abuse report entropy vs. uncertainty avoidance
index, respectively. Note that a higher UAI means lower
uncertainty and ambiguity. The negative relations in the
figures indicate that users from countries with higher uncer-
tainty avoidance index tend to have lower question, answer
and abuse report entropies, thus they are more temporar-
ily predictable. All the entropies have negative relation
to uncertainty avoidance index: r = −0.43 for questions,
r = −0.55 for answers, and r = −0.51 for abuse reports. All
correlation values are statistically significant with p < 0.05.
Figure 10: Question entropy vs. uncertainty avoid-
ance index. Only countries having more than 300
users are plotted. A regression line is also shown.
Figure 12: Report entropy vs. uncertainty avoid-
ance index. Only countries having more than 300
users are plotted. A regression line is also shown.
6. SUMMARY AND DISCUSSION
Observing the global spread of information and commu-
nication technologies, researchers sometimes predicted that
the online world would be converging into a “one-world cul-
ture” [22]. With the advent of the large-scale online behav-
ioral datasets in the past decade from online platforms like
Twitter, Facebook and Foursquare, researchers showed that
the Internet does not have a homogeneous culture. Instead,
country-specific cultural variations do exist. We showed
the same non-homogeneity, but in a very different online
context—community question answering.
In this work, we analyzed about 200 thousand sampled
Yahoo Answers users from 67 countries. We studied users’
behavioral patterns such as temporal predictability of activ-
ities, engagement, (un)ethical behavior, privacy concerns,
and power inequality and how they compare with a number
of cultural dimensions (Pace of Life, Individualism, Uncer-
tainty Avoidance and Power Distance). We find that behav-
ioral differences exist across cultures in YA. Table 2 shows
a summary of all the hypotheses involving cultural indices
and the results found.
We acknowledge that our study is observational and lacks
controlled experimental ground truth data. Therefore, we
cannot draw causal conclusions whether cultures shape the
ecosystem of YA. However, our results hint at the impor-
tance of culture-aware CQA moderation. Note that CQA
●●●●●●●●●●●●●●●●●ARAUBRCLFRDEINIDIEITKEMXPKPEESGBUS 5101520304050607080Power distance indexIndegree imbalance●●●●●●●●●●●●●●●●●●●●●ARAUBRCLCOFRDEINIDIEITKEMXPKPEPHSGESGBUS VE0.500.550.600.650.70255075Uncertainty avoidance indexQuestion entropy●●●●●●●●●●●●●●●●●●●●●●●ARAUBRCLCOFRDEINIDIEITKEKWMXPKPEPHSGESGBUS UYVE0.500.550.600.650.700.75255075100Uncertainty avoidance indexAnswer entropy●●●●●●●●●●●●●●●●●●●●●ARAUBRCLCOFRDEINIDIEITKEMXPKPEPHSGESGBUS UY0.550.600.650.70255075100Uncertainty avoidance indexReport entropyPace of Life
Users from countries with a higher Pace of Life score show more temporally predictable activities (asking, answering and
reporting)
Individualism
Users from higher individualism index countries provide more answers
Users from countries with higher individualism index contribute more to the community than what they take away from
the community
Users from more collective (less individualistic) cultures have higher probability to violate CQA norms
Users from higher individualism index countries exhibit higher level of concern about their privacy
Power distance
Users from higher power distance countries show larger indegree imbalance in follow relationships
Uncertainty Avoidance
Users from countries with higher uncertainty avoidance index exhibit more temporally predictable activities (asking, an-
swering and reporting)
Correlation
rq = 0.67***
ra = 0.37**
rr = 0.18
Correlation
r = 0.46***
r = 0.37**
r = −0.48**
NA
Correlation
r = 0.65***
Correlation
rq = −0.43**
ra = −0.55**
rr = −0.51**
Table 2: Pearson correlation coefficients in hypotheses related to pace of life, individualism, uncertainty
avoidance and power distance. p-values are indicated as: p<0.005(***), p<0.05 (**), p<0.1 (*).
platforms like YA employ human moderators to evaluate
reported abuses and determine the appropriate responses,
from removing content to suspending user accounts. We
find that collective cultures are more probable to provide
bad answers. At a minimum, more attention of moderators
are expected in these cultures to keep the environment clean.
We find that individualistic cultures are more engaged in
YA, e.g., by providing more answers and contributing more
than their take away. These results confirm the generaliza-
tion that individualistic cultures are highly attracted to the
Internet. Researchers often attribute the egalitarian, demo-
cratic nature of the Internet to this engagement [4].
The evidence of different engagement patterns and differ-
ence in pace of life across cultures in CQA platforms imply
that some core functionalities such as question recommenda-
tion and follow recommendation could benefit from exploit-
ing cultural factors. In question recommendation, questions
are routed to the most appropriate answerers. To find out
such answerers, factors such as followers, interests, question
diversity and freshness [36] are considered. Our study sug-
gests that including cultural variables such as individualism
can be useful. For example, as users from collective cul-
tures are less probable to answer, questions from those com-
munities should be routed to a larger number of potential
answerers.
Another variable, Pace of Life, could also be a factor in
question recommendation. Our results show that users from
countries with a higher pace of life are temporally more pre-
dictable.
In those cultures, if questions are forwarded to
answerers during the busy hours of the day (e.g., during of-
fice hours), the questions are less likely to get an answer.
Solutions could include routing questions to a larger num-
ber of potential answerers, diversifying the set of answerers
to include users from countries with a lower Pace of Life, or
delaying routing for after work hours.
In the follow recommendation, CQA platforms recommend
which other users one can follow based on shared interests,
common contacts, and other related factors. We find that in
YA, lower power distance countries show less indegree imbal-
ance in follow relationships. For follow recommendation in
those countries, users to be followed may be recommended
to a user with the same level of indegree as them.
CQA platforms could also exploit cultural differentiations
to improve targeted ads. Okazaki and Alonso [25] analyzed
online advertising appeals such as “soft sell” appeal (that
works by creating emotions and atmosphere via visuals and
symbols) and “hard sell” appeal (that provides focus product
features, explicit information, and competitive persuasion)
across a number of cultures. They found individualistic cul-
tures like the USA are more attracted to “hard sell” appeal,
where collective cultures like Japan are attracted to “soft
sell” appeal. Ju-Pak’s study [15] also confirms that fact-
based appeal is dominant in the USA, but text-limited, vi-
sual layouts are popular in collective cultures like South Ko-
rea. Linguistic aspects in the ads might also be important.
For example, focusing on ‘I’, ‘me’ in individualistic cultures
and ‘us’ and ‘we’ in collective cultures. Finally, CQA sites
could leverage cultural variations in their platforms by, for
example, placing textual, informative feature ads to users
from individualistic cultures and visual and symbolic ads to
users from collective cultures.
7. ACKNOWLEDGMENTS
The work was funded by the National Science Foundation
under the grant CNS 0952420, and by the Yahoo’s Faculty
Research and Engagement Program.
8. REFERENCES
[1] J. Bian, Y. Liu, E. Agichtein, and H. Zha. Finding the
right facts in the crowd: Factoid question answering
over social media. In Proceedings of the 17th
International Conference on World Wide Web, pages
467–476, 2008.
[2] H. Cho, M. Rivera-S´anchez, and S. S. Lim. A
multinational study on online privacy: global concerns
and local responses. New media & society,
11(3):395–416, 2009.
[3] T. M. Cover and J. A. Thomas. Elements of
information theory 2nd edition. Willey-Interscience:
NJ, 2006.
[4] M. De Mooij. The future is predictable for
international marketers: converging incomes lead to
diverging consumer behaviour. International
Marketing Review, 17(2):103–113, 2000.
[5] M. De Mooij. Global marketing and advertising:
Understanding cultural paradoxes. Sage Publications,
2013.
[6] D. Dearman and K. N. Truong. Why users of yahoo!:
[21] R. V. Levine and A. Norenzayan. The pace of life in
Answers do not answer questions. In Proceedings of
the SIGCHI Conference on Human Factors in
Computing Systems, pages 329–332, 2010.
[7] S. L. Feld. Why your friends have more friends than
you do. American Journal of Sociology, pages
1464–1477, 1991.
[8] R. Garcia-Gavilanes, Y. Mejova, and D. Quercia.
Twitter ain’t without frontiers: Economic, social, and
cultural boundaries in international communication.
In Proceedings of the 17th ACM conference on
Computer supported cooperative work & social
computing, pages 1511–1522, 2014.
[9] R. Garcia-Gavilanes, D. Quercia, and A. Jaimes.
Cultural dimensions in twitter: Time, individualism
and power. Proceedings of the 7th International AAAI
Conference on Weblogs and Social Media, 13, 2013.
31 countries. Journal of cross-cultural psychology,
30(2):178–205, 1999.
[22] T. Levitt. The globalization of markets. International
Business: Strategic management of multinationals,
3:18, 2002.
[23] B. Li, T. Jin, M. R. Lyu, I. King, and B. Mak.
Analyzing and predicting question quality in
community question answering services. In Proceedings
of the 21st International Conference Companion on
World Wide Web, pages 775–782, 2012.
[24] Q. Liu, E. Agichtein, G. Dror, Y. Maarek, and
I. Szpektor. When web search fails, searchers become
askers: Understanding the transition. In Proceedings
of the 35th International ACM SIGIR Conference on
Research and Development in Information Retrieval,
pages 801–810, 2012.
[10] S. A. Golder and M. W. Macy. Diurnal and seasonal
[25] S. Okazaki and J. Alonso. Right messages for the right
mood vary with work, sleep, and day length across
diverse cultures. Science, 333(6051):1878–1881, 2011.
[11] N. O. Hodas, F. Kooti, and K. Lerman. Friendship
site: on-line creative strategies by japanese
multinational corporations. Journal of Marketing
Communications, 9(4):221–239, 2003.
paradox redux: Your friends are more interesting than
you. In Proceedings of the 7th International AAAI
Conference on Weblogs and Social Media, 2013.
[26] H. Park. Determinants of corruption: A cross-national
analysis. Multinational Business Review, 11(2):29–48,
2003.
[12] G. Hofstede. National cultures in four dimensions: A
[27] J. Park, Y. M. Baek, and M. Cha. Cross-cultural
research-based theory of cultural differences among
nations. International Studies of Management &
Organization, pages 46–74, 1983.
[13] G. Hoftede, G. J. Hofstede, and M. Minkov. Cultures
and organizations: software of the mind: intercultural
cooperation and its importance for survival.
McGraw-Hill, 2010.
[14] B. W. Husted. The impact of national culture on
software piracy. Journal of Business Ethics,
26(3):197–211, 2000.
[15] K.-H. Ju-Pak. Content dimensions of web advertising:
a cross-national comparison. International Journal of
Advertising, 18(2):207–231, 1999.
[16] I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi, and
F. Bonchi. The social world of content abusers in
community question answering. In Proceedings of the
24th International World Wide Web Conference,
pages 570–580, 2015.
[17] I. Kayes, X. Qian, J. Skvoretz, and A. Iamnitchi. How
influential are you: Detecting influential bloggers in a
blogging community. In Proceedings of the 4th
international conference on Social Informatics, pages
29–42, 2012.
[18] I. Kayes, X. Zuo, D. Wang, and C. Jacob. To blog or
not to blog: Characterizing and predicting retention in
community blogs. In Proceedings of the 7th ACM/ASE
International Conference on Social Computing
(SocialCom’14), 2014.
[19] E.-J. Ki, B.-H. Chang, and H. Khang. Exploring
influential factors on music piracy across countries.
Journal of Communication, 56(2):406–426, 2006.
[20] R. Levine. A Geography of Time: The Temporal
Misadventures of a Social Psychologist or How Every
Culture Keeps Time Just a Little Bit Differently.
University Press, 2006.
comparison of nonverbal cues in emoticons on twitter:
Evidence from big data analysis. Journal of
Communication, 64(2):333–354, 2014.
[28] M. Qu, G. Qiu, X. He, C. Zhang, H. Wu, J. Bu, and
C. Chen. Probabilistic question recommendation for
question answering communities. In Proceedings of the
18th International Conference on World Wide Web,
pages 1229–1230, 2009.
[29] D. Quercia. Don’t worry, be happy: The geography of
happiness on facebook. In Proceedings of the 5th
Annual ACM Web Science Conference, pages 316–325,
2013.
[30] K. Reinecke, M. K. Nguyen, A. Bernstein, M. Naf,
and K. Z. Gajos. Doodle around the world: Online
scheduling behavior reflects cultural differences in
time perception and group decision-making. In
Proceedings of the conference on Computer supported
cooperative work, pages 45–54, 2013.
[31] M. Richardson and R. W. White. Supporting
synchronous social q&a throughout the question
lifecycle. In Proceedings of the 20th international
conference on World wide web, pages 755–764, 2011.
[32] C. Shah and J. Pomerantz. Evaluating and predicting
answer quality in community qa. In Proceedings of the
33rd International ACM SIGIR Conference on
Research and Development in Information Retrieval,
pages 411–418, 2010.
[33] A. Shtok, G. Dror, Y. Maarek, and I. Szpektor.
Learning from the past: Answering new questions with
past answers. In Proceedings of the 21st International
Conference on World Wide Web, pages 759–768, 2012.
[34] T. H. Silva, P. O. Vaz de Melo, J. M. Almeida,
M. Musolesi, and A. A. Loureiro. You are what you
eat (and drink): Identifying cultural boundaries by
analyzing food and drink habits in foursquare. In
Proceedings of the 8th International AAAI Conference
on Weblogs and Social Media, 2014.
[35] J. J. Sosik and D. I. Jung. Work-group characteristics
and performance in collectivistic and individualistic
cultures. The Journal of social psychology,
142(1):5–23, 2002.
[36] I. Szpektor, Y. Maarek, and D. Pelleg. When
relevance is not enough: Promoting diversity and
freshness in personalized question recommendation. In
Proceedings of the 22Nd International Conference on
World Wide Web, pages 1249–1260, 2013.
[37] H. C. Triandis, P. Carnevale, M. Gelfand, C. Robert,
A. Wasti, T. Probst, E. Kashima, T. Dragonas,
D. Chan, X. Chen, et al. Culture, personality and
deception: A multilevel approach. International
Journal of Cross-Cultural Management, 1:73–90, 2001.
[38] J. Ugander, B. Karrer, L. Backstrom, and C. Marlow.
The anatomy of the facebook social graph. arXiv
preprint arXiv:1111.4503, 2011.
[39] I. Weber, A. Ukkonen, and A. Gionis. Answers, not
links: Extracting tips from yahoo! answers to address
how-to web queries. In Proceedings of the 5th ACM
International Conference on Web Search and Data
Mining, pages 613–622, 2012.
|
1509.00511 | 1 | 1509 | 2015-09-01T21:42:27 | Pinterest Board Recommendation for Twitter Users | [
"cs.SI",
"cs.MM"
] | Pinboard on Pinterest is an emerging media to engage online social media users, on which users post online images for specific topics. Regardless of its significance, there is little previous work specifically to facilitate information discovery based on pinboards. This paper proposes a novel pinboard recommendation system for Twitter users. In order to associate contents from the two social media platforms, we propose to use MultiLabel classification to map Twitter user followees to pinboard topics and visual diversification to recommend pinboards given user interested topics. A preliminary experiment on a dataset with 2000 users validated our proposed system. | cs.SI | cs | Pinterest Board Recommendation for Twitter Users
Xitong Yang
University of Rochester,
Rochester, NY 14623
[email protected]
Yuncheng Li
University of Rochester,
Rochester, NY 14623
[email protected]
Jiebo Luo
University of Rochester,
Rochester, NY 14623
[email protected]
5
1
0
2
p
e
S
1
]
I
S
.
s
c
[
1
v
1
1
5
0
0
.
9
0
5
1
:
v
i
X
r
a
ABSTRACT
Pinboard on Pinterest is an emerging media to engage on-
line social media users, on which users post online images for
specific topics. Regardless of its significance, there is little
previous work specifically to facilitate information discov-
ery based on pinboards. This paper proposes a novel pin-
board recommendation system for Twitter users. In order
to associate contents from the two social media platforms,
we propose to use MultiLabel classification to map Twitter
user followees to pinboard topics and visual diversification
to recommend pinboards given user interested topics. A pre-
liminary experiment on a dataset with 2000 users validated
our proposed system.
Categories and Subject Descriptors
H.3.5 [Online Information Services]: We-based services
General Terms
Experimentation
Keywords
cross-network recommendation; multi-label classification
1.
INTRODUCTION
Socially Curation Service [3], on which people can share
and reshare online content that they found interesting, is be-
coming more and more popular. For example, Pinterest has
successfully attracted more than 40 million monthly active
users 1 to create pinboards and share online images. Social
curation creates high quality contents for users to discover,
search and follow what they are interested in. For example,
Pinterest has already delivered better search results than
Google for a number of segments, such as food recipes, fash-
ion and DIY 2. Pinboard, on which people can put together
1eMarketer, Feb 2015
2http://goo.gl/PCWG3W
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
MM'15, October 26 -- 30, 2015, Brisbane, Australia.
c(cid:13) 2015 ACM. ISBN 978-1-4503-3459-4/15/10 ...$15.00.
DOI: http://dx.doi.org/10.1145/2733373.2806375.
Figure 1: An illustrative example to recommend pinboards
to a Twitter user "@xyz"
online images for specific topics to share with others, is the
key element for Pinterest to engage users. Different from
traditional photo albums, such as those on Facebook and
Flickr, pinboards are not yet another way for people to or-
ganize images, but also encouraging users to carefully select
images using their creativity. Also, in order to continuously
attract followers, pinboard curators take efforts to keep up
most recent contents, so pinboards give users a new way to
follow most fresh updates on the topic they are interested
in. As with other online systems, efficient information dis-
covery is one of the major hurdles for continuous growth. In
this paper, we propose a pinboard recommendation system
to help users to discover interesting pinboards on Pinterest.
As a relatively new social media platform, Pinterest is
still in its young age. Therefore, how to keep new users is
an important topic, but recommendation for new users suf-
fers cold start problem for the lack of activity history. We
propose to leverage 3rd party social media platforms, such
as Twitter, to solve the cold start problem for new Pinter-
est users. There are a number of reasons to use Twitter as
an intermediate platform to recommend pinboards. First,
Twitter is more mature and attracts even more active users,
so it represents larger coverage for online users. Second, be-
cause most contents on Twitter are text based, it is much
easier to find out interesting topics on Twitter than on Pin-
terest. Third, even though text based platform makes it
easier to find interesting topics, image based pinboards, if
...Pinterest OntologyTwitter UserFolloweesTweets timelinePinboard RecommendationFigure 2: Overview of the proposed recommendation system. First, we align and filter the data from two different sources.
After that, we collect multimedia contents, such as Pinboards and Pins information, and tweets from these active users.
In the meanwhile, we build the pinboard topic ontology automatically, which is done by pruning an expert ontology such
as Wikipedia. Second, we perform user modeling in two folds. For Pinterest, we obtain multi-label representation for each
account by mapping their boards to the topics in Pinterest ontology. For Twitter, we extract both text feature and personality
feature from user timeline. Third, we associate these two user models using multi-label classification, in which Twitter feature
is used to predict the Pinterest category representation of each user. In the end, we recommend diverse Pinterest boards
according to this prediction, where diversity is guaranteed by combining visual contents of the images in each board.
well aligned with the interests, provide better content for
users to digest. For these reasons, recommending pinboards
based on Twitter activity history is a perfect match.
We propose following procedure to recommend pinboards
to Twitter users. (1) Given Twitter users, we extract their
followees. We assume that the follower relationship rep-
resents user interests. (2) Using the proposed association
method, we map the followees to pinboards topics, which
represent what kind of boards the Twitter users will be in-
terested in. The noise of individual followee can be reduced
by aggregating all mapping results. (3) We choose a number
of pinboards from the selected topics, and recommend these
pinboards to the Twitter users.
Using the example in Fig. 1, we find that twitter user
"@xyz" is following a twitter user "@love146". By collect-
ing and classifying timeline of "@love146", we map the user
"@love146" to one of the pinboard topics "anti human traf-
ficking", so we assume that the target twitter user "@xyz"
is interested in the boards about "anti human trafficking".
Therefore, we select a number boards on this topic. We
further improve the recommendation quality by a reranking
method based on visual diversity analysis.
Since the followees can be extracted trivially from Twitter
API, we solve the following two key problems in this paper,
as illustrated in Fig. 2
Map user timeline to pinboard topics is an example of
cross network analysis [10], and we build the association by
mining users who are active on both Pinterest and Twitter.
We crawl the timeline and pinboards associated with users
that are active on both platforms. The pinboards are then
mapped onto a predefined topic ontology using text based
matching. After that, the users are associated with a twit-
ter timeline and a distribution of pinboard topics. Then we
learn a multi-label classifier to map user timeline to the pin-
board topics. Using this multi-label classifier, we can map
twitter followees without Pinterest account to pinboard top-
ics.
Pinboard reranking is the process to recommend the best
subset from the list of interested pinboards. We adapt a
clustering based algorithm to perform this reranking, and
the goal is to make sure that the recommended pinboards
cover as much aspects as possible for the selected topics.
We make following contributions in this paper, (1) We
present and release a linked dataset that associate pinboards
and Twitter users. This will be of interests to broader re-
search than cross network recommendation. (2) We propose
a cross network recommendation method based on multi-
label classification. (3) We propose a visual reranking method
to diversify pinboard recommendation.
2. RELATED WORK
Our work is related to cross network analysis, user mod-
eling and hierarchical multi-label classification. In this sec-
tion, we highlight the novelty of our work by comparing with
recent works on these related fields.
Cross network analysis aims to merge social signals from
different network to increase online social media platform
engagement. For example, in [10], Yan et al. proposed
to identify the best Twitter accounts to promote YouTube
videos, by mining the associations between topics learning
from user tweets and their favorite YouTube videos.
User modeling is the foundation of personalized services,
such as personalized recommendation, search engine rerank-
ing and advertisements targeting. One component of our
Pinterest board recommendation system is based on Pinter-
est board ontology mapping, which is inspired from [2]. In
this work, Geng et al. proposed a multi-task CNN to map
pinterest images to fashion ontology and the classification re-
sults were sorted as user profiles for image recommendation.
We adapt the idea that user interests can be represented
by multiple nodes on ontology and further extend the on-
PinterestAccountsFilter non-twitteraccounts...Pinterest Ontology...Category 1Category 2Category N...Multi-labelRepresentationHashing FeaturePersonality FeatureMulti-labelClassification...Category aCategory bCategory nPinterestTwitterFilter inactiveaccountsPinboards / PinsInformationTweets#
total nodes
root nodes
leaf nodes
least/largest depth
statistics
471
20
440
2 / 5
Table 1: Pinterest topic ontology Statistics
tology domain to 20 categories, including "Fashion", "Food"
and "Wedding". In addition, instead of single label classifi-
cation on images and aggregating the classification results to
form user profile, we perform hierarchical multi-label clas-
sification on aggregated user tweets to figure out the user
interests directly.
Hierarchical MultiLabel Classification is the problem
of classifying data instances to multiple labels or attributes,
in which the labels are structured in a hierarchical taxon-
omy. [7] proposed a hierarchical multi-label system to clas-
sify short texts (e.g., tweets). In this work, Ren et al. pro-
posed to use text expansion, e.g., entity linking, to deal with
the shortness and concept drift problem in short text classi-
fication. Our twitter user modeling is also based on hierar-
chical multi-label classification. However, instead of single
tweet classification, we deal with the entire timeline of users,
so that each user is modeled by a large number of tweets. In
this paper, we adapt Randomized Labelsets [8] to efficiently
model the hierarchical dependency automatically.
3. PINBOARD VISUAL DIVERSIFICATION
The goal of this stage is to recommend most relevant and
diverse boards, given predicted categories and millions of
board candidates sampled from Pinterest board pool. To
guarantee the relevance, we map each board to the cate-
gories onto the topic ontology with the method described
in Experiments Section 4, and also sort the boards of each
category according to their popularity (e.g. followers). We
then chose top k boards for each category as its preliminary
candidates (we set k = 10 in our experiment).
To enhance diversity, we utilize the visual contents in Pin-
terest, that is, for each category, we cluster all pin images
that belong to its preliminary board candidates, and then
chose the boards that can maximize the coverage of these
clusters. Specifically, we use deep Convolutional Neural Net-
work (CNN) to learn useful features for the pin images (fc7
layer of the AlexNet [4]). After that, Affinity Propagation
algorithm [1] is applied to cluster 4096D image features. Af-
ter obtaining the clusters and assignment for each pin image,
we can build a cluster distribution for each board. Then the
board selection problem can be formalize as follows.
Denote the candidate set by B, its subset by B ⊂ B, a
board in the subset by b ∈ B and the cluster assignment
distribution of the board by Pb ∈ RC . C is the number of
clusters for all images in the pinboard candidates. Then, we
define the set level entropy by,
(cid:18)(cid:80)
(cid:19)
b∈B Pb
B
T (B) = H
,
(1)
in which H(x) is the entropy of a distribution x. Then, we
select the best set of pinboards by argmax B T (B). We can
prove that this is actually an NP-complete problem, so an
approximation algorithm is needed, but in our experiments
we just use brutal force to enumerate all possibilities by
restricting the number of pinboard candidates B and the
recommendation set B.
4. EXPERIMENTS
4.1 Data Collection
4.1.1 Pinterest ontology construction and refining
Ontology is a natural way to model the hierarchical struc-
ture of the categories in Pinterest, as is also used in [2] to
organize items in fashion domain. To construct a full Pin-
terest ontology, we first build a preliminary ontology based
on Wikipedia Categories, where the root nodes of it are 20
manually selected categories according to the 38 original cat-
egories given by Pinterest, such as "Fashion", "Food" and
"Wedding". After that, we prune the ontology to adapt it
to Pinterest user interest distribution. Basically, categories
with low term frequency in board and pin information are
removed. As board information and pin information share
different weights for the ontology, we consider their pruning
approaches separately, and the pruned ontology is obtained
by uniting the results of two approaches. In addition, popu-
larity metrics like the number of followers, likes, comments
and repins are also considered as positive weighted metric
while pruning. As a result, we obtain the refined Pinterest
ontology and the statistics are shown in Table 1.
4.1.2 Map pinboards to topic ontology
With the refined Pinterest ontology, we can model a user's
Pinterest profile by topic distribution. As users have their
own boards, we can obtain this representation by mapping
their boards to the categories in the ontology. For each
board, this mapping approach takes three steps. First, we
match board information to the categories, which can get a
few or even no matches (but more accurate), as the board
information is always rare. Second, we match all pins infor-
mation under the board. Third, concatenate the result of
previous two steps. After obtaining the categories mapping
for each board, we can get the representation for the users
through the union of the categories of their own boards.
4.1.3 Twitter timeline features
We extract two kinds of features to represent the tweets
information for each user. First is the original text feature
extraction, where feature hashing [9] and tf-idf term weight-
ing are applied to reduce feature dimension and weight fea-
ture appropriately. Second, we also compute 64 LIWC fea-
tures (e.g., word categories such as "social" and "work") to
model the personality of each user [5]. These features may
potentially reflect the distribution of their interest and user-
curated data (e.g., Pinterest boards).
4.1.4 Data Statistics and Thresholds
In data preparation stage, we filter out those accounts
that do not have twitter links or twitter activities are not
active enough (number of tweets less than 200). Finally
we get 2265 accounts from original 50000 sample Pinterest
accounts. With these active accounts, we crawl 4.9 million
tweets, 25.5 thousand boards and 2 million pins in total.
In ontology pruning stage, we set the threshold of term
frequency for pins information to be 200 and the threshold
for board information to be 1/100 of it, as the number of
boards is nearly 1/100 of that of pins. After that we get 471
nodes in the ontology, as illustrated in Table 1.
In user modeling stage, for Pinterest data, we build up a
multi-label representation for each user. Table 2 shows cer-
Examples Attributes Labels Label Cardinality Label Density
2265
5000+64
471
16.02
0.034
Table 2: Data Statistics
(a) F macro-ex.
(b) F macro-label
Figure 3: Experiment results varying key parameters in
RAkEL algorithm [8].
tain standard multi-label statistics of these representation,
such as the number of labels, the label cardinality and the
label density [8]. Label cardinality (LC) is the average num-
ber of labels per example, and label density is LC divided by
the number of labels L. For Twitter data, we extract bag
of words (BOW) text feature, and then apply feature hash-
ing to get 5000 dimensional features. 64D LIWC feature is
also extracted from the tweets via LIWC dictionary.
4.2 Preliminary Evaluation
We use macro-F1, a macro-averaged version of F-measure
to measure our approaches, which is widely used in multi-
label classification tasks[6]. Formally, we represent an asso-
ciation of labels v and its prediction v as two binary vec-
tors {0, 1}T . Then F-measure (F1) can be used to measure
the accuracy of the prediction, which is the harmonic mean
of precision and recall and defined as follows: F 1(v, v) =
(2 × precision × recall)/(precision + recall), where preci-
sion is defined as v ∧ v/v, and recall is v ∧ v/v.
For a multi-label classification task with N examples and
L labels, we have two different ways to average the F1 scores:
(1) F1 macro-ex. average F1 scores of N examples, which re-
flects example based evaluation. (2) F1 macro-label: average
F1 scores of L labels, which reflects label based evaluation.
We compare two common multi-label classification meth-
ods: Binary Relevance(BR) and Label Powerset(LP)[6]. BR
considers the prediction of each label as an independent bi-
nary classification task, while LP considers subset of labels
as a single label to perform a multi-class classification task.
For efficiency consideration, we adopt RAkEL[8] method,
which is a variant of LP that ensemble different light LP
classifiers trained by small random subsets of the set of la-
bels.
In order to evaluate the effect of personality features, i.e.,
LIWC feature, in this user-interest relevant task, we com-
pare following three cases: Hashing feature only, LIWC fea-
ture only and an early fusion of both features.
4.3 Experiment results and Conclusion
Figure. 3 present the comparison between BR and RAkEL
while tuning the parameters k and M in RAkEL method.
Table 3 shows the full experiment results while comparing
BR and LP using different kind of features. Through result
above, we notice that LP based method can capture label
dependencies and get better performance than BR method,
especially when the subset size is large enough to contain
sufficient labels. LIWC alone cannot get good result, which
Hashing
F1 macro-ex. F1 macro-label
BR
0.114
LIWC 0.099
fusion
0.115
LP
0.143
0.086
0.142
BR
0.006
0.002
0.006
LP
0.021
0.002
0.021
Table 3: Experiment results, comparing different feature
schemes. Note that the total number of labels is 471, so
these results are significantly better than random guess.
Figure 4: The recommended boards for the topic "Advertise-
ment". Different kinds of advertisements are recommended,
such as "commercial Ads", "creative" and "vintage".
means that this personality feature cannot reflect one's in-
terest distribution across different platforms.
We show diversification results qualitatively in Figure. 4.
The preliminary results qualitatively validate our proposed
system, and further research will work on improving each
components and perform user study to prove the efficiency
and effectiveness of the system, and also on how to model
the dynamic nature of the user interests.
5. REFERENCES
[1] B. J. Frey and D. Dueck. Clustering by passing messages
between data points. Science, 315:972 -- 976, 2007.
[2] X. Geng, H. Zhang, Z. Song, Y. Yang, H. Luan, and T.-S.
Chua. One of a kind: User profiling by social curation.
MM'14.
[3] A. Kimura, K. Ishiguro, M. Yamada, A. Marcos Alvarez,
K. Kataoka, and K. Murasaki. Image context discovery
from socially curated contents. MM '13.
[4] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks.
NIPS '12.
[5] J. Pennebaker, M. Francis, and R. Booth. Linguistic
inquiry and word count [computer software]. Mahwah, NJ:
Erlbaum Publishers, 2001.
[6] J. Read. Scalable multi-label classification. 2010.
[7] Z. Ren, M.-H. Peetz, S. Liang, W. van Dolen, and
M. de Rijke. Hierarchical multi-label classification of social
text streams. SIGIR '14. ACM.
[8] G. Tsoumakas and I. Vlahavas. Random k-labelsets: An
ensemble method for multilabel classification. In Machine
Learning: ECML 2007. Springer Berlin Heidelberg, 2007.
[9] K. Weinberger, A. Dasgupta, J. Langford, A. Smola, and
J. Attenberg. Feature hashing for large scale multitask
learning. ICML '09, New York, NY, USA. ACM.
[10] M. Yan, J. Sang, and C. Xu. Mining cross-network
association for youtube video promotion. MM '14.
AdvertisementRecommended boardsRepresentative Pinsvintagecommercialcreative |
1803.08251 | 1 | 1803 | 2018-03-22T07:42:58 | Life in the "Matrix": Human Mobility Patterns in the Cyber Space | [
"cs.SI",
"cs.CY"
] | With the wide adoption of the multi-community setting in many popular social media platforms, the increasing user engagements across multiple online communities warrant research attention. In this paper, we introduce a novel analogy between the movements in the cyber space and the physical space. This analogy implies a new way of studying human online activities by modelling the activities across online communities in a similar fashion as the movements among locations. First, we quantitatively validate the analogy by comparing several important properties of human online activities and physical movements. Our experiments reveal striking similarities between the cyber space and the physical space. Next, inspired by the established methodology on human mobility in the physical space, we propose a framework to study human "mobility" across online platforms. We discover three interesting patterns of user engagements in online communities. Furthermore, our experiments indicate that people with different mobility patterns also exhibit divergent preferences to online communities. This work not only attempts to achieve a better understanding of human online activities, but also intends to open a promising research direction with rich implications and applications. | cs.SI | cs | Life in the Matrix∗: Human Mobility Patterns in the Cyber Space
Tianran Hu, Jiebo Luo
Department of Computer Science
University of Rochester
{thu, jluo}@cs.rochester.edu
Wei Liu
AI Lab
Tencent Inc.
[email protected]
8
1
0
2
r
a
M
2
2
]
I
S
.
s
c
[
1
v
1
5
2
8
0
.
3
0
8
1
:
v
i
X
r
a
Abstract
With the wide adoption of the multi-community setting in
many popular social media platforms, the increasing user en-
gagements across multiple online communities warrant re-
search attention. In this paper, we introduce a novel analogy
between the movements in the cyber space and the physical
space. This analogy implies a new way of studying human on-
line activities by modelling the activities across online com-
munities in a similar fashion as the movements among loca-
tions. First, we quantitatively validate the analogy by com-
paring several important properties of human online activi-
ties and physical movements. Our experiments reveal striking
similarities between the cyber space and the physical space.
Next, inspired by the established methodology on human
mobility in the physical space, we propose a framework to
study human "mobility" across online platforms. We discover
three interesting patterns of user engagements in online com-
munities. Furthermore, our experiments indicate that people
with different mobility patterns also exhibit divergent prefer-
ences to online communities. This work not only attempts to
achieve a better understanding of human online activities, but
also intends to open a promising research direction with rich
implications and applications.
Introduction
Understanding human activities in online communities not
only is the key to computational sociology research (Ren,
Kraut, and Kiesler 2007; Zhu, Kraut, and Kittur 2014), but
also can offer valuable guidance to the design of online
systems (Kraut et al. 2012). Many popular platforms, such
as Reddit, 4chan, and StackExchange, adopt the setting of
multiple communities for user engagement. Much work has
been done on human activities across communities, includ-
ing user exploration and participation patterns in more than
one community (Tan and Lee 2015; Zhang et al. 2017), and
user loyalty under the multi-community setting (Hamilton
et al. 2017). However, these studies usually focus on spe-
cific aspects of online activities, while a comprehensive and
general-purpose framework for studying multi-community
activities is still lacking. To overcome the problem, we in-
troduce a novel analogy between human online activities
∗A metaphor taken from the hit movie Matrix. The work is to
appear at ICWSM 2018.
Copyright c(cid:13) 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
and offline physical movements in this paper. Given the rich
body of research on human mobility patterns (Barbosa-Filho
et al. 2017), such an analogy allows us to borrow the existing
approaches and frameworks for analyzing movements in the
physical space and apply them to online scenarios with nec-
essary adaptation. In this work, we first validate this analogy,
and design experiments to reveal striking quantitative simi-
larities between human online activities and offline move-
ments. We then propose a frameworks for studying users of
online platforms, and uncover interesting activity patterns
across communities.
We draw a strong analogy between the cyber space (i.e.
online multi-community platforms such as Reddit)1 and
physical space. The communities on the online platforms is
then treated as the locations in the cyber space. The intuition
of the analogy arises from two aspects:
• The activities in the cyber space resemble the movements
in the physical space – people move from one commu-
nity to another on the platforms, explore new communi-
ties, and regularly visit communities with which they are
familiar, as do they with physical locations.
• The locations in the two spaces (i.e. communities and
places) share important similarities – some locations are
popular and thus gain large amounts of visitors; some
are niche and attract specific groups of visitors; some are
private where only authorized visitors have access (e.g.
home and private subreddit).
Without causing ambiguity, in this paper we may use the
movements across locations in the cyber space to refer to the
activities across online communities.
We quantitatively validate our analogy by comparing the
properties of movements in the cyber and physical spaces
from three representative and progressive aspects: 1) at a
coarse granularity, we first compare the overall visit distribu-
tions in the two spaces; 2) at a fine granularity, we then study
the visit behavior of individuals; and 3) considering time fac-
tors, we further investigate the temporal properties of both
cyber and physical movements. The results reveal striking
similarities between the movements in the two spaces. For
1We use "cyber space" and "online multi-community plat-
forms" interchangeably in this paper for the simplicity of narration.
Please note that "cyber space", as sometimes used as a metaphor to
the whole Internet, is a wider concept than online platforms.
example, the number of visits to an online community is
found to fall into the same distribution of the number vis-
its to a physical location. Moreover, it is shown that individ-
uals visit locations in both spaces following random-walk
behavior. More strikingly, the Zipf's law of the movements
in the physical space also applies to the movements in the
cyber space. In terms of temporal property, we observe an al-
most identical returning pattern in both spaces – people tend
to return to specific communities/locations on a daily basis.
Also, a temporally complementary relation between the two
spaces is uncovered – human mobility level is high in the
cyber space when the level is low in the physical space, and
vice versa.
The analogy implies a possibility of modelling the move-
ments in the cyber space using the existing approaches for
studying physical movements. However, one of the differ-
ences between the two spaces is that distance is not univer-
sally defined in the cyber space (Hessel, Tan, and Lee 2016;
Pavalanathan et al. 2017). Instead of arbitrarily defining the
distance concept, we focus on entropy-based approaches
that do not require an explicit measurement of distance. En-
tropy and its variants have been widely used for analyz-
ing the randomness and predictability of individual mobil-
ity (Song et al. 2010b), measuring diversity of visitors to
a location (Cranshaw et al. 2010), and so on. Following this
line of research, we study human mobility in the cyber space.
We first study the randomness of human mobility in the
cyber space. We discover that mobility randomness varies
significantly across people. Some people evenly distribute
their visits to many communities, and therefore exhibit high
mobility randomness. In contrast, some people only visit a
very limited number of communities, and exhibit very low
mobility randomness. We then investigate if human mobil-
ity in the cyber space evolves over time. By comparing dif-
ferent stages of a user's online lifespan, our experiments re-
veal three interesting mobility patterns in the cyber space: 1)
concentrating on a limited number of communities through-
out the whole lifespan; 2) exploring many communities in
the early stage, but stopping exploring and concentrating on
only a few later on; and 3) focusing on a few communities
in the early stage, and starting to explore more and more
communities later on. Furthermore, we observe that people
of the concentrated pattern are more likely to visit commu-
nities of specific topics and smaller sizes, while people of
both two exploratory patterns prefer communities of general
topics and larger sizes.
The main contributions of this paper are threefold:
• We introduce a novel analogy between the cyber space
and the physical space. This work is intended to first
achieve a better understanding of human online activities,
and more importantly, initialize a promising new research
direction.
• We quantitatively examine the validity of the analogy be-
tween the cyber space and the physical space. Our experi-
ments reveal striking similarities between the two spaces.
• We investigate the individual mobility patterns in the cy-
ber space. Our results reveal three major patterns of online
activities, as well as the different preferences to online
communities by the people of the three patterns.
Related Work
Online Communities
Rotman et al. suggest that users interact and share purpose
in online groups, and therefore, form sociological commu-
nities (Rotman, Golbeck, and Preece 2009). Since then there
has been a rich literature studying online communities from
various aspects, such as the styles and evolution of commu-
nities (Tran and Ostendorf 2016; Lin et al. 2017), differences
between communities (Hessel, Tan, and Lee 2016), and so
on. The interaction between users and communities has also
been investigated. For example, (Danescu-Niculescu-Mizil
et al. 2013) studies the changes of linguistic style in online
communities, and uncovers the interesting evolution of the
interaction patterns between users and communities.
Given the wide adoption of the multi-community set-
ting on online platforms, more and more attention has been
paid to human activities across online communities (Chan,
Hayes, and Daly 2010; Pavlick and Tetreault 2016). Zhu
et al. report that user participation in multiple communities
benefits the survival of communities (Zhu, Kraut, and Kittur
2014). Ren et al. study the common identities within differ-
ent communities, and suggest the "bonds" between online
communities (Ren, Kraut, and Kiesler 2007). Furthermore,
it is reported that community characteristics can affect the
user engagement pattern in a community. (Hamilton et al.
2017). For example, a community with a distinctive and dy-
namic identity is not only more likely to retain users, but also
creates a larger "cultural" gap between senior members and
newcomers (Zhang et al. 2017). Tan et al. study the involve-
ments of users in more than one communities (Tan and Lee
2015). This work suggests that instead of gradually settling
down in previously visited communities, online users keep
exploring new but less popular communities.
Human Physical Mobility Patterns
Much research work has been devoted to human mobility
in the physical space on various topics such as individual
and group level mobility patterns (De Montjoye et al. 2013;
Simini et al. 2012), the temporal-spatial properties of hu-
man mobility (Hu et al. 2017), and the relation between in-
dividual mobility and social connections (Cho, Myers, and
Leskovec 2011). Many studies in modelling human mobil-
ity suggest the relation between random-walk models and
the movements in the physical space (Gonzalez, Hidalgo,
and Barabasi 2008). For example, Song et al. model people
in the physical space as randomly moving objects, and pro-
pose methods to predict human mobility (Song et al. 2010a).
Many interesting temporal patterns of human mobility have
also been discovered in previous work. For example, (Cheng
et al. 2011) indicates that people return to specific loca-
tions on a daily basis, and (Noulas et al. 2011) reports the
different mobility levels of people on weekdays and week-
ends. Without modelling the distance in the space, a num-
ber of entropy-based approaches are proposed to investigate
the randomness of human mobility (Cranshaw et al. 2010;
Smith et al. 2014). For example, Song et al. study human
moving trajectories using entropy, and discover a high pre-
dictability in human mobility (Song et al. 2010b).
Data Collection and Preprocessing
We collect our data from Reddit, which was launched in
2005 and is now one of the most visited websites in the
world2. Due to its high popularity, long time span, and al-
most complete data availability3, Reddit has been used as the
data source in many previous studies (Hamilton et al. 2017;
Zhang, Culbertson, and Paritosh 2017). Reddit is organized
into thousands topic-based communities (subreddits), and
users are allowed to join any communities at will (except for
private subreddits). Such a multi-community setting makes
Reddit ideal for our study.
We download all the posts on Reddit from the website's
inception on Dec 2005 to Dec 2016. The dataset contains 2.9
billion posts sent by 21 million users on 430 thousand sub-
reddits. Besides text content, each post in the dataset is as-
sociated with many other types of information, such as user
ID, community ID, time stamp, and so on. We first filter out
0.3 billion posts sent by deleted users (denoted by a user ID
of "[deleted]" in the data). We also remove the posts by non-
human accounts. To detect non-human accounts (bots), we
first collect the users that post with an abnormally high fre-
quency (50 thousand+ posts), and take them as possible ex-
amples of non-human accounts. We observe the user IDs of
these accounts, and summarize a list of terms that frequently
occur in these user IDs, such as "-bot", " transcriber", and
"Moderator". We take the accounts that contain at least one
of these terms in their IDs as non-human accounts, and re-
move all the posts sent by these accounts. In total, we fil-
ter out 35 million posts sent by 28 thousand user accounts
of this kind. After the data cleaning, we further process the
data to extract the visit history of each user. To be specific,
the visit history of a user records all the communities the
user has visited in the chronological order. In other words,
visit histories are users' "trajectories" in the cyber space.
Our work investigates the mobility patterns across commu-
nities by focusing on user visit histories. Different slices of
user visit histories may be used for facilitating the different
problems studied in this paper. We will specify the data used
for each problem in the corresponding section.
Analogy between the Two Spaces
We first validate the analogy between the cyber space and
the physical space. To be specific, we study if the properties
of human mobility discovered in the physical space still hold
true in the cyber space. On the data collected from Reddit,
we conduct the experiments that are originally designed for
studying human physical mobility, and compare our results
with the conclusions reported in the previous work. Most
work on physical mobility is based on data collected in time
spans of several months (Barbosa-Filho et al. 2017). To align
with the previous work, we collect a data slice containing all
the posts on Reddit from January to March 2016. This data
2www.en.wikipedia.org/wiki/Reddit
3Reddit data is made publicly available, and free for download
at www.reddit.com/3bxlg7
slice contains 169 million posts sent by 4.6 million users on
161 thousand subreddits (after data cleaning). All the exper-
iments in this section are conducted on this data slice.
Distributions of Visits
At a coarse granularity, we first compare the distributions
of the number of visits in both spaces. (Noulas et al. 2011)
reports the complementary cumulative distribution function
(CCDF) of the number of visits to a physical location, as
well as the CCDF of the number of visits per user. Both dis-
tributions reportedly have heavy tails. Moreover, the trend of
the number of visits to a physical location follows a power-
law distribution (a straight line in log-log scale). We plot the
CCDF of the number of visits to an online community, as
well as the CCDF of the number of visits per user in Fig-
ure 1 (a) ∼ (b). The plot shows that both distributions of
visits in the cyber space exhibit the same trends as in the
physical space. To be specific, both distributions computed
from online data also have heavy tails. Moreover, the trend
of the number of visits to an online community follows a
power-law distribution (Figure 1 (a)).
The same trends of the distributions in the two spaces
imply the similarities between communities and physical
locations, as well as the similarities between the activities
across communities and the movements across locations.
The heavy tailed distribution of the visit amount to an online
community reveals that, similar to physical locations, only
a few communities receive a large number of visits, and a
higher number of communities have only few visits. Mean-
while, the same distributions of visits per user suggest that,
in both cyber and physical spaces, a small number of peo-
ple contribute a large amount of visits, while the number of
visits of most people is low.
Human Visit Behavior
At a fine granularity, we compare human visit behavior in
the two spaces. Much work on human mobility in the physi-
cal space suggests the relation between random-walk models
and the physical movements of individuals (Gonzalez, Hi-
dalgo, and Barabasi 2008; Castellano, Fortunato, and Loreto
2009). Human physical mobility reportedly exhibits two im-
portant quantitative characteristics of random-walk behav-
ior (Song et al. 2010a):
1) the number of distinct locations visited by a user, de-
noted by S(t), follows
S(t) ∼ tµ
(1)
where t is the time the user spent in the space.
2) the frequency fk of the kth most visited location of a
user follows Zipf's law, and formally,
fk ∼ k−ζ
(2)
The first characteristic describes the exploration of people
in the physical space. The parameter µ is estimated to be
smaller than 1 from physical mobility data, indicating a de-
creasing tendency of the users to visit new locations through
time. The second characteristic indicates that the visits of
users are distributed very unevenly, with most visits paid
Figure 1: (a) Complementary Cumulative Distribution Function (CCDF) of the number of visits to an online community. (b)
CCDF of the number of visits per user. (c) Distribution of the number of visited distinct communities S(t). (d) Distributions of
the frequency of the kth most visited community fk for different S values.
to a few most visited locations. We follow the exact steps
suggested in (Song et al. 2010a) to investigate if these two
characteristics still apply to the cyber space.
Distribution of Visited Locations For the first character-
istic, we first extract the visit histories of all the users from
the three month data slice. For a user, we split the visit his-
tory into hours, and compute the number of distinct commu-
nities visited by the end of each hour, denoted by s(t). Then
S(t) is empirically computed as the average of s(t) of all the
users. We plot the relation between S(t) and t in Figure 1
(c). The result reveals that in the cyber space the relation
S(t) ∼ tµ also holds, suggesting a similar exploration pat-
tern of people in the two spaces. Furthermore, the parameter
µ is estimated to be 0.4 in our experiment, which is smaller
than the estimation in the physical space (0.6 ± 0.02). This
indicates that the tendency of user visiting new communities
in the cyber space also decreases over time. Moreover, the
decreasing tendency is faster in the cyber space than in the
physical space.
Zipf's Law We then validate the Zipf's law in the cyber
space. From the data slice, we select the users who visited S
unique communities. Different values of S are experimented
as suggested in (Gonzalez, Hidalgo, and Barabasi 2008;
Song et al. 2010a). We then sort the communities a user vis-
ited according to their visit frequencies. The frequency fk is
computed as the average of the visit frequencies to the kth
most visited communities of all the users. Please note that k
ranges from 1 (most visited) to S (least visited). The rela-
tion between fk and k is plotted in Figure 1 (d). The result
shows that the Zipf's law fk ∼ k−ζ also applies in the cy-
ber space. More strikingly, the parameter ζ is estimated to
be 1.12 from our data, which is very close to the results es-
Figure 2: Distribution of the returning probability to online
communities.
timated on physical mobility data (1.2± 0.1). This indicates
that people distribute their visits unevenly in a very similar
fashion in both the cyber space and physical space.
Our experiments reveal the two characteristics also apply
to the movements in the cyber space. The results suggest
that individuals' trajectories across online communities can
also be described using random-walk models. This further
implies the similarity between human mobility in the cyber
space and the physical space.
Temporal Properties
Next, we validate our analogy for two well studied tempo-
ral properties of human physical mobility: distribution of re-
turning probability (Gonzalez, Hidalgo, and Barabasi 2008;
Cheng et al. 2011) and hourly mobility levels (Noulas et al.
2011; Hu et al. 2016). Returning probability measures the
periodic patterns of human mobility. To be specific, the re-
turning probability is the probability that a user returns to
a location that the user visited t hours before. In the phys-
ical space, the distribution of the returning probability, al-
though having an overall decreasing tendency over time, in-
creases sharply every 24 hours. This indicates a daily pattern
of human mobility – people return to specific locations on a
daily basis. Zooming into the hourly level, previous work re-
ports a high level of mobility during the daytime and a low
level during the nighttime. Furthermore, researchers have
observed two peaks in the mobility level around 9am and
7pm on weekdays, matching rush hours in the morning and
happy hours in the evening, respectively. As for weekends,
human mobility increases rapidly in the morning, and stays
at a high level from 2pm to 9pm.
Returning Probability We first compute the distribution
of returning probability in the cyber space. For each com-
munity a user visited, we record the time gap between ev-
ery two consecutive visits to the community (i.e. returning
time). We then collect the returning time of all the users,
and compute the probability of returning to a community in
the tth hour. The distribution is plotted in Figure 2. Quite
interestingly, we observe an almost identical distribution of
returning probability as in the physical space – the probabil-
ity has an overall decreasing tendency, but increases sharply
every 24 hours. It indicates that people return to specific on-
line communities also on a daily basis.
Hourly Mobility Level We then compute the mobility
level in the cyber space. One of the requirements for com-
puting the hourly mobility level is to know the clock time
of each movement. However, time stamps on Reddit are
recorded in UTC time while no time zone information is
available. Fortunately, there are many subreddits on spe-
cific cities (e.g. /r/nyc4). Since the topics in a city-specific
subreddit are mostly related to the life in the city, we can
assume that most posts in such subreddits are sent by the
city residents. Therefore, given the time zone of a city, we
are able to compute the local time for each post in the city
specific subreddit. Following this idea, we first collect the
posts from several popular city-specific subreddits such as
/r/nyc, /r/boston, /r/LosAngeles, and so on. We then convert
the time stamp of each post to the local time of the corre-
sponding city. The mobility level of one hour in the cyber
space is computed as the percentage of posts in the hour.
The mobility levels on both weekdays and weekends in the
cyber space are shown in Figure 3. We also plot the mobil-
ity levels in the physical world as reported in (Noulas et al.
2011) for a better comparison.
Similar to the physical space, we observe that the mobility
level in the cyber space is much higher during the daytime
than during the nighttime. Also, on weekdays the mobility
level in the cyber space varies significantly during the day-
time, while on weekends the tendency of the level appears
to be relatively flat. More interestingly, Figure 3 shows a
complementary relation between the two spaces – when the
mobility level is high in the cyber space, the level is low in
the physical space, and vice versa. For example, in the phys-
ical space, the mobility level during the work hours (from
9am to 5pm) is relatively low on weekdays. On the con-
4On Reddit, a subreddit is denoted as "/r/" + an unique name.
Figure 3: Mobility levels in the cyber space over weekdays
(left) and weekends (right). Please note that the two subplots
share the same y-axis for a better comparison between week-
days and weekends. The values of frequency of visits in the
physical space are learned from (Noulas et al. 2011).
trary, the highest mobility level on weekdays in the cyber
space occurs exactly in these hours, indicating that people
are more likely to surf the Internet during work hours. The
complementary relation can also be observed from the mo-
bility level on weekends – in the afternoon when the mobil-
ity level is high in the physical space, the mobility level in
the cyber space decreases correspondingly.
The temporal properties of human online mobility reveal
several interesting relations between the cyber space and the
physical space. On one hand, people exhibit the same daily
returning pattern, and their mobility levels follow the same
day-night cycle in both spaces. This suggests that, although
in two different spaces, human circadian rhythm remains un-
changed. On the other hand, we discover the complemen-
tary relation between the two spaces. This makes sense intu-
itively – although sometimes people can access online com-
munities while in transportation, in most cases they cannot
"move" in both spaces at the same time.
Human Mobility in the Cyber Space
The similarities between the cyber space and the physical
spaces imply the possibility of applying the approaches orig-
inally designed for human physical mobility to human on-
line mobility. In this paper, we borrow the idea of entropy-
based approaches (Song et al. 2010b), and study human on-
line mobility from three aspects: 1) the randomness of hu-
man online mobility, 2) online mobility patterns, and 3) the
preferences to online communities by the people of differ-
ent mobility patterns. We select entropy-based approaches
because such approaches do not require a distance measure-
ment, which is not universally defined in the cyber space.
Randomness of Mobility in the Cyber Space
Entropy is widely applied to measure the randomness of
human mobility in the physical space (Smith et al. 2014;
Cranshaw et al. 2010). Inspired by the previous work, we
use the entropy of the visit histories of a user to measure the
randomness of her mobility across online communities. For-
mally, the entropy of the visit history of a user u, denoted by
larger than 0.9. Please note that a max f rq = 0.9 indicates
that the user direct 90% of all the visits to one community. In
other words, although these users are active online, they al-
most always devote their visits to only one community. The
distribution of entropy echoes the finding by showing that
over 13% users have an entropy value lower than 1.
Mobility Patterns in the Cyber Space
Given the diverse mobility randomness across people in the
cyber space, a nature follow-up question is: does human on-
line mobility change over time? Take the people with very
low mobility randomness for an example. We wonder if they
always focus on a specific community since they join the
platform, or they explore many communities in the begin-
ning and discover their favorites later. To study the prob-
lem, we focus on the active users whose whole lifespans on
the platform are available (Danescu-Niculescu-Mizil et al.
2013; Tan and Lee 2015). In other words, these users have
been active on the platform, but left the platform eventually.
Therefore, we select the users who used to be active before
January 2016 and never post after the time. We apply the
same constraints as in the task for choosing active users (i.e.
n>2 and total visits>1000). There are around 69,000 users
meeting the constraints. We collect the complete visit histo-
ries of these users, and conduct our following experiments
on this data slice.
Methodology Since the total number of visits varies sig-
nificantly across users, we first equally divide the lifespan of
a user into 20 stages5 as suggested in (Danescu-Niculescu-
Mizil et al. 2013). In other words, each stage of a user ac-
counts for 5% of all the visits through the user's lifespan. By
doing this, we are able to align the stages of all the users, and
study the evolution of user mobility over different stages.
We then quantify the mobility within each stage of a user.
Entropy and max f rq are again used to measure mobility
randomness in a stage. However, these two measurements
do not quantify to what extent user explore unvisited com-
munities over stages. For example, a user could visit two
totally different sets of communities in two stages, but with
the same mobility randomness. To measure the user explo-
ration to new community in a stage, we design another mea-
surement P (new comm) – the probability of a user visiting
a new community that never has been visited in previous
stages. Formally, for the ith stage of a user u, let Vu,i de-
note the set of the visits of u in this stage. The set of the
visits to the communities that are visited in the ith stage but
never have been visited before is denoted as V new
. There-
fore, P (new comm) is computed as
u,i
P (new comm) =
V new
Vu,i
u,i
(5)
For each user, we compute the entropy and max f rq for
all the 20 stages in order. We also compute P (new comm)
from the second stage to the last stage. We exclude the
first stage because all the visits in this stage are directed to
new communities, thus the value of P (new comm) of the
5We obtain similar results for other choices of number of stages.
Figure 4: Distribution of the entropy of a user's visits to on-
line communities (left). Distribution of the frequency of a
user's most visited community max f rq (right). Please note
that the two subplots share the same y-axis.
En(u), is computed as:
En(u) = −(cid:88)
n
pilog(pi),
(3)
where n denotes the number of unique communities the user
visited, and pi is the probability of the user visiting the ith
community. In general, entropy measures how precisely the
next community a user will visit can be predicted given the
visit history. The lower the entropy is, the lower the mobility
randomness is. Another more intuitive measurement that de-
scribes the randomness of a user's mobility is the frequency
to the most visited community, denoted by max f rq(u).
Formally, max f rq(u) is computed as
max f rq(u) = maxn(pi)
(4)
Clearly, a larger value of max f rq indicates the user is more
focused on a specific community, and therefore implies a
lower user mobility randomness. To investigate the mobil-
ity randomness in the cyber space, we compute both entropy
and max f rq for each user. We conduct the experiments on
the same data slice from January to March 2016 in this task,
and apply the constraints suggested in (Song et al. 2010b)
to remove inactive users (i.e. n>2 and total visits>1000).
The distributions of the two measurements are plotted in
Figure 4.
We observe that mobility randomness varies significantly
across users. Over 25% users have an entropy value larger
than 4, suggesting that a high randomness of such users' on-
line mobility. Please note that an entropy value of 4 indicates
that the next community the user will visit could be found on
the average in any of 24 = 16 communities. Similarly, over
30% users have a max f rq value lower than 0.3 indicat-
ing that many users do not focus on specific communities.
Meanwhile, the mobility randomness of a large portion of
users in the cyber space is very low. From the distribution of
max f rq, we observe that about 17% users have a max f rq
value larger than 0.8, and nearly 10% users with a value
Figure 5: Three mobility patterns in the cyber spaces extracted by NMF. For a better illustration, we plot the weights of entropy,
max f rq, and P (new comm) separately.
first stage is 1 for all the users. Using the three measure-
ments, we quantify a user's mobility over 20 stages into a
59-dimensional vector. The first 20 dimensions are the en-
tropy values of all the stages, the next 20 dimensions are the
max f rq values, and the remaining 19 dimensions are the
P (new comm) values of the 19 stages (the first stage is ex-
cluded). The vectors of all users are then stacked to create
a 59×69,000 matrix. This matrix records the mobility over
time for all the users. We investigate the patterns of mobility
evolution by decomposing the matrix. Since Non-negative
Matrix Factorization (NMF) has been successfully used for
mining interpretable temporal-spatial human mobility pat-
terns (Lee and Seung 1999; Hu et al. 2017), we also apply
NMF to complete the decomposition.
Mobility Patterns By setting the number of component k
to 3, NMF reveals three very interpretable mobility patterns
in the cyber space: two exploratory patterns and one con-
centrated pattern6. We plot the three patterns in Figure 5 by
showing the tendency of the three measurements over stages.
We summarize the patterns as follows:
• Exploratory Pattern I: The people of this pattern concen-
trate on a few communities in the early stages, but explore
more and more new communities with high randomness
in the late stages. The entropy value of these users is ini-
tially low, and increases over stages. Correspondingly, the
max f rq value starts at a high level, and decreases over
stages. The tendencies of both entropy and max f rq in-
dicate that the mobility randomness is low in the begin-
ning, and goes up as time goes on. In other words, these
user only focus on a limited number of communities at
first, but gradually lose their concentrations later. Mean-
while, the value of P (new comm) is low in the begin-
ning, and increases over stages. This tendency indicates
that the users start at a low level of interest in new commu-
nities, but explore more and more unvisited communities
6With a k value larger than 3, the two exploratory patterns are
further decomposed into smaller but less interpretable components,
and the concentrated pattern is barely affected. Therefore, we set k
to 3 in our experiments
over stages.
• Exploratory Pattern II: The people of this pattern is the
opposite to the first pattern. They explore many new com-
munities in the early stages, but only focus on a few com-
munities later. The mobility randomness is initially high,
as indicated by a high entropy value and low max f rq
value. This suggests that these users do not concentrate
on any communities in the beginning. As time goes on,
the mobility randomness monotonously decreases, as in-
dicated by the decreasing tendency of entropy and the
increasing tendency of max f rq over stages. In other
words, the users discover their interested communities,
and pay more and more attention to these communities.
Meanwhile, the decreasing tendency of P (new comm)
also suggests that the users pay a large amount of visits to
new communities in the early stages, but gradually stop
exploring unvisited communities over stages.
• Concentrated Pattern: The people of this pattern are
very concentrated – they direct almost all their visits to
a small and unchanged set of communities through the
whole lifespan. In this pattern, both entropy value and
P (new comm) value are low for all the stages. This sug-
gests that these user only visit specific communities, and
rarely explore unvisited communities. Correspondingly,
the max f rq is high for all the stages, also indicating the
low overall mobility randomness of this pattern.
Exploratory Patterns vs. Concentrated Pattern
Given the divergent mobility patterns people exhibit in the
cyber space, we further investigate the relation between mo-
bility pattern and online community preference. For exam-
ple, we wonder if the concentrated type people also like to
visit communities that the exploratory people usually visit,
and if the people of the two exploratory patterns share sim-
ilarities in their preferences to communities. We study this
problem by converting it to a classification task. In this clas-
sification task, we take the three mobility patterns of users
as class labels, and attempt to distinguish the three classes
only using the communities visited by the users as features.
Precision Recall F-1 Score
Exploratory I
Exploratory II
Concentrated
avg / total
0.64
0.32
0.77
0.63
0.86
0.10
0.71
0.67
0.74
0.15
0.74
0.63
Table 1: Classification results among the three patterns.
Classification among Three Mobility Patterns From the
results of NMF, we find the mobility pattern to which a user
is assigned the highest weight among the three patterns, and
take the mobility pattern as the user's class label. By do-
ing so, we obtain around 31,000 and 13,000 users of Ex-
ploratory Pattern I and Pattern II, respectively. The around
25,000 remaining users are labelled as the Concentrated Pat-
tern. The amounts of visits to different communities of a
user are used as the classification features. To be specific,
we first remove the unpopular communities that have less
than 50 unique users, and obtain 7,526 unique communities.
We collect the numbers of visits to the selected communities
for each user. TF-IDF is then applied to weight the numbers
of visits across all the users, and the weighted results are
used as the classification features. We use 80% of the data
for training, and the remaining 20% for testing. A logistic re-
gression model is employed for the task. The classification
results are reported in Table 1.
The results show that people of the Concentrated Pattern
can be distinguished from the people of Exploratory Pattern
I and Pattern II, with a high precision of 0.77 and recall of
0.71. This indicates that concentrated people have different
preferences to communities from exploratory people. How-
ever, the classifier cannot distinguish people of Exploratory
Pattern I and II. Because of the much larger user size of Ex-
ploratory Pattern I, a large amount of users of Exploratory
Pattern II are classified as Exploratory Pattern I. This leads
to the low precision (0.32) and recall (0.1) for Exploratory
Pattern II. Due to the same reason, Exploratory Pattern I re-
ceives a high recall (0.86) but a low precision (0.64). The
results imply that users of the two exploratory patterns share
similarities in their community preferences, and therefore
cannot be simply distinguished by only using the commu-
nity features.
Community Preference of Different Patterns From the
trained logistic model, we can tell the features (communi-
ties) assigned with the highest positive and negative coeffi-
cients for distinguishing the users of the Concentrated Pat-
tern. These communities are reported in Table 2. Clearly, the
communities with the positive coefficients are preferred by
the users of the Concentrated Pattern. In contrast, the com-
munities with the negative coefficients are preferred by the
users of either Exploratory Pattern I or Pattern II. We also
report the values of the coefficients and the user sizes of the
communities in the table. Two interesting differences can
be observed from these two groups of communities. First,
the communities preferred by the concentrated type people
are much smaller than the communities preferred by the ex-
ploratory type people. None of the top five positive com-
munities has a user size larger than 100,000, and the small-
Subreddit
User Size Coefficient
top five positive features (communities)
top five negative features (communities)
/r/stopdrinking
/r/thinkpad
/r/MinecraftCirclejerk
/r/incremental games
/r/autism
94,187
24,545
2,508
39,250
21,461
/r/bestof
/r/reactiongifs
/r/woahdude
/r/comics
/r/technology
4,841,958
1,260,843
1,571,722
836,383
5,866,352
0.013
0.012
0.011
0.011
0.011
-0.083
-0.064
-0.051
-0.050
-0.041
Table 2: Five top positive and negative features (communi-
ties) for classifying the people of the Concentrated Pattern.
We list the communities along with their user sizes and the
values of the coefficients.
est only has a user size of 2,500. In contrast, four of the
top five negative communities have a user size larger than
1 million. Furthermore, the communities preferred by the
concentrated type users are usually on specific topics. For
example, in the top five positive communities, two com-
munities are on specific games (/r/MinecraftCirclejerk and
/r/incremental games), two communities are on personal is-
sues (/r/stopdrinking and /r/autism), and one community
is on a specific product (/r/thinkpad). In contrast, the top
five negative communities are all on general topics such as
/r/bestof and /r/reactiongifs.
Conclusion & Future Work
In this paper, we present a novel analogy between the cyber
space and the physical space. We quantitatively validate the
analogy from three representative and progressive aspects:
visit distributions, individual visit behavior, and temporal
properties. Our experiments on the three aspects all reveal
striking the similarities between human mobility in the two
spaces. Next, we study human online activities by treating
the communities as locations in the cyber space, and ac-
tivities across communities as movements across locations.
By applying the framework originally designed for studying
human physical mobility, we investigate the mobility pat-
terns in the cyber space. It is observed that the randomness
of online mobility varies significantly across users. Further-
more, we study the evolution of human mobility in the cyber
space, and discover three interesting exploration patterns of
by users of online communities. Moreover, our experiments
suggest divergent preferences to different online communi-
ties across people of different patterns. Our work provides
valuable insights into the human activities under the multi-
community setting. More importantly, we uncover the in-
teresting similarity between the two spaces, and suggest a
promising research direction.
In the future, we plan to build upon our work mainly from
two aspects. First, we would like to quantify the "cost" of
users moving among communities, i.e. the "distance" in the
cyber space. Such a distance measurement would allow us
to apply more well-established frameworks for modelling
the physical movements to the online scenarios. Second, we
would like to study online communities by borrowing the
approaches developed for studying physical locations. Much
previous work discusses the characteristics of physical loca-
tions. It would be interesting to see if the locations in the
cyber space exhibit similar characteristics.
References
Barbosa-Filho, H.; Barthelemy, M.; Ghoshal, G.; James,
C. R.; Lenormand, M.; Louail, T.; Menezes, R.; Ramasco,
J. J.; Simini, F.; and Tomasini, M. 2017. Human mobility:
models and applications. arXiv preprint arXiv:1710.00004.
Castellano, C.; Fortunato, S.; and Loreto, V. 2009. Statisti-
cal physics of social dynamics. Reviews of modern physics
81(2):591.
Chan, J.; Hayes, C.; and Daly, E. M. 2010. Decompos-
ing discussion forums and boards using user roles. ICWSM
10:215–218.
Cheng, Z.; Caverlee, J.; Lee, K.; and Sui, D. Z. 2011. Ex-
ploring millions of footprints in location sharing services.
ICWSM 2011:81–88.
Cho, E.; Myers, S. A.; and Leskovec, J. 2011. Friendship
and mobility: user movement in location-based social net-
works. In Proceedings of the 17th ACM SIGKDD interna-
tional conference on Knowledge discovery and data mining,
1082–1090. ACM.
Cranshaw, J.; Toch, E.; Hong, J.; Kittur, A.; and Sadeh, N.
2010. Bridging the gap between physical location and on-
In Proceedings of the 12th ACM in-
line social networks.
ternational conference on Ubiquitous computing, 119–128.
ACM.
Danescu-Niculescu-Mizil, C.; West, R.;
Jurafsky, D.;
Leskovec, J.; and Potts, C. 2013. No country for old mem-
bers: User lifecycle and linguistic change in online commu-
nities. In Proceedings of the 22nd international conference
on World Wide Web, 307–318. ACM.
De Montjoye, Y.-A.; Hidalgo, C. A.; Verleysen, M.; and
Blondel, V. D. 2013. Unique in the crowd: The privacy
bounds of human mobility. Scientific reports 3:1376.
Gonzalez, M. C.; Hidalgo, C. A.; and Barabasi, A.-L. 2008.
Understanding individual human mobility patterns. Nature
453(7196):779–782.
Hamilton, W. L.; Zhang, J.; Danescu-Niculescu-Mizil, C.;
Jurafsky, D.; and Leskovec, J. 2017. Loyalty in online com-
munities. arXiv preprint arXiv:1703.03386.
Hessel, J.; Tan, C.; and Lee, L. 2016. Science, askscience,
and badscience: On the coexistence of highly related com-
munities. In ICWSM, 171–180.
Hu, T.-r.; Luo, J.-b.; Kautz, H.; and Sadilek, A. 2016. Home
location inference from sparse and noisy data: models and
applications. Frontiers of Information Technology & Elec-
tronic Engineering 17(5):389–402.
Hu, T.; Bigelow, E.; Luo, J.; and Kautz, H. 2017. Tales of
two cities: Using social media to understand idiosyncratic
lifestyles in distinctive metropolitan areas. IEEE Transac-
tions on Big Data 3(1):55–66.
Kraut, R. E.; Resnick, P.; Kiesler, S.; Burke, M.; Chen, Y.;
Kittur, N.; Konstan, J.; Ren, Y.; and Riedl, J. 2012. Build-
ing successful online communities: Evidence-based social
design. Mit Press.
Lee, D. D., and Seung, H. S. 1999. Learning the parts
of objects by non-negative matrix factorization. Nature
401(6755):788–791.
Lin, Z.; Salehi, N.; Yao, B.; Chen, Y.; and Bernstein, M. S.
2017. Better when it was smaller? community content and
behavior after massive growth. In ICWSM, 132–141.
Noulas, A.; Scellato, S.; Mascolo, C.; and Pontil, M. 2011.
An empirical study of geographic user activity patterns in
foursquare. ICWSM 11:70–573.
Pavalanathan, U.; Fitzpatrick, J.; Kiesling, S.; and Eisen-
stein, J. 2017. A multidimensional lexicon for interpersonal
In Proceedings of the 55th Annual Meeting
stancetaking.
of the Association for Computational Linguistics (Volume 1:
Long Papers), volume 1, 884–895.
Pavlick, E., and Tetreault, J. 2016. An empirical analysis
of formality in online communication. Transactions of the
Association for Computational Linguistics 4:61–74.
Ren, Y.; Kraut, R.; and Kiesler, S. 2007. Applying common
identity and bond theory to design of online communities.
Organization studies 28(3):377–408.
Rotman, D.; Golbeck, J.; and Preece, J. 2009. The com-
munity is where the rapport is–on sense and structure in the
youtube community. In Proceedings of the fourth interna-
tional conference on Communities and technologies, 41–50.
ACM.
Simini, F.; Gonz´alez, M. C.; Maritan, A.; and Barab´asi, A.-
L. 2012. A universal model for mobility and migration pat-
terns. Nature 484(7392):96–100.
Smith, G.; Wieser, R.; Goulding, J.; and Barrack, D. 2014.
A refined limit on the predictability of human mobility. In
Pervasive Computing and Communications (PerCom), 2014
IEEE International Conference on, 88–94. IEEE.
Song, C.; Koren, T.; Wang, P.; and Barab´asi, A.-L. 2010a.
Modelling the scaling properties of human mobility. Nature
Physics 6(10):818–823.
Song, C.; Qu, Z.; Blumm, N.; and Barab´asi, A.-L. 2010b.
Science
Limits of predictability in human mobility.
327(5968):1018–1021.
Tan, C., and Lee, L.
2015. All who wander: On the
prevalence and characteristics of multi-community engage-
ment. In Proceedings of the 24th International Conference
on World Wide Web, 1056–1066. International World Wide
Web Conferences Steering Committee.
Tran, T., and Ostendorf, M. 2016. Characterizing the lan-
guage of online communities and its relation to community
reception. arXiv preprint arXiv:1609.04779.
Zhang, J.; Hamilton, W. L.; Danescu-Niculescu-Mizil, C.;
Jurafsky, D.; and Leskovec, J. 2017. Community iden-
tity and user engagement in a multi-community landscape.
arXiv preprint arXiv:1705.09665.
Zhang, A. X.; Culbertson, B.; and Paritosh, P. 2017. Charac-
terizing online discussion using coarse discourse sequences.
Zhu, H.; Kraut, R. E.; and Kittur, A. 2014. The impact of
membership overlap on the survival of online communities.
In Proceedings of the SIGCHI Conference on Human Fac-
tors in Computing Systems, 281–290. ACM.
|
1911.05464 | 1 | 1911 | 2019-11-04T17:19:39 | Mining urban lifestyles: urban computing, human behavior and recommender systems | [
"cs.SI",
"cs.CY",
"cs.LG",
"stat.ML"
] | In the last decade, the digital age has sharply redefined the way we study human behavior. With the advancement of data storage and sensing technologies, electronic records now encompass a diverse spectrum of human activity, ranging from location data, phone and email communication to Twitter activity and open-source contributions on Wikipedia and OpenStreetMap. In particular, the study of the shopping and mobility patterns of individual consumers has the potential to give deeper insight into the lifestyles and infrastructure of the region. Credit card records (CCRs) provide detailed insight into purchase behavior and have been found to have inherent regularity in consumer shopping patterns; call detail records (CDRs) present new opportunities to understand human mobility, analyze wealth, and model social network dynamics. In this chapter, we jointly model the lifestyles of individuals, a more challenging problem with higher variability when compared to the aggregated behavior of city regions. Using collective matrix factorization, we propose a unified dual view of lifestyles. Understanding these lifestyles will not only inform commercial opportunities, but also help policymakers and nonprofit organizations understand the characteristics and needs of the entire region, as well as of the individuals within that region. The applications of this range from targeted advertisements and promotions to the diffusion of digital financial services among low-income groups. | cs.SI | cs |
Mining urban lifestyles: urban computing, human
behavior and recommender systems
Sharon Xu1, Riccardo Di Clemente2,3, and Marta C. Gonz´alez4,5*
1Department of Civil and Environmental Engineering, Massachusetts Institute of Technology, Cambridge, MA
02139, USA
2Centre for Advanced Spatial Analysis, University College London, London WC1E 6BT, GBR
3Department of Computer Science, University of Exeter, Exeter EX4 4PY, GBR
4Department of City and Regional Planning, UC Berkeley, 406 Wurster Hall, Berkeley, 94720, USA
3Lawrence Berkeley National Laboratory, Cyclotron Road, Berkeley, 94720, USA
*[email protected]
This is a postprint of the 5th chapter published in the book Big Data Recommender Systems - Volume 2: Application
Paradigms and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at
the IET Digital Library DOI: 10.1049/PBPC035G_ch5
In the last decade, the digital age has sharply redefined the way we study human behavior. With the advancement of
data storage and sensing technologies, electronic records now encompass a diverse spectrum of human activity, ranging from
location data1, 2, phone3, 4 and email communication5 to Twitter activity6 and open-source contributions on Wikipedia and
OpenStreetMap7, 8. In particular, the study of the shopping and mobility patterns of individual consumers has the potential to
give deeper insight into the lifestyles and infrastructure of the region. Credit card records (CCRs) provide detailed insight into
purchase behavior and have been found to have inherent regularity in consumer shopping patterns9; call detail records (CDRs)
present new opportunities to understand human mobility10, analyze wealth11, and model social network dynamics12.
Regarding the analysis of CDR data, there exists a wide body of work characterizing human mobility patterns. As a notable
example,10 describes the temporal and spatial regularity of human trajectories, showing that each individual can be described
by a time independent travel distance and a high probability of returning to a small number of locations. Further, the authors
are able to model individual travel patterns using a single spatial probability distribution. There has also been work at the
intersection of similar datasets, such as the inference of friendships from mobile phone data13, or the analysis such data in
relation to metrics on spending behavior such as diversity, engagement, and loyalty14. Recent work15 uses the Jaccard distance
as a similarity measure on motifs among spending categories, then applies community detection algorithms to find clusters of
users. These studies propose models for either mobility or spending behavior, but not in conjunction.
The only known paper that incorporates both aspects16 frames its analysis only on an aggregate scale of city regions.
However, the coupled collaborative filtering methods (also known as collective matrix factorization) used in16 have been
successfully applied in a variety of urban computing applications for data fusion and prediction17 -- 19, from location-based
activity recommendations20, 21 to travel speed estimation on road segments22. Recent work includes methods that use Laplacian
regularization23 to leverage social network information, and use geometric deep learning matrix completion methods to model
nonlinearities24.
In this chapter, we jointly model the lifestyles of individuals, a more challenging problem with higher variability when
compared to the aggregated behavior of city regions. Using collective matrix factorization, we propose a unified dual view
of lifestyles. Understanding these lifestyles will not only inform commercial opportunities, but also help policymakers and
nonprofit organizations understand the characteristics and needs of the entire region, as well as of the individuals within that
region. The applications of this range from targeted advertisements and promotions to the diffusion of digital financial services
among low-income groups.
Mining Shopping and Mobility Patterns
Location and transactional data offer valuable perspectives on the lifestyles of each user. For example, we may expect the
shopping purchases of middle-aged parents to include groceries and fuel, while their mobility patterns may center around locali-
ties near home and work locations, in addition to points of interest such as supermarket, laundry, and so on. We use mobility
information to aid in the prediction of shopping behavior, connecting the two views using collective matrix factorization25. In
1
this way, we discover representative patterns relating shopping and mobility, characterizing behavior for a richer understanding
into urban lifestyles and improved prediction of behavior.
The high granularity of such digital records allows modeling at the level of the individual, providing a new framework in
which to relate movement and spending. However, in using CDR data for data on individuals, we must deal with issues of
sparsity and lack of contextual information on the user's activities. In proposing this dual view of lifestyles, our contributions
can be summarised as follows:
Prediction of Shopping Behavior with Data Sparsity
There are many individuals for which we have no CDR data. To deal with this data sparsity issue, we construct a framework that
uses mobility patterns as supplementary information in the prediction of shopping behavior. We connect the two perspectives
on lifestyles using collective matrix factorization (collective matrix factorization). In comparison to modeling only shopping
behavior, we find that incorporating mobility information in the prediction of shopping lifestyles leads to a significant reduction
in root mean square error (RMSE).
Adding Contextual Information to Location Data
We transform mobility data using external data sources to better relate CCR to CDR Data. Although CCRs provide high
granularity at the level of the individual user, spatial granularity can range from a radius of 200 - 1000 meters, and there is no
contextual information for the user's activities within that region. Thus, there has been little previous work leveraging CCR
data for prediction with CDR data.
Multi-Perspective Lifestyles
We describe the mappings between shopping and mobility patterns, connecting the two views to provide a novel understanding
of consumer behavior in urban regions.
Data
The primary datasets used in this chapter consist of two sets of anonymised data for residents in Mexico throughout five months
in 2015:
• Call detail records (CDRs). CDRs are produced with each telephone exchange, These kocation records give the nearest
cellular tower at the time of a placed call. There are 1192 cell towers throughout Mexico City -- as users tend to visit a
small subset of these towers, this mobility data is extremely sparse. In a count matrix denoting user visits to towers, 98%
of entries indicate zero visits.
• Credit card records (CCRS). CCRs are recorded with each purchase and denote the purchase category, or Merchant
Category Code (MCC), of the transaction as well as the amount spent. Each month, we have on the order of 10 million
financial transactions and 200 million location records.
Discovering Shopping Patterns
Our spending habits reflect our lifestyles, capturing an essential aspect of our behavior. Within the computational social science
community, the question remains whether pervasive trends exist among disparate groups at urban scale15. In this chapter, we
use latent Dirichlet allocation (LDA)26 to identify topics (behavioral patterns) among individuals, representing each individual's
spending lifestyle as a finite mixture of an underlying set of behaviors. Each behavioral pattern, in turn, is modeled as a mixture
of a set of words (Merchant Category Codes, or MCCs). These topics are determined by co-occurrences of words within a
document. For example, in an article database, we may uncover a topic containing the words "data", "processing", "computer",
and so on because these words frequently appear in an article together.
By putting a Dirichlet prior on the per-user behavior distribution and per-behavior MCC distribution, LDA controls the sparsity
of the number of topics per document (the number of behaviors per individual), as well as the number of words per topic (the
number of MCCs per behavioral pattern). In this way, each individual is represented by a small number of behaviors, and each
behavior involves making a small set of purchase categories with high frequency.
As a generative model, LDA allows us to calculate the probabilities (assignments to shopping behaviors) of previously unseen
users. We train the model on 40% of the users, and generate the matrix S for the remaining 60%. In so doing, we set up the
prediction of lifestyles for unseen users, assessing the LDA model itself in addition to the relation of shopping with mobility
patterns. We experiment with the choice of number of behaviors to learn, as well as adding a categorical variable describing
amount spent to each MCC. To maximise interpretability, we choose five topics while using MCCs as input only.
2/8
Figure 1. Our framework
In Fig. 2 we plot the twenty most highly weighted MCCs of the five shopping behaviors. The first shopping behavior describes
credit card usage that is centered on food-related purchases such as Grocery Stores, Misc. Food Stores and Restaurants. The
second shopping behavior seems to be associated primarily with business purchases, with spending within MCCs such as Fax
Services and Financial Institutions. The third shopping behavior is dominated by relative "luxuries" such as purchases in the
Cable and Department Store categories, and is characterised by a relatively high proportion of Air Travel and Hotel Lodging
MCCs. The fourth shopping behavior contains primarily purchases in Computer Network Services and Service Stations (gas
stations). The third and fourth shopping behavior describe a slightly wealthier portion of the population, as only 35% of
Mexicans owned a computer in 201027, and only 44.2% own a car28. Lastly, the fifth shopping behavior captures purchase
primarily for toll fees and subscription services.
Mobility Pattern Extraction
Extracting Cellular Tower Location Types
Within the CDR data, each tower is the site for a corresponding cell within the Voronoi diagram; i.e., it is the closest tower to
any point within this cell. We define a "visit" to a cellular tower as a call placed within its corresponding cell. In order to relate
cellular towers to spending behavior, for each tower we crawl Google's API for points of interest within a certain radius. To
determine this radius, we use Delaunay triangulation, a widely used method in computational geometry. Delaunay triangulation
gives the dual graph to the Voronoi diagram, maximizing the minimum angle among all the triangles within the triangulation,
and connecting the sites in a nearest-neighbor fashion29. For each tower, we set the crawling radius to be half the average
distance from the site to its neighbors.
3/8
Figure 2. The top weighted purchase categories of the five shopping behaviors learned from LDA.
Treating each of the Voronoi cells as a document and the POI categories as words, we use latent Dirichlet allocation to discover
underlying tower "classes" that will be more informative of shopping behavior. We remove from the vocabulary any POI
categories that occur with over 25% frequency. These removed categories are uninformative classifications such as "point of
interest" and "establishment". For purposes of interpretability, we learn the LDA model with twenty classes on the 1192 towers.
In Fig. 3, we show a subset of tower classes highly weighted within our final lifestyles (see Section 6), and the corresponding
points of interest with the highest probabilities. From the sample topics in Fig. 4, we see each tower class puts specific emphasis
on related points of interest, such as "hospital" and "doctor", "car rental" and "car repair", or "book store" and "library". In
this way, we cluster the towers in terms of nearby POI categories, obtaining contextual information more directly related to
shopping.
Baseline Methods
Before introducing our model, we present the results of several baseline methods, illustrating the challenges of incorporating
CDR data into the prediction of shopping patterns.
Regression on Average Amount Spent
Using the columns of the per tower count matrix W directly as features, we use regression with L1 regularization to predict
the average amount spent by the user per week. As we increase regularization we increase the test R-squared, but due to a
combination of sparsity and lack of signal achieve a maximum test R-squared of 0 as the coefficients shrink to 0.
Classification of Primary Shopping Behavior
For each user, we take as our outcome the highest weighted shopping behavior from the topic proportions learned from LDA.
This is the user's primary behavior. Again using the columns of W as our features, we employ a range of classifiers including
4/8
Figure 3. The top weighted POI categories of a subset of tower classes learned from LDA.
Figure 4. Sample topics from learned from LDA, treating each tower as a document and each POI as a word.
SVM and AdaBoost to predict primary behavior. We find that the best classifier achieves only 21.6% accuracy, when already
21.9% of users fall into a single class.
5/8
Characterizing Mobility Patterns
From the Voronoi diagram of the p cell tower locations, we construct a matrix W ∈ Rnxp where each entry wi j is the number of
days individual i visited tower j throughout five months. We weight these counts using TF-IDF, a common method for text
representation30. Using TF-IDF, we offset the tower counts by the frequency of the tower in the data, so that a user's visit to an
uncommonly visited tower is assigned a higher weight. We now have a matrix W ∈ Rnxp that characterises users in terms of
tower visits, and a matrix Cm ∈ Rpxd, where d is the chosen number of tower classes. We define our mobility pattern matrix
as M = W T , achieving a significant dimensionality reduction with M ∈ Rnxd. In this manner, we obtain a representation of
mobility more closely related to shopping behavior, as users are now characterised by their visits to tower classes defined by
POI categories.
Predicting Shopping Behavior
For many users, we have access to data on mobility patterns (M) but not shopping patterns (S). In this section, we describe our
methodology for incorporating mobility information in addition to shopping information for the matrix completion problem of
predicting the shopping behavior of unseen users.
Collective Matrix Factorization
We denote S as the matrix of behavior proportions obtained from latent Dirichlet allocation, and M as the matrix of weighted
visit frequencies to the different tower classes. Modeling each user's shopping and mobility behavior as two views of the same
lifestyle, we assume that S and M are generated from a matrix Ul containing the latent lifestyle information of each user.
s
S ≈ UlV T
M ≈ UlV T
m
Traditionally, the objective function under this model is represented as
L (Ul,Vs,Vm) = S−UlV T
s 2 +M −UlV T
m 2 + λ1Ul2 + λ2Vs2 + λ3Vm2
In this chapter, we use group-wise sparse collective matrix factorization31, which puts group-sparse priors following N (0,σ 2
k )
on the columns of matrices Vs and Vm, where the columns are the groups indexed by k and σ 2
k is small. This allows the matrix
to learn private factors for the relation between latent lifestyles (Ul) and the shopping aspect (Vs), and correspondingly between
latent lifestyles (Ul) and the mobility aspect (Vm). More specifically, if the kth column of Vm is null, then the kth factor impacts
only the shopping pattern matrix S.
Results
Prediction
In our problem, credit card data is unknown for many users, but we would like to use mobility information to predict their
shopping behavior; i.e., S contains many empty rows. Thus, to test the performance within this setting, we remove rows from
the shopping behavior S to predict the shopping behavior of users for which we have no credit card information. We use 10-fold
cross validation and compare our collective matrix factorization predictions with the actual values. We use the popular metric
root mean square error (RMSE) to evaluate our model.
(cid:115) 1
T ∑
i, j
RMSE =
(Si, j − Si, j)2
Using cross-validation to determine the rank (number of lifestyles), we find that the inclusion of mobility data leads to a
1.3% decrease in RMSE and obtain a test error of 21.6%.
Dual Lifestyles
Using collective matrix factorization, we also obtain both the dual shopping and mobility views of these latent lifestyles, in Vs
and Vm respectively.
Lifestyle 1 is connected with wealthier shopping behavior typical common to urban white collars. The top weighted shopping
patterns indicate spending on cable, air travel, hotels and at department stores as well as gas stations and computer network
services (Fig. 2: behaviors 3 and 4, respectively). This suggests that people who can afford to spend on relative luxuries tend to
6/8
have vehicles and thus higher mobility, visiting a wider range of tower classes. The mobility patterns of this lifestyle focus on
areas with points of interest such as universities, accounting, electronics, bakeries and car repair (Fig. 3: tower classes 6, 7, 12,
17 and 20).
Lifestyle 2 is extremely food-oriented, with high weight on shopping behavior 1. Mobility patterns suggest visits to cafes,
gyms and convenience stores.
Lifestyle 3 primarily captures the transportation aspect of lifestyles. Top weighted mobility patterns indicate visits to areas
with car rental and car repair (tower classes 10 and 12), while shopping patterns include gas stations in behavior 4 and food in
behavior 1.
Discussion
In this study, we relate the shopping and mobility patterns of consumers on an individual level for the first time. Viewing these
as aspects of the same underlying lifestyle, we set up a framework to incorporate CDR data in the prediction of shopping
patterns for unseen users. We achieve a significant increase in prediction and recover interesting relationships between shopping
and mobility.
There are many directions for future work. In terms of modeling formulation, it would be interesting to introduce a temporal
dimension into the task of shopping prediction, as human behavior and needs vary over time. There is also the opportunity to
include social regularization in the collective matrix factorization formulation, constraining each user to be similar to his or her
neighborhood. In addition, stronger prediction methods may be achieved by modeling nonlinear relationships using geometric
deep learning methods described by24.
Acknowledgements
We thank Grandata for supplying the data. (For contractual and privacy reasons, the raw data cannot be provided.)
References
1. Song, C., Qu, Z., Blumm, N. & Barabási, A. L. Limits of predictability in human mobility. Science 327, 1018 -- 1021, DOI:
10.1126/science.1177170 (2010).
2. Hasan, S., Schneider, C. M., Ukkusuri, S. V. & González, M. C. Spatiotemporal Patterns of Urban Human Mobility. J.
Stat. Phys. 151, 304 -- 318, DOI: 10.1007/s10955-012-0645-0 (2013).
3. Jo, H.-H., Karsai, M., Kertész, J. & Kaski, K. Circadian pattern and burstiness in mobile phone communication. New J.
Phys. 14, 013055xw, DOI: 10.1088/1367-2630/14/1/013055 (2012).
4. Aledavood, T. et al. Daily rhythms in mobile telephone communication. PLoS ONE 10, e0138098, DOI: 10.1371/journal.
pone.0138098 (2015).
5. Malmgren, R. D., Stouffer, D. B., Motter, A. E. & Amaral, L. A. A Poissonian explanation for heavy tails in e-mail
communication. Proc. Natl. Acad. Sci. United States Am. 105, 18153 -- 18158, DOI: 10.1073/pnas.0800332105 (2008).
6. ten Thij, M., Bhulai, S. & Kampstra, P. Circadian patterns in twitter. Data Anal. 2014 12 -- 17 (2014).
7. Yasseri, T., Sumi, R. & Kertész, J. Circadian patterns of wikipedia editorial activity: A demographic analysis. PLoS ONE
7, e30091, DOI: 10.1371/journal.pone.0030091 (2012).
8. Yasseri, T., Quattrone, G. & Mashhadi, A. Temporal analysis of activity patterns of editors in collaborative mapping project
of openstreetmap. In Proceedings of the 9th International Symposium on Open Collaboration, WikiSym + OpenSym 2013,
13, DOI: 10.1145/2491055.2491068 (ACM, 2013).
9. Krumme, C., Llorente, A., Cebrian, M., Pentland, A. & Moro, E. The predictability of consumer visitation patterns. Sci.
Reports 3, DOI: 10.1038/srep01645 (2013).
10. González, M. C., Hidalgo, C. A. & Barabási, A. L. Understanding individual human mobility patterns (Nature (2008) 453,
(779-782)). Nature 458, 238, DOI: 10.1038/nature07850 (2009).
11. Blumenstock, J., Cadamuro, G. & On, R. Predicting poverty and wealth from mobile phone metadata. Science 350,
1073 -- 1076, DOI: 10.1126/science.aac4420 (2015).
7/8
12. Morse, S., Gonzalez, M. C. & Markuzon, N. Persistent cascades: Measuring fundamental communication structure in
social networks. Proc. - 2016 IEEE Int. Conf. on Big Data, Big Data 2016 969 -- 975, DOI: 10.1109/BigData.2016.7840695
(2016).
13. Eagle, N., Pentland, A. & Lazer, D. Inferring friendship network structure by using mobile phone data. Proc. Natl. Acad.
Sci. United States Am. 106, 15274 -- 15278, DOI: 10.1073/pnas.0900282106 (2009).
14. Singh, V. K., Freeman, L., Lepri, B. & Pentland, A. S. Predicting Spending Behavior Using Socio-mobile Features. In
2013 International Conference on Social Computing, SOCIALCOM '13, 174 -- 179, DOI: 10.1109/SocialCom.2013.33
(IEEE, Washington, DC, USA, 2013).
15. Di Clemente, R. et al. Sequences of purchases in credit card data reveal lifestyles in urban populations. Nat. Commun. 9,
DOI: 10.1038/s41467-018-05690-8 (2018).
16. Hu, T., Song, R., Wang, Y., Xie, X. & Luo, J. Mining shopping patterns for divergent urban regions by incorporating
mobility data. In International Conference on Information and Knowledge Management, Proceedings, vol. 24-28-Octo,
569 -- 578, DOI: 10.1145/2983323.2983803 (ACM, 2016).
17. Zheng, Y. Methodologies for Cross-Domain Data Fusion: An Overview. IEEE Transactions on Big Data 1, 16 -- 34, DOI:
10.1109/tbdata.2015.2465959 (2015).
18. Zheng, Y., Capra, L., Wolfson, O. & Yang, H. Urban computing: concepts, methodologies, and applications. ACM
Transactions on Intell. Syst. Technol. (TIST) 5, 38, DOI: 10.1145/2629592 (2014).
19. Zheng, Y. Trajectory data mining: An overview. ACM Transactions on Intell. Syst. Technol. 6, 29, DOI: 10.1145/2743025
(2015).
20. Zheng, V. W., Zheng, Y., Xie, X. & Yang, Q. Collaborative location and activity recommendations with GPS history data.
In Proceedings of the 19th International Conference on World Wide Web, WWW '10, 1029 -- 1038, DOI: 10.1145/1772690.
1772795 (ACM, 2010).
21. Zheng, V. W., Cao, B., Zheng, Y., Xie, X. & Yang, Q. Collaborative filtering meets mobile recommendation: A user-centered
approach. In Proceedings of the National Conference on Artificial Intelligence, vol. 1, 236 -- 241 (2010).
22. Shang, J., Zheng, Y., Tong, W., Chang, E. & Yu, Y.
Inferring gas consumption and pollution emission of vehicles
throughout a city. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining, 1027 -- 1036, DOI: 10.1145/2623330.2623653 (ACM, 2014).
23. Leng, C., Zhang, H., Cai, G., Cheng, I. & Basu, A. Graph regularized Lp smooth non-negative matrix factorization for data
representation. IEEE/CAA J. Autom. Sinica 6, 584 -- 595, DOI: 10.1109/JAS.2019.1911417 (2019).
24. Bronstein, M. M., Bruna, J., Lecun, Y., Szlam, A. & Vandergheynst, P. Geometric Deep Learning: Going beyond Euclidean
data. IEEE Signal Process. Mag. 34, 18 -- 42, DOI: 10.1109/MSP.2017.2693418 (2017).
25. Singh, A. P. & Gordon, G. J. Relational learning via collective matrix factorization. In Proceedings of the ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining, KDD '08, 650 -- 658, DOI: 10.1145/1401890.1401969
(ACM, New York, NY, USA, 2008).
26. Blei, D. M., Ng, A. Y. & Jordan, M. I. Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993 -- 1022, DOI: 10.1016/
b978-0-12-411519-4.00006-9 (2003).
27. Villagram, L. For most Mexicans, the digital age is still out of reach, vol. 16 (Dallas News, 2012).
28. Morales, S. E., Cosart, T. & Holben, W. E. Bacterial gene abundances as indicators of greenhouse gas emission in soils.
The ISME J. 4, 799 -- 808, DOI: 10.1038/ismej.2010.8 (2010).
29. Aurenhammer, F. Voronoi diagrams -- a survey of a fundamental geometric data structure. ACM Comput. Surv. (CSUR) 23,
345 -- 405, DOI: 10.1145/116873.116880 (1991).
30. Zhang, W., Yoshida, T. & Tang, X. A comparative study of TF*IDF, LSI and multi-words for text classification. Expert.
Syst. with Appl. 38, 2758 -- 2765, DOI: 10.1016/j.eswa.2010.08.066 (2011).
31. Klami, A., Bouchard, G. & Tripathi, A. Group-sparse embeddings in collective matrix factorization. 2nd Int. Conf. on
Learn. Represent. ICLR 2014 - Conf. Track Proc. (2014). 1312.5921.
8/8
|
1503.00322 | 2 | 1503 | 2015-12-11T12:50:57 | Seeded PageRank Solution Paths | [
"cs.SI"
] | We study the behavior of network diffusions based on the PageRank random walk from a set of seed nodes. These diffusions are known to reveal small, localized clusters (or communities) and also large macro-scale clusters by varying a parameter that has a dual-interpretation as an accuracy bound and as a regularization level. We propose a new method that quickly approximates the result of the diffusion for all values of this parameter. Our method efficiently generates an approximate $\textit{solution path}$ or $\textit{regularization path}$ associated with a PageRank diffusion, and it reveals cluster structures at multiple size-scales between small and large. We formally prove a runtime bound on this method that is independent of the size of the network, and we investigate multiple optimizations to our method that can be more practical in some settings. We demonstrate that these methods identify refined clustering structure on a number of real-world networks with up to 2 billion edges. | cs.SI | cs |
1
Seeded PageRank Solution Paths
D. F. Gleich 1, and K. Kloster 2
1 Department of Computer Science, Purdue University, West Lafayette IN, USA
2 Department of Mathematics, Purdue University, West Lafayette IN, USA
email: [email protected]
email: [email protected]
We study the behavior of network diffusions based on the PageRank random walk from a set
of seed nodes. These diffusions are known to reveal small, localized clusters (or communities)
and also large macro-scale clusters by varying a parameter that has a dual-interpretation
as an accuracy bound and as a regularization level. We propose a new method that quickly
approximates the result of the diffusion for all values of this parameter. Our method
efficiently generates an approximate solution path or regularization path associated with a
PageRank diffusion, and it reveals cluster structures at multiple size-scales between small
and large. We formally prove a runtime bound on this method that is independent of the
size of the network, and we investigate multiple optimizations to our method that can
be more practical in some settings. We demonstrate that these methods identify refined
clustering structure on a number of real-world networks with up to 2 billion edges.
Key Words: 05C81 Random walks on graphs; 05C50 Graphs and linear algebra (matrices,
eigenvalues, etc.); 90C35 Programming involving graphs or networks; 91D30 Social networks;
05C82 Small world graphs, complex networks
1 Introduction
Networks describing complex technological and social systems display many types of
structure. One of the most important types of structure is clustering because it reveals the
modules of technological systems and communities within social systems. A tremendous
number of methods and objectives have been proposed for this task (survey articles
include refs. [26, 30]). The vast majority of these methods seek large regions of the graph
that display evidence of local structure. For the case of modularity clustering, methods
seek statistically anomalous regions; for the case of conductance clustering, methods seek
dense regions that are weakly connected to the rest of the graph. All of the objective
functions designed for these clustering approaches implicitly or explicitly navigate a
trade-off between cluster size and the underlying clustering signal. For example, large
sets tend to be more anomalous than small sets. Note that these trade-offs are essential
to multi-objective optimization, and the choices in the majority of methods are natural.
Nevertheless, directly optimizing the objective makes it difficult to study these structures
2
D. F. Gleich and K. Kloster
as they vary in size from small to large because of these implicit or explicit biases. This
intermediate regime represents the meso-scale structure of the network.
In this manuscript, we seek to study structures in this meso-scale regime by analyzing
the behavior of seeded graph diffusions. Seeded graph diffusions model the behavior of a
quantity of "dye" that is continuously injected at a small set of vertices called the seeds
and distributed along the edges of the graph. These seeded diffusions can reveal multi-scale
features of a graph through their dynamics. The class we study can be represented in
terms of a column-stochastic distribution operator P:
x =(cid:80)∞
k=0 γkPs
where γk are a set of diffusion coefficients that reflect the behavior of the dye k steps
away from the seed, and s is a sparse, stochastic vector representing the seed nodes. More
specifically, we study the PageRank diffusions
x =(cid:80)∞
k=0(1 − α)αkPs.
The PageRank diffusion is equivalent to the stationary distribution of a random walk
that (i) with probability α, follows an edge in the graph and (ii) with probability (1 − α)
jumps back to a seed vertex (see Section 2 more detail on this connection).
PageRank itself has been used for a broad range of applications including data mining,
machine learning, biology, chemistry, and neuroscience; see our recent survey [11]. Among
all the uses of PageRank, the seeded variation is frequently used to localize the PageRank
vector within a subset of the network; this is also known as personalized PageRank
due to its origins on the web, or localized PageRank because of its behavior.(We will
use these terms: seeded PageRank, personalized PageRank, and localized PageRank
interchangeably and use the standard acronym PPR to refer to them.) Perhaps the most
important justification for this use is presented in [2], where the authors determined a
relationship between seeded PageRank vectors and low-conductance sets that allowed
them to create a type of graph partitioning method that does not need to see the entire
graph. Their PageRank-based clustering method, called the push method, has been used
for a number of important insights into communities in large social and information
networks [17, 21].
Our focus is a novel application of this push method for meso-scale structural analysis
of networks. Push, which we'll describe formally in Section 3, depends on an accuracy
parameter ε. As we vary ε, the result of the push method for approximating the PageRank
diffusion reveals different structures of the network. We illustrate three PageRank vectors
as we vary ε for Newman's network science collaboration graph [25] in Figure 1. There, we
see that the solution vectors for PageRank that result from push have only a few non-zeros
for large values of ε. (Aside: There is a subtle inaccuracy in this statement. As we shall
see shortly, we actually are describing degree normalized PageRank values. This difference
does not affect the non-zero components or the intuition behind the discussion.) This is
interesting because an accurate PageRank vector is mathematically non-zero everywhere
in the graph. Push, with large values of ε, then produces sparse approximations to the
PageRank vector. This connection is formal, and the parameter ε has a dual interpretation
as a sparsity regularization parameter [12] (reviewed in Section 3.2).
The solution path or regularization path for a parameter is the set of trajectories that
3
(a) ε = 10−2
(b) ε = 10−3
(c) ε = 10−4
Figure 1. Nodes colored by their degree-normalized PageRank values as ε varies: dark
red is large, yellow is small. The hidden nodes are mathematically zero. As ε decreases,
more nodes become non-zero.
the components of the solution trace out as the parameter varies [9]. We present new
algorithms based on the push procedure that allow us to approximate the solution path
trajectories as a function of ε. We use our solution path approximation to explore the
properties of graphs at many size-scales in Section 4. In our technical description, we
show that the solution path remains localized in the graph (Theorem 5.1). Experiments
show that it runs on real-world networks with millions of nodes in less than a second
(Section 6).
The push method has become a frequently-used graph mining primitive because of the
sparsity of the vectors that result from when push is used to approximate the seeded
PageRank diffusion, along with the speed at which they can be computed. The method
is typically used to identify sets of low-conductance in a graph as part of a community
or cluster analysis [10, 13, 14, 17, 21, 28]. In these cases, the insights provided by the
solution paths are unlikely to be necessary. Rather, what is needed is a faster way to
compute these diffusions for many values of ε. We describe a data structure called a shelf
that we demonstrate can use 40 times as many values of ε in only 7 times the runtime
(Section 6.3).
We plan to make our computational codes available in the spirit of reproducible research.
2 Technical Preliminaries
We first fix our notation and review the Andersen-Chung-Lang procedure, which forms
the basis for many of our contributions. We denote a graph by G = (V, E), where V is
the set of nodes and E the set of edges. All graphs we consider are simple, connected,
and undirected. Let G have n = V nodes and fix a labeling of the graph nodes using
the numbers 1, 2, . . . , n. We refer to a node by its label. For each node j we denote its
degree by dj.
The adjacency matrix of the graph G, which we denote by A, is the n × n matrix
having Ai,j = 1 if nodes i and j are connected by an edge, and 0 otherwise. Since G is
simple and undirected, A is symmetric with 0s on the diagonal. The matrix D denotes the
diagonal matrix with entry (i, i) equal to the degree of node i, di. Since G is connected,
D is invertible, and we can define the random walk transition matrix P := AD−1.
4
D. F. Gleich and K. Kloster
We denote by ej the standard basis vector of appropriate dimensions with a 1 in entry
j, and by e the vector of all 1s. In general, we use subscripts on matrices and vectors to
denote entries, e.g. Ai,j is entry (i, j) of matrix A; the notation for standard basis vectors,
ej, is an exception. Superscripts refer to vectors in a sequence of vectors, e.g. x(k) is the
kth vector in a sequence.
For any set of nodes, S ⊆ V , we define the volume of S to be the sum of the degrees of
j∈S dj. Next, define the boundary of S ⊆ V to be the
set of edges that have one endpoint inside S and the other endpoint outside S, denoted
∂(S). Finally, the conductance of S, denoted φ(S), is defined by
the nodes in S, denoted vol(S) =(cid:80)
φ(S) :=
∂(S)
min{vol(S), vol(V − S)} .
Conductance can be thought of as measuring the extent to which a set is more connected
to itself than the rest of the graph and is one of the most commonly used community
detection objectives [26].
2.1 PageRank and Andersen-Chung-Lang Method
The Andersen-Chung-Lang method uses PageRank vectors to identify a set of small
conductance focused around a small set of starting nodes [2]. We call such starting nodes
seed sets and the resulting communities, local communities. We now briefly review this
method starting with PageRank.
For a stochastic matrix P, a stochastic vector v, and a parameter α ∈ (0, 1) we define
the PageRank diffusion as the solution x to the linear system
(I − αP)x = (1 − α)v.
(2.1)
Note that when α ∈ (0, 1) the system in (2.1) can be solved via a Neumann series
expansion, and so the solution x to this linear system is equivalent to the PageRank
diffusion vector described in Section 1. When v = (1/S)eS, i.e. the indicator vector for
a seed set S, normalized to be stochastic, then we say the PageRank vector has been
seeded on the set S (or personalized on the set S).
Given PageRank diffusion scores x, the Andersen-Chung-Lang procedure uses the values
xj/dj to determine an order for a sweep-cut procedure (described below) that identifies a
set of good conductance. Thus, we would like to bound the error in approximating the
values xj/dj. Specifically (for their theory) we need our approximate solution x to satisfy
or equivalently,
(2.2)
x ≥ x, and (cid:107)D−1(x − x)(cid:107)∞ < ε.
0 ≤ xj − xj < εdj
Once a PPR diffusion x is computed to this accuracy, a near-optimal conductance set
located nearby the seed nodes is generated from the following a sweep cut procedure. Rank
the nodes in descending order by their scaled diffusion scores xj/dj , with large scores
ranking the highest. Denote the set of nodes ranked 1 through m by S(m). Iteratively
compute the conductance of the sets S(m) for m = 2, 3, . . . , until xm/dm = 0. Return
the set S(t) with the minimal conductance. This returned set is related to the optimal set
of minimum conductance nearby the seed set through a localized Cheeger inequality [2].
The value of ε relates to the possible size of the set.
5
3 The push procedure
The push procedure is an iterative algorithm to compute a PageRank vector to satisfy
the approximation (2.2). The distinguishing feature is that it can accomplish this goal
with a sparse solution vector, which it can usually generate without ever looking at the
entire graph or matrix. This procedure allows the Andersen-Chung-Lang procedure to
run without ever looking at the entire graph. As we discussed in the introduction, this
idea and method are at the heart of our contributions and so we present the method in
some depth.
At each step, push updates only a single coordinate of the approximate solution like
a coordinate relaxation method. We'll describe its behavior in terms of a general linear
system of equations. Let Mx = b be a square linear system with 1s on the diagonal,
i.e. Mi,i = 1 for all i. Consider an iterative approximation x(k) ≈ x after k steps. The
corresponding residual is r(k) = b − Mx(k). Let j be a row index where we want to
relax, i.e. locally solve, the equation, and let r be the residual value there, r = r(k)
.
We update the solution by adding r to the corresponding entry of the solution vector,
x(k+1) = x(k) + rej, in order to guarantee r(k+1)
= 0. The residual can be efficiently
updated in this case. Thus, the push method involves the operations:
j
j
x(k+1) = x(k) + rej
r(k+1) = r(k) − rMej.
(3.1)
Note that the iteration requires updating just one entry of x(k) and accessing only a
single column of the matrix M. It is this local update that enables push to solve the
seeded PageRank diffusion especially efficiently.
3.1 The Andersen-Chung-Lang Push Procedure for PageRank
The full algorithm for the push method applied to the PageRank linear system to compute
a solution that satifies (2.2) for a seed set S is:
1. Initialize x = 0, r = (1 − α)eS using sparse data structures such as a hash-table.
2. Add any coordinate i of r where ri ≥ εdi to a queue Q.
3. While Q is not empty
4.
5.
6.
7.
8.
9.
10.
Let j be the coordinate at the front of the queue and pop this element.
Set xj = xj + rj
Set δ = αrj/dj
Set rj = 0
For all neighbors u of node j
Set ru = ru + δ
If ru exceeds εdu after this change, add u to Q.
The queue maintains a list of all coordinates (or nodes) where the residual is larger than
εdj. We choose coordinates to relax from this queue. Then we execute the push procedure
to update the solution and residual. The residual update operates on only the nodes that
neighbor the updated coordinate j. Once elements in the residual exceed the threshold,
they are entered into the queue. We present the convergence theory for this method in
the description of our new algorithms (Section 5).
6
D. F. Gleich and K. Kloster
We have presented the push method so far from a linear solver perspective. To instead
view the method from a graph diffusion perspective, think of the solution vector as
tracking where "dye" has concentrated in the graph and the residual as tracking where
"dye" is still spreading. At each step of the method, we find a node with a sufficiently
large amount of dye left (Step 4), concentrate it at that node (Step 5), then update the
amount of dye that is left in the system as a result of concentrating this quantity of dye
(Lines 6-10). The name push comes from the pattern of concentrating dye and pushing
newly unprocessed dye to the adjacent residual entries.
Note that the value of ε plays a critical role in this method as it determines the entries
that enter the queue. When ε is large, only a small number of coordinates or nodes
will ever enter the queue. This will result in a sparse solution. As ε → 0, there will be
substantially more entries that enter the queue.
3.2 Implicit regularization from Push
To understand the sparsity that results from the push method, we introduce a slight
variation on the standard push procedure. Rather than using the full update xj + rj
and pushing αrj/dj to the adjacent residuals, we consider a method that takes a partial
update. The form we assume is that we will leave εdjρ "dye" remaining at node j. For
ρ = 0, this correspond to the push procedure described above. For ρ = 1, this update will
remove node j from the queue, but push as little mass as possible to the adjacent nodes
such that the dye at node j will remain below εdj. The change is just at steps 5-7:
5'.
6'.
7'.
Set xj = xj + (rj − εdjρ)
Set δ = α(rj − εdjρ)/dj
Set rj = εdjρ
In previous work [12, Theorem 3], we showed that ρ = 1 produces a solution vector x
that exactly solves a related 1-norm regularized optimization problem. The form of the
problem that x solves is most cleanly stated as a quadratic optimization problem in z, a
degree-based rescaling of the solution variable x:
minimize
subject to z ≥ 0
1
2
zT Qz − zT g + Cε(cid:107)Dz(cid:107)1
(3.2)
The terms of the normalization x vs. z and the equivalence Q, g, C are tedious to state
exactly and uninformative to our purposes in this work. The important point is that ε
can also be interpreted as a regularization parameter that governs the sparsity of the
solution vector x. Large values of ε increase the magnitude of the 1-norm regularizer and
thus cause the solutions to be sparser. Moreover, the resulting solutions are unique as the
above problem is strongly convex.
In this work, we seek algorithms to compute the solution paths or regularization paths
that result from trying to use all values of ε to fully study the behavior of the diffusion.
In the next section we explore some potential utilities of these paths before presenting
our algorithms for computing them in Section 5.
7
4 Personalized PageRank paths
In this section we aim to show the types of insights that our solution path methodology
can provide. We should remark that these are primarily designed for human interpretation.
Our vision is that they would be used by an analyst that was studying a network and
needed to better understand the "region" around a target node. These solution paths
would then be combined with something like a graph layout framework to study these
patterns in the graph. Thus, much of the analysis here will be qualitative. We demonstrate
quantative advantages to the path methodology in subsequent sections.
4.1 Exact paths and fast path approximations
The exact solution path for the seeded PageRank diffusion results from solving the
regularized optimization problem (3.2) itself for all values of ε. This could be accomplished
by using ideas similar to those used to compute solution paths for the Lasso regularizer [9].
Our algorithms and subsequent analysis evaluate approximate solution paths that result
from using our push-based algorithm with ρ = 0.9 (Section 5.2). In this section, we
compare these approximate paths to the exact paths. We find that, while the precise
numbers change, the qualitative properties are no different.
Figure 2 shows the results of such a comparison on Newman's netscience dataset (379
nodes, 914 edges [25]). Each curve or line in the plot represents the value of a non-zero
entry of an approximate PageRank vector xε as ε varies (horizontal axis). As ε approaches
0 (and 1/ε approaches ∞), each approximate PageRank entry approaches its exact value
in a monotonic manner. Alternatively, we can think of each line as the diffusion value of
a node as the diffusion process spreads across the graph.
One of the plots was computed by solving for the optimality conditions of (3.2); the
other plot was computed using the PPR path algorithm from Section 5.2. The values of ε
are automatically determined by the algorithm itself. The plots show that for the two sets
of paths have essentially identical qualitative features. For example, they reveal the same
bends and inflections in individual node trajectories, as well as large gaps in PageRank
values. The maximum difference between the two paths never exceeds 1.1 · 10−4.
These results were essentially unchanged for a variety of other sample diffusions we
considered, and so we decided that using ρ = 0.9 was an acceptable compromise between
speed and exactness. Thus, all path plots in this paper were created with ρ = 0.9, unless
noted otherwise. (For analysis of the differences of the exact paths and ρ-paths, and in
particular the behavior of the ρ-approximate paths as ρ varies, see Figure 7 below.)
4.2 The Seeded PageRank Solution Path Plot
We now wish to introduce a specific variation on the solution path plot that shows
helpful contextual information. In the course of computation, our solution path algorithm
identifies a small set of values of ε (somewhere between a few hundred to a few thousand)
where it satisfies the solution criteria (5.2). At these values, we perform a sweep-cut
procedure to identify the set of best conductance induced by the current solution. In the
solution path plot, we display the cut-point identified by this procedure as a thick black
line. All the nodes whose trajectories are above the dark black line at a particular value
8
D. F. Gleich and K. Kloster
Figure 2. (Left) The solution paths for a PageRank diffusion on Newman's netscience
dataset from a single seed node computed by exactly solving the regularized problem.
(Right) The approximate solution paths computed by our push-based solution path
algorithm with ρ = 0.9. Each line traces a value xj as ε varies. The maximum infinity-
norm distance between the two paths is 1.1 · 10−4, showing that ρ = 0.9 provides a
good qualitative approximation. Moreover, the two plots highlight identical qualitative
features-for example, the large gaps between paths, and the strange bend in the paths
near ε = 10−3. The coloring of the lines is based on the values at the smallest value of ε.
The values of ε used were generated by the approximate algorithm itself and we computed
the exact solution at these same values for comparision.
of ε are contained in the set of best conductance at that value of ε. This line allows us to
follow the trajectory of the minimum conductance set as we vary ε. Another property
of our algorithm is that the smallest possible non-zero diffusion value in the solution is
(1 − ρ)ε. Thus, we plot this as a thin, diagonal, black line that acts as a pseudo-origin for
all of the node trajectories. The vertical blue lines in the bottom left of the plot mark
the values of ε where we detect a significant new set of best conductance. Representative
conductance values are shown when there is room in the plot.
The solution path plot that corresponds to Figure 2 is shown in Figure 3. This plot
illustrates all of the features we discussed in this section.
4.3 Nested communities in netscience and Facebook
We now discuss some of the insights that arise from the solution path plot. In Figure 3,
we show the seeded PageRank solution path plot for around 21, 000 values of ε computed
via our algorithm for the network science collaboration network. This computation runs
in less than a second. Here, we see that large gaps in the degree normalized PageRank
vector indicate cutoffs for sets of good conductance. This behavior is known to occur
when sets of really good conductance emerge [1]. We can now see how they evolve and
how the procedure quickly jumps between them. In particular, the path plots reveal
multiple communities (good conductance sets) nested within one another through the
gaps between the trajectories.
9
Figure 3. An example of the seeded PageRank solution path plot on Newman's netscience
dataset. Each colored line represents the value of a single node as the diffusion progresses
from large ε to small ε. Because of our ρ-approximation to the true paths, the smallest
value any node obtains is (1 − ρ)ε and we plot this as a dark diagonal line. The thick
black line traces out the boundary of the set of best conductance found at each distinct
value of ε as determined by a sweep-cut procedure. The blue lines indicate significant
changes to the set of minimum conductance, and they are labelled with the conductance
value. The coloring of the trajectory lines is based on the values at the smallest value of
ε. We discuss implications of the plot in Section 4.3.
On a crawl of a Facebook network from 2009 where edges between nodes correspond
to observed interactions [29] (see Table 1, fb-one, for the statistics), we are able to find
a large, low conductance set using our solution path method. (Again, this takes about
a second of computation.) Pictured in Figure 4, this diffusion shows no sharp drops in
the PageRank values like in the network science data, yet we still find good conductance
cuts. Note the few stray "orange" nodes in the sea of yellow. These nodes quickly grow
in PageRank and break into the set of smallest conductance. Finding these nodes is
likely to be important to understand the boundaries of communities in social networks;
these trajectories could also indicate anomalous nodes. Furthermore, this example also
shows evidence of multiple nested communities. These are illustrated with the manual
annotations A, B, C.
4.4 Core and periphery structure in the US Senate
The authors in [17] analyzed voting patterns across the first 110 US-Senates by comparing
senators in particular terms. We form a graph from this US Senate data where each
senator is represented by a single node. For each term of the senate, we connect senators
in that session to their 3 nearest neighbors measured by voting similarities. This graph
10
D. F. Gleich and K. Kloster
Figure 4. The seeded PageRank solution path for a crawl of observed Facebook network
activity for one year (fb-one from Table 1) shows large, good cuts do not need to have
large drops in the PageRank values. Nodes enter the solution and then quickly break
into the best conductance set, showing that the frontier of the diffusion should be an
interesting set in this graph. Furthermore, this path plot shows evidence of multiple
nested communities (A, B, and C), which were manually annotated. The set A is only
a few nodes, but has a small conductance score of 0.11; set B grows and improves this
to a conductance of 0.1, and finally set C achieves a conductance of 0.07, which is an
unusually small conductance value in a large social network.
has a substantial temporal structure as a senator from 100 years ago cannot have any
direct links to a senator serving 10 years ago. We show how our solution paths display
markedly different characteristics when seeded on a node near the core of the network
compared with a node near the periphery. This example is especially interesting because
both diffusions lead to on closely related cuts.
Figure 5 displays solution paths seeded on a senator on the periphery of the network
(top right) and a senator connected to the core of the network (top left). Here are some
qualitative insights from the solution path plots. The peripheral seed is a senator who
served a single term; the diffusion spreads across the graph slowly because the seed is
poorly connected to the network outside the seed senator's own senate term. As the
diffusion spreads outside the seed's particular term, the paths identify multiple nested
communities that essentially reflect previous and successive terms of the Senate. In
contrast, the core node is a senator who served eight terms. The core node's paths skip
over such smaller-scale community structures (i.e. individual senate terms) as the diffusion
spreads to each of those terms nearly simultaneously. Instead, the paths of the core node
identify only one good cut: the cut separating all of the seed's terms from the remainder
of the network.
This example demonstrates the paths' potential ability to shed light on a seed's
11
(a) Core seed
(b) Periphery seed
(c) Core, ε = 3 · 10−4
(d) Core, ε = 10−4
(e) Core, ε = 3 · 10−5
(f) Periphery, ε = 3 · 10−4
(g) Periphery, ε = 10−4
(h) Periphery, ε = 3 · 10−5
Figure 5. (Top.) The solution paths on the US-Senate graph for a senator in the core
(who served multiple terms and is centrally located in a graph layout) and for a senator
in the periphery (who served a single term and is located on the boundary of the graph
layout). (Bottom.) The diffusions for each of these senators are shown as heat-plots on the
graph layout. Red indicates nodes with the largest values and yellow the smallest. The
seed nodes are circled in these layouts. The solution paths for a peripheral node indicate
multiple nested communities, visible in the images of the diffusion on the whole graph
and marked A, B, C, D, E. These sets are strongly correlated with successive terms of the
Senate. In contrast, the core node diffusion only indicates one good cut. For the core node,
we can see the diffusion essentially spreads across multiple dense regions simultaneously,
without settling in one easily separated region until ε is small enough that the diffusion
has spread to the entire left side of the graph. The sets A and F are also almost the same.
12
D. F. Gleich and K. Kloster
relationship to the network's core and periphery, as well as the seed's relationship to
many communities.
4.5 Cluster boundaries in handwritten digit graphs
Finally, we use the solution paths to study the behavior of a diffusion for a semi-supervised
learning task. The USPS hand-written digits dataset consists of roughly 10,000 images of
the digits 0 through 9 in human hand-writing [32]. Each digit appears in roughly 1,000
of the images, and each image is labelled accordingly. From this data we construct a
3-nearest-neighbors graph, and carry out our analysis as follows. Pick one digit, and select
4 seed nodes uniformly at random from the set of nodes labelled with this digit. Then
compute the PageRank solution paths from these seeds. Figure 6 shows the path plots
with labels (right) and without (left). In the labelled plot, the correct labels are red and
the incorrect labels are green.
We can use the best conductance set determined by the PPR vector to capture a
number of other nodes sharing the seeds' label. However, this straight-forward usage of
a PageRank vector results in a number of false positives. Figure 6 (right) shows that a
number of nodes with incorrect labels are included in the set of best conductance (curves
that are not colored red do not share the seed's label).
Looking at the solution-paths for this PageRank vector (Figure 6, left) we can see that
a number of these false positives can be identified as the erratic lighter-orange paths
cutting across the red paths. Furthermore, the solution paths display earlier sets of best
conductance (left of the black spikes near ε = 10−3) that would cut out almost all false
positives. This demonstrates that the solution paths can be used to identify "stable" sets
of best conductance that are likely to yield higher precision labeling results. Consequently,
these results hint that a smaller, but more precise, set lurks inside of the set of best
conductance. This information would be valuable when determining additional labels or
trying to study new data that is not as well characterized as the USPS digits dataset.
4.6 Discussion
Overall, these seeded PageRank solution path plots reveal information about the clusters
and sets near the seeds. Some of the features we've seen include nested community structure
and core-periphery structure. They all provide refined information about the boundary of a
community containing the seed, and suggest nodes with seemingly anomalous connections
to the seed. For instance, some nodes enter the diffusion early but have only a slow-growing
value indicating a weak connection to the seed; other nodes are delayed in entering the
diffusion but quickly grow in magnitude and end up being significant members of the
cluster. Each of these features offers refined insights over the standard single-shot diffusion
computation.
Here we present two novel algorithms for analyzing a PPR diffusion across a variety
of accuracy parameter settings by computing the diffusion only a single time. Our first
5 Algorithms
13
Figure 6. Seeded PageRank solution path plots for diffusions in the USPS digit dataset.
The seeds are chosen to be images of handwritten digits with the same label. (At left.)
The solution paths reveal a number of anomalous node trajectories near the set of best
conductance. Nodes entering the set of best conductance after the black line erratically
oscillates are most likely to be false positives near the boundary. (At right.) Here, we
have colored the solution path lines based on the true-class label. Red shows a correct
label and green shows an incorrect label.
algorithm (Section 5.2) computes the best-conductance set from the ρ-approximate
solution paths described in Section 3.2. This effectively finds the best-conductance set
from PPR diffusions for every accuracy satisfied in an interval [εmin, εmax], where εmin
min(1− α)−2(1− ρ)−2),
and εmax are inputs. We prove the total runtime is bounded by O(ε−2
though we believe improvements can be made to this bound. In addition to identifying
the best-conductance set taken from the different approximations, the algorithm enables
us to study the solution paths of PageRank, i.e. how the PPR diffusion scores change as
the diffusion's accuracy varies. Hence, we call this method ppr-path.
We describe a second algorithm optimized for speed (Section 5.3) in finding sets
of low conductance, as the exhaustive nature of our first method generates too much
intermediate data for stricter values of ε. Instead of computing the full solution paths, the
second method searches for good-conductance sets over an approximate solution for each
accuracy parameter taken from a grid of parameter values. The spacing of the accuracy
parameters values on the grid is an additional input parameter. For this reason, we call
the algorithm ppr-grid. For a log-spaced grid of values ε0 > ε1 > ··· > εN , we locate the
best-conductance set taken from a sweep over each εk-approximation. The work required
N (1 − α)−1); we show this yields a constant
to compute the diffusions is bounded by O(ε−1
factor speedup over the practice of computing each diffusion separately. However, our
method requires the same amount of work for performing the sweeps over each different
diffusion.
We begin by describing a modification to the PageRank linear system that will simplify
our notation and the exposition of our algorithm.
14
D. F. Gleich and K. Kloster
5.1 A modified PageRank linear system for the push procedure
Recall that the goal is to solve the PageRank linear system (2.1) to the accuracy condi-
tion (2.2) and then sort by the elements xj/dj. If we multiply Equation (2.1) by D−1,
then after some manipulation we obtain
(I − αPT )D−1x = (1 − α)D−1v.
Note this transformation relies on A being symmetric so that PT = (AD−1)T = D−1A =
D−1PD. To avoid writing D−1 repeatedly, we make the change of variables y = (1/(1 −
α))D−1x and b = D−1v. The modified system is then
(I − αPT )y = b
(5.1)
and we set x(k) = (1 − α)Dy(k).
Next we use this connection between x and y enables us to establish a convergence
criterion for our algorithms that will guarantee we obtain an approximation with the kind
of accuracy typically desired for methods related to the push operation, e.g. (2.2). More
concretely, to guarantee (cid:107)D−1(x − x)(cid:107)∞ < 1−α
so it suffices for our purposes to bound the error of the system (5.1).
ε , it suffices to guarantee (cid:107)y − y(cid:107)∞ < ε,
The accuracy requirement has two components: nonnegativity, and error. We relate the
solution to its residual as the first step toward proving both of these. Left-multiplying
the residual vector for (5.1) by (I − αPT )−1 and substituting y = (I − αPT )−1b, we get
(cid:32) ∞(cid:88)
PT(cid:17)m(cid:33)
αm(cid:16)
r(k),
y − y(k) =
m=0
where the right-hand side replaces (I − αPT )−1 with its Neumann series. Note here
that, if the right-hand side consists of all nonnegative entries, then it is guaranteed that
y − y(k) ≥ 0 holds. Recall from Section 3.1 that the residual update involved in the push
procedure consists of adding nonnegative components to the residual, and so the residual
must be nonnegative. Then, since (1 − α)y(k) = D−1x(k), this implies x ≥ x(k), proving
one component of the accuracy criteria (2.2) is satisfied.
Next we bound the error in y in terms of its residual, and then control the residual's
norm. Using the triangle inequality and sub-multiplicativity of the infinity norm allows
us to bound (cid:107)y − y(k)(cid:107)∞, which implies (2.2), with the following
m=0
m=0
≤
(cid:32) ∞(cid:88)
αm(cid:13)(cid:13)(cid:13)PT(cid:13)(cid:13)(cid:13)m
αm(cid:13)(cid:13)(cid:13)(cid:16)
r(k)(cid:13)(cid:13)(cid:13)∞
PT(cid:17)m
∞(cid:88)
tuting this and noting that(cid:80)∞
(cid:13)(cid:13)(cid:13)D−1x − D−1x(k)(cid:13)(cid:13)(cid:13)∞ =
(cid:13)(cid:13)(cid:13)y − y(k)(cid:13)(cid:13)(cid:13)∞
(cid:13)(cid:13)(cid:13)r(k)(cid:13)(cid:13)(cid:13)∞ < ε
1
1−α
∞
(cid:33)(cid:13)(cid:13)(cid:13)r(k)(cid:13)(cid:13)(cid:13)∞ .
(cid:13)(cid:13)(cid:13)r(k)(cid:13)(cid:13)(cid:13)∞ .
≤ 1
1−α
m=0 αm = 1/(1 − α) allows us to bound
Finally, since P is column stochastic, PT is row-stochastic, and so (cid:107)PT(cid:107)∞ = 1. Substi-
So to guarantee x satisfies the desired accuracy, it is enough to guarantee that
(5.2)
holds, where r(k) = b − (I − αPT )y(k) and x(k) = (1 − α)Dy(k). Thus, for our algorithms
to converge to the desired accuracy, it suffices to iterate until the residual norm satisfies
the bound (5.2). With this terminating condition established, we can now describe our
algorithm for computing the solution paths of xε as ε varies.
15
5.2 PageRank solution paths
Recall that our goal is computing the solution paths of seeded PageRank with respect
to the parameter ε. That is, we want an approximation xε of PageRank for all ε values
inside some region. Let P be a stochastic matrix, choose α satisfying 0 < α < 1, let v be a
stochastic vector, and set b = D−1v. Fix input parameters εmin and εmax. Then for each
value εcur ∈ [εmin, εmax] (εcur denotes "the value of ε currently being considered"), we
want an approximation y of the solution to (I− αPT )y = b that satisfies (cid:107)y− y(cid:107)∞ < εcur
1−α .
(Or rather, we want a computable approximation to this information.) As discussed in
Section 3.2, we also use the approximation parameter ρ ∈ [0, 1) in the push step.
Given initial solution y(0) = 0 and residual r(0) = b, proceed as follows. Maintain a
priority queue, Q(r), of all entries of the residual that do not satisfy the convergence
criterion rj < εmin. We store the entries of Q(r) using a max-heap so that we can quickly
determine (cid:107)r(cid:107)∞ at every step.
Each time the value (cid:107)r(cid:107)∞ reaches a new minimum, we consider the resulting solution
vector to satisfy a new "current" accuracy, which we denote εcur. For each such εcur
achieved, we want to perform a sweep over the solution vector. Because the sweep operation
requires a sorted solution vector, we keep y in a sorted array, L(y). By re-sorting the
solution vector each time a single entry yj is updated, we avoid having to do a full sweep
for each "new" εcur-approximation. The local sorting operation is a bubblesort on a single
entry; the local sweep update we describe below.
With the residual and solution vector organized in this way, we can quickly perform
each step of the above iterative update. Then, iterating until (cid:107)r(cid:107)∞ < εmin guarantees
convergence to the desired accuracy. Next we present the iteration in full detail.
PPR path algorithm
The ppr-path algorithm performs the following iteration until the maximum entry in
Q(r) is below the smallest parameter desired, εmin.
1. Pop the max of Q(r), say entry j with value r, then set rj = ρεcur and reheap Q(r).
2. Add r − ρεcur to yj.
3. Bubblesort entry yj in L(y).
4. If L(y) changes, perform a local sweep update.
5. Add (r − ρεcur)αPT ej to r.
6. For each entry i of r that was updated, if it does not satisfy ri < εmin, then insert
7. If (cid:107)r(cid:107)∞ < εcur, record the sweep information, then set εcur = (cid:107)r(cid:107)∞.
When the max-heap Q(r) is empty, this signals that all entries of r satisfy the conver-
gence criterion rj < εmin, and so our diffusion score approximations satisfy the accuracy
requirement (2.2).
(or update) that entry in Q(r) and re-heap.
16
D. F. Gleich and K. Kloster
Sweep update
The standard sweep operation over a solution vector involves sorting the entire solution
vector and iteratively computing the conductance of each consecutive sweep set. Here, we
re-sort the solution vector after each update by making only the local changes necessary
to move entry yj to the correct ranking in L(y). This is accomplished by bubblesorting
the updated entry yj up the rankings in L(y). Note that if y(k) has Tk nonzero entries,
then this step can take at most Tk operations. We believe this loose upperbound can be
improved. We could determine the new rank of node yj in work log Tk via a binary insert.
However, since we must update the rank and sweep information of each node that node
yj surpasses, the asymptotic complexity would not change.
Once the node ranks have been corrected, the conductance score update proceeds as
follows. Denote by S(k−1)(m) the set of nodes that have rankings 1, 2,··· , m during step
k − 1. Assuming we have the cut-set (cut and volume) information for each of these sets,
then we can update that information for the sets S(k)(m) as follows.
Suppose the node that changed rankings was promoted from rank j to rank j − ∆k.
Observe that the sets S(k)(m) and their cut-set information remain the same for any set
S(k)(m) lying inside the rankings [1,··· , j − ∆k − 1], because the change in rankings
happened entirely in the interval [j − ∆k,··· , j]. This occurs for m < j − ∆k. Similarly,
any set S(k)(m) with m > j would already contain all of the nodes whose rank changed –
altering the ordering within the set does not alter the conductance of that set, and so
this cut-set information also need not be changed. Hence, we need to update the cut-set
information for only the intermediate sets.
Now we update the cut-set information for those intermediate sets. We refer to the
node that changed rank as node L(j). Its old rank was j, and its new rank is j − ∆k. Note
that the cut-set information for the set S(k)(j − t) (for t = 0,··· , ∆k) is the exact same
as that of set S(k−1)(j − t − 1) ∪ {L(j)}. In words, we introduce the node L(j) to the set
S(k−1)(j − t − 1) from the previous iteration, and then compute the cut-set information
for the new iteration's set, S(k)(j − t), by looking at just the neighborhood of node L(j) a
single time. This provides a great savings over simply reperforming the sweep procedure
over the entire solution vector up to the index where the rankings changed.
If the node being operated on, L(j), has degree d, then this process requires work
O(d + ∆k). As discussed above, we can upperbound ∆k with the total number of iterations
the algorithm performs Tk.
Theorem 5.1 Given a random walk transition matrix P = AD−1, stochastic vector v,
and input parameters α ∈ (0, 1), ρ ∈ [0, 1), and εmax > εmin > 0, our ppr-path algorithm
outputs the best-conductance set found from sweeps over εcur-accurate degree-normalized,
ρ-approximate solution vectors x to (I−αP)x = (1−α)v, for all values εcur ∈ [εmin, εmax].
The total work required is bounded by O(cid:0)
(cid:1).
1
min(1−α)2(1−ρ)2
ε2
Proof We carry out the proof in two stages. First, we show that the basic iterative
min(1 − α)−1(1 − ρ)−1). Then, we show that the additional
update converges in work O(ε−1
min(1− α)−2(1− ρ)−2).
work of sorting the solution vector and sweeping is bounded by O(ε−2
Push work. We count the work on just the residual r(k) and solution vector y(k). The
work required to maintain the heap Q and sorted array L is accounted for below.
17
Each step, the push operation acts on a single entry in the residual that satisfies
rj ≥ εmin. The step consists of a constant number of operations to update the residual
and solution vectors (namely, updating a single entry in each). The actual amount that is
removed from the residual node is (rj −ρεmin); then we add (rj −ρεmin) to the appropriate
entry of the solution, and (rj − ρεmin)α/dj to r(k)
for each neighbor i of node j. Since j
has dj such neighbors, the total work in one step is bounded by O (dj). If T steps of the
push operation are performed, then the amount of work required to obtain an accuracy
t=0 dj, where j = j(t) is the index of the residual operated on in
of εmin is bounded by(cid:80)T
i
step t, r(t)
j .
Next we bound this expression for the work done in these "push" steps. Since all
(cid:80)T
entries of the solution and residual vectors are nonnegative at all times, the sum of the
values (rt − ρεmin) pushed at each step exactly equals the sum of the values y(k), i.e.
t=0(rt − ρεmin) = eT y(k). Since y(k) = (1/(1 − α))D−1x(k), we then have that the sum
degree and (1 − α), i.e. eT x(k) = (1 − α)(cid:80)T
of entries in (1/(1 − α))x(k) equals the sum of values pushed from the residual scaled by
t=0(rt − ρεmin) · dj(t), where j(t) is the node
get from the previous equation that (1 − α)(cid:80)T
pushed in step t. We claim that the sum eT x(k) ≤ 1. Assuming this for the moment, we
t=0(rt − ρεmin) · dj(t) = eT x(k) ≤ 1. Since
each step of ppr-path operates on a residual value satisfying rt ≥ εmin, we know that
(rt − ρεmin) ≥ εmin(1 − ρ), and so
T(cid:88)
(1 − α)
T(cid:88)
min(1 − α)−1(1 − ρ)−1(cid:1).
t=0
εmin(1 − ρ) · dj(t) < (1 − α)
rt · dj(t) ≤ 1.
Dividing by εmin(1−α)(1−ρ) completes the proof that the expression for work,(cid:80)T
is bounded by O(cid:0)ε−1
t=0 dj(t),
Lastly, we justify the claim eT x(k) ≤ 1. Left-multiplying the equations in (5.1) by
t=0
(De)T and using stochasticity of v gives
eT (I − αP)Dy(k) = eT Db − eT Dr(k)
(1−α) x(k) = eT v − eT Dr(k)
(1 − α)eT
eT x(k) = 1 − eT Dr(k).
1
(5.3)
As noted above, all entries of the residual and iterative solution vector are nonnegative
at all times. The sum eT x(k) cannot exceed 1, then, because that would imply that the
residual summed to a negative number, contradicting nonnegativity of the residual vector.
Hence, eT x(k) ≤ 1.
Sorting and sweeping work. Here we account for the work performed each step in
maintaining the residual heap Q(r), re-sorting the solution vector L(y), and updating the
sweep information for L(y). To ease the process, we first fix some notation: denote the
number of entries in the residual heap Q(r) by Q, and the number of non-zero entries
in the sorted solution vector L(y) by L. We will bound both of these quantities later
on. We continue to use ∆t to denote the number of rank positions changed in L(y) in
18
D. F. Gleich and K. Kloster
step t. Finally, recall that T denotes the number of iterations of the algorithm required
to terminate.
The work bounds we will prove, listed in the order in which the ppr-path algorithm
performs them, are as follows:
Operation
actual work
upperbound
Find max(r)
Delete max(r)
Bubblesort L(yj)
Re-sweep L(y)
Update r + rαPT ej
Re-heap Q(r)
1
log(Q)
∆t
dj + ∆t
dj
dj log(Q)
1
εmin(1−α)(1−ρ) )
1
log(
T
dj + T
dj
dj log(
1
εmin(1−α)(1−ρ) )
The residual heap operations for deleting max Q(r) and re-heaping the updated entries
each require O(log(Q)) work, where Q is the size of the heap, i.e. the number of nonzero
entries in the residual. We can upperbound this number using the total number of pushes
performed (since a nonzero in the residual can exist only via a push operation placing it
min(1 − α)−1(1 − ρ)−1), then. We remark that this is quite
there). We bound Q by O(ε−1
loose, as values of ρ near 1 actually force the solution and residual to be sparser, so the
min(1− α)−1), though we do not yet have a proof
heap size should still be bounded by O(ε−1
of this.
Re-sorting the solution vector via a bubblesort can involve no more operations than
the length of the solution vector. Since a nonzero in entry yj can exist only if a step of
the algorithm operates on an entry rj, the number of nonzeros in y is bounded by the
number of steps of the algorithm, i.e. L ≤ T . We believe this bound to be loose, but
cannot currently tighten it. Note that the work required in updating sweep information
also requires ∆t work, which we again upperbound by T . The dj term in updating sweep
information is from accessing the neighbors of the entry yj, the node changing its rank.
The dominant terms in the above expression for work are the re-heap updates and the
bubblesort and re-sweep operations, which require a total of O(dj log(Q)+L) work each
step. Summing this over all T steps of the algorithm, we can majorize work by O(log(Q)·
.
Finally, substituting in our loose upperbounds for T , Q, and L mentioned above
completes the proof:
εmin(1−α)(1−ρ) log(Q) + T · L(cid:17)
(cid:17)
(cid:17) ≤ O
(cid:80)T
t=0 dj) + O((cid:80)T
(cid:16)
t=0 L), which is upperbounded by O
(cid:16)
1
εmin(1−α)(1−ρ) log(
1
εmin(1−α)(1−ρ) ) +
1
min(1−α)2(1−ρ)2
ε2
(cid:16)
1
min(1−α)2(1−ρ)2
ε2
.
1
O
5.3 Fast multi-parameter PPR
Here we present a fast framework for computing ε-approximations of a push-based PPR
diffusion without computing a new diffusion for each ε. This enables us to identify the
optimal output that would result from multiple diffusion computations for different
ε values, but without having to do the work of computing a new diffusion for each
different ε. This algorithmic framework does not admit the parameter ρ as easily, because
19
of implementation details surrounding the data structures used to handle sorting and
updating the residual.
The framework is compatible with every set of parameter choices for ε that allows for
constant-time bin look-ups. More precisely, the set of parameters ε0, ε1, . . . , εN must
have an efficient method for determining the index k such that, given a value r, we have
εk−1 > r ≥ εk. We focus on a set of ε values that are taken from a log-spaced grid: that is,
the parameters are of the form εk = ε0θk for constants 0 < ε0, θ < 1. Because we assume
our ε parameters are taken from such a grid, we call our method ppr-grid. Another
possibly useful case is choosing εk values taken from a grid formed from Chebyshev-like
nodes, allowing for constant-time shelf-placement via cos−1 evaluations.
We emphasize that the underlying algorithm we use to compute the PageRank diffusion
is closely related to the push method discussed in Section 3 as implemented by [2]; in the
case that only a single accuracy parameter is used, the algorithms are identical. When
more than one accuracy setting is used, we employ a special data structure, which we call
a shelf.
The shelf structure
The main difference between our algorithm ppr-grid and previous implementations of
the push method lies in our data structure replacing the priority queue, Q, discussed
in ppr-path. Instead of inserting residual entries in a heap as in ppr-path, we organize
them in a system of arrays. Each array holds entries between consecutive values of εk, so
that each array holds entries larger than the shelf below it. For this reason, we call this
system of arrays a "max-shelf", H, and refer to each individual array as a "shelf", Hk.
The process is effectively a bucket sort: each shelf (or bucket) of H holds entries of the
residual lying between consecutive values of εk in the parameter grid. For parameters
ε0, ε1, . . . , εN , shelf Hk holds residual values r satisfying εk−1 > r ≥ εk. Residual entries
smaller than εN are omitted from H (since convergence does not require operating on
them). Residual entries with values greater than ε0 are simply placed in shelf H0.
PPR on a grid of ε parameters
During the iterative step of ppr-grid, then, rather than place a residual entry at the
back of Q, we instead place the entry at the back of the appropriate shelf, Hk. Once all
shelves Hm(r) are cleared for m ≤ k, then the residual has no entries larger than εk, and
so we have arrived at an approximation vector satisfying convergence criterion (2.2) with
accuracy εk. At this point, we perform a sweep procedure using the εk-solution. We then
repeat the process until the next shelf is cleared, and a new εk+1-solution is produced.
PPR grid algorithm. The iterative step is as follows:
1. Determine the top-most non-empty shelf, Hk.
2. While H contains an entry in shelf k or above, do the following:
3.
4.
5.
6.
Pop an entry on or above shelf Hk, say value r in entry rj, and set rj = 0.
Add r to xj.
Add rαPT ej to r.
For each entry of r that was updated, move that node to the correct shelf, Hm,
20
where εm−1 > r ≥ εm. If an entry is placed on a shelf higher than k, record the new
top-shelf.
D. F. Gleich and K. Kloster
7. Shelves 0 through k are cleared, so the εk-solution is done; perform a sweep.
Once all shelves are empty, the approximation with strictest accuracy, εN , has been
attained, and a final sweep procedure is performed.
Shelf computation. In each iteration of ppr-grid we must place multiple entries
into their respective "shelves". Here we show that computing the correct shelf where a
value r will be placed can be accomplished in constant time.
Let εk = ε0θk for a fixed value of θ ∈ (0, 1). We want a value r satisfying εk−1 > r ≥ εk
to be placed on shelf k. If r ≥ ε0, then we place r into shelf 0. Otherwise, making the
substitution εk = ε0θk and performing some algebra yields
k − 1 <
log(r/ε0)
log(θ)
≤ k,
so k can be computed by taking the ceiling of log(r/ε0)/ log(θ), which is a constant time
operation. Note that this process requires that 0 < εk < 1 holds for all k, that θ ∈ (0, 1),
and that r > 0.
Top shelf. Each step of ppr-grid also requires determining the top non-empty shelf.
This can be done in constant time by tracking what the top shelf is during each residual
update. If k is the top shelf immediately prior to step (2.4), then k will still be the top
shelf after the residual update is complete, unless one of the updates in step (6.) moves
an entry to a shelf l < k. By checking for this event during the update of each individual
residual entry in step (6.), we will have knowledge of the top non-empty shelf at the
beginning of each step, with only constant work per step.
Once the current working shelf is emptied, then it is possible that the next non-empty
shelf is many shelves down, i.e. shelves Hk and higher are emptied and the next non-empty
shelf is Hk+c for some large number c. Then determining k + c takes O(c) operations.
However, this operation is performed every time the algorithm switches from one value of
εk to the next. If there are N values of εk, then the total work in all calls of this top-shelf
computation is bounded by O(N ).
Theorem 5.2 Given a random walk transition matrix P = AD−1, stochastic vector
v, and input parameters α, θ ∈ (0, 1) and εk = ε0θk, our ppr-grid algorithm outputs
the best-conductance set found from sweeps over εk-accurate degree-normalized solution
vectors x to (I − αP)x = (1 − α)v, for all values εk for k = 0 through N . The work
εN (1−α) ). This improves on the method of
in computing the diffusions is bounded by O(
computing the N diffusions separately, which is bounded by O(cid:0)
1
εN (1−α)(1−θ) (1 − θN +1)(cid:1).
1
The two methods perform the same amount of sweep-cut work.
Proof. Note that the amount of push-work required to produce a diffusion with smallest
accuracy εN is exactly the same as the push-work performed in computing an εN solution
via ppr-path; The only difference is in how we organize the residual and solution vectors.
N (1 − α)−1). Updating the shelf
Hence, the push-work for ppr-grid is bounded by O(ε−1
structure for ppr-grid requires only a constant number of operations in each iteration,
21
Table 1. Datasets
Graph
itdk0304
dblp
youtube
fb-one
fbA
ljournal
hollywood
twitter
friendster
V
190,914
226,413
1,134,890
1,138,557
3,097,165
5,363,260
1,139,905
41,652,230
65,608,366
E
607,610
716,460
2,987,624
4,404,989
23,667,394
49,514,271
56,375,711
2,041,892,992
1,806,067,135
dave
6.37
6.33
5.27
3.9
15.3
18.5
98.9
98
55.1
and so the dominating operation in one step of ppr-grid is the residual push work. Thus,
the push-work bound for ppr-grid is O(ε−1
N (1 − α)−1).
with parameters εk and α requires push-work O(ε−1
values of εk gives (cid:80)N
place of εk, we see this sum is simply a scaled partial geometric series, (cid:80)N
Push-work for N separate diffusions. As noted above, computing a diffusion
k (1 − α)−1). Summing this over all
k=0(1/εk). Substituting ε0θk in
k =
k (1 − α)−1 = (1 − α)−1(cid:80)N
k=0 ε−1
N(cid:88)
0 θ−N (1 − θN +1)/(1 − θ). Simplifying gives
ε−1
k=0 ε−1
1
εk(1−α) =
1
εN (1−α)(1−θ)
(cid:0)1 − θN +1(cid:1) ,
k=0
proving the bound on the push-work. For our choices ε0 = 10−1, εN = 10−6/3, and
θ = 0.66 (which correponds to using N = 32 diffusions), this quantity is roughly 2.9 times
greater than computing only one diffusion, as our method does.
Sweep work. The number of operations required in computing the diffusion is bounded
N (1− α)−1), but this does not include the work done in sweeping over the various
by O(ε−1
εk-approximation vectors. The sweep operation requires sorting the solution vector. As
noted in the proof of work for ppr-path, the number of nonzeros in the solution vector is
N (1−α)−1)).
bounded by O(ε−1
This implies that sorting is the dominant subroutine of the algorithm. In practice the
bound on the number of nonzeros in the solution is loose, and the push operations
comprise most of the labor.
N (1−α)−1), and so the sorting work is O(ε−1
N (1−α)−1 log(ε−1
6 Experimental Results on Finding Small Conductance Sets
We have presented two frameworks for computing a single personalized PageRank diffusion
across multiple parameter settings. Here we analyze their performance on a set of real-
world social and information networks with varying sizes and edge-densities with the goal
of identifying sets of small conductance. All datasets were altered to be symmetric and
have 0s on their diagonals; this is done by deleting any self-edges and making all directed
edges undirected. In addition to versions of the Facebook dataset analyzed in Section 4,
we test our algorithms on graphs including twitter-2010 from [19], friendster and youtube
from [24, 31], dblp-2010 and hollywood-2009 in [3, 4], idk0304 from [27], and ljournal-2008
in [7]. See Table 1 for a summary of their properties.
22
D. F. Gleich and K. Kloster
6.1 The effect of ρ on conductance
Our first experimental study regards the selection of the parameter ρ for finding sets of
small conductance. We already established that ρ = 0.9 yielded qualitatively accurate
solution path plots. However, for the specific problem of identifying small conductance
sets, we find a curious behavior and get the best results with small values of ρ. We'll
explain why this is shortly, but consider the results in Figure 7. In the left subplot, we see
the maximum difference between the minimum conductance found for any value of ρ over
a series of trials. It can be large, for instance, 0.7 for one trial on the LiveJournal graph,
where large ρ shows worse results. In that same figure, we show the runtime scaling. It
seems to scale with 1/(1 − ρ), which is slightly better than expected from the bound in
Theorem 5.1.
Figure 7. Here we display the behavior of the solution paths as ρ scales from 0 to 1.
At left, we display the gap between φ(ρ), the best conductance found at that value of
ρ, and φmin, the minimum conductance found over all values of ρ. The lines depict the
maximum difference over 100 trials of the quantity φ(ρ) − φmin. This plot shows that the
best conductance found becomes worse as ρ approaches 1. At right, the runtime appears
to scale with 1/(1 − ρ), which is better than the 1/(1 − ρ)2 predicted by our theory.
The greatest difference between the best conductance found for any value of ρ and
the worst conductance found for any ρ occurs in the livejournal graph, with a gap of
nearly 0.7. We discovered that the cause for this disparity is that large values of ρ delay
the propagation of the diffusion, and so the ρ = 0.9 paths at ε = 10−5 did not spread
far enough to find a set of conductance near 0.07. In contrast, all paths with ρ < 0.5
did diffuse deep enough into the graph to identify this good conductance set. Thus, it is
possible that many of the differences in conductance performance between paths with
different values of ρ might in fact be caused by the size of the region to which the diffusion
spreads for a given value of ε. Figure 8 illustrates this finding.
Our conclusion from these experiments is that, for the goal of finding sets of small
conductance, we should use small values of ρ near zero. While it sometimes happens that
ρ > 0 slightly improves conductance, this is not a reliable observation, and so for the
rho00.20.40.60.81Conductance gap00.10.20.30.40.50.60.7youtubetwitterljournalhollywoodfriendsterfbAdblprho00.20.40.60.81Runtime (sec)10-310-210-110010110223
Figure 8. At left, the ρ = 0 paths identify mostly poor conductance sets φ ≈ 0.8, and
locate a set of low conductance, φ = 0.0788, only toward the end of the diffusion. At right
we see that the ρ = 0.9 paths cannot find this set with ε = 10−5. With a slightly smaller
accuracy (ε = 5 · 10−6 instead of ε = 10−5), the diffusion is able to spread far enough to
locate the good conductance set.
remaining experiments on conductance, we set ρ = 0. (This has the helpful side effect of
making it easier to compare with our ppr-grid.)
6.2 Runtime and conductance: ppr-path
Our first method, ppr-path, is aimed at studying how PPR diffusions vary with the pa-
rameter ε. Toward this, Table 2 emphasizes the shear volume of distinct ε-approximations
that ppr-path explores. We also want to highlight both the efficiency of our method over
the naıve approach for computing the solution paths, and the additional information that
the solution paths provide compared to a single diffusion.
With this in mind, our experiment proceeds as follows. On each data set, we selected
100 distinct nodes uniformly at random, and ran three personalized PageRank algorithms
from that node, with the settings α = 0.99 and ε = 10−5. Table 2 displays results for
our solution paths algorithm ("path" in the table) compared with two other algorithms
chosen to emphasize the runtime and the performance of ppr-path.
To show how ppr-path scales compared to the runtime of a single diffusion, and to
emphasize that the solution paths can locate better conductance sets in some cases, we
compare our solution paths method with a standard implementation for computing a
single PPR diffusion ("single" in Table 2). Column 3 in the table gives the median runtime,
taken over 100 trials, of the single diffusion. To compare, column 4 gives the median ratio
of "path" time to "single" time. Although ppr-path is slower on the small graphs, on
the larger graphs we see the runtime is nearly the same as for a single PPR diffusion. At
the same time, column 2 shows that "path" computes the results from hundreds or even
thousands of diffusions, a significant gain in information over the single PPR diffusion.
Finally, column 7 gives the best ratio of conductance found by "path" compared to that
24
D. F. Gleich and K. Kloster
Data
num ε Single diff. time (sec.)
ppr-path time (sec.)
multi diff. time (sec.)
φ-ratio
25
50
75
25
50
75
25
50
75
0.02
0.02
0.01
0.01
0.01
0.41
0.51
0.10
0.05
0.01
0.02
0.28
0.40
0.05
0.03
0.01
0.01
5292
8138
2844
3464
862
2799
94.2
97.9
38.7
34.6
16.5
30.9
17.2
10.3
13.6
70.8
87.3
28.6
28.1
14.0
24.5
14.0
6.5
11.1
1.77
1.12
1.47
1.09
1.16
2.09
1.19
1.05
1.09
123.2
111.5
49.2
40.5
19.5
43.6
22.4
18.1
16.6
0.69
0.03
0.02
0.65
0.02
0.02
0.15
0.01
0.01
0.07
0.01
0.01
0.01
< 0.01 < 0.01 0.01
0.01
0.05
0.01
< 0.01 < 0.01 < 0.01 < 0.01 < 0.01 0.01
< 0.01 < 0.01 < 0.01 < 0.01 < 0.01 0.01
< 0.01 < 0.01 < 0.01 < 0.01 < 0.01 0.01
itdk0304
dblp
youtube
fb-one
fbA
ljournal
hollywood 423
twitter
172
friendster 402
Table 2. Runtime and conductance comparison of the solution paths (all accuracies from
10−1 to 10−5) with (1) a single PPR diffusion with accuracy 10−5 (labelled "single") and
(2) 10,000 PPR diffusions, accuracies k−1 for k = 1 to 10,000 (labelled "mult"). On each
dataset we selected 100 distinct nodes uniformly at random and ran the algorithms with
the settings α = 0.99 and ε = 10−5 and ρ = 0. Column "num ε" displays the median
number of distinct accuracy parameters ε explored by our algorithm ppr-path. Columns
under "Time" report 25th, 50th, and 75th percentile of runtimes over these 100 trials.
The column "φ-ratio" lists the largest (best) ratio of conductance achieved by a single
diffusion with conductance achieved by our ppr-path, showing our method can improve
on the conductance found by a single diffusion by as much as a factor of 2.09.
found by "single". This shows that the solution paths can improve conductance by 10%
to even 50% compared to a single diffusion.
To display the efficiency of our algorithm in computing these many diffusion settings,
we again use the standard PPR implementation, but this time set to compute the diffusion
for every accuracy setting k−1 for k = 1 to 10, 000. This algorithm is "mult" in Table 2,
and is essentially a naıve method for approximating the solution paths. Column 5 gives the
ratio of "mult" time to "single" time, and shows that this naıve approach to computing
diffusions with multiple accuracies is prohibitively slow – it is thousands of times slower
than our "path" method.
Lastly, we acknowledge here that both variations on the PPR diffusion are naıve
approaches to the problem at hand. However, currently there is no other algorithm for
computing the PPR solution paths which we can use as a more competitive baseline.
6.3 Runtime and Conductance: ppr-grid
We compare our second method ppr-grid with a method called ppr-grow, which uses the
push framework described in Section 3. Each of these algorithms uses a variety of accuracy
settings, and returns the set of best conductance found from performing a sweep-cut over
the diffusion vector resulting from each accuracy setting. The algorithm ppr-grow has
32 pre-set accuracy parameters εk. In contrast with ppr-grid, which takes its accuracy
parameters from a log-spaced grid εk = ε0θk, the parameters for ppr-grow are chosen
as the inverses of values from the grid 10j ·(cid:2) 2
15 (cid:3) for j = 0, 1,··· , 4,
5
along with two additional parameters, 10−6/2 and 10−6/3.
10
3
4
In addition to α, our method ppr-grid has the parameters ε0 and εN , the laxest and
strictest accuracies (respectively), and θ, which determines the fineness of the grid of
25
accuracy parameters. We use the values ε0 = 10−1 and εN = 10−6/3, and use values of θ
corresponding to N = 32, 64, and 1256 different accuracy parameters.
We emphasize that this comparison with the ppr-grow method is not as naıve as it
might seem: out of the 32 calls that it makes, in practice the very last call (with the
strictest value of ε) constitutes near 37% of the total runtime. This means that making
only a single call would save little work, and would sacrifice the information from the
other 31 (smaller) approximations. Furthermore, the primary optimizations that would
be made to the ppr-grow framework to improve on this are exactly the optimizations
that we make with our ppr-grid algorithm, namely avoiding re-doing push work between
diffusion computations for different values of ε.
Because the two algorithms compute the same PageRank diffusion, comparing their
runtimes here allows us to study what proportion of the total work is made up of redundant
push operations, and what proportion is comprised of the sweep cut procedures, which
both algorithms perform anew for each diffusion. To study this, we highlight the results
in Table 3 which displays the runtimes for ppr-grow and the ratios of the runtimes of
ppr-grid with ppr-grow for computing the best-conductance set from the same number
of different diffusions, N = 32. We also display ppr-grid results for the cases N = 64
and 1256 to show how the algorithm scales with the fineness of the grid.
To compare runtimes, we perform the following for each different dataset. For 100
distinct nodes selected uniformly at random, we ran both algorithms with the setting
α = 0.99. We display the best (25%) and worst (75%) quartile of performance of each
algorithm and parameter setting. On almost all datasets, we see that ppr-grid with
N = 32 has a speedup of a factor 2 to 3. This is consistent with our theoretical comparison
of the two runtimes in Theorem 5.2, which predicts a factor of 2.9 difference in the push-
work that the two algorithms perform. Then, columns 6 through 9 of Table 3 display how
quickly ppr-grid can compute even more diffusions: whereas ppr-grow takes around 1
second to compute and analyze N = 32 diffusions, ppr-grid takes little more than half
that time to compute on N = 64 diffusions (columns 6 and 7). Columns 8 and 9 show
that ppr-grid can compute and analyze N = 1256 diffusions, nearly 40 times as many
as ppr-grow, in an amount of time only 1.10 to 6.59 times greater than the time required
by ppr-grow.
The conductances displayed in Table 4 are taken from the same trials as the runtime
information in Table 3. As with the table of runtimes, for each dataset the table gives
the 25% (best) and 75% (worst) percentiles of conductance scores produced by each
algorithm on the 100 trials. We see nearly identical conductance scores for ppr-grow and
ppr-grid with N = 32, which we expect because the two perform nearly identical work.
It is interesting to note, however, that increasing the number of diffusions can result in
significantly improved conductance scores in some cases, as with N = 1256 on the "fb-one"
and "hollywood" datasets. This demonstrates concretely the potential effect of using a
broad swath of parameter settings for ε to study the meso-scale structure. Moreover, it
demonstrates that even a finely spaced mesh of ε values, as with ppr-grow and ppr-grid
with N = 64, can miss informative diffusions.
26
Data
D. F. Gleich and K. Kloster
time (sec.)
ppr-grow
time ratio
ppr-grid N = 32
time ratio
ppr-grid N = 64
time ratio
ppr-grid N = 1256
25
6.23
itdk0304
4.52
dblp
1.73
youtube
1.25
fb-one
0.49
fbA
ljournal
0.82
hollywood 0.28
0.13
twitter
friendster
0.34
75
8.73
7.21
2.39
1.60
0.65
1.20
0.64
0.37
0.49
25
0.56
0.56
0.39
0.33
0.47
0.44
0.34
0.39
0.39
75
0.61
0.62
0.50
0.39
0.55
0.55
0.49
0.44
0.44
25
0.61
0.62
0.54
0.45
0.63
0.58
0.44
0.54
0.51
75
0.66
0.67
0.65
0.53
0.72
0.74
0.60
0.60
0.58
25
1.10
1.28
3.35
3.72
5.99
4.57
3.47
4.61
3.90
75
1.20
1.43
4.38
4.38
6.59
6.12
5.00
5.44
4.32
Table 3. Runtime comparison of our ppr-grid with ppr-grow. For each dataset, we
selected 100 distinct nodes uniformly at random and ran ppr-grow with 32 and ppr-grid
with N different accuracy settings εk. Columns 2 and 3 display the 25th and 75th
percentile runtimes for ppr-grow (in seconds). The other columns display the median over
the 100 trials of the ratios of the runtimes of ppr-grid (using the indicated parameter
setting) with the runtime of ppr-grow on the same node. These results demonstrate that
our algorithm computing over N = 32 accuracy parameters εk achieves the factor of 2 to
3 speed-up predicted by our theory in Section 5.3.
Data
grow
N = 32
N = 64
N = 1256
0.06
itdk0304
0.07
dblp
0.18
youtube
0.37
fb-one
0.56
fbA
ljournal
0.32
hollywood 0.29
0.80
twitter
friendster
0.85
25
1.00
1.00
1.01
1.06
1.00
1.00
1.00
1.00
1.00
75
1.00
1.00
1.30
1.16
1.05
1.01
1.01
1.00
1.00
25
1.00
1.00
1.09
1.10
1.00
1.00
1.00
1.00
1.00
75
1.01
1.00
1.50
1.26
1.06
1.01
1.01
1.00
1.00
25
1.00
1.00
1.21
1.18
1.00
1.00
1.00
1.00
1.00
75
1.02
1.01
1.72
1.37
1.09
1.01
1.02
1.00
1.01
Table 4. Conductance comparison of our ppr-grid with ppr-grow. Column 2 displays
the median of the conductances found by ppr-grow in the same 100 trials presented
in Table 3. The other columns display the 25% and 75% percentiles of the ratio of the
conductances achieved by ppr-grow and ppr-grid for the same seed set. For example,
on the dataset 'fb-one', the conductances found by ppr-grow are 18% larger than those
found by ppr-grid with N = 1256 accuracy settings - and that comparison is on the
quartile of trials where ppr-grid compares the worst to ppr-grow. We report the ratios
in this manner (rather than their reciprocals) because in this form the values displayed
are greater than 1, which distinguishes the values from conductance scores (which are
between 0 and 1).
7 Related work
As we already mentioned, regularization paths are common in statistics [9, 15], and they
help guide model selection questions. In terms of clustering and community detection,
solution paths are extremely important for a new type of convex clustering objective
27
function [16, 22]. Here, the solution path is closely related to the number and size of
clusters in the model.
One of the features of the solution path that we utilize to understand the behavior
of the diffusion is the stability of the set of best conductance over time. In ref. [8], the
authors use a closely related concept to study the persistence of communities as a different
type of temporal relaxation parameter varies. Again, they use the stability of communities
over regions of this parameter space to indicate high-quality clustering solutions.
In terms of PageRank, there is a variety of work that considers the PageRank vector as
a function of the teleportation parameter α [5, 20]. Much of this work seeks to understand
the sensitivity of the problem with respect to α. For instance, we can compute the
derivative of the PageRank vector with respect to α. It is also used to extrapolate
solutions to accelerate PageRank methods [6]. More recently, varying α was used to show
a relationship between personalized-PageRank-like vectors and spectral clustering [23].
Note that PageRank solution paths as α varies would be an equally interesting parameter
regime to analyze. The parameter α functions akin to ε in that large values of α cause
the diffusion to propagate further in the graph.
8 Conclusions and discussion
We proposed two algorithms that utilize the push step in new ways to generate refined
insights on the behavior of diffusions in networks. The first is a method to rapidly
estimate the degree-normalized PageRank solution path as a function of the tolerance
ε. This method is slower than estimating the solution of a single diffusion in absolute
run time, but still fast enough for use on large graphs. We designed that method, and
the associated degree-normalized PageRank solution path plot, in order to reveal new
insights about regions at different size-scales in large networks. The second method is a
fast approximation to the solution path on a grid of logarithmically-spaced ε values. It
uses an interesting application of bucket sort to efficiently manage these diffusions. We
demonstrate that both of these algorithms are fast and local on large networks.
The seeded PageRank solution plots, in particular, are effective at identifying a number
of subtle structures that emerge as a diffusion propagates from a set of seed nodes to the
remainder of the network. We hope that these become useful tools to diagnose and study
the properties of large networks.
As recently established by Ghosh et al. [10], there are many related diffusion methods
that all share Cheeger-like inequalities for specific definitions of conductance. We anticipate
that our solution path algorithm could apply to any of these diffusions as well. For instance,
our recent result on estimating the heat kernel diffusion in large graphs is based on the
push step as well [18]; we anticipate only mild difficulty in adapting our results to that
diffusion.
Fast access to the solution path trajectories provides a number of additional opportuni-
ties that we have not yet explored. We may be able to track multiple clusters directly by
managing intermediate data. We may be able to find near-optimal conductance sets that
are larger than those that directly optimize the objective. Also, nodes in an egonet or
larger set could be further clustered by properties of their solution paths instead of their
connectivity patterns.
28
D. F. Gleich and K. Kloster
Acknowledgments
We thank the following people for their careful reading of several early drafts: Huda
Nassar, Bryan Rainey, and Varun Vasudevan. This work was supported by NSF CAREER
Award CCF-1149756.
References
[1] R. Andersen and F. Chung. Detecting sharp drops in pagerank and a simplified local
partitioning algorithm. In Theory and Applications of Models of Computation, pages 1–12.
2007.
[2] R. Andersen, F. Chung, and K. Lang. Local graph partitioning using PageRank vectors. In
FOCS, 2006.
[3] P. Boldi, F. Bonchi, C. Castillo, D. Donato, A. Gionis, and S. Vigna. The query-flow graph:
Model and applications. In Proceedings of the 17th ACM Conference on Information and
Knowledge Management, CIKM '08, pages 609–618, New York, NY, USA, 2008. ACM.
[4] P. Boldi, M. Rosa, M. Santini, and S. Vigna. Layered label propagation: A multiresolution
In Proceedings of the 20th
coordinate-free ordering for compressing social networks.
WWW2011, pages 587–596, March 2011.
[5] P. Boldi, M. Santini, and S. Vigna. PageRank: Functional dependencies. ACM Trans. Inf.
Syst., 27(4):1–23, 2009.
[6] C. Brezinski, M. Redivo-Zaglia, and S. Serra-Capizzano. Extrapolation methods for pagerank
computations. Comptes Rendus Mathematique, 340(5):393 – 397, March 2005.
[7] F. Chierichetti, R. Kumar, S. Lattanzi, M. Mitzenmacher, A. Panconesi, and P. Raghavan.
On compressing social networks. In Proceedings of the 15th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, KDD '09, pages 219–228, New
York, NY, USA, 2009. ACM.
[8] J.-C. Delvenne, S. N. Yaliraki, and M. Barahona. Stability of graph communities across
time scales. Proceedings of the National Academy of Sciences, 107(29):12755–12760, June
2010.
[9] B. Efron, T. Hastie, I. Johnstone, and R. Tibshirani. Least angle regression. Ann. Statist.,
32(2):407–499, 04 2004.
[10] R. Ghosh, S.-h. Teng, K. Lerman, and X. Yan. The interplay between dynamics and
networks: Centrality, communities, and cheeger inequality. In KDD, pages 1406–1415,
2014.
[11] D. F. Gleich. PageRank beyond the web. SIAM Review, 57(3):321–363, August 2015.
[12] D. F. Gleich and M. M. Mahoney. Algorithmic anti-differentiation: A case study with
min-cuts, spectral, and flow. In ICML, pages 1018–1025, 2014.
[13] D. F. Gleich and C. Seshadhri. Vertex neighborhoods, low conductance cuts, and good seeds
for local community methods. In KDD, pages 597–605, Aug. 2012.
[14] T. Gutierrez-Bunster, U. Stege, A. Thomo, and J. Taylor. How do biological networks differ
from social networks? (an experimental study). In ASONAM, pages 744–751, 2014.
[15] T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning: Data
Mining, Inference, and Prediction. Springer, 2009.
[16] T. Hocking, J.-P. Vert, A. Joulin, and F. R. Bach. Clusterpath: an algorithm for clustering
using convex fusion penalties. In ICML), pages 745–752, 2011.
[17] L. G. S. Jeub, P. Balachandran, M. A. Porter, P. J. Mucha, and M. W. Mahoney. Think
locally, act locally: Detection of small, medium-sized, and large communities in large
networks. Phys. Rev. E, 91:012821, Jan 2015.
[18] K. Kloster and D. F. Gleich. Heat kernel based community detection. In KDD, pages
1386–1395, 2014.
[19] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news
29
media? In WWW '10: Proceedings of the 19th international conference on World wide
web, pages 591–600, New York, NY, USA, 2010. ACM.
[20] A. N. Langville and C. D. Meyer. Google's PageRank and Beyond: The Science of Search
Engine Rankings. Princeton University Press, 2006.
[21] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Community structure in large
networks: Natural cluster sizes and the absence of large well-defined clusters. Internet
Mathematics, 6(1):29–123, September 2009.
[22] F. Lindsten, H. Ohlsson, and L. Ljung. Just relax and come clustering! a convexification of
k-means clustering. Technical report, Linkopings universitet, 2011.
[23] M. W. Mahoney, L. Orecchia, and N. K. Vishnoi. A local spectral method for graphs: With
applications to improving graph partitions and exploring data graphs locally. Journal of
Machine Learning Research, 13:2339–2365, August 2012.
[24] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement
and analysis of online social networks.
In Proceedings of the 7th ACM SIGCOMM
Conference on Internet Measurement, IMC '07, pages 29–42, New York, NY, USA, 2007.
ACM.
[25] M. E. J. Newman. Finding community structure in networks using the eigenvectors of
matrices. Phys. Rev. E, 74(3):036104, September 2006.
[26] S. E. Schaeffer. Graph clustering. Computer Science Review, 1(1):27–64, 2007.
[27] C. (The Cooperative Association for Internet Data Analyais). Network datasets. http:
//www.caida.org/tools/measurement/skitter/router_topology/, 2005. Accessed in
2005.
[28] J. J. Whang, D. F. Gleich, and I. S. Dhillon. Overlapping community detection using seed
set expansion. In CIKM, pages 2099–2108, 2013.
[29] C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao. User interactions in social
networks and their implications. In EuroSys, pages 205–218, 2009.
[30] J. Xie, S. Kelley, and B. K. Szymanski. Overlapping community detection in networks:
The state-of-the-art and comparative study. ACM Comput. Surv., 45(4):43:1–43:35, Aug.
2013.
[31] J. Yang and J. Leskovec. Defining and evaluating network communities based on ground-
truth. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages
745–754, Dec 2012.
[32] D. Zhou, O. Bousquet, T. N. Lal, J. Weston, and B. Scholkopf. Learning with local and global
consistency. In Advances in neural information processing systems (NIPS), volume 16,
pages 321–328, 2003.
|
1911.06961 | 1 | 1911 | 2019-11-16T05:25:01 | Towards Automated Sexual Violence Report Tracking | [
"cs.SI",
"cs.CL"
] | Tracking sexual violence is a challenging task. In this paper, we present a supervised learning-based automated sexual violence report tracking model that is more scalable, and reliable than its crowdsource based counterparts. We define the sexual violence report tracking problem by considering victim, perpetrator contexts and the nature of the violence. We find that our model could identify sexual violence reports with a precision and recall of 80.4% and 83.4%, respectively. Moreover, we also applied the model during and after the \#MeToo movement. Several interesting findings are discovered which are not easily identifiable from a shallow analysis. | cs.SI | cs | Towards Automated Sexual Violence Report Tracking
Naeemul Hassan1, Amrit Poudel2, Jason Hale2, Claire Hubacek2, Khandakar Tasnim Huq3
Shubhra Kanti Karmaker Santu4, Syed Ishtiaque Ahmed5
1University of Maryland, College Park, 2University of Mississippi, 3Khulna University of Engineering and Technology
4Massachusetts Institute of Technology, 5University of Toronto
9
1
0
2
v
o
N
6
1
]
I
S
.
s
c
[
1
v
1
6
9
6
0
.
1
1
9
1
:
v
i
X
r
a
Abstract
Tracking sexual violence is a challenging task. In this paper,
we present a supervised learning-based automated sexual vio-
lence report tracking model that is more scalable, and reliable
than its crowdsource based counterparts. We define the sex-
ual violence report tracking problem by considering victim,
perpetrator contexts and the nature of the violence. We find
that our model could identify sexual violence reports with a
precision and recall of 80.4% and 83.4%, respectively. More-
over, we also applied the model during and after the #MeToo
movement. Several interesting findings are discovered which
are not easily identifiable from a shallow analysis.
1
Introduction
According to World Health Organization (WHO), sexual vi-
olence is defined as any sexual act, attempt to obtain a sex-
ual act, unwanted sexual comments or advances, or acts to
traffic, or otherwise directed, against a person's sexuality us-
ing coercion, by any person regardless of their relationship
to the victim, in any setting, including but not limited to
home and work (Krug et al. 2002). This is a serious offence
that causes several negative impacts on the victims' physi-
cal, psychological, and social health (Fitzgerald et al. 1997;
Loy and Stewart 1984). Unfortunately, the prevalence of
sexual violence is very high across the globe (Gelfand,
Fitzgerald, and Drasgow 1995), and women are the princi-
ple victims of sexual violence. According to UN Women and
World health Organization (WHO), 35% (more than one in
every three) of women worldwide have experienced either
physical and/or sexual intimate partner violence or sexual
violence by a non-partner at some point in their lives (UN
WOMEN contributors 2017).
Despite its disturbing prevalence and severity, it is often
difficult to detect sexual violence and reach out to a victim
in a timely manner (Aroussi 2011). This challenge mostly
comes from the fact that sexual violence is often subjective
and context-dependent (Clay-Warner 2003). Without a re-
port by the victim, many sexual violence acts are hard to
recognize. However, self-reporting is not always easy for the
Copyright c(cid:13) 2020, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
victims because of various social and cultural constraints in-
cluding taboos around discussing sex, stigma around the vic-
tims of sexual violence, and the possibility of victim blam-
ing in many societies around the world (Fisher et al. 2003;
Kathleen C. Basile 2014; Spencer et al. 2017). These chal-
lenges constitute a 'silence' that surrounds sexual violence
and that has long been impeding the process of reducing the
occurrence and impact of this problem.
While the victims tend not to self-report through tradi-
tional mechanisms such as filing a police report (Felson and
Par´e 2005) or going to corresponding workplace/educational
system (e.g., Title IX) (Cantor et al. 2015) due to uncertainty
and complexity of the process among other reasons (Krebs et
al. 2007), they often take their frustration into social media
and disclose their violent experience to friends, peers, or fol-
lowers (Andalibi et al. 2016). The objective of this paper is
to identify the sexual violence victims by mining self-reports
from social media.
In October, 2017, an online movement began over social
media where women from all over the world started shar-
ing their stories of experiencing sexual violence using the
hashtag #MeToo. This online movement was fueled up by
actress Alyssa Milano's invitation to all women to reveal the
name of the perpetrators of sexual violence. She said, "If all
the women who have been sexually harassed or assaulted
wrote 'Me too' as a status, we might give people a sense of
the magnitude of the problem", on October 15, 2017. Af-
ter Milano's tweet, within 24 hours, there were more than
4.5 million posts on different social network platforms with
hashtag #MeToo (or some variants of it).
Thus, the #MeToo movement created an unprecedented
opportunity for women to express their untold feelings to the
world, and for researchers and practitioners to understand
various patterns of violence in various contexts. Millions of
#MeToo posts allow us learning the kind of violence, vic-
tim's relationship with the perpetrator, location and time of
the incident, and victim's emotional response among oth-
ers. This, in turn, also creates the opportunity to identify if
a written statement expresses a report of sexual violence,
even if it's not explicitly tagged with #MeToo. This capabil-
ity is particularly important in order to automatically detect
violence from a massive stream of text data over social me-
dia. An automated system for identifying posts that report
sexual violence will eliminate the need for a huge amount
of human power to observe and evaluate each post sepa-
rately. Furthermore, attention to posts on social media often
depends on the social capital of the poster, which shrinks
the way for victims with small capital to get proper atten-
tion. An automated system can eliminate such limitations
and provide a scalable platform to instantly detect a post
with a report of violence and inform concerned parties for
reacting. Such automated tools can also be used for under-
standing the prevalence, severity, and nature of violence in
different geographic locations in different times of the year.
To this end, we have developed a data-driven, AI based
automated sexual violence report tracking model that can
i) detect a sexual violence report, ii) characterize the report
with respect to several contexts -- gender of the victim, na-
ture of the violence in terms of severity, category of the per-
petrator, and iii) automatically tag the perpetrator describ-
ing portion from the report. Our model can detect the sex-
ual violence reports with a precision and recall of 80.4%
and 83.4%, respectively. It can also annotate the perpetrator
identity from the report with an average F1-measure of 76%.
Overall, we make the following contributions in this paper-
1. We gather about a million #MeToo hashtagged tweets,
systematically process the corpus to remove noise, and
identify potential sexual violence reports using Seman-
tic Role Labeling (Section 3.2). A subset of the corpus
is made public for researchers.
2. We design a sexual violence report annotation and char-
acterization scheme by following the guidelines of Center
for Disease Control and Prevention (CDC) and use Ama-
zon Mechanical Turk to annotate about 18, 000 tweets.
3. We define the sexual violence report tracking as multi-
ple multi-class supervised classification problem and se-
quence labeling problem (Section 4, 5). To the best of our
knowledge, this is the first data-driven, AI based solution
towards automated sexual violence report tracking.
4. We present two cases by deploying the tracking models
over the #MeToo corpus and a Post-MeToo corpus (Sec-
tions 6.1, 6.2). Our analysis reveals several relationships
between violence and perpetrator category.
2 Literature Review
Barriers to Reporting: Knowledge about sexual violence is
limited by a widespread silence around it. There are differ-
ent factors working behind this silence. One dominant fac-
tor, especially operational in the western world, is the fear
of retaliation which is defined by the victim's fear of be-
ing ignored or the incident being trivialized by the listen-
ers (Bergman et al. 2002). This silence is also often cre-
ated by the lack of hope in the victim who do not expect
the listeners to help them (Banyard 2011; Garrett and Has-
san 2019). Furthermore, in many workplaces, sexual vio-
lence is often considered as an expression of masculinity,
and being a victim is seen as a sign of weakness. This holds
women back from reporting any sexual violence happened
to them (Fitzgerald 1993). Speaking out is even harder for
women in many places in the south Asia. In most places
in the Indian subcontinent, for example, "sex" is a tabooed
topic, and talking about sexual harassment is seen as an
act of immodesty (Nair and John 2000). This challenge is
compounded by the strong patriarchal culture (Houston and
Kramarae 1991) in India and the middle-east (Shalhoub-
Kevorkian 2003), where women often depend on men for
most things needed for their living including foods, shel-
ter, education, transportation, and health (Mitter 1992). For
these and many other reasons, women often remain silent
about the violence they experience; and their silence creates
a gap in our knowledge about this particular problem.
Current Reporting Mechanisms: Feminist activists, re-
searchers, artists, and scholars have long been trying to
break this silence of women about sexual harassment. There
have been many demonstrations on the street and on the
news, radio, and television media by the feminist activists
that depict the severity of sexual harassment, and the gender-
politics related to it (Hester, Kelly, and Radford 1996). With
the advancement of information and communication tech-
nologies, people have now many effective means of commu-
nication including mobile phone and internet. Researchers
have tried to leverage them to design different communica-
tion platforms for women to report abuses, get safety infor-
mation, combat harassment, and share their opinions with
others. For example, Hollaback! is a smartphone application
that allows the users to take pictures of the harassers and
post the pictures on social media to shame them (Dimond et
al. 2013). Victims can also report harassment through Ha-
rassmap (harassmap.org), Bijoya (bijoya.crowdmap.com),
or Akshara (akshara.crowdmap.com), applications that show
an interactive map of sexual harassment incident places to
the users (Young 2014). One limitation of these systems is,
unless the victims are aware of these, the systems won't
sustain. For example, Bijoya had the latest report in 2013
and Akshara had the latest report in 2016. Once the pop-
ularity of such a system fades out, it no longer tracks re-
ports of sexual harassment. Safetipin is a mobile phone ap-
plication with which users can mark the unsafe places, and
it also informs a user if they enter into an unsafe place.
On the other hand, Circle of 6 (www.circleof6app.com)
helps users find other trusted women to accompany them
while traveling. Protibadi, a mobile application was de-
ployed that allowed women to anonymously report harass-
ment, provided an interactive harassment map, and allowed
the users to participate in a discussion around harassment
anonymously (Ahmed et al. 2014). All these applications
have been proven to be effective to some extent, and could
help some women break the silence and raise their voice
against sexual harassment. However, as it has been seen,
many women do not use these platforms to talk about sexual
harassment because of many larger social, cultural, and po-
litical challenges that just cannot be fully mitigated only by
easy, accessible, ubiquitous, and intelligent applications and
communication tools (Ahmed et al. 2016).
Promise of Social Media Based Report Tracking: The
#MeToo movement on Twitter and other social media is con-
sidered revolutionary (Manikonda et al. 2018). Such volun-
tary and spontaneous participation of millions of women
across the globe in breaking down a silence that had
long been suppressing them was unprecedented in the his-
tory (Kearl 2018). Through the tweets of these women,
we could know information about sexual harassment that
was never disclosed before (Rodino-Colocino 2018). We
could also learn the context, emotion, and repercussions
around sexual harassment which would be hard to get oth-
erwise (Khatua, Cambria, and Khatua 2018; Bhattacharyya
2018). We argue that the tweets shared by the victims
over Twitter have not only helped them release their bot-
tled up emotions, but also have provided us with impor-
tant data that we can use for better understanding the nature
of sexual harassment (Tambe 2018). Such information can
be used for improving existing law, policy, education, and
technology to reduce the occurrences of sexual harassment
and to extend a better support to the victims (Jaffe 2018;
Tippett 2018). Moreover, our analysis finds that victims take
to social media to report violence experience even in the ab-
sence of a social movement. So, we argue that the insights
extracted from the #MeToo movement data can potentially
assist in tracking sexual violence reports from social media.
3 Data Preparation
3.1 Collection
We collected about a million tweets containing the #MeToo
hashtag from all over the world within the October 15 − 31,
2017 period using the Twitter API. This is the period when
the movement was gaining momentum. We have made a
25% random sample of the whole dataset publicly available
for other researchers 1. We removed the duplicate tweets
from the dataset by matching the permanent URLs of the
tweets. After that, we removed the re-tweets of original
tweets. These cleaning steps reduced the collection size to
520, 761 tweets that were tweeted by 363, 090 unique users.
As the tweets are gathered from all over the world, we find
that they are written in multiple languages. We translated
the non-English tweets to English using the Google Trans-
late API 2.
3.2 Processing
Our primary inspection finds that the dataset contains tweets
that are pertinent to the #MeToo movement and also some
tweets that were irrelevant such as advertisements, spams,
etc. Moreover, the pertinent tweets were also of varying na-
ture. For instance, some tweets contained sexual violence
reports, some expressed support to the spirit of the #MeToo
movement, and some were opposing or questioning the
movement. We used the Amazon Mechanical Turk [AMT]
(details in Section 3.3) to separate the sexual violence re-
ports from the rest of the dataset. However, as the number of
tweets is large and the AMT service is not cheap, we wanted
to filter the dataset and maximize the chance of getting pos-
itive samples. We processed the data as follows.
Identify Common Violence Related Verbs We used
NLTK 3 part of speech (POS) tagger to identify the verbs
1Link is not provided due to the anonymous submission policy.
2https://cloud.google.com/translate/docs/
3https://www.nltk.org/
that are present in the tweets. Then, we manually inspected
the top-1000 most frequent verbs and identified a set of 27
verbs, H, which are generally associated with sexual vio-
lence or events of that nature. The verbs are -- Abuse, As-
sault, Attack, Beat, Bully, Catcall, Flirt, Fondle, Force, Fuck,
Grab, Grope, Harass, Hit, Hurt, Kiss, Masturbate, Molest,
Pull, Rape, Rub, Slap, Stalk, Threat, Touch, Use, Whistle.
These verbs and their variants (e.g., Abuse: abuse, abused,
abusing) were present in 103, 083 tweets (20% of 520, 761).
Identify Potential Sexual Violence Reports We under-
stand that the presence of a sexual violence related verb in
a tweet does not necessarily mean that the tweet reports a
sexual violence. To identify potential sexual violence re-
ports, we applied Semantic Role Labeling (SRL) (Carreras
and M`arquez 2005). Given a sentence, SRL can identify the
verb, the agent of the verb, and the details. For example, SRL
extracts the tuple (a jerk, grab, my vagina) from the tweet
"A jerk grab my vagina at a night club in NYC". We used
a deep highway BiLSTM with constrained decoding based
SRL detection technique
(He et al. 2017) that achieves
83.2% F-1 on the CoNLL 2005 (Carreras and M`arquez
2005) test set and 83.4% F-1 on CoNLL 2012 (Pradhan et
al. 2012). We considered the tweets where SRL finds a tuple
< agent, verb, detail > such that,
verb ∈ H
agent = a string with a noun or 3rd person pronoun
detail (cid:54)= an empty string
It should be noted that the SRL detection technique iden-
tifies presence of negation of an action (e.g., He didn't kiss
her) or modal of an action (e.g., Women can abuse men).
We omitted the tweets containing negation or modal from
our consideration. In total, we identified 17, 935 (17.39% of
103, 083) such tweets through this process. We argue that
these tweets are more likely to contain sexual violence re-
ports than the tweets where SRL doesn't find such a tuple.
We take a random sample of 16, 000 from these 17, 935
tweets and a random sample of 10, 000 from the rest of the
tweets that -- i) didn't pass the SRL filter, thereby don't nec-
essarily contain a violence related verb, and ii) contained at
least 5 words. In this way, we created a set of 26, 000 tweets
to annotate using AMT.
3.3 Annotation Scheme
We prepare the annotation scheme by following the sex-
ual violence reporting guidelines and categorizations pro-
vided by the Centers for Disease Control and Prevention
(CDC) (Kathleen C. Basile 2014), the leading national pub-
lic health institute of the United States. Given a tweet, an
AMT worker identifies the following five information-
1. Category of sexual violence, if reported in the tweet. The
categories are-
(a) (PEN) Completed or attempted forced penetration.
(b) (PEN) Completed or attempted alcohol/drug facilitated
penetration.
(c) (PEN) Completed or attempted forced acts in which a
victim is made to penetrate someone.
(d) (PEN) Completed or attempted alcohol/drug facilitated
acts in which a victim is made to penetrate someone.
(e) (PEN) Nonphysically forced penetration which occurs
after a person is pressured to consent.
(f) (USC) Unwanted sexual contact.
(g) (NSE) Non-contact unwanted sexual experiences.
(h) (OTH) A sexual violence incident that doesn't belong
to any of the above category.
(i) (NON) The tweet doesn't report a sexual violence.
2. Identity of the victim in case the tweet reports a vio-
lence. Possible categories are- (a) (SLF) The tweeter is
the victim- in other words, the victim is self-reporting, (b)
(nSLF) The tweeter is not the victim.
3. Gender of the victim. The options are- (FEM) Female,
(MAL) Male, and (UNS) Unspecified.
4. Category of the perpetrator (person who inflicts the vio-
lence), if specified in the tweet. The categories are -- (INT)
Intimate Partner, (FAM) Family Member, (POW) Person
in Position of Power, Authority or Trust, (FRN) Friend
or Acquaintance, (STR) Stranger, and (PNM) Perpetrator
not mentioned or not specific enough.
5. Words from the tweet that describe the perpetrator.
Example 1. For example, given the following tweet- "an old
guy at wendy's moved me aside in line by grabbing me by
the hips", possible annotations would be 1. USC, 2. SLF, 3.
FEM, and 4. STR, and 5. "an old guy".
3.4 Annotated Data
Each tweet was annotated by one annotator. Due to the large
scale of the data, we couldn't afford multiple annotators
for a tweet. However, a manual analysis of the annotated
data found the annotations to be of good quality. In total,
18, 624 tweets were annotated by AMT out of 26, 0004. Ta-
ble 1 shows distributions of the sexual violence categories.
In total, there are 11, 671 tweets containing a sexual vio-
lence reports and 6, 953 tweets do not contain any sexual
violence reports. There are 3, 529 penetration (PEN) related
reports that comprise of the first five sexual violence cate-
gories. In our sexual violence characterization task (details
in Section 4.2), we treat the penetration related violence as a
whole rather than treating each of the PEN categories sepa-
rately due to limited sample size for these categories except
for the first one. The most frequent category is the Unwanted
Sexual Contact (USC).
About 79.13% (9, 236) of the reports are from the 16K
SRL filtered data. This demonstrates the effectiveness of the
SRL based filtering to maximize getting sexual violence re-
ports. About 20.86% (2, 435) of the reports came from 10K
data. So, our dataset also contains a good number of reports
which don't follow the SRL based patterns.
Among the 11, 671 sexual violence reports, 7, 395
(63.36%) were self-reported (SLF) by the victims and the
remaining 4, 276 were not self reported (nSLF). Our analy-
sis finds that the nSLF set contains reports where the tweeter
4The annotation task is paused at this moment to preserve
anonymity of the authors. It will be resumed after this manuscript's
reviews are available.
is reporting a sexual violence of other victim such as a fam-
ily member or an acquaintance. It also has reports where the
victim is mentioned but not specifically enough to under-
stand the identity.
Question 3 asked about gender identity of the victim. The
percentage of FEM, MAL, and UNS were 41.43%, 9.39%,
and 49.18%, respectively. A gender-violence bi-variate anal-
ysis reveals that females face more unwanted sexual contact
(USC) violence than what males face. Table 2 shows fre-
quency (percentage) of each gender category for each vio-
lence category. Percentage of USC among FEM is 38.02%
whereas it is 26.56% among MAL. Also, USC is the most
common violence in FEM whereas for MAL it is PEN.
Question 4 asked about perpetrator's nature. We find that
7, 509 (64.34%) of the sexual violence reports contain clear
categorization of the relationship between the victim and the
perpetrator. The relationship can be one of the first 5 cate-
gories described in Question 4. Table 4 shows distribution of
the categories. The majority of the perpetrators are stranger
to the victims. The second major category consists of per-
petrator from person in position of power or authority or
trust. There are 4, 162 (35.66%) violence reports which ei-
ther don't mention the relationship specifically or don't men-
tion about perpetrator at all (PNM category of Question 4).
Question 5 requires the AMT coders to highlight the
words of a tweet that describe the perpetrator of a sexual
violence. We took several precautionary measures to ensure
good quality annotation and discourage spam activities. For
example, we discarded the data where coders responded (i)
NON to Question 1 or (f) PNM to Question 4 but at the same
time highlighted words in Question 5. We also alerted the
coders when they deliberately or mistakenly highlighted the
whole tweet. Our analysis finds that the highlighted words
by and large comprise of nouns such as boss, teacher, un-
cle, etc. or pronouns such as he, she. Table 3 shows some of
the most frequent perpetrator indicating texts that were high-
lighted by the coders. The table has both 'a man' and 'man'.
It could be because a tweeter wrote without the article 'a'
or because a coder didn't highlight the article. The average
number of highlighted words in the tweets is 2.19. We use
these words to train a sequence labeling model that can pre-
dict perpetrator of sexual violence (details in Section 5.4).
4 Problem Formulation
We design the sexual violence report tracking as a two step
process- i) detecting sexual violence reports and ii) charac-
terizing the reports with respect to violence nature, victim's
identity, gender identity, and relationship with perpetrator.
4.1 Sexual Violence Report Detection
We define the sexual violence report detection task as a
supervised binary classification problem where the set of
classes, C = {SV R, nSV R}. Formally, given X , a set of
all tweets, and a training set T of annotated tweets (cid:104)t, c(cid:105),
where (cid:104)t, c(cid:105) ∈ X × C, our goal is to learn a function γ
such that γ : X → C, in other words, it maps tweets to
{SV R, nSV R}.
Category
Completed or attempted forced penetration
Completed or attempted alcohol or drug facilitated penetration
Completed or attempted forced acts in which a victim is made to penetrate someone
Completed or attempted alcohol or drug facilitated acts in which a victim is made to penetrate someone
Nonphysically forced penetration which occurs after a person is pressured to consent
Unwanted sexual contact
Non-contact unwanted sexual experiences
A sexual violence incident that doesn't belong to any of the above category
This tweet doesn't report a sexual violence
Table 1: Sexual violence category distribution in the annotated data
PEN
3529
Count Code Count
1919
438
699
241
232
3980
1492
2670
6953
USC
NSE
OTH
NON
3980
1492
2670
6953
NSE
FEM 610 (14.12)
MAL 90 (9.19)
UNS
679 (13.24)
OTH
843 (19.51)
197 (20.12)
1264 (24.65)
PEN
1225 (28.35)
432 (44.13)
1246 (24.30)
USC
1643 (38.02)
260 (26.56)
1939 (37.81)
Table 2: Frequency (Percentage) of each Gender-Violence
combination
Text
he
men
a man
a guy
man
someone
guy
Text
a boy
boss
Count
509
276
269 women
friend
192
114
a stranger
the man
77
75
the guy
Count
Text
69 my boss
64
63
60
56
55
49 manager
they
stranger
a woman
boyfriend
she
Count
47
42
42
40
35
31
29
Table 3: Common perpetrator words
Category
(INT) Intimate Partner
(FAM) Family Member (not Intimate Partner)
(POW) Person in Position of Power/Authority/Trust
(FRN) Friend or Acquaintance
(STR) Stranger
Total
Count
545
837
2045
1735
2347
7509
%
7.26
11.14
27.23
23.11
31.26
100
Table 4: Perpetrator category distribution
supervised
a
4.2 Sexual Violence Report Characterization
We formulate the characterization of
reports as mul-
tiple multi-class
problems.
Formally, given XSVR,
that
tweets
have been mapped to {SV R} by γ, and a train-
(cid:104)t, (c, v, g, p)(cid:105)
ing
where t ∈ XSVR, c ∈ {P EN, U SC, N SE, OT H},
v ∈ {SLF, nSLF}, g ∈ {F EM, M AL, U N S},
p ∈ {IN T, F AM, P OW, F RN, ST R, P N M}, our goal
is to learn functions ζ, υ, ξ, ρ such that-
classification
set of
set TSVR of
annotated
ζ : XSVR → {P EN, U SC, N SE, OT H}
υ : XSVR → {SLF, nSLF}
all
tweets
ξ : XSVR → {F EM, M AL, U N S}
ρ : XSVR → {IN T, F AM, P OW, F RN, ST R, P N M}
In addition, we model the perpetrator tagging task as a se-
quence labeling problem. Specifically, given a tweet t, the
goal is to identify the consecutive set of words in t that de-
notes the perpetrator who caused the sexual violence.
5 Model Development
In the following sections, we describe the processing of the
annotated data, modeling of the problems, and comparison
of performances of multiple learning techniques.
5.1 Data Processing
We preprocessed the tweets following a series of steps. First,
we converted the tweets to all lowercase. Then, a Python
package named tweet-preprocessor 5 was used to remove
URLs, emojis, and smileys from the tweets. We also re-
moved the hashtag #metoo from the tweets. After that, these
cleaned tweets were transformed to vectors using Bag-of-
Words (BOW) model and TF-IDF (with sublinear tf). We
used unigrams and bigrams as features (ngrams with n = 1,
2). There were 147, 370 such features. The ngrams that were
present in only one tweet (very rare) or present in more than
25% of all tweets (very common) were discarded from fea-
ture set. This step reduced the number of features to 34, 688.
From these, we selected the most frequent 5, 000 ngram fea-
tures and experimented with these in all the experiments.
Note: We experimented with stopwords removal and
stemming. However, these steps decreased the overall per-
formance. So, we decided not to use these two steps.
5.2 Model Selection
We experimented with multiple supervised learning al-
gorithms. Specifically, we used Support Vector Machine
(SVM) with linear kernel, Random Forest (RDF) with 100
estimators, and Gradient Boosting (GDB). In some cases,
the SVM and GDB outperformed others in terms of f1-
measure. However, we observed a better performance when
all of the three classifiers were combined to build a majority
voting classifier (MVC). We used a Python package named
5https://pypi.org/project/tweet-preprocessor/
scikit-learn to build MVC. It predicts the class label based
on the argmax of the sums of the predicted probabilities
by SVM, RDF, and GDB. Table 7 shows performances of
the classifiers in terms of precision (P), recall (R), and F1-
measure(F1). We conducted 5-fold cross-validation. In each
fold, 80% of the data was used for training and the remain-
ing 20% was used for testing. Then took the average of the
performances of the folds. The highest F1-measure for each
category is highlighted in the table. MVC achieved the high-
est F1-measures in 10 of the 17 total categories.
Note: We also experimented with word embedding based
techniques (GLOVE (Pennington, Socher, and Manning
2014)) with deep learning models (LSTM, IndRNN (Li et
al. 2018)). However, we didn't observe better performance,
particularly in task 4.2. This could be because of the fact that
the sample size was small to learn the model parameters.
5.3 Sexual Violence Report Detection
Recall that the dataset has about 11K sexual violence reports
and 7K other tweets. MVC classifier achieves the best per-
formance in detecting sexual violence reports in tweets. It
can identify a report with a precision, recall, and F1-measure
of 0.804, 0.834, and 0.808, respectively. To further under-
stand the effectiveness of MVC, we used its SV R class
probabilities to conduct ranking evaluation. We measured
the accuracy of the top-k sentences by two commonly used
measures- Precision-at-k (P@k), and Average Precision-at-k
(AvgP@k). Table 5 shows these measures for various value
of k. In general, MVC achieves excellent performance in
ranking. For top 1000 sentences, its precision is 0.951. This
indicates that MVC has a strong agreement with human an-
notators on detecting sexual violence reports.
k
P@k
AvgP@k
25
1.0
1.0
50
1.0
1.0
100
1.0
1.0
300
0.993
0.997
500
0.982
0.993
1000
0.951
0.950
2500
0.798
0.935
Table 5: Ranking evaluation of sexual violence reports
5.4 Sexual Violence Report Characterization
In general, MVC outperforms other classifiers in charac-
terizing sexual violence reports. It achieves the highest
weighted-average F1-measure in all the categorization tasks.
The weighted-average F1-measure for violence, victim, gen-
der, and perpetrator categorization is 0.57, 0.82, 0.612, and
0.55, respectively.
Violence and Victim Category MVC also achieves the
best precision and recall in detecting penetration related
(P EN) sexual violence reports. In case of detecting un-
wanted sexual contact (U SC), the GDB has the best preci-
sion (0.736) and F1-measure (0.724). None of the classifiers
performed well in case of detecting non-contact sexual ex-
perience (N SE). It could be because of the comparatively
limited sample or class imbalance. The SVM achieves the
best F1-measure (0.4) in this category which is 0.15 higher
than a random guess. SVM and MVC comparatively per-
form well in detecting whether the sexual violence report is
a self-report or not. MVC achieves the best weighted aver-
age F1-measure- 0.82.
Gender Category Similar argument can be made for
M AL category in gender categorization. Although the per-
formances are reasonable for F EM, and U N S but M AL
measures, particularly recall and F1-measure, are lower than
random guess. This suggests that many M AL reports were
mis-classified into other categories. A further look into the
confusion matrix reveals that 57% and 35% of M AL reports
were classified as U N S and F EM, respectively.
Perpetrator Category MVC achieves the best weighted
F-1 measure in all perpetrator categories. The weighted av-
erage F1-measure is 0.55, 0.38 higher than a random guess.
Our annotation scheme collects the perpetrator denoting
words from the tweets (see Section 3.3, 3.4 and Exam-
ple 1 for reference). We used Conditional Random Field
(CRF) (Lafferty, McCallum, and Pereira 2001) to train a se-
quence labeling model using these words. We used the BIE
(begin-inside-end) notation to tag the perpetrator word se-
quences. Words those were not part of the perpetrator se-
quence, were assigned the O tag. For instance, the tweet
"in the subway an old man grabbed me" would be tagged
as- {in-O, the-O, subway-O, an-B, old-I, man-E, grabbed-
O, me-O}. We used the words, their prefix and suffix, and
their parts-of-speech tags as features while training the se-
quence labeling model. In total, 8, 614 sexual violence re-
porting tweets were labeled with perpetrator words. We did
a 5-fold cross-validation. Table 6 shows performance of the
CRF perpetrator text labeling model in terms of precision,
recall, and F1-measure. The model achieves a weighted-
average F1-measure of 0.943 (0.70 if class O is not consid-
ered). We observe that the performance for class I is low. As
most of the highlighted perpetrator text (6, 653 out of 8, 614)
was less than or equal two words, we didn't have enough
sample for class I. For the B and E classes, the F1-measures
were above 0.76.
Class
O
B
E
I
Avg / total
Precision Recall
0.959
0.989
0.703
0.840
0.739
0.883
0.218
0.601
0.943
0.949
F1-measure
0.974
0.765
0.805
0.320
0.943
Support
35440
1723
1723
871
39757
Table 6: Performance of perpetrator labeling
6 Case Studies
Using the above described classifiers, we conduct an ex-
ploratory analysis on two cases- i) the #MeToo movement
and ii) the Post-Metoo era. The data collection method for
the #Metoo has been explained in Section 3.1. For the Post-
MeToo case, we collected 631, 677 tweets from May, 2019
when the #MeToo movement was not the major news topic
in the world.
Classifier
Categories
Sexual Violence Report
Violence Category
Victim Category
Gender Category
Perpetrator Category
nSV R
SV R
weighted-Avg
N SE
OT H
P EN
U SC
weighted-Avg
SLF
nSLF
weighted-Avg
F EM
M AL
U N S
weighted-Avg
F AM
F RN
IN T
P N M
P OW
ST R
weighted-Avg
SVM
R
0.666
0.802
0.754
0.358
0.452
0.532
0.718
0.554
0.714
0.878
0.818
0.538
0.092
0.782
0.616
0.466
0.346
0.340
0.770
0.482
0.434
0.548
P
0.708
0.810
0.772
0.456
0.422
0.560
0.678
0.558
0.780
0.842
0.818
0.618
0.642
0.618
0.618
0.692
0.512
0.708
0.502
0.656
0.574
0.568
F-1
0.662
0.798
0.744
0.400
0.432
0.546
0.694
0.554
0.744
0.860
0.818
0.576
0.154
0.688
0.592
0.552
0.410
0.452
0.604
0.552
0.486
0.532
P
0.710
0.786
0.758
0.444
0.434
0.548
0.736
0.572
0.766
0.768
0.766
0.708
0.616
0.614
0.654
0.696
0.582
0.546
0.488
0.726
0.622
0.590
GDB
R
0.620
0.810
0.740
0.358
0.454
0.576
0.720
0.570
0.532
0.902
0.770
0.476
0.078
0.892
0.642
0.472
0.326
0.354
0.814
0.426
0.426
0.550
F-1
0.632
0.792
0.732
0.394
0.440
0.560
0.724
0.566
0.626
0.832
0.756
0.570
0.138
0.728
0.606
0.552
0.418
0.424
0.610
0.536
0.496
0.534
P
0.736
0.798
0.778
0.446
0.434
0.574
0.664
0.556
0.77
0.83
0.81
0.648
0.570
0.632
0.630
0.674
0.618
0.640
0.486
0.660
0.590
0.578
RDF
R
0.628
0.830
0.756
0.276
0.420
0.576
0.760
0.566
0.694
0.876
0.808
0.540
0.062
0.826
0.634
0.436
0.308
0.314
0.808
0.448
0.428
0.546
F-1
0.648
0.804
0.746
0.340
0.426
0.576
0.708
0.556
0.726
0.852
0.802
0.586
0.108
0.716
0.604
0.526
0.406
0.414
0.608
0.526
0.490
0.524
MVC
R
0.638
0.834
0.760
0.336
0.434
0.584
0.758
0.580
0.688
0.898
0.822
0.522
0.074
0.858
0.642
0.482
0.330
0.360
0.830
0.478
0.432
0.564
P
0.752
0.804
0.782
0.484
0.444
0.578
0.686
0.572
0.802
0.834
0.826
0.680
0.642
0.624
0.650
0.718
0.610
0.682
0.500
0.702
0.642
0.604
F-1
0.656
0.808
0.750
0.394
0.438
0.580
0.718
0.570
0.738
0.864
0.820
0.590
0.130
0.722
0.612
0.568
0.426
0.462
0.622
0.564
0.508
0.550
Table 7: Performance of different classifiers on the detection and characterization tasks
6.1 The #MeToo Movement
We apply our sexual violence report detecting and character-
izing classifiers on the 0.49 million tweets (except the tweets
which were used to train the models) which were collected
during the #MeToo movement's prime time (see details in
Section 3.1). Our goal is to understand to what extent sexual
violence experiences were reported during this movement,
what were the nature of the violence, who are the perpetra-
tors, and more.
Extent of Sexual Violence Our classifiers
identify
106, 885 tweets containing sexual violence reports. 59, 776
of them are self-reported (SLF ). To conduct a robust anal-
ysis with high-probable violence reports, we identified the
SLF s with SV R class probability greater than or equal to
0.7. This threshold is set empirically, after attempting with
multiple smaller and larger values. There are 25, 163 self-
reports which surpass this threshold. We continue our anal-
ysis with these high SV R class probability, SLF labeled
reports only. 4, 462 of these SLF reports are from female
(F EM) victims, 105 from male (M AL), and 20, 596 be-
long to U N S.
Nature of Violence Our violence category classifier finds
that out of 25, 163 SV R, SLF labeled reports, 1, 866,
3, 477, 9, 193, and 10, 627 reports are classified as N SE,
OT H, P EN, and U SC, respectively.
Perpetrator Category The perpetrator classifier finds that
10, 698 (42.5%) of the reports contain specific perpetrator
information and the rest didn't mention perpetrator in the
tweet. Table 8 shows the distribution of perpetrator cate-
gories among these reports. Overall, we observe a large
Category
FAM
FRN
INT
POW
STR
Frequency
1112
2568
751
2408
3859
Percentage Tagged
10.39
24.00
7.02
22.51
36.07
442
731
230
1865
939
Percentage
39.75
28.47
30.63
77.45
24.33
Table 8: Perpetrator category distribution
number of violence committed by ST R (36.07%). Only
7.02% of the violence was attributed to IN T .
Perpetrator Annotation We apply the CRF perpetrator
text labeling model on the 10, 698 reports where perpetra-
tor information is provided. Overall, the model could tag
the perpetrator denoting text in 3, 391 reports. The rightmost
two columns in Table 8 shows the number and percentage of
tagged reports in each category. Figure 1 shows a wordcloud
of CRF tagged perpetrator text for each perpetrator category.
The font size signifies relative frequency of a text. Overall,
CRF identifies different roles under each category. For ex-
ample, the F AM cloud shows father, brother, cousin, un-
cle, step father etc. The P OW cloud shows boss, teacher,
manager, professor and so on. In Section 6.2, we provide
more examples of reports with annotated perpetrator text.
Violence-Perpetrator Relation We further investigate the
relation between perpetrator category and the nature of vi-
olence. Figure 2 shows the number of reports for each
violence-perpetrator category pairs (left). Overall, the most
common reports are about unwanted sexual contact by
(a) INT
(b) FAM
Figure 1: Perpetrator text tagged by CRF in each perpetrator category. Font size is proportion to relative frequency.
(c) FRN
(d) POW
(e) STR
strangers (U SC − ST R) and the least common is non-
contact unwanted sexual experience by intimate partners
(N SE − IN T ). Figure 2 also shows the percentages of
sexual violence categories across the perpetrators (middle)
and the percentages of perpetrator categories across the vio-
lence (right). An interesting observation is that intimate part-
ners mostly conduct penetration related violence (62.18%)
but, penetration violence is least done by intimate partners
(13.21%). Strangers mostly commit unwanted sexual con-
tacts (72.19%); almost 5 times more than the second most
common violence category (P EN, 15.03%). At the same
time, strangers are also the most common perpetrator of the
U SC category (50.72%); more than twice as common as
the next probable perpetrator category (P OW, 20.19%). For
non-contact unwanted sexual experiences, person in posi-
tion of power/authority/trust (P OW ) and ST R are signifi-
cantly more responsible than others. Also, P OW is the sec-
ond most common perpetrator class in each of the violence
categories. Overall, the perpetrators who are closer to the
victims (F AM, IN T , F RN) are related to severe sexual
violence (P EN) more than to what the less closer perpe-
trators (ST R, P OW ) relate. Also, the less closer perpetra-
tors (ST R, P OW ) are more related to mild sexual violence
(U SC, N SE) compared to the closer perpetrators (F AM,
IN T , F RN).
6.2 Post-MeToo Period
Even though the spirit of the #MeToo movement is still
present to some extent, the momentum diminished from its
initial period. We wanted to investigate- to what extent peo-
ple take social media to share their sexual violence expe-
rience without the presence of an active online movement.
So, we collected about 631, 677 tweets from May, 2019, one
and a half year after the movement became viral, using the
Twitter Streaming API by querying the 27 keywords in H
(see Section 3.2 for reference). Then, we applied the classi-
fication and sequence labeling models over these tweets. In
total, we find 4, 830 (0.76%) self-reported sexual violence
reports that had a SV R class probability >= 0.7. The CRF
perpetrator tagger could label 655 of these reports with per-
petrator text. Table 9 shows top-10 sexual violence reports
with respect to the SV R class probability. The CRF tagged
perpetrator text in each report is highlighted with red color
bold font. The predicted SV C category is also presented
on the left column. CRF could correctly tag the complete
perpetrator text in 6 cases (e.g., 1, 7). However, there are
some false positives as well, 2, 4, 6 for example. We plan
to continue get more data annotated, including tweets with-
out #MeToo hashtag, and improve the quality of the models
which can further reduce the amount of false positives.
7 Discussion
In this paper, we present a data-driven, supervised learning
approach of mining sexual violence reports from social me-
dia. We envision several pathways regarding how the out-
comes of this paper can create impact in the real world. First,
the sexual violence supporting coalitions across the world
can benefit from this work. Currently, the coalitions depend
on the victims' self-reports to them before they can provide
any support. An automated tracker can assist the coalitions
in identifying the victims. As explained in the Literature Re-
view section, many victims do not go to the authority due
to different reasons. An automated tracker can find the self-
reported victims in social networks and connect with the au-
thorities. Second, we understand that there is room for ad-
versarial attacks. One way to mitigate those attacks is to de-
sign an human-in-the-loop system. The output from this au-
tomated tracker can be feed to a set of human domain experts
before any decisions or actions are made on the identified re-
ports. Third, due to the sensitivity of the issue, it is possible
that the user who publicly shared a sexual violence report
on social media may not actually want to be contacted by
support centers or law and regulatory entities. It is an issue
that demands further research; how to support the victims
without the conventional support centers. One possible idea
could be creating a social community of sexual violence vic-
tims that can provide mental and logistical supports to the
peers. We plan to continue working along this line in future.
8 Limitations
We present a data-driven, supervised learning approach of
mining sexual violence reports from social media in this pa-
per. Our proposed technique can identify the reports with
a precision and recall of 80.4% and 83.4%, respectively.
Our techniques can also characterize the identified reports
in terms of violence severity, perpetrator category, and gen-
der. We also automatically tag the perpetrator text if that
is present in a report. However, there are some limita-
tions. First, we only used the unigram and bigram fea-
tures. One possible improvement could be exploiting the
user specific and network specific features. These features
can particularly improve the gender and victim characteri-
zation. Second, the lack of samples in some characterization
classes created class imbalance problem. Although, we ex-
perimented with undersampling and oversampling methods
(details not provided in this paper), but that didn't improve
generalization ability of the models. That is why proceeded
with actual sample sizes. One can collect more samples of
the undersampled classes and improve the overall perfor-
mances of the models. More data samples would also al-
low leveraging deep learning based models. Third, we didn't
consider credibility of a report into account. So, our mod-
Figure 2: Distribution of Sexual Violence and Perpetrator pairs. (left: frequency, middle: percentage of sexual violence cate-
gories across the perpetrators, right: percentage of perpetrator categories across the violence.
i was 8 years old asleep when my biological father first raped me. he didn't give a fuck about what i was wearing. instead
Tweet
No. SV C
PEN
1
USC my boss at dominos was telling me about how he was walking his dog at 2am &; some guy in a truck stopped to talk to
2
USC my mother was married 12 times and one of the use to touch me i am a molested victim ...i got saved when i was 14
3
PEN
4
5
USC
USC
6
USC
7
USC @parkersuave is it the same guy that tried to touch dababy ass when he agreed to take the picture
8
USC @jeff lj lloyd he def used his body to push the guy back until he fell, then tried to act like he didn't do anythin
9
this one guy told us how his father died and he said dead asss word for word woke up in the middle of the night
10
PEN
i also, zero hates bible thumpers. he hates religion. when his pastor used to rape him, he would insist it was god
rt @drippinswagu: @parkersuave is it the same guy that tried to touch dababy ass when he agreed to take the picture
likethe nigga friend could be dead ass struggle dude in jail ask him for a couple dollars he say no cus he strugglin
tw// assaulti was wearing leggings and an oversized sweatshirt when a 16 year old boy grabbed my thighs and told
Table 9: Examples of self-reported sexual violence reports. Perpetrator texts are annotated in red.
els cannot discern a true sexual violence report from a false
claim.
9 Conclusion
In this paper, we address the sexual violence report detec-
tion and characterization task using data-driven, machine
learning approach. In the process, we make several con-
tributions. First, we collect about a million #MeToo hash-
tagged tweets from the period when the movement was in its
prime. We systematically annotated a subset of these tweets
using Amazon Mechanical Turk following Center for Dis-
ease Control and Prevention (CDC) guidelines. To the best
of our knowledge, it is the first annotated dataset of sexual
violence reports. We employed supervised classification and
sequence labeling algorithms to train models using these an-
notated data. Our models can identify the sexual violence re-
ports with a precision of 80.4% and characterize the reports
with respect to four characteristics. Our sequence labeling
model can annotate the perpetrator identity from a report
with an average F1-measure of 76%. We use these models
to analyze the full #MeToo corpus and another Post-MeToo
corpus. Our analysis finds some interesting insights such as
the relationship between violence severity and perpetrator
category. We argue that our contributions in this paper, the
annotated data, models, and insights, can be useful in de-
signing an automated, scalable, and reliable sexual violence
reports tracking system that can assist the victims by con-
necting them with appropriate authorities and at the same
time help relevant entities such as human rights groups, law
and regulatory agencies to reach the victims. In future, our
goal is to address the limitations and implement an auto-
mated data-driven tracking system.
Data Sharing and Reproducibility Statement We have
made 25% of our collected #MeToo hashtagged data pub-
licly available. We plan to make the full data public con-
tingent on the decision of the paper. We also plan to make
50% of our annotated data open for researchers. Moreover,
we will make our code public through github to facilitate
reproducibility of our findings.
References
[Ahmed et al. 2014] Ahmed, S. I.; Jackson, S. J.; Ahmed, N.; Fer-
dous, H. S.; Rifat, M. R.; Rizvi, A.; Ahmed, S.; and Mansur, R. S.
2014. Protibadi: A platform for fighting sexual harassment in urban
bangladesh. In Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, 2695 -- 2704. ACM.
[Ahmed et al. 2016] Ahmed, S. I.; Ahmed, N.; Hussain, F.; and Ku-
mar, N. 2016. Computing beyond gender-imposed limits. In Pro-
ceedings of the Second Workshop on Computing within Limits, 6.
ACM.
[Andalibi et al. 2016] Andalibi, N.; Haimson, O. L.; De Choudhury,
M.; and Forte, A. 2016. Understanding social media disclosures of
sexual abuse through the lenses of support seeking and anonymity.
In Proceedings of the 2016 CHI Conference on Human Factors in
Computing Systems, 3906 -- 3918. ACM.
[Aroussi 2011] Aroussi, S. 2011. women, peace and security: ad-
dressing accountability for wartime sexual violence. International
Feminist Journal of Politics 13(4):576 -- 593.
[Banyard 2011] Banyard, V. L. 2011. Who will help prevent sexual
violence: Creating an ecological model of bystander intervention.
Psychology of violence 1(3):216.
[Bergman et al. 2002] Bergman, M. E.; Langhout, R. D.; Palmieri,
P. A.; Cortina, L. M.; and Fitzgerald, L. F. 2002. The (un) reason-
ableness of reporting: Antecedents and consequences of reporting
sexual harassment. Journal of Applied Psychology 87(2):230.
[Bhattacharyya 2018] Bhattacharyya, R. 2018. # metoo movement:
An awareness campaign.
[Cantor et al. 2015] Cantor, D.; Fisher, B.; Chibnall, S. H.;
Townsend, R.; Lee, H.; Thomas, G.; Bruce, C.; and Westat, I. 2015.
Report on the aau campus climate survey on sexual assault and sex-
ual misconduct.
[Carreras and M`arquez 2005] Carreras, X., and M`arquez, L. 2005.
Introduction to the conll-2005 shared task: Semantic role labeling.
In Proceedings of the Ninth Conference on Computational Natu-
ral Language Learning, 152 -- 164. Association for Computational
Linguistics.
[Clay-Warner 2003] Clay-Warner, J. 2003. The context of sexual
violence: Situational predictors of self-protective actions. Violence
and Victims 18(5):543.
[Dimond et al. 2013] Dimond, J. P.; Dye, M.; LaRose, D.; and
Bruckman, A. S. 2013. Hollaback!: the role of storytelling online
in a social movement organization. In Proceedings of the 2013 con-
ference on Computer supported cooperative work, 477 -- 490. ACM.
[Felson and Par´e 2005] Felson, R. B., and Par´e, P.-P. 2005. The
reporting of domestic violence and sexual assault by nonstrangers
to the police. Journal of marriage and family 67(3):597 -- 610.
[Fisher et al. 2003] Fisher, B. S.; Daigle, L. E.; Cullen, F. T.; and
Turner, M. G. 2003. Reporting sexual victimization to the police
and others: Results from a national-level study of college women.
Criminal justice and behavior 30(1):6 -- 38.
[Fitzgerald et al. 1997] Fitzgerald, L. F.; Drasgow, F.; Hulin, C. L.;
Gelfand, M. J.; and Magley, V. J. 1997. Antecedents and conse-
quences of sexual harassment in organizations: a test of an inte-
grated model. Journal of Applied psychology 82(4):578.
[Fitzgerald 1993] Fitzgerald, L. F. 1993. Sexual harassment: Vi-
olence against women in the workplace. American Psychologist
48(10):1070.
[Garrett and Hassan 2019] Garrett, A., and Hassan, N. 2019. Un-
derstanding the silence of sexual harassment victims through the#
whyididntreport movement. In Proceedings of the 2019 IEEE/ACM
International Conference on Advances in Social Networks Analysis
and Mining 2019. ACM.
[Gelfand, Fitzgerald, and Drasgow 1995] Gelfand, M. J.; Fitzger-
ald, L. F.; and Drasgow, F. 1995. The structure of sexual harass-
ment: A confirmatory analysis across cultures and settings. Journal
of Vocational Behavior 47(2):164 -- 177.
[He et al. 2017] He, L.; Lee, K.; Lewis, M.; and Zettlemoyer, L.
2017. Deep semantic role labeling: What works and what's next.
In Proceedings of the Annual Meeting of the Association for Com-
putational Linguistics.
[Hester, Kelly, and Radford 1996] Hester, M.; Kelly, L.; and Rad-
ford, J. 1996. Women, violence, and male power: Feminist ac-
tivism, research, and practice. Open University Press Buckingham.
[Houston and Kramarae 1991] Houston, M., and Kramarae, C.
1991. Speaking from silence: Methods of silencing and of resis-
tance. Discourse & Society 2(4):387 -- 399.
[Jaffe 2018] Jaffe, S. 2018. The collective power of# metoo. Dis-
sent 65(2).
[Kathleen C. Basile 2014] Kathleen C. Basile, Sharon G. Smith, M.
J. B. M. C. B. R. M. 2014. Sexual violence surveillance: Uniform
definitions and recommended data elements. https://www.cdc.gov/
violenceprevention/pdf/sv surveillance definitionsl-2009-a.pdf.
[Online; accessed 24-April-2019].
[Kearl 2018] Kearl, H. 2018. The facts behind the# metoo move-
ment: A national study on sexual harassment and assault (executive
summary).
[Khatua, Cambria, and Khatua 2018] Khatua, A.; Cambria, E.; and
Khatua, A. 2018. Sounds of silence breakers: Exploring sexual
violence on twitter. In 2018 IEEE/ACM International Conference
on Advances in Social Networks Analysis and Mining (ASONAM),
397 -- 400. IEEE.
[Krebs et al. 2007] Krebs, C. P.; Lindquist, C. H.; Warner, T. D.;
Fisher, B. S.; and Martin, S. L. 2007. The campus sexual assault
(csa) study. Washington, DC: National Institute of Justice, US De-
partment of Justice.
[Krug et al. 2002] Krug, E. G.; Mercy, J. A.; Dahlberg, L. L.; and
Zwi, A. B. 2002. The world report on violence and health. The
lancet 360(9339):1083 -- 1088.
[Lafferty, McCallum, and Pereira 2001] Lafferty,
J.; McCal-
lum, A.; and Pereira, F. C. 2001. Conditional random fields:
Probabilistic models for segmenting and labeling sequence data.
[Li et al. 2018] Li, S.; Li, W.; Cook, C.; Zhu, C.; and Gao, Y. 2018.
Independently recurrent neural network (indrnn): Building a longer
and deeper rnn. In Proceedings of the IEEE Conference on Com-
puter Vision and Pattern Recognition, 5457 -- 5466.
[Loy and Stewart 1984] Loy, P. H., and Stewart, L. P. 1984. The
extent and effects of the sexual harassment of working women. So-
ciological focus 17(1):31 -- 43.
[Manikonda et al. 2018] Manikonda, L.; Beigi, G.; Liu, H.; and
Kambhampati, S. 2018. Twitter for sparking a movement, reddit
for sharing the moment:# metoo through the lens of social media.
arXiv preprint arXiv:1803.08022.
Dependency and autonomy:
[Mitter 1992] Mitter, S.
1992.
Women's employment and the family in calcutta. Feminist Review
41(1):133 -- 135.
[Nair and John 2000] Nair, J., and John, M. E. 2000. A question of
silence: The sexual economies of modern India. Zed Books.
[Pennington, Socher, and Manning 2014] Pennington, J.; Socher,
R.; and Manning, C. 2014. Glove: Global vectors for word rep-
resentation. In Proceedings of the 2014 conference on empirical
methods in natural language processing (EMNLP), 1532 -- 1543.
[Pradhan et al. 2012] Pradhan, S.; Moschitti, A.; Xue, N.;
Uryupina, O.; and Zhang, Y. 2012. CoNLL-2012 shared task:
Modeling multilingual unrestricted coreference in OntoNotes.
In Proceedings of the Sixteenth Conference on Computational
Natural Language Learning (CoNLL 2012).
[Rodino-Colocino 2018] Rodino-Colocino, M. 2018. Me too,#
metoo: countering cruelty with empathy. Communication and Crit-
ical/Cultural Studies 15(1):96 -- 100.
[Shalhoub-Kevorkian 2003] Shalhoub-Kevorkian, N. 2003. Reex-
amining femicide: Breaking the silence and crossing scientific bor-
ders. Signs: Journal of Women in Culture and Society 28(2):581 --
608.
[Spencer et al. 2017] Spencer, C.; Mallory, A.; Toews, M.; Stith, S.;
and Wood, L. 2017. Why sexual assault survivors do not report to
universities: A feminist analysis. Family relations 66(1):166 -- 179.
[Tambe 2018] Tambe, A. 2018. Reckoning with the silences of#
metoo. Feminist Studies 44(1):197 -- 203.
[Tippett 2018] Tippett, E. C. 2018. The legal implications of the
metoo movement. Minn. L. Rev. 103:229.
[UN WOMEN contributors 2017] UN WOMEN contributors.
2017. Un women: Facts and figures: Ending violence against
http://www.unwomen.org/en/what-we-do/ending-
women.
violence-against-women/facts-and-figures.
[Online; accessed
24-April-2019].
[Young 2014] Young, C. 2014. Harassmap: using crowdsourced
data to map sexual harassment in egypt. Technology Innovation
Management Review 4(3).
|
1608.04418 | 4 | 1608 | 2016-11-03T17:44:11 | A Note on Markov Normalized Magnetic Eigenmaps | [
"cs.SI",
"physics.soc-ph"
] | We note that building a magnetic Laplacian from the Markov transition matrix, rather than the graph adjacency matrix, yields several benefits for the magnetic eigenmaps algorithm. The two largest benefits are that the embedding becomes more stable as a function of the rotation parameter g, and the principal eigenvector of the magnetic Laplacian now converges to the page rank of the network as a function of diffusion time. We show empirically that this normalization improves the phase and real/imaginary embeddings of the low-frequency eigenvectors of the magnetic Laplacian. | cs.SI | cs |
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
ALEXANDER CLONINGER
Abstract. We note that building a magnetic Laplacian from the Markov transition
matrix, rather than the graph adjacency matrix, yields several benefits for the magnetic
eigenmaps algorithm. The two largest benefits are that the embedding becomes more
stable as a function of the rotation parameter g, and the principal eigenvector of the
magnetic Laplacian now converges to the page rank of the network as a function of
diffusion time. We show empirically that this normalization improves the phase and
real/imaginary embeddings of the low-frequency eigenvectors of the magnetic Laplacian.
1. Introduction
We consider the problem of building a diffusion operator on directed networks and graphs
with adjacency matrix W ∈ RN×N that parallels Diffusion Maps on undirected networks
[1]. A natural approach to this is to build the Magnetic Eigenmaps Laplacian [2],
L = D − T ◦ W (s),
and Di,i =(cid:80)
where (T ◦ W (s))i,j = e2πig(Wj,i−Wi,j ) Wi,j +Wj,i
i,j . This method assigns a
complex rotation to asymmetric links. This approach generalizes the notion of building a
diffusion map or graph embedding to work on directed graphs.
j W (s)
2
In this note, we observe that Markov normalization of the adjacency matrix,
P (x, y) =
(cid:80)
W (x, y)
y W (x, y)
,
allows us to introduce the notion of diffusion time steps, which is capable of capturing
the evolution of the process. Markov normalization of the graph adjacency matrix yields
several benefits:
(1) normalizing the complex rotation matrix e2πig(Pj,i−Pi,j ) by the density of the node,
which emphasizes absorbing states and converges to the stationary distribution of
the process,
(2) stabilizing the phase embedding with respect to choice of the rotation parameter
g,
(3) separating the long time trend of the process into the first eigenvector and recurrent
states into subsequent eigenvectors, and
(4) introducing diffusion time, which allows for the study of multi-step neighborhoods.
We further note that it is possible to augment the adjacency matrix by a transportation
factor, as is done in the PageRank algorithm , when there exists an absorbing state [3].
1
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
2
For a small α > 0, we replace P → (1 − α)P + α11
(cid:124)
. This creates a small probability of
jumping from any node to any other node, and thus escaping a sink in the process and
making the process ergodic.
For the rest of the paper we will assume that the adjacency matrix P is ergodic, under
the pretense that if there is an absorbing state, we simply add a transportation factor.
2. Markov Property and Diffusion Time
An important aspect of diffusion maps is the ability to separate the statistics of the sam-
pling distribution from the geometry of the underlying manifold [4]. This is accomplished
by normalizing the affinity between points by the overall transition probability,
(cid:40)(cid:80)
P = T −1W, where Tx,y =
y W (x, y), x = y
x (cid:54)= y
.
0,
This also allows us to consider the properties of the multiple time step diffusion process
P t for t ∈ R+. For a symmetric process (i.e. undirected graph), the embedding of this
process remains stable. This is because, if the eigendecomposition is P = ΦΛΦ∗, then
P t = (ΦΛΦ∗)t = ΦΛtΦ∗.
However, for a non-symmetric graph, this property no longer holds. Thus the eigenvectors
of P t will exhibit time dependence beyond a simple multiplicity factor.
The markov normalized magnetic Laplacian then takes the form of
i,j = Di,j − e2πig(P t
L(t)
j,i−P t
i,j ) P t
i,j + P t
j,i
2
, where Di,i =
1
2
(cid:88)
(cid:0)P t
j
(cid:1) .
i,j + P t
j,i
Adjusting the weight matrix to be Markov normalized has several implications on the
magnetic Laplacian. In diffusion on a symmetric graph, normalizing by the node density
causes the principal eigenvector φ0 to be a constant across all nodes and is thus trivial.
However, when the network is not symmetric, the principal eigenvector takes on a much
more important role. Namely, the principal eigenvector recovers the degree of asymmetry
between nodes. This implies that, as t increases, the phase of the eigenvectors converges
to the page rank of the network.
i,j > 0 for all i, j. Let Lnorm = D−1/2LD−1/2
Theorem 1. Suppose there exists T such that P T
be the normalized magnetic Laplacian. Then in the limit as t → ∞, the principal eigen-
vector of the normalized Laplacian Lnorm = limt L(t)
norm (denoted φ) converge to
(cid:18) 1 +(cid:80)
(cid:19)1/2
,
j Pj,i
2
i = c · e2πghi
φ(g)
where h = pagerank(P ) (i.e. the stationary distribution of P ), and c ∈ C.
Proof. From Theorem 1 in [2], we know that the magnetic Laplacian L has a zero eigenvalue
iff ∃h such that ai,j = hj − hi. Furthermore, we know that, in this case, φ(g)
k,i = e2πighiφ(0)
k,i .
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
3
We also know that, since P is ergodic by assumption, P t
pagerank(P ). That means ai,j = P t
Let v be the principal eigenvector of I − D−1/2PsymD−1/2, where Psym =(cid:0) P +P ∗
Dxx =(cid:80)
j,i = hj − hi.
i,j − P t
. Then
2
i,· = h as t → ∞, where h =
(cid:1) and
y(Psym)xy = 1+(cid:80)
(cid:16)
I − D−1/2PsymD−1/2(cid:17)
x Pxy
2
v = 0 =⇒ (cid:16)
D1/2 − PsymD−1/2(cid:17)
(cid:1) x = 0,
=⇒ (D − Psym) x = 0
=⇒ (cid:0)I − D−1Psym
v = 0
where x = D−1/2v. Because D−1Psym is row stochastic, we know x = 1, so v = D1/21.
Since φ(g)
k,i = e2πighiφ(0)
k,i , we know
φ(g)
i
= e2πighi(c · D1/2
= c · e2πighi
(cid:18) 1 +(cid:80)
)
i
(cid:19)1/2
.
j Pj,i
2
(cid:3)
This only applies in the limit as t → ∞. The embeddings of L(t) for small t, and even
t = 1, yield valuable properties due to the Markov normalization. We show this empirically
in Section 3.
3. Examples
In all examples of the Markov normalized process, we will refer to a value of g ∈ [0, 1/2)
that is on the same scale as for the unnormalized Laplacian. However, due to the weights
being normalized to sum to 1, they are actually on a different scale than the unnormalized
weights matrix. For that reason, we set g ← g/max(max(P )) for the Markov normalized
weights so that the degree of rotation is on the same order of magnitude for both methods.
3.1. Three Cluster Example. We begin with the three cluster example from [2]. This
example is particularly simple given that the complex rotation of three clusters will, more
often than not, keep the clusters separated. However, for small values of g, rotation of
the unnormalized asymmetric weights matrix yields insufficient separation between the
clusters, as shown in Figure 1. In fact, Figure 2 shows the percentage of points that cluster
correctly across 100 uniform random small values of g (g < 0.25), where clustering was
done by k-means with k = 3.
By incorporating the notion of diffusion time, we are also able to observe the time
dynamics of this process. Figure 8 in the appendix shows the embedding for each t ∈
{1, 2, ..., 9}. Notice that after 3 and 4 time steps, the clusters become momentarily blurred.
This is because, by that time, most of the energy from cluster 1 will have moved to clusters 2
and 3, etc. However, after that momentary blurring, the process stabilizes and we continue
to see the three clusters rotating about each other for larger t. This tells us that there is
a global mixing time of t > 1 for the process to satisfy Pi,j > for all i, j.
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
4
Unnormalized Embedding
Unnormalized Phase
Unnormalized Phase vs Page Rank
Markov Normalized Embedding Markov Normalized Phase Markov Normalized Phase vs Page Rank
Figure 1. Three clusters with P (inCluster) = 0.5, P (outCluster) = 0.5,
P (rotateClockwise) = 0.9, and with parameter g = 0.04. The markov
normalized embeddings are with t = 1, though the bottom right page rank
plot is for t = 4 to allow sufficient time to converge.
Unnormalized Embedding Hist
Markov Normalized Embedding Hist
Figure 2. Three clusters with P (inCluster) = 0.5, P (outCluster) = 0.5,
P (rotateClockwise) = 0.9, and with random parameter g < 0.25. The
markov normalized embeddings are with t = 1.
3.2. Circle with Drift. We consider data distributed on a unit circle, with drift in the
counterclockwise direction. This is an interesting process as it has a very large mixing
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
5
time. We define the affinity between points to be
(cid:40)
k(x, y) =
e−(cid:107)x−y(cid:107)2/5σ2, (cid:93)xy ≥ 0
e−(cid:107)x−y(cid:107)2/σ2, (cid:93)xy < 0
,
where (cid:93)xy measures the angle between the points. The affinity matrix is seen in Figure 9
in the appendix.
Figure 3 compares the different normalizations and eigenvectors for the circle with drift.
By normalizing the weights matrix, the first eigenvector is once again the trivial eigenvector.
Subsequent eigenvectors recover the geometry of the circle.
Unnormalized Embedding
Unnormalized Phase
Markov Normalized Embedding Markov Normalized Phase
Figure 3. Circle with drift, colored by angle in original data. Top: Un-
normalized and leading two eigenvectors, Bottom: Markov normalized and
first two non-trivial eigenvectors. g = 0.04
The higher order eigenvectors also contain useful information, as in diffusion maps.
They mimic the sins and cosines of the angle around the circle, as the Fourier functions
{einx} are eigenfunctions of the Laplacian on the circle. We wish to recover these functions
independent of the sampling density on the circle. Figure 10 in the appendix shows that
the Markov normalized weights matrix gives a closer approximation of the sin multiples
on the circle that comes from the unnormalized weights matrix. Note that the data used
here is not uniformly sampled across the circle.
3.3. Bow Tie Example. Another issue with not including a diffusion time is the need for
g to implicitly assume the number of clusters. By setting g to be 1/k for k clusters as the
authors suggest [2], the complex rotation can lose valuable information about transitions
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
6
that aren't k periodic. We demonstrate this with an example similar to the three cluster
example from Section 3.1. We build a three cluster cycle among clusters 1,2, and 3, and a 5
cluster cycle among clusters 1, 4, 5, 6, and 7. By normalizing the weights, we see in Figure
4 that the non-principal eigenvectors capture the geometry of the process. Moreover, we
discount the fact that cluster 1 appears in both cycles, and will end with twice the energy
of the other clusters for large t.
Unnormalized Embedding
Unnormalized Phase
Markov Normalized Embedding Markov Normalized Phase
Figure 4. Bow tie clusters with P (inCluster) = 0.5, P (outCluster) = 0.5,
P (rotateClockwise) = 0.9, and with g = 0.04. For Markov normalization,
we take t = 1.
We are also able to observe the time dynamics of this process. Figure 11 in the appendix
shows the embedding for each t ∈ {1, 2, ..., 9}. Notice that after 7 and 8 time steps, the
clusters become momentarily blurred. This is because, by that time, most of the energy
from one end of the bow tie has moved to the other. However, after that momentary
blurring, the process stabilizes and we continue to see the three clusters rotating about
each other for larger t. This tells us that there is a global mixing time of t > 6 for the
process to satisfy Pi,j > for all i, j. We can also see these dynamics in the affinity matrix
in Figure 12. And finally, we see in Figure 12 that after a large t, the phase of the leading
eigenvector converges to the page rank of the process.
3.4. Hidden Circle. As a different example, we consider a mix of absorbing and recurrent
states. The data we consider is a unit square with drift from left to right via
(cid:40)
k(x, y) =
e−(cid:107)x−y(cid:107)2/3σ2, x1 < y1
x1 ≥ y1
e−(cid:107)x−y(cid:107)2/σ2,
.
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
7
On top of that, we add an annulus in the middle of the unit square with counterclockwise
flow. The results of the phase and embedding are in Figure 5.
Unnormalized Phase V0
Unnormalized Phase V1
Unnormalized Embedding
Markov Normalized Phase V0 Markov Normalized Phase V1 Markov Normalized Embedding
Figure 5. g = 0.24, t = 4
Also, by not normalizing the phase rotation, low density points become separated in the
phase space (see Figure 6). This leads to discontinuity in the torus projection of the phase,
because the top and bottom edges of the square do not have much energy coming in.
Unnormalized Phase Torus Markov Normalized Phase Torus
Figure 6. g = 0.24, t = 1
3.5. Absorbing States. As a final example, we return to the three cluster example from
Section 3.1. We change this by removing one node's out going edges, making that node
an absorbing state. We augment the weights matrix for the normalized weights matrix by
adding a teleportation parameter of α = 0.1.
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
8
Unnormalized Phase
Unnormalized Embedding
Normalized Phase t = 1
Normalized Embedding t = 1
Normalized Phase t = 5
Normalized Embedding t = 5
Figure 7. Three cluster data with absorbing state from orange cluster.
Absorbing state in red. Top: diffusion time of 1, Bottom: diffusion time of
5. g = 0.04
We see in Figure 7 that, as time progresses, the state becomes more central to the Markov
normalized process while still maintaining the geometry of the three clusters. Moreover,
the phase of the principal eigenvector converges to the page rank of the process, correctly
placing the absorbing state in middling importance as in Figure 13 in the appendix. This
is compared to the unnormalized magnetic Laplacian, which captures the absorbing nature
of the red node, but loses the geometry of the other clusters or the relationship between
the absorbing state and cluster 3.
We note that Markov normalization of the graph adjacency matrix yields several benefits.
Normalization of the complex rotation matrix T converges to the page rank of the graph
4. Conclusion
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
9
for a large time, as in Section 3.1. The Markov normalization also stabilizes the phase
embedding over a larger choice of g, as in most examples in Section 3. By emphasizing the
absorbing states in the first eigenvector, this normalization separates the recurrent states
into subsequent eigenvectors as in Section 3.4. And finally, we can introduce diffusion time
into the process and observe the multi-step neighborhood dynamics of the graph, as in
most examples in Section 3.
References
[1] Coifman, Ronald R., and St´ephane Lafon. "Diffusion maps." Applied and computational harmonic
analysis 21.1 (2006): 5-30.
[2] Fanuel, Michael, et al. Magnetic Eigenmaps for Visualization of Directed Networks. arXiv preprint
arXiv:1606.08266 (2016).
[3] Page, Lawrence, et al. The PageRank citation ranking: bringing order to the web. (1999).
[4] Lafon, St´ephane S. Diffusion maps and geometric harmonics. Diss. Yale University, 2004.
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
10
Appendix
t=1
t=2
t=3
t=4
t=5
t=6
t=7
t=8
t=9
Figure 8. Three clusters with P (inCluster) = 0.5, P (outCluster) = 0.5,
P (rotateClockwise) = 0.9, and with g = 1/4. Evolve cluster from t ∈
{1, ..., 9}.
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
11
Figure 9. Affinity matrix for circle with drift
Normalized real(φ1)
Normalized real(φ3)
Normalized real(φ5)
Unnormalized real(φ1)
Unnormalized real(φ3)
Unnormalized real(φ5)
Figure 10. Circle with drift, colored by corresponding real part of real(φi).
Top: Markov normalized, Bottom: Unnormalized. The eigenvectors corre-
spond to multiples of sinusoids, the eigenvectors of the DFT matrix.
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
12
t=1
t=2
t=3
t=4
t=5
t=6
t=7
t=8
t=9
Figure 11. Bow tie clusters with P (inCluster) = 0.5, P (outCluster) =
0.5, P (rotateClockwise) = 0.9, and with g = 1/4. Evolve cluster from
t ∈ {1, ..., 9}.
Figure 12. Bow tie clusters affinity at t = 7 (left), and bow tie clusters
phase(V0) at t = 10 (right).
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS
13
Figure 13. Absorbing state principal eigenvector phase compared to the
page rank of the process.
|
1707.03375 | 1 | 1707 | 2017-07-11T17:28:05 | Trump vs. Hillary: What went Viral during the 2016 US Presidential Election | [
"cs.SI"
] | In this paper, we present quantitative and qualitative analysis of the top retweeted tweets (viral tweets) pertaining to the US presidential elections from September 1, 2016 to Election Day on November 8, 2016. For everyday, we tagged the top 50 most retweeted tweets as supporting or attacking either candidate or as neutral/irrelevant. Then we analyzed the tweets in each class for: general trends and statistics; the most frequently used hashtags, terms, and locations; the most retweeted accounts and tweets; and the most shared news and links. In all we analyzed the 3,450 most viral tweets that grabbed the most attention during the US election and were retweeted in total 26.3 million times accounting over 40% of the total tweet volume pertaining to the US election in the aforementioned period. Our analysis of the tweets highlights some of the differences between the social media strategies of both candidates, the penetration of their messages, and the potential effect of attacks on both | cs.SI | cs | Trump vs. Hillary: What went Viral during the
(cid:2)(cid:0)(cid:1)(cid:6) US Presidential Election
Kareem Darwish1, Walid Magdy2, and Tahar Zanouda1
1 Qatar Computing Research Institute, HBKU, Doha, Qatar
{kdarwish,tzanouda}@hbku.edu.qa,
2 School of Informatics, The University of Edinburgh, Scotland
[email protected]
7
1
0
2
l
u
J
1
1
]
I
S
.
s
c
[
1
v
5
7
3
3
0
.
7
0
7
1
:
v
i
X
r
a
Abstract. In this paper, we present quantitative and qualitative analysis
of the top retweeted tweets (viral tweets) pertaining to the US presidential
elections from September (cid:1), (cid:2)(cid:0)(cid:1)(cid:6) to Election Day on November (cid:8), (cid:2)(cid:0)(cid:1)(cid:6).
For everyday, we tagged the top (cid:5)(cid:0) most retweeted tweets as supporting or
attacking either candidate or as neutral/irrelevant. Then we analyzed the
tweets in each class for: general trends and statistics; the most frequently
used hashtags, terms, and locations; the most retweeted accounts and
tweets; and the most shared news and links. In all we analyzed the (cid:3),(cid:4)(cid:5)(cid:0)
most viral tweets that grabbed the most attention during the US election
and were retweeted in total (cid:2)(cid:6).(cid:3) million times accounting over (cid:4)(cid:0)% of the
total tweet volume pertaining to the US election in the aforementioned
period. Our analysis of the tweets highlights some of the differences
between the social media strategies of both candidates, the penetration
of their messages, and the potential effect of attacks on both.
Keywords: US elections, quantitative analysis, qualitative analysis, com-
putational Social Science.
Introduction
Social media is an important platform for political discourse and political cam-
paigns [(cid:2)(cid:6), (cid:3)(cid:1)]. Political candidates have been increasingly using social media
platforms to promote themselves and their policies and to attack their opponents
and their policies. Consequently, some political campaigns have their own social
media advisers and strategists, whose success can be pivotal to the success of the
campaign as a whole. The (cid:2)(cid:0)(cid:1)(cid:6) US presidential election is no exception, in which
the Republican candidate Donald Trump won over his main rival Hilary Clinton.
In this work, we showcase some of the Twitter trends pertaining to the US
presidential election by analyzing the most retweeted tweets in the sixty eight
days leading to the election and election day itself. In particular, we try to answer
the following research questions:
(cid:1)) Which candidate was more popular in the viral tweets on Twitter? What
proportion of viral tweets in terms of number and volume were supporting or
attacking either candidate?
(cid:2)) Which election related events, topics, and issues pertaining to each candi-
date elicited the most user reaction, and what were their effect on each candidate?
Which accounts were the most influential?
(cid:2)
Kareem Darwish et al.
(cid:3)) How credible were the links and news that were shared in viral tweets?
To answer these questions, we analyze the most retweeted (viral) (cid:5)(cid:0) tweets per
day starting from September (cid:1), (cid:2)(cid:0)(cid:1)(cid:6) and ending on Election Day on November
(cid:8), (cid:2)(cid:0)(cid:1)(cid:6). The total number of unique tweets that we analyze is (cid:3),(cid:4)(cid:5)(cid:0), whose
retweet volume of (cid:2)(cid:6).(cid:3) million retweets accounts for over (cid:4)(cid:0)% of the total
tweets/retweets volume concerning the US election during that period. We have
manually tagged all the tweets in our collection as supporting or attacking either
candidate, or neutral (or irrelevant). For the different classes, we analyze retweet
volume trends, top hashtags, most frequently used words, most retweeted accounts
and tweets, and most shared news and links. Our analysis of the tweets shows
some clear differences between the social media strategies of each candidate and
subsequent user responses. For example, our observations show that the Trump
campaign seems to be more effective than the Clinton campaign in achieving
better penetration and reach for: the campaign's slogans, attacks against his rival,
and promotion of campaign activities in different US states. We also noticed that
the prominent vulnerabilities for each candidate were Trump's views towards
women and Clinton's email leaks and scandal. In addition, our analysis shows
that the majority of tweets benefiting Clinton were actually more about attacking
Trump rather than supporting Clinton, while for Trump, tweets in his favor had
more balance between supporting him and attacking Clinton. By analyzing the
links in the viral tweets, the tweets attacking Clinton had the most number of
links (accounting for (cid:5)(cid:8)% of the volume of shared links), where approximately
half were to highly credible sites and the remaining were to sites of mixed
credibility. We hope that our observations and analysis would aid political and
social scientists in understanding some of the factors that may have led to the
eventual outcome of the election.
Background
Social media is a fertile ground for developing tools and algorithms that can
capture the opinions of the general population at a large scale [(cid:1)(cid:3)]. Much work has
studied the potential possibility of predicting the outcome of political elections
from social data. Yet, there is no unified approach for tackling this problem.
While Bollen et al. [(cid:4)] analyzed people's emotions (not sentiment) towards the
US (cid:2)(cid:0)(cid:0)(cid:8) Presidential campaign, the authors used both US (cid:2)(cid:0)(cid:0)(cid:8) Presidential
campaign and election of Obama as a case study. Sentiment typically signifies
preconceived positions towards an issue, while emotions, such as happiness or
sadness, are temporary responses to external stimulus. Though the authors
mentioned the feasibility of using such data to predict election results, they
did not offer supporting results. Using the same approach, O'Connor et al. [(cid:2)(cid:3)]
discussed the feasibility of using Twitter data to replace polls. Tumasjan et al. [(cid:2)(cid:7)]
provided one of the earliest attempts for using this kind of data to estimate
election results. They have used twitter data to forecast the national German
federal election, and investigated whether online interactions on Twitter validly
mirrored offline political sentiment. The study was criticized for being contingent
on arbitrary experimental variables [(cid:9), (cid:1)(cid:0), (cid:1)(cid:4), (cid:2)(cid:1)]. Metaxas et al. [(cid:2)(cid:1)] argued
Trump vs. Hillary
(cid:3)
that the predictive power of Twitter is exaggerated and it cannot be accurate
unless we are able to identify unbiased representative sample of voters. However,
these early papers kicked off a new wave of research initiatives that focus on
studying the political discourse on Twitter, and how this social platform can be
used as a proxy for understanding people's opinions [(cid:2)(cid:2)]. On the other hand,
many studies have questioned the accuracy, and not just the feasibility, of using
social data to predict and forecast [(cid:9), (cid:1)(cid:0)]. Without combining the contextual
information, together with social interactions, the results might lead to biased
findings. One of the main problems of studying political social phenomena on
Twitter is that users tend to interact with like-minded people, forming so-called
"echo chambers" [(cid:1), (cid:6), (cid:1)(cid:8)]. Thus, the social structure of their interactions will
limit their ability to interact in a genuinely open political space. Though the
literature on the predictive power of twitter is undoubtedly relevant, the focus
of this work is on performing post-election analysis to better understand the
potential strengths and weaknesses of the social media strategies of political
campaigns and how they might have contributed to eventual electoral outcomes.
A step closer to our politically motivated work, we find some studies that
focused on studying the US presidential election. For the (cid:2)(cid:0)(cid:1)(cid:2) US presidential
election, Shi et al. [(cid:2)(cid:5)] analyzed millions of tweets to predict the public opinion
towards the Republican presidential primaries. The authors trained a linear
regression model and showed good results compared to pre-electoral polls during
the early stages of the campaign. In addition, the Obama campaign data analytics
system(cid:3), a decision-making tool that harnesses different kind of data ranging from
social media to news, was developed to help the Obama team sense the pulse of
public opinion and strategically manage the campaign. With an attempt to study
the recent US presidential election, early studies have showed promising results.
For example, Wang et al. [(cid:2)(cid:9)] studied the growth pattern of Donald Trump's
followers at a very early stage. They characterized individuals who ceased to
support Hillary Clinton and Donald Trump, by focusing on three dimensions of
social demographics: social status, gender, and age. They also analyzed Twitter
profile images to reveal the demographics of both Donald Trump and Hillary
followers. Wang et al. [(cid:3)(cid:0)] studied the frequency of 'likes' for every tweet that
Trump published. More recently, Bovet et al. [(cid:5)] developed an analytical tool
to study the opinion of Twitter users, in regards to their structural and social
interactions, to infer their political affiliation. Authors showed that the resulting
Twitter trends follow the New York Times National Polling Average.
Concerning disseminating information, recent research has focused on how
candidates engaged in spreading fake news and in amplifying their message
via the use of social bots, which are programmatically controlled accounts that
produce content and automatically interact with other users [(cid:7),(cid:1)(cid:5)]. Bessi and
Ferrara [(cid:3)] investigated how the presence of social media bots affected political
discussion around the (cid:2)(cid:0)(cid:1)(cid:6) U.S. presidential election. Authors suggest that the
presence of social media bots can negatively affect democratic political discussion
rather than improving it, which in turn can potentially alter public opinion and
(cid:3) edition.cnn.com/(cid:2)(cid:0)(cid:1)(cid:2)/(cid:1)(cid:1)/(cid:0)(cid:7)/tech/web/obama-campaign-tech-team/index.html
(cid:4)
Kareem Darwish et al.
endanger the integrity of the presidential election. In the same context, Giglietto
et al. [(cid:1)(cid:1)] studied the role played by "fake-news" circulating on social media
during the (cid:2)(cid:0)(cid:1)(cid:6) US Presidential election. In this study, we provide a quantitative
and qualitative analysis of tweets related to the (cid:2)(cid:0)(cid:1)(cid:6) US presidential election. By
tapping into the wealth of Twitter data, we focus on analyzing and understanding
the possible factors underlying the success and failure of candidates. Our work
builds upon the aforementioned research in social and computer sciences to study
and measure the volume and diversity of support for the two main candidates
for the (cid:2)(cid:0)(cid:1)(cid:6) US presidential elections, Donald Trump and Hillary Clinton.
Data Collection and Labeling
To acquire the tweets that are relevant to the US presidential election, we obtained
the tweets that were collected by TweetElect.com from September (cid:1), (cid:2)(cid:0)(cid:1)(cid:6) to
November (cid:8), (cid:2)(cid:0)(cid:1)(cid:6) (Election Day). TweetElect is a public website that aggregates
tweets that are relevant to the (cid:2)(cid:0)(cid:1)(cid:6) US presidential election. It shows the most
retweeted content on Twitter including text tweets, images, videos, and links.
The site uses state-of-the-art adaptive filtering methods for detecting relevant
tweets on broad and dynamic topics, such as politics and elections [(cid:1)(cid:9), (cid:2)(cid:0)].
TweetElect used an initial set of (cid:3)(cid:8) keywords related to the US elections for
streaming relevant tweets. Consequently, adaptive filtering continuously enriches
the set of keywords with additional terms that emerge over time [(cid:2)(cid:0)]. The (cid:3)(cid:8)
seeding keywords included all candidate names and common keywords (including
hashtags) about the elections and participating parties. During the period of
interest, the total number of aggregated tweets per day (including retweets)
related to the US elections typically ranged between (cid:2)(cid:0)(cid:0)K and (cid:6)(cid:0)(cid:0)K. This
number increased dramatically after specific events or revelations, such as after
the presidential debates and Election Day, when the number of tweets exceeded
(cid:3).(cid:5) million tweets. The total number of unique tweets collected by TweetElect
between September (cid:1) and November (cid:8) was (cid:6).(cid:8) million, while the full volume of
tweets including retweets was (cid:6)(cid:5).(cid:8) million.
In this work, we are interested in analyzing the most "viral" tweets pertain to
the US presidential elections, as they typically express the topics that garnered
the most attention on Twitter [(cid:1)(cid:7)]. Specifically, we constructed a set of the
most retweeted (cid:5)(cid:0) tweets for everyday in the period of interest. Thus, our
collection contained (cid:3),(cid:4)(cid:5)(cid:0) unique tweets that were retweeted (cid:2)(cid:6).(cid:6) million times,
representing more than (cid:4)(cid:0)% of the total volume of tweets during that period. Out
of the (cid:3),(cid:4)(cid:5)(cid:0) tweets in our collection, (cid:7)(cid:0)(cid:0) were authored by the official account
of Donald Trump, accounting for (cid:8).(cid:7) million retweets, and (cid:6)(cid:9)(cid:8) were authored by
Clinton's official account, accounting for (cid:4).(cid:7) million retweets. Figure (cid:1) shows the
distribution of the number of tweets collected by TweetElect in the US elections in
the period of study. The number of unique tweets, retweets volume, and retweets
volume of the top viral daily tweets are displayed. As shown, the volume of
tweets increased as election day approached. The biggest four peaks in the graph
represent the days following the presidential debates and the election day. As
it is shown, the retweet volume of the top (cid:5)(cid:0) daily viral tweets correlates well
Trump vs. Hillary
(cid:5)
Fig. (cid:1). Volume of retweets the top (cid:5)(cid:0) daily viral tweets on the US collection compared
to the full volume of tweets and retweets.
Label
attack Trump, sup-
port Clinton
attack Trump,
tack Clinton
attack Clinton
attack Trump
at-
neutral
Tweet
Donald Trump is unfit for the office of president. Fortunately, there's an exceptionally qualified
candidate @HillaryClinton
Donald Trump looks like what Hillary Clinton smells like
A rough night for Hillary Clinton ABC News.
Trump to Matt Lauer on Iraq: I was totally against the war. Here's proof Trump is lying:
https://t.co/(cid:6)ZhgJMUhs(cid:3)
It s official: the US has joined the #ParisAgreement https://t.co/qYN(cid:1)iRzSJk
Table (cid:1). Example annotations
with the full retweet volume, with a Pearson correlation of (cid:0).(cid:9)(cid:2), which indicates
nearly identical trend.
We calculated the daily coverage 𝐶𝑑𝑎𝑖𝑙𝑦 of the top (cid:5)(cid:0) daily viral tweets to
the full tweet volume. The daily coverage ranged between (cid:2)(cid:3)% and (cid:6)(cid:6)%, with
the majority of the days having 𝐶𝑑𝑎𝑖𝑙𝑦 over (cid:4)(cid:0)%. This indicates that the top (cid:5)(cid:0)
viral daily tweets may offer good coverage and reasonable indicators for public
interaction with the US election on Twitter.
All tweets were labeled with one of five class labels, namely: "support Trump",
"attack Trump", "support Clinton", "attack Clinton", or "neutral/irrelevant",
with tweets being allowed to have multiple labels if applicable. Support for a
candidate included praising or defending the candidate, his/her supporters, or
staff, spreading positive news about the candidate, asking people to vote for the
candidate, mentioning favorable polls where the candidate is ahead, promoting
the candidate's agenda, or advertising appearances such as TV interviews or
rallies. Attacking a candidate included maligning and name calling targeted at
the candidate, his/her supporters, or staff, spreading negative news about the
candidate, mentioning polls where the candidates is behind, or attacking the
candidate's agenda. Other tweets were labeled as neutral/irrelevant. Tweets were
allowed to have more than one label such as "support Trump, attack Clinton".
The labeling was done by an annotator with strong knowledge of US politics. The
annotator was instructed to check the content of tweets carefully including any
images, videos, or external links to obtain accurate annotations. In addition, we
advised the annotator to check the profile of tweet authors to better understand
their position towards the candidates if needed. One of the authors took a
random sample of (cid:5)(cid:0) tweets to verify the correctness of the annotation. In all,
both agreed fully on (cid:9)(cid:0)% of the sample, partially agreed on (cid:8)%, and disagreed
on the remaining (cid:2)%. The agreement between the annotator and the author,
as measured using Cohen's Kappa, is (cid:0).(cid:8)(cid:7), meaning nearly perfect agreement.
Table (cid:1) shows few sample labeled tweets.
01,000,0002,000,0003,000,00001/0903/0905/0907/0909/0911/0913/0915/0917/0919/0921/0923/0925/0927/0929/0901/1003/1005/1007/1009/1011/1013/1015/1017/1019/1021/1023/1025/1027/1029/1031/1002/1104/1106/1108/11Volume of tweets/retweets of collected data and Top 50 daily viral tweets# tweets# retweets# retweets (top 50)(cid:6)
Kareem Darwish et al.
Class
No. of Tweets % of Tweets No. of Retweets % of Retweets
Support Clinton
(cid:1)(cid:1).(cid:5)%
Attack Trump
(cid:2)(cid:2).(cid:8)%
Support Trump
(cid:2)(cid:4).(cid:7)%
Attack Clinton
(cid:3)(cid:3).(cid:8)%
Neutral/irrelevant
(cid:7).(cid:1)%
Table (cid:2). Number of tweets and retweet volume per class.
(cid:3),(cid:2)(cid:0)(cid:5),(cid:3)(cid:0)(cid:3)
(cid:6),(cid:3)(cid:7)(cid:3),(cid:5)(cid:4)(cid:9)
(cid:6),(cid:8)(cid:9)(cid:6),(cid:9)(cid:4)(cid:0)
(cid:9),(cid:4)(cid:4)(cid:1),(cid:9)(cid:2)(cid:1)
(cid:1),(cid:9)(cid:7)(cid:8),(cid:7)(cid:8)(cid:4)
(cid:5)(cid:0)(cid:6)
(cid:7)(cid:1)(cid:2)
(cid:8)(cid:4)(cid:8)
(cid:1),(cid:4)(cid:5)(cid:8)
(cid:1)(cid:9)(cid:9)
(cid:1)(cid:3).(cid:6)%
(cid:1)(cid:9).(cid:1)%
(cid:2)(cid:2).(cid:8)%
(cid:3)(cid:9).(cid:2)%
(cid:5).(cid:3)%
Tweet Analysis
We analyze tweets in every class from different perspectives. Specifically, we
look at: user engagement with class over time, most viral events during election,
most discussed topics, most shared links and news, and most influential accounts
supporting them.
Popularity of Candidates on Twitter Table (cid:2) shows the number of tweets
and their retweet volume for each label. For further analysis, we ignore tweets
that are labeled as neutral/irrelevant as they are not interesting to this work.
Figure (cid:2) shows a break down for each label across all days. Table (cid:2) shows that
the majority of the tweets and retweets volume were in favor of Trump ((cid:6)(cid:1).(cid:9)%
of tweets, (cid:5)(cid:8).(cid:6)% of retweet volume), either by supporting him or attacking
Clinton, while those in favor of Clinton represent only ((cid:3)(cid:2).(cid:7)% of tweets, (cid:3)(cid:4).(cid:3)%
of retweet volume) of the total, either supporting her or attacking Trump. It can
be observed that the retweet volume of tweets attacking Clinton outnumbered
the retweet volume of tweets supporting her by nearly a (cid:3)-to-(cid:1) margin, while
for Trump those supporting and attacking him were almost evenly matched.
Figure (cid:2)(a) shows the distribution of support/attack of each candidate over the
period of study. Figure (cid:2)(b) shows the relative per day retweet volume for tweets
supporting/attacking each candidate. As expected, large spikes in volume happen
in conjunction with major events such the presidential and vice presidential
debates, Election Day, the release of Trump's lewd Access Hollywood tape, and
the FBI announcement concerning the reopening of the investigation of Clinton.
An interesting observation from Figure (cid:2)(b) is that tweets in favor of Trump
(either supporting him or attacking Clinton) were retweeted more than tweets in
favor of Clinton for (cid:8)(cid:5)% of the days, with the exception of a few days, especially
the day following the first presidential debate and following the release of Trump's
lewd tape. This observation might be different to the trends in normal media,
where large number of articles were more negative towards Trump [(cid:2)(cid:8)].
Table (cid:3) lists the three days for every class when each class had the largest
percentage of tweet volume along with the leading topic. As can be seen, the
"support Clinton" class not only had the lowest average overall, but it also never
exceed (cid:3)(cid:3)% on any given day. All other classes had days when their volume
exceeded (cid:6)(cid:0)% of the total retweet volume, with the "attack Clinton" class reach-
ing nearly (cid:7)(cid:3)%. The relative volume of "support Clinton" retweets peaked after
public appearances (promotional video, debate, and TV interview). The "attack
Clinton" class peaked when her health came into question and after WikiLeaks
leaks questioned her integrity. For the "support Trump" class, it peaked after
polls showed he was ahead and after he announced the building of a wall with
Mexico. The "attack Trump" class peaked due positions on immigration and
women. The most frequent hashtags and terms reflect similar trends.
Date Leading topic
(cid:1)(cid:1)/(cid:5) release of a video promoting Clinton
(cid:9)/(cid:2)(cid:6) after first presidential debate
(cid:9)/(cid:2)(cid:2) interview w/ comedy program (two Ferns)
(cid:9)/(cid:1)(cid:1) Clinton faints at (cid:9)/(cid:1)(cid:1) memorial
(cid:1)(cid:0)/(cid:3)(cid:1) WikiLeaks: Clinton got gifts from foreign governments
(cid:1)(cid:0)/(cid:1)(cid:9) WikiLeaks: Clinton got gift from Qatar
attack Clinton
support Trump
(cid:1)(cid:0)/(cid:2)(cid:2) Trump leads in (cid:3) national polls
(cid:1)(cid:0)/(cid:6) Trump leads in Virginia poll
(cid:9)/(cid:1) Trump says to build wall with Mexico
(cid:9)/(cid:1)(cid:6) Sanders attacks Trump on immigration
(cid:9)/(cid:1)(cid:5) Trump quoted: "pregnancy very inconvenient for business"
(cid:1)(cid:0)/(cid:7) Trump lewd tape released
attack Trump
%
(cid:3)(cid:2).(cid:9)%
(cid:3)(cid:2).(cid:2)%
(cid:2)(cid:8).(cid:2)%
(cid:7)(cid:2).(cid:9)%
(cid:6)(cid:9).(cid:4)%
(cid:6)(cid:2).(cid:9)%
(cid:6)(cid:0).(cid:2)%
(cid:5)(cid:0).(cid:7)%
(cid:5)(cid:0).(cid:1)%
(cid:6)(cid:6).(cid:4)%
(cid:6)(cid:0).(cid:2)%
(cid:5)(cid:5).(cid:5)%
Trump vs. Hillary
(cid:7)
Fig. (cid:2). (a) Retweet volume for each label per day, and (b) Percentage of labels per day.
support Clinton
Table (cid:3). Top (cid:3) days when relative volume for each class peaked with leading topic
and percentage.
.
Most Frequent Hashtags In order to understand the most discussed topics
in the viral tweets, Table (cid:4) shows the top hashtags that are used in attacking
or supporting either candidate divided into categories along with the volume in
each category. The top used hashtags for the different labels reveal some stark
contrasts between the two candidates. These include:
(i) The top most frequently appearing hashtags favoring Clinton were those
praising her debate performances and attacking Trump. On the Trump side, the
most frequently appearing hashtags were those iterating his campaign slogans,
encouraging people to vote, and spreading campaign news.
(i) Hashtags of Trump's campaign slogans appeared nearly (cid:2)(cid:0)(cid:0) times more than
Clinton's campaign slogan (#IAmWithHer). In fact, Trump's campaign slogans
category has the most frequently appearing hashtags.
(ii) Hashtags indicating "Get out of the vote" were (cid:4) times more voluminous for
Trump than Clinton. Trump and his campaign were more effective in promoting
their activities (ex. #ICYMI – in case you missed it, #TrumpRally).
(iii) Hashtags pertaining to the presidential debate appeared for every class. The
support to attack hashtag volume ratio was roughly (cid:3)-to-(cid:2) for Clinton and (cid:1)-to-(cid:9)
for Trump. Further, the debates were the number one category for the "support
Clinton" and the "attack Trump" classes. It seems that most users thought that
she did better in the debates than him.
0%10%20%30%40%50%60%70%80%90%100%01 Sep02 Sep03 Sep04 Sep05 Sep06 Sep07 Sep08 Sep09 Sep10 Sep11 Sep12 Sep13 Sep14 Sep15 Sep16 Sep17 Sep18 Sep19 Sep20 Sep21 Sep22 Sep23 Sep24 Sep25 Sep26 Sep27 Sep28 Sep29 Sep30 Sep01 Oct02 Oct03 Oct04 Oct05 Oct06 Oct07 Oct08 Oct09 Oct10 Oct11 Oct12 Oct13 Oct14 Oct15 Oct16 Oct17 Oct18 Oct19 Oct20 Oct21 Oct22 Oct23 Oct24 Oct25 Oct26 Oct27 Oct28 Oct29 Oct30 Oct31 Oct01 Nov02 Nov03 Nov04 Nov05 Nov06 Nov07 Nov08 NovRelative percentage of each class per day0200,000400,000600,000800,0001,000,0001,200,0001,400,00001 Sep02 Sep03 Sep04 Sep05 Sep06 Sep07 Sep08 Sep09 Sep10 Sep11 Sep12 Sep13 Sep14 Sep15 Sep16 Sep17 Sep18 Sep19 Sep20 Sep21 Sep22 Sep23 Sep24 Sep25 Sep26 Sep27 Sep28 Sep29 Sep30 Sep01 Oct02 Oct03 Oct04 Oct05 Oct06 Oct07 Oct08 Oct09 Oct10 Oct11 Oct12 Oct13 Oct14 Oct15 Oct16 Oct17 Oct18 Oct19 Oct20 Oct21 Oct22 Oct23 Oct24 Oct25 Oct26 Oct27 Oct28 Oct29 Oct30 Oct31 Oct01 Nov02 Nov03 Nov04 Nov05 Nov06 Nov07 Nov08 NovVolume per class per daysupport Trumpattack Clintonattack Trumpsupport Clinton1st debateVP debateTrump lewdtape2nd debate3rd debateFBI investigatesCLintonElection Day(cid:8)
Kareem Darwish et al.
Category
Debate performance
Attacking Trump
Get out the vote
Campaign Issues
Campaign slogan
Corruption/lying
Wikileaks Releases
Debate performance
Health Care
Tension w/Sanders sup-
porters
Media/Election Bias
Ben Ghazi attack
Clinton's health
Campaign slogans
Get out the vote
Campaign news
Debate performance
Attacking Clinton
Debate performance
Sexual misconduct
General attacks and in-
sults
Comedy attacks
#tag Freq. Hashtags
Support Clinton
(cid:4)(cid:8)(cid:6),(cid:4)(cid:0)(cid:2) #DebateNight #Debate #SheWon #VPDebate #Debates(cid:2)(cid:0)(cid:1)(cid:6) #NBCNews-
#Interro-
(cid:1)(cid:1)(cid:4),(cid:6)(cid:1)(cid:4) #TrumpTapes
Forum
gateTrump #ImWithTacos #AlSmithDinner
#TangerineNightmare
(cid:8)(cid:6),(cid:2)(cid:9)(cid:7) #ElectionDay #Election(cid:2)(cid:0)(cid:1)(cid:6) #Voting #OHVotesEarly #Vote #Elec-
(cid:1)(cid:5),(cid:0)(cid:5)(cid:5) #NationalComingOutDay #LatinaEqualPay
(cid:1)(cid:0),(cid:0)(cid:8)(cid:4) #ImWithHer
#ImVotingBecause
tions(cid:2)(cid:0)(cid:1)(cid:6)
Attack Clinton
(cid:8)(cid:4)(cid:2),(cid:8)(cid:9)(cid:2) #DrainTheSwamp #CrookedHillary #BigLeagueTruth #GoldmanSach
#FollowTheMoney #PayToPlay
(cid:6)(cid:4)(cid:0),(cid:3)(cid:3)(cid:0) #PodestaEmails #Wikileaks #PodestaEmails{(cid:8),(cid:3)(cid:1),(cid:2)(cid:8),(cid:2)(cid:6),(cid:1)(cid:5)} #SpiritCook-
ing #Podesta #DNCLeak #DNCLeak(cid:2) #FreeJulian #AnthonyWeiner
(cid:3)(cid:4)(cid:8),(cid:7)(cid:4)(cid:9) #Debates(cid:2)(cid:0)(cid:1)(cid:6) #Debate #DebateNight #VPDebate #Debates
(cid:1)(cid:1)(cid:3),(cid:3)(cid:1)(cid:8) #ObamaCare #ObamaCareFail #ObamaCareInThreeWords
(cid:8)(cid:6),(cid:3)(cid:3)(cid:3) #FeelTheBern #BasementDwellers
(cid:7)(cid:8),(cid:5)(cid:1)(cid:1) #VoterFraud #RiggedSystem
(cid:4)(cid:6),(cid:7)(cid:2)(cid:5) #BenGhazi
(cid:3)(cid:0),(cid:7)(cid:4)(cid:7) #HillarysHealth
Support Trump
(cid:2),(cid:0)(cid:8)(cid:9),(cid:1)(cid:6)(cid:2) #MAGA (Make America Great Again) #DrainTheSwamp #AmericaFirst
#MakeAmericaGreatAgain #ImWithYou #TrumpTrain #TrumpPence(cid:1)(cid:6)
(cid:3)(cid:4)(cid:9),(cid:0)(cid:7)(cid:8) #VoteTrumpPence(cid:1)(cid:6) #ElectionDay #VoteTrump #Vote #IVoted #Elec-
tionNight #TheHoodForTrump #Vote(cid:2)(cid:0)(cid:1)(cid:6) #EarlyVote
(cid:1)(cid:8)(cid:3),(cid:0)(cid:3)(cid:1) #ICYMI (in case you missed it) #TrumpRally #Gettysburg (public speech)
(cid:7)(cid:4),(cid:8)(cid:0)(cid:8) #VPDebate #DebateNight #Debates #Debates(cid:2)(cid:0)(cid:1)(cid:6)
(cid:6)(cid:6),(cid:3)(cid:1)(cid:8) #FollowTheMoney #DNCLeak #ObamaCareFailed #BigLeagueTruth
Attack Trump
(cid:7)(cid:7)(cid:6),(cid:9)(cid:5)(cid:6) #DebateNight #Debate #VPDebate #Debates #NBCNewsForum
(cid:7)(cid:8),(cid:0)(cid:4)(cid:3) #TrumpTapes #NatashaStoynoff
(cid:4)(cid:4),(cid:1)(cid:0)(cid:0) #ImVotingBecause #TangerineNightmare #Lunatic #DangerousMan #Un-
fit #Deceit #InterrogateTrump
(cid:2)(cid:6),(cid:9)(cid:8)(cid:0) #ACloserLook (segment on Seth Meyer comedy show) #AlSmithDinner
Attacking
speech
Table (cid:4). Top hashtags attacking or supporting both candidates with their categories.
(cid:2)(cid:1),(cid:1)(cid:1)(cid:7) #LoveTrumpsHate #NastyWoman
Trump's
(charity dinner)
(iv) Attacks against Clinton focus on her character and on the WikiLeaks leaks,
which cover Clinton's relationship with Wall Street (ex. #GoldmanSachs), alleged
impropriety in the Clinton Foundation (ex. #FollowTheMoney, #PayToPlay),
mishandling of the Ben Ghazi attack in Libya, Democratic Party primary race
against senator Sanders (ex. #BasementDewellers), the FBI investigation of
Clinton (#AnthonyWeiner), and accusation of witchcraft (#SpiritCooking).
(v) Attacks against Trump were dominated by his debate performance. The
frequency of hashtags for the next category pertaining to accusations of sex-
ual misconduct (ex. #TrumpTapes) is one order of magnitude lower than the
frequency of those about the debate. This suggests that accusations of sexual
misconduct against Trump were not the primary of focus of users.
(vi) Policy issues such as health care (ex. #ObamaCare, #LatinaEqualPay) were
eclipsed by issues pertaining to the personalities of the candidates and insults
(ex. #CrookedHillary, #TangerineNightmare).
Most Frequent Terms We look at the most frequent terms in the tweets to
better understand the most popular topics being discussed. Figure (cid:3) shows
tag-clouds of the most frequent terms for the different classes, which exhibit
similar trends to those in the most frequent hashtags. For example, top terms in
the "attack Clinton" class include "crooked", "emails", "FBI", "WikiLeaks", and
"#DrainTheSwamp". Similarly, "#DebateNight" was prominent in the "support
Clinton" and "attack Trump" classes. One interesting word in the "support Trump"
class is the word "thank", which typically appears in Trump authored tweets
in conjunction with polls showing Trump ahead (ex. "Great poll out of Nevada-
thank you!"), after rallies (ex. "Great evening in Canton Ohio-thank you!"), or in
Trump vs. Hillary
(cid:9)
Fig. (cid:3). Tag-cloud of top frequent terms in each class support/attack Clinton/Trump.
response to endorsements (ex. "Thank you Rep. @MarshaBlackburn!"). Words of
thanks appeared in (cid:1)(cid:6)(cid:7) "support Trump" tweets that were retweeted more than
(cid:1).(cid:5) million times compared to (cid:1)(cid:5) "support Clinton" tweets that were retweeted
(cid:7)(cid:5) thousand times only. Another set of words that do not show in the hashtags
are "pregnancy" and "inconvenient" that come from two tweets that mention
that "Trump said pregnancy is very inconvenient for businesses". One of these
tweets is the most retweeted in the "attack Trump" class.
Mentions of States One of the top terms that appeared in tweets supporting
Trump is "Florida", Figure (cid:3)(c). This motivated us to analyze mentions of states
in the tweets of each class. The frequency of state mentions may indicate states
of interest to candidates and Twitter users. Figure (cid:4) lists the number of times
each of the (cid:1)(cid:5) most frequently mentioned states. To obtain the counts, we tagged
all tweets using a named entity recognizer that is tuned for tweets [(cid:2)(cid:4)]. We auto-
matically filtered entities to obtain geolocations, and then we manually filtered
locations to retain state names and city and town names within states. Then,
we mapped city and town names to states (ex. "Grand Rapids" → "Iowa"). As
expected, so-called "swing states", which are states that could vote Republican or
Democrat in any given election(cid:4), dominated the list. The only non-swing states
on the list are New York, Washington, and Texas. Interestingly, the number
of mentions in "support Trump" tweets far surpasses the counts for all other
classes. Most of the mentions of swing states were in tweets authored by Trump
indicating Trump rallies being held in these states. This suggests that the Trump
campaign effectively highlighted their efforts in these states, and there was signif-
icant interest from Twitter users as indicated by the number of retweets. Of the
swing states in the figure, Trump won the first six, namely Florida, Ohio, North
Carolina, Pennsylvania, Michigan, and Arizona, along with Iowa and Wisconsin.
Most Shared Links An important debate that surfaced after the US elections
was whether fake news affected the election results or not [(cid:1)(cid:1),(cid:1)(cid:6)]. Thus, we analyze
the credibility of the websites that were most linked to in the tweets for each
(cid:4) https://projects.fivethirtyeight.com/(cid:2)(cid:0)(cid:1)(cid:6)-election-forecast/
(a) Support Clinton (b) Attack Trump (c) Support Trump (d) Attack Clinton Support Clinton
Count Volume Leaning Credibility Link
Attack Trump
Count Volume Leaning Credibility
(cid:1)(cid:0)
Kareem Darwish et al.
Link
Hillaryclinton.com
Democrats.org
IWillVote.com
SnappyTV.com
CNN.com
WashingtonPost.com
Medium.com
BusinessInsider.com
NYTimes.com
YouTube.com
Left
(cid:6)(cid:3) (cid:3)(cid:6)(cid:3),(cid:1)(cid:5)(cid:3)
Left
(cid:8) (cid:1)(cid:2)(cid:0),(cid:0)(cid:2)(cid:6)
(cid:2)(cid:6) (cid:1)(cid:0)(cid:1),(cid:9)(cid:9)(cid:6)
Left
(cid:1)(cid:4) (cid:5)(cid:8),(cid:9)(cid:2)(cid:6) N/A
(cid:6) (cid:4)(cid:3),(cid:3)(cid:5)(cid:5)
(cid:1)(cid:0) (cid:2)(cid:7),(cid:2)(cid:6)(cid:4)
(cid:2)(cid:7),(cid:1)(cid:8)(cid:7)
(cid:8)
(cid:4)
(cid:1)(cid:6),(cid:0)(cid:1)(cid:0)
(cid:6) (cid:1)(cid:5),(cid:8)(cid:8)(cid:6)
(cid:2)
(cid:1)(cid:1),(cid:5)(cid:6)(cid:4) N/A
-(cid:3)
-(cid:2)
-(cid:2)
-(cid:2)
-(cid:2)
–
–
–
Mixed
High
High
Mixed
High
High
Mixed
Hillaryclinton.com
WashingtonPost.com
IWillVote.com
SnappyTV.com
Democrats.org
Newsweek.com
NYTimes.com
CNN.com
Vox.com
Facebook.com
Left
(cid:6)(cid:5) (cid:2)(cid:3)(cid:6),(cid:1)(cid:2)(cid:6)
-(cid:2)
(cid:2)(cid:3) (cid:1)(cid:0)(cid:2),(cid:1)(cid:7)(cid:9)
(cid:1)(cid:1) (cid:9)(cid:5),(cid:1)(cid:2)(cid:6)
Left
(cid:1)(cid:4) (cid:8)(cid:6),(cid:1)(cid:0)(cid:0) N/A
Left
(cid:3) (cid:6)(cid:7),(cid:8)(cid:4)(cid:3)
-(cid:3)
(cid:1)(cid:1) (cid:5)(cid:5),(cid:6)(cid:6)(cid:3)
-(cid:2)
(cid:9) (cid:3)(cid:7),(cid:9)(cid:9)(cid:3)
-(cid:3)
(cid:6) (cid:2)(cid:7),(cid:2)(cid:7)(cid:5)
(cid:1)(cid:3),(cid:9)(cid:9)(cid:2)
(cid:4)
-(cid:4)
(cid:2)
(cid:1)(cid:1),(cid:9)(cid:7)(cid:3) N/A
–
–
–
High
Mixed
High
High
High
High
Mixed
Support Trump
(cid:7)(cid:7) (cid:5)(cid:0)(cid:3),(cid:3)(cid:7)(cid:5)
right
(cid:2)(cid:5) (cid:1)(cid:6)(cid:4),(cid:9)(cid:9)(cid:5) N/A
DonaldJTrump.com
Facebook.com
WashingtonPost.com
Lifezette.com
SnappyTV.com
Instagram.com
DailyCaller.com
NYPost.com
Periscope.tv
YouTube.com
Table (cid:5). Top shared links per class – support/attack Clinton/Trump – with ideological
leaning (-(cid:5) extreme left to (cid:5) extreme right) and credibility (high or mixed) according
to https://mediabiasfactcheck.com/
WikiLeaks.org
DailyCaller.com
FoxNews.com
YouTube.com
Breitbart.com
Politico.com
NYPost.com
CNN.com
Vox.com
Facebook.com
(cid:7) (cid:5)(cid:6),(cid:8)(cid:5)(cid:5)
(cid:3)
(cid:4)(cid:9),(cid:1)(cid:3)(cid:2)
(cid:4) (cid:3)(cid:6),(cid:6)(cid:6)(cid:3) N/A
(cid:5) (cid:3)(cid:6),(cid:1)(cid:3)(cid:2) N/A
(cid:3)
(cid:3)(cid:5),(cid:4)(cid:7)(cid:4)
(cid:4) (cid:3)(cid:4),(cid:9)(cid:3)(cid:0)
(cid:3) (cid:2)(cid:2),(cid:5)(cid:9)(cid:6) N/A
(cid:5) (cid:2)(cid:0),(cid:0)(cid:4)(cid:6) N/A
Attack Clinton
(cid:4)(cid:7) (cid:4)(cid:0)(cid:6),(cid:6)(cid:0)(cid:7)
(cid:2)(cid:2) (cid:1)(cid:9)(cid:5),(cid:6)(cid:9)(cid:5)
(cid:2)(cid:8) (cid:1)(cid:4)(cid:6),(cid:5)(cid:7)(cid:1)
(cid:2)(cid:9) (cid:1)(cid:0)(cid:7),(cid:9)(cid:1)(cid:5) N/A
(cid:1)(cid:7) (cid:1)(cid:0)(cid:2),(cid:9)(cid:4)(cid:9)
(cid:1)(cid:1) (cid:9)(cid:3),(cid:1)(cid:6)(cid:5)
(cid:1)(cid:4)
(cid:9)(cid:2),(cid:1)(cid:4)(cid:7)
(cid:1)(cid:1)
(cid:7)(cid:8),(cid:7)(cid:9)(cid:7) Right
(cid:1)(cid:6) (cid:7)(cid:7),(cid:3)(cid:4)(cid:0)
(cid:9) (cid:6)(cid:3),(cid:8)(cid:9)(cid:6)
Mixed
Hight
Mixed
Mixed
Mixed
Mixed
Mixed
Mixed
Mixed
High
Mixed
Mixed
Mixed
Mixed
High
Mixed
High
High
(cid:2)
(cid:4)
(cid:4)
(cid:5)
-(cid:2)
(cid:3)
(cid:3)
(cid:3)
-(cid:2)
(cid:4)
(cid:4)
(cid:3)
class. Our analysis shows that (cid:2)(cid:9)% of the viral tweets ((cid:2)(cid:1)% of the full retweet
volume) contained external links. Table (cid:5) shows the top (cid:1)(cid:0) web domains that
were linked to in the tweets dataset along with ideological leaning and credibility
rating. Aside from the official websites of the campaigns (ex. HillaryClinton.com,
Democrats.org, and DonaldJTrump.com), the remaining links were to news
websites (ex. CNN and NYTimes) and social media sites (ex. Facebook, Insta-
gram, and YouTube). As Table (cid:5) shows, the candidates' official websites received
the most links. However, it is interesting to note the large difference in focus
between both. Clinton's website attacked Trump than it supported Clinton, while
Trump's website did the exact opposite. This again shows the differences in
strategies and trends between both candidates and their supporters. We checked
the leaning and credibility of the news websites on mediabiasfactcheck.com, a
fact checking website which rates news sites anywhere between "Extreme Left"
to "Extreme Right" and their credibility between "Very Low" and "Very High"
with "Mixed" being the middle point. We assumed social media sites to have
no ideological leaning with a credibility of "Mixed". We opted for assigning
credibility to websites as opposed to individual stories, because investigating
the truthfulness of individual stories is rather tricky and is beyond the scope of
this work. Though some stories are easily debunked, such as the Breitbart story
claiming that "Hillary gave an award to a terrorist's wife(cid:5)", other mix some truth
with opinion, stretched truth, and potential lies, such as the Breitbart story that
the "FBI is seething at the botched investigation of Clinton".
Figure (cid:4) aggregates all the number of retweets for each category for the
websites with credibility of "High" and "Mixed" – none of the sites had credibility
of "Very High", "Low", or "Very Low". The aggregate number of links for all
categories to "High" and "Mixed" credibility websites was (cid:1).(cid:0)(cid:4) million and (cid:1).(cid:1)(cid:8)
million respectively. The figure shows that a significantly higher proportion of
highly credible websites were linked to for the "support Clinton" and "attack
(cid:5) http://bit.ly/(cid:2)d(cid:9)(cid:9)lWD/
6 http://bit.ly/(cid:2)tEUxVw
Trump vs. Hillary
(cid:1)(cid:1)
Fig. (cid:4). Mentions of states for each class. Fig. (cid:5). Credibility of websites that are
linked to from each category
Trump" categories compared to mixed credibility sites. The opposite was true
for the "support Trump" category, where the majority of links used to support
Trump was from mixed creditability websites. This may indicate that Trump
supporters were more susceptible to share less credible sources compared to
Clinton supporters. High and mixed credibility sites were evenly matched for the
"attack Clinton" category. WikiLeaks was the foremost shared site for attacking
Clinton, which has high credibility. This again highlights the role of WikiLeaks in
steering public opinion against Clinton. It worth mentioning that "The Podesta
Emails(cid:6)" was the most popular link. Thus, though lower credibility links were
used to attack Clinton, high credibility links featured prominently. For ideological
orientation, left leaning sources featured prominently in the "support Clinton"
and "attack Trump" classes, and right leaning sources featured prominently for
the two other classes. The only left leaning sources appearing on the "support
Trump" and "attack Clinton" lists were Washington Post and Politico.
Most Retweeted Tweets Table (cid:6) lists the top (cid:5) most retweeted(cid:7) tweets for
each class. They illustrate the trends to those exhibited in our previous analysis,
namely: "support Clinton" tweets are led by talk about debates and attacks
against Trump; the most retweeted "attack Clinton" tweets are from WikiLeaks;
Trump campaign slogans appear atop of "support Trump" tweets; and the most
retweeted attack Trump" tweets cover demeaning statements against women
and minorities and mockery of Trump. An interesting observation is that the
most retweeted tweet attacking Trump came from a Nigerian account with screen
name "Ozzyonce" who had less than (cid:2),(cid:0)(cid:0)(cid:0) followers at the time when she posted
the tweet. Nonetheless, this tweet received over (cid:1)(cid:5)(cid:0)K retweets in one day.
Most Retweeted Accounts Table (cid:7) lists the most retweeted accounts for each
class. As expected, the most retweeted accounts for "support" and "attack" classes
were those of the candidates themselves and their rivals respectively. Notably:
(i) Clinton authored (cid:1)(cid:0)% more "attack Trump" tweets (with (cid:3)(cid:5)% more volume)
(cid:6) https://wikileaks.org/podesta-emails/
(cid:7) The number of retweets in the table are taken in November (cid:2)(cid:0)(cid:1)(cid:6)
(cid:1)(cid:2)
Kareem Darwish et al.
Date
Author
Text
Count
support Clinton
(cid:9)/(cid:2)(cid:7)
(cid:9)/(cid:2)(cid:7) Hillary Clinton RT this if you re proud to be standing with Hillary tonight. #debatenight
Hillary Clinton belongs in the White House. Donald Trump belongs on my show. (cid:7)(cid:8),(cid:8)(cid:7)(cid:2)
(cid:7)(cid:2),(cid:4)(cid:4)(cid:3)
Jerry Springer
(cid:1)(cid:0)/(cid:1)(cid:0)
Erin Ruberry
(cid:1)(cid:0)/(cid:2)(cid:0) Hillary Clinton RT if
you're
https://t.co/(cid:9)(cid:1)tBmKxVMs
Hillary is proof a woman can work hard rise to the top of her field still have to
compete against a less qualified man for the same job.
proud
https://t.co/H(cid:7)CJep(cid:7)APX
Trump: Don t judge me on the man I was (cid:1)(cid:0) years ago. But please judge Hillary
on the man her husband was (cid:2)(cid:0) years ago #TrumpTapes
tonight. #DebateNight #SheWon
of Hillary
(cid:1)(cid:0)/(cid:8)
Richard Hine
(cid:1)(cid:1)/(cid:1)
(cid:1)(cid:0)/(cid:1)(cid:4)
(cid:1)(cid:0)/(cid:3)
WikiLeaks
WikiLeaks
WikiLeaks
attack Clinton
No link between Trump Russia No link between Assange Russia But Podesta Clin-
ton involved in selling (cid:2)(cid:0)% of US uranium to Russia
Democrats prepared fake Trump grope under the meeting table Craigslist employ-
ment advertisement in May (cid:2)(cid:0)(cid:1)(cid:6) https://t.co/JM(cid:9)JMeLYet
Hillary Clinton on Assange Can t we
just drone
https://t.co/S(cid:7)tPrl(cid:2)QCZ https://t.co/qy(cid:2)EQBa(cid:4)(cid:8)y
this guy – report
(cid:7)(cid:2),(cid:1)(cid:6)(cid:7)
(cid:7)(cid:2),(cid:1)(cid:5)(cid:0)
(cid:6)(cid:6),(cid:8)(cid:1)(cid:7)
(cid:5)(cid:1),(cid:3)(cid:1)(cid:1)
(cid:4)(cid:5),(cid:3)(cid:4)(cid:8)
(cid:4)(cid:5),(cid:2)(cid:3)(cid:3)
(cid:4)(cid:2),(cid:3)(cid:3)(cid:1)
(cid:4)(cid:1),(cid:0)(cid:4)(cid:7)
(cid:3)(cid:5)(cid:2),(cid:1)(cid:4)(cid:0)
(cid:6)(cid:0),(cid:7)(cid:1)(cid:8)
(cid:5)(cid:2),(cid:8)(cid:8)(cid:7)
(cid:4)(cid:3),(cid:6)(cid:2)(cid:7)
(cid:4)(cid:2),(cid:1)(cid:7)(cid:8)
(cid:1)(cid:5)(cid:2),(cid:7)(cid:5)(cid:6)
(cid:1)(cid:2)(cid:4),(cid:3)(cid:2)(cid:2)
(cid:1)(cid:2)(cid:1),(cid:6)(cid:3)(cid:5)
(cid:1)(cid:0)(cid:5),(cid:1)(cid:1)(cid:8)
(cid:1)(cid:0)(cid:2),(cid:0)(cid:6)(cid:3)
(cid:1)(cid:1)/(cid:4) Donald J. Trump If Obama worked as hard on straightening out our country as he has trying to
(cid:1)(cid:1)/(cid:8)
Cloyd Rivers
protect and elect Hillary we would all be much better off!
To everyone who wants to vote for Hillary just to keep Trump from becomin
President watch this... https://t.co/TuUpD(cid:7)Qgcg
(cid:1)(cid:1)/(cid:8) Donald J. Trump TODAY WE MAKE AMERICA GREAT AGAIN!
(cid:1)(cid:1)/(cid:5) Donald J. Trump MAKE AMERICA GREAT AGAIN!
(cid:1)(cid:0)/(cid:8) Donald J. Trump Here is my statement. https://t.co/WAZiGoQqMQ
(cid:1)(cid:1)/(cid:7) Immigrants(cid:4)Trump If you make this go viral Trump will win. It s about (cid:2) minutes that makes the
choice in this election crystal clear https://t.co/CqMY(cid:4)CSJbp
Congrats to my running mate @realDonaldTrump on a big debate win! Proud to
stand with you as we #MAGA.
support Trump
attack Trump
Donald Trump said pregnancy is very inconvenient for businesses like his mother
s pregnancy hasn't been inconvenient for the whole world.
Good morning everyone especially the person who destroyed Donald Trump s walk
of fame star https://t.co/IcBthxMPd(cid:9)
Stephen King My newest horror story: Once upon a time there was a man named Donald Trump
Kat Combs
Es un racista
and he ran for president. Some people wanted him to win.
Trump writing a term paper: Sources Cited: (cid:1). You Know It (cid:2). I know It (cid:3). Every-
body Knows It
Anna for you to sit here call Trump a racist is outrageous Anna: OH?! Well lemme
do it again in (cid:2) languages! https://t.co/nq(cid:4)DO(cid:7)bN(cid:7)J
Table (cid:6). Top retweeted tweets for each class – support/attack Clinton/Trump.
(cid:1)(cid:0)/(cid:2)(cid:1)
(cid:1)(cid:0)/(cid:1)(cid:0)
(cid:1)(cid:0)/(cid:8)
(cid:1)(cid:0)/(cid:1)(cid:0)
Mike Pence
(cid:9)/(cid:1)(cid:5)
Ozzyonce
(cid:1)(cid:0)/(cid:2)(cid:6)
Bailey Disler
than "support Clinton". In contrast, Trump authored (cid:8)(cid:1)% more "support Trump"
tweets (with (cid:3)(cid:8)% more volume) than "attack Clinton" tweets. This suggests that
Clinton expended more energy attacking her opponent than promoting herself,
while Trump did the exact opposite. Trump campaign staffers and accounts, such
as Kellyanne Conway, Dan Scavino Jr., and Official Team Trump, were slightly
more active in the "attack Clinton" class than the "support Trump" class.
(ii) Trump Campaign accounts featured prominently in "support Trump" and
"attack Clinton" classes, capturing (cid:7) out of (cid:1)(cid:0) and (cid:4) out of (cid:1)(cid:0) top spots for both
classes respectively. In contrast, Clinton campaign account captured (cid:2) out of
(cid:1)(cid:0) and (cid:1) out of (cid:1)(cid:0) top spots for "support Clinton" and "attack Trump" classes
respectively. Top Clinton aides like Huma Abedin and John Podesta were absent
from the top list, suggesting a more concerted Trump campaign Twitter strategy.
(iii) Though Clinton authored (cid:4)(cid:8)% more tweets attacking her rival than tweets
Trump authored attacking her, his attack tweets led to (cid:3)(cid:4)% more retweet volume.
This suggests that his attacks were more effective than her attacks. Trump tweets
were more retweeted on average than Clinton's tweets with an average of (cid:1)(cid:1),(cid:1)(cid:9)(cid:5)
and (cid:6),(cid:1)(cid:2)(cid:0) retweets per tweet for both respectively. Highlighting WikiLeaks' role
in the election, WikiLeaks was the second most retweeted account attacking
Clinton and had four times as much retweet volume than the next account.
Discussion
Our analysis contrasts differences in support for either candidate, namely:
Popularity: While Trump received more negative coverage than Clinton in
Trump vs. Hillary
(cid:1)(cid:3)
Volume
(cid:3)(cid:6)(cid:3) (cid:2),(cid:6)(cid:9)(cid:8),(cid:2)(cid:0)(cid:9)
(cid:3)(cid:0)(cid:4),(cid:8)(cid:6)(cid:0)
(cid:1)(cid:5)(cid:2),(cid:7)(cid:5)(cid:6)
(cid:1)(cid:2)(cid:4),(cid:3)(cid:2)(cid:2)
(cid:1)(cid:2)(cid:1),(cid:6)(cid:3)(cid:5)
(cid:1)(cid:0)(cid:5),(cid:1)(cid:1)(cid:8)
(cid:1)(cid:0)(cid:2),(cid:0)(cid:6)(cid:3)
(cid:9)(cid:9),(cid:4)(cid:0)(cid:1)
(cid:7)(cid:8),(cid:8)(cid:7)(cid:2)
(cid:6)(cid:7),(cid:6)(cid:9)(cid:0)
(cid:1)(cid:1)
(cid:1)
(cid:1)
(cid:2)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:2)(cid:4)(cid:6) (cid:3),(cid:6)(cid:1)(cid:3),(cid:0)(cid:2)(cid:5)
(cid:1),(cid:4)(cid:5)(cid:4),(cid:9)(cid:0)(cid:3)
(cid:1)(cid:4)(cid:1)
(cid:3)(cid:4)(cid:9),(cid:0)(cid:2)(cid:5)
(cid:9)(cid:2)
(cid:2)(cid:9)(cid:7),(cid:2)(cid:7)(cid:3)
(cid:7)(cid:8)
(cid:1)(cid:5)(cid:0),(cid:9)(cid:3)(cid:2)
(cid:2)(cid:3)
(cid:1)(cid:2)(cid:6),(cid:7)(cid:4)(cid:4)
(cid:3)(cid:4)
(cid:1)(cid:9)
(cid:8)(cid:5),(cid:7)(cid:4)(cid:2)
(cid:8)(cid:4),(cid:0)(cid:6)(cid:3)
(cid:7)
(cid:8)(cid:3),(cid:9)(cid:0)(cid:3)
(cid:4)
(cid:1)(cid:6)
(cid:7)(cid:8),(cid:7)(cid:1)(cid:9)
attack Trump
Count
support Clinton
Count
Volume Account
Account
Hillary Clinton
President Obama
Senator Tim Kaine
Jerry Springer
Erin Ruberry
Richard Hine
Bernie Sanders
CNN
Funny Or Die
Channel (cid:4) News
(cid:3)(cid:3)(cid:1) (cid:2),(cid:0)(cid:2)(cid:5),(cid:8)(cid:2)(cid:1) Hillary Clinton
(cid:4)
(cid:1)(cid:5)
(cid:1)
(cid:1)
(cid:1)
(cid:7)
(cid:6)
(cid:1)
(cid:1)
Support Trump
(cid:1)(cid:2)(cid:2),(cid:9)(cid:4)(cid:7) Bernie Sanders
(cid:8)(cid:4),(cid:2)(cid:4)(cid:5) Ozzyonce
(cid:7)(cid:8),(cid:8)(cid:7)(cid:2) Bailey Disler
(cid:7)(cid:2),(cid:1)(cid:6)(cid:7) Stephen King
(cid:6)(cid:6),(cid:8)(cid:1)(cid:7) Kat Combs
(cid:4)(cid:6),(cid:1)(cid:8)(cid:0) Es un racista
(cid:4)(cid:1),(cid:9)(cid:8)(cid:3) Rob Fee
(cid:2)(cid:7),(cid:9)(cid:0)(cid:9) Jerry Springer
(cid:2)(cid:7),(cid:4)(cid:0)(cid:9) Master of None
attack Clinton
Donald J. Trump
Kellyanne Conway
Mike Pence
Dan Scavino Jr.
Official Team Trump
Donald Trump Jr.
Eric Trump
Immigrants(cid:4)Trump
Cloyd Rivers
Paul Joseph Watson
(cid:4)(cid:4)(cid:6) (cid:4),(cid:9)(cid:9)(cid:2),(cid:8)(cid:4)(cid:5) Donald J. Trump
(cid:5)(cid:1)
(cid:1)(cid:9)(cid:9),(cid:5)(cid:1)(cid:1) WikiLeaks
(cid:1)(cid:9)(cid:5),(cid:8)(cid:2)(cid:4) Kellyanne Conway
(cid:3)(cid:6)
(cid:4)(cid:0)
(cid:1)(cid:8)(cid:1),(cid:6)(cid:0)(cid:1) Paul Joseph Watson
(cid:1)(cid:4)(cid:1),(cid:2)(cid:8)(cid:9) Official Team Trump
(cid:1)(cid:4)
(cid:1)(cid:1)(cid:2),(cid:8)(cid:3)(cid:5) Donald Trump Jr.
(cid:2)(cid:0)
(cid:7)(cid:9),(cid:3)(cid:8)(cid:7) Jared Wyand
(cid:8)
(cid:5)(cid:2),(cid:2)(cid:5)(cid:6) Cloyd Rivers
(cid:4)
(cid:4)(cid:5),(cid:4)(cid:9)(cid:3) Juanita Broaddrick
(cid:2)
(cid:1)(cid:0)
(cid:3)(cid:8),(cid:4)(cid:7)(cid:4) James Woods
Table (cid:7). Top retweeted accounts per class – support/attack Clinton/Trump. Accounts
of candidates and campaign affiliates are italicized.
mainstream media [(cid:2)(cid:8)], Trump benefited from many more tweets that are either
supporting him or attacking his rival. In fact, (cid:6)(cid:3)% of the volume of viral content
on US election were in his favor compared to only (cid:3)(cid:7)% in favor of Clinton.
Similarly, on (cid:8)(cid:5)% of the days in the last two months preceding the election,
Trump had more tweets favoring him than Clinton. This observation shows the
gap between the trends of social media and traditional news media.
Positive vs negative attention: The volume of tweets attacking and support-
ing Trump were evenly matched, while the volume of tweets attacking Clinton
outnumbered tweets praising her by a (cid:3)-to-(cid:1) margin. Given the importance of
social media in elections, this may have been particularly damaging.
Support points: Trump campaign accounts featured more prominently in the
top retweeted accounts supporting their candidate. Support came in the form
of promoting his slogans, urging supporters to vote, and featuring positive polls
and campaign news. Conversely, Clinton support came mostly in the form of
contrasting her to her rival, praise for her debate performance against Trump,
and praise for her attacks on Trump. In fact, viral tweets from her campaign
account were attacking Trump more than promoting her. Unfortunately for her,
she was framed in reference to her rival, and research has shown that debates
have a dwindling effect election outcomes as the election day draws closer [(cid:2),(cid:8),(cid:1)(cid:2)].
Consequently, her post-debate surges in volume of attacks against Trump eclipsed
surges of support for her.
Attack points: Both candidates were attacked on different things. Trump was
mainly attacked on his debate performance, eclipsing attacks related to his scan-
dals, such as the lewd Access Hollywood tape. Luckily for him, debates have
a diminishing effect on voters as election day draws near [(cid:2), (cid:8), (cid:1)(cid:2)]. Conversely
for Clinton, persistent allegations of corruption and wrongdoing triggered by
WikiLeaks and the FBI investigation of her emails dominated attacks against
her. These attacks may have led to her eventual loss, with polls suggesting that
"email define(d) Clinton"(cid:8).
(cid:8) gallup.com/poll/(cid:1)(cid:8)(cid:5)(cid:4)(cid:8)(cid:6)/email-defines-clinton-immigration-defines-trump.aspx
(cid:1)(cid:4)
Kareem Darwish et al.
Message penetration: Trump's slogan, "Make America Great Again", had a
far greater reach than that of his rival, "Stronger Together". Similarly, his policy
positions and agenda items, such as the proposal to build a wall with Mexico,
attracted significantly more attention than those of Clinton, where her proposed
policy positions received very little mention.
Geographical focus: Trump and his supporters effectively promoted his cam-
paign's efforts in swing state, with frequent mentions of rallies and polls from
these states along with messages of thanks for people turning-out for his rallies.
The volume of tweets mentioning swing states and supporting Trump were typi-
cally two orders of magnitude larger than similar tweets supporting Clinton. This
might have contributed to the narrow victory he achieved in many of them.
Low credibility links: Trump supporters were more likely to share links from
websites of questionable credibility than Clinton supporters. However, WikiLeaks,
which has high credibility, was the most prominent source attacking Clinton.
To better understand the presented results, a few limitations that need to be
considered. First, the top (cid:5)(cid:0) viral tweets do not have to be representative of the
whole collection. Nonetheless, they still represent over (cid:4)(cid:0)% of the tweets volume
on the US elections during the period of the study. Second, the results are based
on tweets collected from TweetElect. Although it is highly robust, the site uses
automatic filtering methods that are not perfect [(cid:1)(cid:9)]. Therefore, there might be
other relevant viral tweets that were not captured by the filtering method. Lastly,
measuring support for a candidate using viral tweets does not have to represent
actual support on the ground for many reasons. Some of these reasons include
the fact that demographics of Twitter users may not match the general public,
more popular accounts have a better chance of having their tweets go viral, or
either campaign may engage in astroturfing, in which dedicated groups or bots
may methodically tweet or retweet pro-candidate messages [(cid:3)].
Conclusion
In this paper, we presented quantitative and qualitative analysis of the top
retweeted tweets pertaining to the US presidential elections from September
(cid:1), (cid:2)(cid:0)(cid:1)(cid:6) to election day on November (cid:8), (cid:2)(cid:0)(cid:1)(cid:6). For everyday, we tagged the
top (cid:5)(cid:0) most retweeted tweets as supporting/attacking either candidate or as
neutral/irrelevant. Then we analyzed the tweets in each class from the perspective
of: general trends and statistics; most frequent hashtags, terms, and locations;
and most retweeted accounts and tweets. Our analysis highlights some of the
differences between the social media strategies of both candidates, the effectiveness
of both in pushing their messages, and the potential effect of attacks on both. We
show that compared to the Clinton campaign, the Trump campaign seems more
effective in: promoting Trump's messages and slogans, attacking and framing
Clinton, and promoting campaign activities in "swing" states. For future work,
we would like to study the users who retweeted the viral tweets in our study to
ascertain such things as political leanings and geolocations. This can help map
the political dynamics underlying the support and opposition of both candidates.
References
Trump vs. Hillary
(cid:1)(cid:5)
(cid:1). Barberá, P., Jost, J.T., Nagler, J., Tucker, J.A., Bonneau, R.: Tweeting from left to
right is online political communication more than an echo chamber? Psychological
science ((cid:2)(cid:0)(cid:1)(cid:5))
(cid:2). Benoit, W.L., Hansen, G.J., Verser, R.M.: A meta-analysis of the effects of viewing
us presidential debates. Communication Monographs (cid:7)(cid:0)((cid:4)), (cid:3)(cid:3)(cid:5)–(cid:3)(cid:5)(cid:0) ((cid:2)(cid:0)(cid:0)(cid:3))
(cid:3). Bessi, A., Ferrara, E.: Social bots distort the (cid:2)(cid:0)(cid:1)(cid:6) us presidential election online
discussion. First Monday (cid:2)(cid:1)((cid:1)(cid:1)) ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:4). Bollen, J., Mao, H., Pepe, A.: Modeling public mood and emotion: Twitter sentiment
and socio-economic phenomena. ICWSM (cid:1)(cid:1), (cid:4)(cid:5)(cid:0)–(cid:4)(cid:5)(cid:3) ((cid:2)(cid:0)(cid:1)(cid:1))
(cid:5). Bovet, A., Morone, F., Makse, H.A.: Predicting election trends with twitter: Hillary
clinton versus donald trump. arXiv preprint arXiv:(cid:1)(cid:6)(cid:1)(cid:0).(cid:0)(cid:1)(cid:5)(cid:8)(cid:7) ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:6). Colleoni, E., Rozza, A., Arvidsson, A.: Echo chamber or public sphere? predicting
political orientation and measuring political homophily in twitter using big data.
Journal of Communication (cid:6)(cid:4)((cid:2)), (cid:3)(cid:1)(cid:7)–(cid:3)(cid:3)(cid:2) ((cid:2)(cid:0)(cid:1)(cid:4))
(cid:7). Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: A system
to evaluate social bots. In: Proceedings of the (cid:2)(cid:5)th International Conference
Companion on World Wide Web. pp. (cid:2)(cid:7)(cid:3)–(cid:2)(cid:7)(cid:4). International World Wide Web
Conferences Steering Committee ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:8). Erikson, R.S., Wlezien, C.: The timeline of presidential elections: How campaigns
do (and do not) matter. University of Chicago Press ((cid:2)(cid:0)(cid:1)(cid:2))
(cid:9). Gayo-Avello, D.: Don't turn social media into another'literary digest'poll. Commu-
nications of the ACM (cid:5)(cid:4)((cid:1)(cid:0)), (cid:1)(cid:2)(cid:1)–(cid:1)(cid:2)(cid:8) ((cid:2)(cid:0)(cid:1)(cid:1))
(cid:1)(cid:0). Gayo Avello, D., Metaxas, P.T., Mustafaraj, E.: Limits of electoral predictions using
twitter. In: Proceedings of the Fifth International AAAI Conference on Weblogs
and Social Media. Association for the Advancement of Artificial Intelligence ((cid:2)(cid:0)(cid:1)(cid:1))
(cid:1)(cid:1). Giglietto, F., Iannelli, L., Rossi, L., Valeriani, A.: Fakes, news and the election: A
new taxonomy for the study of misleading information within the hybrid media
system ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:1)(cid:2). Hillygus, D.S., Jackman, S.: Voter decision making in election (cid:2)(cid:0)(cid:0)(cid:0): Campaign
effects, partisan activation, and the clinton legacy. American Journal of Political
Science (cid:4)(cid:7)((cid:4)), (cid:5)(cid:8)(cid:3)–(cid:5)(cid:9)(cid:6) ((cid:2)(cid:0)(cid:0)(cid:3))
(cid:1)(cid:3). Jungherr, A.: Analyzing political communication with digital trace data. Cham,
Switzerland: Springer ((cid:2)(cid:0)(cid:1)(cid:5))
(cid:1)(cid:4). Jungherr, A., Jürgens, P., Schoen, H.: Why the pirate party won the german election
of (cid:2)(cid:0)(cid:0)(cid:9) or the trouble with predictions: A response to tumasjan, a., sprenger, to,
sander, pg, & welpe, im "predicting elections with twitter: What (cid:1)(cid:4)(cid:0) characters
reveal about political sentimen". Social science computer review (cid:3)(cid:0)((cid:2)), (cid:2)(cid:2)(cid:9)–(cid:2)(cid:3)(cid:4)
((cid:2)(cid:0)(cid:1)(cid:2))
(cid:1)(cid:5). Kollanyi, B., Howard, P.N., Woolley, S.C.: Bots and automation over twitter during
the first us presidential debate. Comprop Data Memo ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:1)(cid:6). Kucharski, A.: Post-truth: Study epidemiology of fake news. Nature (cid:5)(cid:4)(cid:0)((cid:7)(cid:6)(cid:3)(cid:4)),
(cid:5)(cid:2)(cid:5)–(cid:5)(cid:2)(cid:5) ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:1)(cid:7). Magdy, W., Darwish, K.: Trump vs. hillary analyzing viral tweets during us presi-
dential elections (cid:2)(cid:0)(cid:1)(cid:6). arXiv preprint arXiv:(cid:1)(cid:6)(cid:1)(cid:0).(cid:0)(cid:1)(cid:6)(cid:5)(cid:5) ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:1)(cid:8). Magdy, W., Darwish, K., Abokhodair, N., Rahimi, A., Baldwin, T.: # isisisnotislam
or# deportallmuslims?: Predicting unspoken views. In: Proceedings of the (cid:8)th ACM
Conference on Web Science. pp. (cid:9)(cid:5)–(cid:1)(cid:0)(cid:6). ACM ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:1)(cid:6)
Kareem Darwish et al.
(cid:1)(cid:9). Magdy, W., Elsayed, T.: Adaptive method for following dynamic topics on twitter.
In: ICWSM ((cid:2)(cid:0)(cid:1)(cid:4))
(cid:2)(cid:0). Magdy, W., Elsayed, T.: Unsupervised adaptive microblog filtering for broad
dynamic topics. Information Processing & Management (cid:5)(cid:2)((cid:4)), (cid:5)(cid:1)(cid:3)–(cid:5)(cid:2)(cid:8) ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:2)(cid:1). Metaxas, P.T., Mustafaraj, E., Gayo-Avello, D.: How (not) to predict elections. In:
Privacy, Security, Risk and Trust (PASSAT) and (cid:2)(cid:0)(cid:1)(cid:1) IEEE Third Inernational
Conference on Social Computing (SocialCom), (cid:2)(cid:0)(cid:1)(cid:1) IEEE Third International
Conference on. pp. (cid:1)(cid:6)(cid:5)–(cid:1)(cid:7)(cid:1). IEEE ((cid:2)(cid:0)(cid:1)(cid:1))
(cid:2)(cid:2). Mislove, A., Lehmann, S., Ahn, Y.Y., Onnela, J.P., Rosenquist, J.N.: Understanding
the demographics of twitter users. ICWSM (cid:1)(cid:1), (cid:5)th ((cid:2)(cid:0)(cid:1)(cid:1))
(cid:2)(cid:3). O'Connor, B., Balasubramanyan, R., Routledge, B.R., Smith, N.A.: From tweets
to polls: Linking text sentiment to public opinion time series. ICWSM (cid:1)(cid:1)((cid:1)(cid:2)(cid:2)-(cid:1)(cid:2)(cid:9)),
(cid:1)–(cid:2) ((cid:2)(cid:0)(cid:1)(cid:0))
(cid:2)(cid:4). Ritter, A., Clark, S., Etzioni, O., et al.: Named entity recognition in tweets: an
experimental study. In: Proceedings of the Conference on Empirical Methods
in Natural Language Processing. pp. (cid:1)(cid:5)(cid:2)(cid:4)–(cid:1)(cid:5)(cid:3)(cid:4). Association for Computational
Linguistics ((cid:2)(cid:0)(cid:1)(cid:1))
(cid:2)(cid:5). Shi, L., Agarwal, N., Agrawal, A., Garg, R., Spoelstra, J.: Predicting us primary
elections with twitter. URL: http://snap. stanford. edu/social(cid:2)(cid:0)(cid:1)(cid:2)/papers/shi. pdf
((cid:2)(cid:0)(cid:1)(cid:2))
(cid:2)(cid:6). Shirky, C.: The political power of social media: Technology, the public sphere, and
political change. Foreign affairs pp. (cid:2)(cid:8)–(cid:4)(cid:1) ((cid:2)(cid:0)(cid:1)(cid:1))
(cid:2)(cid:7). Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Predicting elections
with twitter: What (cid:1)(cid:4)(cid:0) characters reveal about political sentiment. ICWSM (cid:1)(cid:0),
(cid:1)(cid:7)(cid:8)–(cid:1)(cid:8)(cid:5) ((cid:2)(cid:0)(cid:1)(cid:0))
(cid:2)(cid:8). Van Aelst, P., Van Erkel, P., DâĂŹheer, E., Harder, R.A.: Who is leading the cam-
paign charts? comparing individual popularity on old and new media. Information,
Communication & Society (cid:2)(cid:0)((cid:5)), (cid:7)(cid:1)(cid:5)–(cid:7)(cid:3)(cid:2) ((cid:2)(cid:0)(cid:1)(cid:7))
(cid:2)(cid:9). Wang, Y., Li, Y., Luo, J.: Deciphering the (cid:2)(cid:0)(cid:1)(cid:6) us presidential campaign in the
twitter sphere: A comparison of the trumpists and clintonists. arXiv preprint
arXiv:(cid:1)(cid:6)(cid:0)(cid:3).(cid:0)(cid:3)(cid:0)(cid:9)(cid:7) ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:3)(cid:0). Wang, Y., Luo, J., Niemi, R., Li, Y., Hu, T.: Catching fire via"likes": Inferring topic
preferences of trump followers on twitter. arXiv preprint arXiv:(cid:1)(cid:6)(cid:0)(cid:3).(cid:0)(cid:3)(cid:0)(cid:9)(cid:9) ((cid:2)(cid:0)(cid:1)(cid:6))
(cid:3)(cid:1). West, D.M.: Air wars: Television advertising and social media in election campaigns,
(cid:1)(cid:9)(cid:5)(cid:2)-(cid:2)(cid:0)(cid:1)(cid:2). Sage ((cid:2)(cid:0)(cid:1)(cid:3))
|
1710.03852 | 2 | 1710 | 2018-05-09T22:22:18 | Top-k Route Search through Submodularity Modeling of Recurrent POI Features | [
"cs.SI",
"cs.DB",
"cs.DS"
] | We consider a practical top-k route search problem: given a collection of points of interest (POIs) with rated features and traveling costs between POIs, a user wants to find k routes from a source to a destination and limited in a cost budget, that maximally match her needs on feature preferences. One challenge is dealing with the personalized diversity requirement where users have various trade-off between quantity (the number of POIs with a specified feature) and variety (the coverage of specified features). Another challenge is the large scale of the POI map and the great many alternative routes to search. We model the personalized diversity requirement by the whole class of submodular functions, and present an optimal solution to the top-k route search problem through indices for retrieving relevant POIs in both feature and route spaces and various strategies for pruning the search space using user preferences and constraints. We also present promising heuristic solutions and evaluate all the solutions on real life data. | cs.SI | cs | Top-k Route Search through Submodularity Modeling of
Recurrent POI Features
Hongwei Liang
School of Computing Science
Simon Fraser University, Canada
[email protected]
Ke Wang
School of Computing Science
Simon Fraser University, Canada
[email protected]
8
1
0
2
y
a
M
9
]
I
S
.
s
c
[
2
v
2
5
8
3
0
.
0
1
7
1
:
v
i
X
r
a
ABSTRACT
We consider a practical top-k route search problem: given a collec-
tion of points of interest (POIs) with rated features and traveling
costs between POIs, a user wants to find k routes from a source to a
destination and limited in a cost budget, that maximally match her
needs on feature preferences. One challenge is dealing with the per-
sonalized diversity requirement where users have various trade-off
between quantity (the number of POIs with a specified feature)
and variety (the coverage of specified features). Another challenge
is the large scale of the POI map and the great many alternative
routes to search. We model the personalized diversity requirement
by the whole class of submodular functions, and present an opti-
mal solution to the top-k route search problem through indices for
retrieving relevant POIs in both feature and route spaces and vari-
ous strategies for pruning the search space using user preferences
and constraints. We also present promising heuristic solutions and
evaluate all the solutions on real life data.
KEYWORDS
Location-based Search; Route Planning; Diversity Requirement
ACM Reference Format:
Hongwei Liang and Ke Wang. 2018. Top-k Route Search through Submod-
ularity Modeling of Recurrent POI Features. In SIGIR '18: The 41st Inter-
national ACM SIGIR Conference on Research & Development in Information
Retrieval, July 8–12, 2018, Ann Arbor, MI, USA. ACM, New York, NY, USA,
11 pages. https://doi.org/10.1145/3209978.3210038
1 INTRODUCTION
The dramatic growth of publicly accessible mobile/geo-tagged data
has triggered a revolution in location based services [10]. An emerg-
ing thread is route planning, with pervasive applications in trip rec-
ommendation, intelligent navigation, ride-sharing, and augmented-
reality gaming, etc. According to [23], the travel and tourism indus-
try directly and indirectly contributed US$7.6 trillion to the global
economy and supported 292 million jobs in 2016. The majority of
current route planning systems yields shortest paths or explores
popular POIs [28], or recommends routes based on users' histori-
cal records [15] or crowdsourced experience [20].
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
the author(s) must be honored. Abstracting with credit is permitted. To copy other-
wise, or republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee. Request permissions from [email protected].
SIGIR'18, July 2018, Ann Arbor, MI, USA
© 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM.
ACM ISBN 978-1-4503-5657-2/18/07. . . $15.00
https://doi.org/10.1145/3209978.3210038
( 0, 1, 0 )
v
1
Feature vector ( (cid:875)
14
(cid:875) ) ) )
( 0, 0.9, 0 )
( 0, 0.4, 0.6 )
v
6
v
4
3
( 0, 0, 0.9 )
v
5
( 0.8, 0, 0 )
v
2
5
( 1, 0, 0.2 )
v
3
Figure 1: A sample POI map. Each node vi represents a POI
with 3 features (Park, Museum, Restaurant). Each feature
has a numeric rating in the range [0, 1], indicated by the vec-
tor aside the POI. Each edge has an associated traveling cost.
A practical problem that has not been well studied is that, a user
wants to be suggested a small number of routes that not only sat-
isfy her cost budget and spatial constraints, but also best meet her
personalized requirements on diverse POI features. We instantiate
this problem with a travel scenario. Consider that a new visitor to
Rome wishes to be recommended a trip, starting from her hotel and
ending at the airport, that allows her to visit museums, souvenir
shops, and eat at some good Italian restaurants (not necessarily
in this order) in the remaining hours before taking the flight. She
values the variety over the number of places visited, e.g., a route
consisting of one museum, one shop, and one Italian restaurant is
preferred to a route consisting of two museums and two shops.
The above problem is actually generalizable to various route
planning scenarios, and they illustrate some common structures
and requirements. First, there is a POI map where POIs are con-
nected by edges with traveling cost between POIs, and each POI
has a location and is associated with a vector of features (e.g., mu-
seum) with numeric or binary ratings. The POI map can be cre-
ated from Google Map, and features and ratings of POIs can be
created from user rating and text tips available on location-based
services such as Foursquare, or extracted from check-ins and user
provided reviews [7]. Second, the user seeks to find top-k routes
{P1, · · · , Pk }, from a specified source x to a specified destination
y within a travel cost budget b, that have highest values of a cer-
tain gain function Gain(Pi V ) for the set of POIs Pi V on the routes
Pi . The user specifies her preference of routes through a weight
vector w with wh being the weight of a feature h, and a route diver-
sity requirement, which specifies a trade-off between quantity (the
number of POIs with a preferred feature) and variety (the coverage
of preferred features) for the POIs on a route. The gain function has
wh Φh (PV ), where Φh for each feature h
the form Gain(PV ) =h
aggregates the feature's scores of the POIs PV .
SIGIR'18, July 2018, Ann Arbor, MI, USA
Hongwei Liang and Ke Wang
To better motivate the route diversity requirement, let us con-
sider the POI map in Figure 1 and a user with the source v1, des-
tination v5 and the budget b = 18. The user weights the features
Park and Museum using the vector w = (0.4, 0.6, 0), and values
both quantity and variety. If the sum aggregation Φh is used, the
route v1 → v6 → v4 → v5 will have the highest Gain. How-
ever, the user may not prefer this route because it does not include
any park though it includes 3 museums. With the max aggregation
used, the route v1 → v3 → v5 has the highest Gain by including
one top scored museum and one top scored park, but this route
does not maximally use the entire budget available. Intuitively, the
sum aggregation is "quantity minded" but ignores variety, whereas
the max aggregation is the opposite; neither models a proper trade-
off between quantity and variety as the user considered. The above
user more prefers the route v1 → v2 → v3 → v5 that visits mul-
tiple highly scored museums and parks, which will better address
both quantity and variety.
Solving the top-k route search problem faces two challenges.
Challenge I. One challenge is to design a general enough Φ
h
that includes a large class of aggregation functions to model a per-
sonalized route diversity requirement where each user has her own
quantity and variety trade-off. Our approach is treating the satis-
faction by visiting each POI as the marginal utility and modeling
the aggregation of such utilities of POIs with the diminishing mar-
ginal utility property by submodular set functions Φ
h. The intu-
ition is that, as the user visits more POIs of the same, her marginal
gain from such visits decreases gradually. Submodularity has been
used for modeling user behaviors in many real world problems
[14][11]. To the best of our knowledge, modeling user's diversity
requirement on a route by submodularity has not been done previ-
ously.
Challenge II. The top-k route problem is NP-hard as it sub-
sumes the NP-hard orienteering problem [4]. However, users typi-
cally demand the routes not only be in high quality, even optimal,
but also be generated in a timely manner (seconds to minutes). For-
tunately, the users' preferences and constraints on desired routes
provide new opportunities to reduce the search space and find op-
timal top-k routes with fast responses. For example, for a user with
only 6-hour time budget and preferring museums and parks on a
route, all the POIs in other types or beyond the 6 hours limit will
be irrelevant. The key of an exact algorithm is to prune, as early
as possible, such irrelevant POIs as well as the routes that are un-
promising to make into the top-k list due to a low gain Gain(PV ).
However, this task is complicated by the incorporation of a generic
submodular aggregation function Φh motivated above in our objec-
tive Gain(PV ), and designing a tight upper bounding strategy on
Gain(PV ) for pruning unpromising routes is a major challenge.
Contributions. The main contributions of this paper are:
• We define the top-k route search problem with a new person-
alized route diversity requirement where the user can choose any
submodular function Φh to model her desired level of diminishing
return. As an instantiation, we show that the family of power-law
functions is a sub-family of submodular functions and can model
a spectrum of personalized diversity requirement. (Section 3)
• Our first step towards an efficient solution is to eliminate irrel-
evant POIs for a query, by proposing a novel structure for indexing
the POI map on both features and travel costs. This index reduces
the POI map to a small set of POIs for a query.(Section 4)
• Our second step towards an efficient solution is to prune un-
promising routes, by proposing a novel optimal algorithm, PACER.
The novelties of the algorithm include an elegant route enumer-
ation strategy for a compact representation of search space and
the reuse of computed results, a cost-based pruning for eliminat-
ing non-optimal routes, and a gain-based upper bound strategy for
pruning routes that cannot make into the top-k list. The algorithm
works for any submodular function Φ
h. (Section 5)
• To deal with the looser query constraints, we present two
heuristic algorithms with a good efficiency-accuracy trade-off, by
finding a good solution with far smaller search spaces. (Section 6)
• We evaluate our algorithms on real-world data sets. PACER
provides optimal answers while being orders of magnitude faster
than the baselines. The heuristic algorithms provide answers of
a competitive quality and work efficiently for a larger POI map
and/or a looser query constraint. (Section 7)
2 RELATED WORK
Route recommendation/planning that suggests a POI sequence or a
path is related to our work. Works like [15] [6] learn from historical
travel behaviors and recommend routes by either sequentially pre-
dicting the next location via a Markov model or globally construct-
ing a route. These works rely on users' historical visit data, thus,
cannot be applied to a new user with no visit data or a user with
dynamically changed preferences. [1] interactively plans a route
based on user feedback at each step. Our approach does not rely
on user's previous visit data or interactive feedback, and works for
any users by modeling the preferences through a query.
Several works recommend a route by maximizing user satisfac-
tion under certain constraints. [8] assumes that each POI has a
single type and searches for a route with POIs following a pre-
determined order of types. [25] allows the user to specify a min-
imum number of POI types, instead of exact types, in a route. [19]
estimates temporal-based user preferences. [17] focuses on mod-
eling the queuing time on POIs. [3] constructs an optimal route
covering user-specified categories associated with locations. None
of them considers a general route diversity requirement for mod-
eling user's quantity and variety trade-off.
[24], perhaps most related to our work, adopts a keyword cov-
erage function to measure the degree to which query keywords
are covered by a route, similar to ours. Their pruning strategies
are designed specifically for their specific keyword coverage func-
tion; thus, does not address the personalized route diversity re-
quirement, where a different submodular function may be required.
Our pruning strategies apply to any submodular function Φh. Fi-
nally [24] produces a single route, and its performance is only "2-3
times faster than the brute-force algorithm", as pointed in [24].
Less related to our work is the next POI recommendation [26]
that aims to recommend the POI to be visited next, and the travel
package recommendation [18] that aims to recommend a set of
POIs. They are quite different from our goal of finding a route as a
sequence of featured POIs. Trajectory search either retrieves exist-
ing (segments of) trajectories that match certain similarity query
[27] from a database, or constructs a route based on the retrieved
Top-k Route Search through Submodularity Modeling of Recurrent POI Features
SIGIR'18, July 2018, Ann Arbor, MI, USA
Table 1: Nomenclature
Interpretation
POI-feature matrix F with POI set V and feature set H
the rating on feature h ∈ H for POI i ∈ V
staying cost on POI i
the traveling cost on edge ei , j ∈ E
the least traveling cost from any POI i to any POI j
route P with the included POI set PV
user query with parameters:
x and y – source and destination location
b – travel cost budget
w ∈ RH – feature preference vector
θ ∈ RH – filtering vector on feature ratings
Φ – feature aggregation functions
POI candidates set VQ retrieved by Q with its size n
Fi ,h after filtered by θ
gain of a route P given query Q
Notation
F ∈ RV ×H
Fi ,h
si
ti , j
Ti , j
P, PV
Q =
(x , y, b ,
Φ)
w
θ
,
,
VQ , n
Fi ,h
Gain(PV , Q )
trajectories [5]. These works assume the existence of a trajectory
database, instead of a POI map for route construction.
The classical Orienteering Problem (OP), such as [4], studied in
operational research on theoretical level, finds a path, limited in
length, that visits some nodes and maximizes a global reward col-
lected from the nodes on the path. No POI feature or route diversity
requirement is considered in OP.
3 PRELIMINARY
Table 1 summarizes the notations frequently used throughout the
paper. The variables in bold-face are vectors or matrices.
3.1 Problem Statement
Definition 1. [A POI Map] A POI map G = (V, E) is a di-
rected/undirected and connected graph, where V is a set of geo-tagged
POI nodes and E ⊆ V × V is a set of edges between nodes (i, j),
i, j ∈ V. H is a set of features on POIs. F ∈ R V × H denotes the
POI-feature matrix, where Fi ,h ∈ [0, β] is the rating on a feature h
for the POI i. Each POI i ∈ V is associated with a staying cost si .
Each edge ei , j ∈ E has a travel cost ti , j . (cid:3)
The choices of si and ti , j can be time, expenses, or other costs.
Definition 2. [Routes] A route P is a path x → · · · i · · · → y
in G from the origin x to the destination y through a sequence of non-
repeating POIs i except possibly x = y. PV denotes the set of POIs on
P. Ti , j denotes the least traveling cost from i to the next visited j,
where i, j are not necessarily adjacent in G. The cost of P is
cost (P) =i ∈PV
si +i →j ∈P
Ti , j .
(cid:3)
(1)
A route P includes only the POIs i that the user actually "visits"
by staying at i with si > 0. Each i → j on a route is a path from i to
j with the least traveling cost Ti , j . The intermediate POIs between
i, j on path i → j are not included in P. The staying times at x
and/or y can be either considered or ignored depending on the user
choice. The latter case can be modeled by setting sx = sy = 0.
At the minimum, the user has an origin x and a destination y for
a route, not necessarily distinct, and a budget b on the cost of the
route. In addition, the user may want the POIs to have certain fea-
tures specified by a H -dimensional weight vector w with each
element wh ∈ [0, 1] and Σh wh = 1. The user can also specify a
filtering vector θ so that Fi ,h is set to 0 if it is less than θ h. Fi ,h de-
notes Fi ,h after this filtering. Finally, the user may specify a route
diversity requirement through a feature aggregation function vec-
tor Φ, with Φh for each feature h. Φh(PV ) aggregates the rating on
feature h over the POIs in PV . See more details in Section 3.2.
Definition 3. [Query and Gain] A query Q is a 6-tuple (x, y, b, w,
θ , Φ). A route P is valid if cost (P) ≤ b. The gain of P w.r.t. Q is
Gain(PV , Q) =h
wh Φh (PV ).
(cid:3)
(2)
Note that only the specification of x, y, b is required; if the spec-
ification of w, θ , Φ is not provided by a user, their default choices
can be used, or can be learned from users' travel records if such
data are available (not the focus of this paper). Gain(PV , Q) is a
set function and all routes P that differ only in the order of POIs
have the same Gain, and the order of POIs affects only cost (P).
[Top-k route search problem] Given a query Q and an integer
k, the goal is to find k valid routes P that have different POI sets
PV (among all routes having the same PV , we consider only the
route with the smallest cost (P)) and the highest Gain(PV , Q) (if
ties, ranked by cost (P)). The k routes are denoted by topK.
In the rest of the paper, we use Gain(PV ) for Gain(PV , Q).
3.2 Modeling Route Diversity Requirement
To address the personalized route diversity requirement, we con-
sider a submodular Φh to model the diminishing marginal utility
as more POIs with feature h are added to a route. A set function
f : 2V → R is submodular if for every X ⊆ Y ⊆ V and v ∈ V \ Y ,
f (X ∪ {v })− f (X ) ≥ f (Y ∪ {v })− f (Y ), and is monotone if for every
X ⊆ Y ⊆ V , f (X ) ≤ f (Y ). The next theorem follows from [13] and
the fact that Gain(PV ) is a nonnegative linear combination of Φ
h.
Theorem 1. If for every feature h, Φh (PV ) is nonnegative, mono-
tone and submodular, so is Gain(PV ).
We aim to provide a general solution to the top-k route search
problem for any nonnegative, monotone and submodular Φh, which
model various personalized route diversity requirement. To illus-
trate the modeling power of such Φ
defined by the power law function
h, for example, consider Φ
h
Φ
h (PV ) =i ∈PV
Rh(i)−α h F
i ,h ,
(3)
where Rh(i) is the rank of POI i on the rating of feature h among
all the POIs in PV (the largest value ranks the first), rather than
the order that i is added to P, and α h ∈ [0, +∞) is the power
law exponent for feature h. Rh(i)−α h is non-increasing as Rh(i)
increases. For a sample route P = A(3) → B(5) with the ratings
of feature h for each POI in the brackets, and α h = 1, the ranks
for A and B on h are Rh (A) = 2 and Rh(B) = 1. Thus, Φh (PV ) =
2−1 × 3 + 1−1 × 5, with a diminishing factor 2−1 for the secondly
h (PV ) = 2−2 × 3 + 1−2 × 5
ranked A. If we use a larger α h = 2, Φ
has a larger diminishing factor for A.
In general, a larger αh means a faster diminishing factor for the
ratings Fi ,h on the recurrent feature, i.e., a diminishing marginal
value on h. Note that the sum aggregation (αh = 0) and the max
SIGIR'18, July 2018, Ann Arbor, MI, USA
Hongwei Liang and Ke Wang
aggregation (αh = ∞) are the special cases. Hence, Eqn. (3) sup-
ports a spectrum of diversity requirement through the setting of
αh .
Note that Rh (i) for an existing POI i may decrease when a new
POI j is added to P, so it is incorrect to compute the new Φh (PV )
by simply adding the marginal brought by j to existing value of
h (PV ). For ease of presentation, we assume α h has same value
Φ
for all h and use α for α h in the rest of the paper.
Theorem 2. Φ
h (PV ) defined in Eqn. (3) is nonnegative, monotone
and submodular.
Proof. The nonnegativity and monotonicity of Φh (PV ) in Eqn.
(3) is straightforward. For its submodularity, we omit the mathe-
matical proof due to limited space and only present an intuitive
idea. Let X and Y be the set of POIs in two routes, X ⊆ Y . Intu-
itively, for every i ∈ X , there must be i ∈ Y and i's rank in X is
not lower than that in Y . Let v ∈ V \ Y so that X ′ = X ∪ {v } and
Y ′ = Y ∪ {v }. Similarly, v' rank in X ′ is not lower than that in
Y ′, thus the increment brought by v to X is not less than that to
Y , which means Φh(X ′) − Φh (X ) ≥ Φh(Y ′) − Φh(Y ). Hence, it is
submodular.
(cid:3)
The user can also personalize her diversity requirement by spec-
ifying any other submodular Φh, such as a log utility function
h (PV ) =
Φ
h (PV ) = lo❕(1+i ∈PV
1 −i ∈PV [1 − Fi ,h]. Our approach only depends on the submod-
ularity of Φh, but is independent of the exact choices of such func-
tions.
F
i ,h) and the coverage function Φ
Our problem subsumes two NP-hard problems, i.e., the submod-
ular maximization problem [13] and the orienteering problem [4].
3.3 Framework Overview
To efficiently deal with the high computational complexity of this
problem, we divide the overall framework into the offline compo-
nent and the online component. Before processing any query, the
offline component carefully indexes the POI map on feature and
cost dimensions for speeding up future POI selection and travel
cost computation. The online component responds to the user query
Q with Sub-index Retrieval that extracts the sub-indices relevant
to Q, and Routes Search that finds the top-k routes using the sub-
indices. For routes search, as motivated in Section 1, we consider
both the exact algorithm with novel pruning strategies, and heuris-
tic algorithms to deal with the worst case of less constrained Q.
We first consider an indexing strategy in Section 4, and then
consider routes search algorithms in Section 5 and Section 6.
4 INDEXING
In this section, we explain the offline indexing component and the
Sub-index Retrieval of the online component.
4.1 Offline Index Building
The POI map data is stored on disk. To answer user queries rapidly
with low I/O access and speed up travel cost computation, we build
two indices, FI and HI stored on disk.
Offline Index Building
Online Sub-index Retrieval
(stored on disk)
Feature Index (FI)
(loaded to memory)
Query specific Feature Index (FIQ)
park: { (v3,1) (v2,0.8) }
park: { (v3,1) (v2,0.8) }
museum: { (v1,1) (v4,0.9) (v6,0.4) }
museum: { (v1,1) (v4,0.9) }
food: { (v5,0.9) (v6,0.6) (v3,0.2) }
2-Hop Index (HI)
Q = (v6, v2, 13, ( 0.5, 0.5, 0 ), 0.6, 1)
$ %
! "
#
v1: { (v1,0) (v2,12) (v6,12) (v4,14) }
Query specific 2-Hop Index (HIQ)
v2: { (v2,0) (v6,4) (v3,5) }
v3: { (v3,0) (v4,4) (v6,4) }
v4: { (v4,0) (v6,3) }
v1: { (v1,0) (v2,12) (v6,12) }
v2: { (v2,0) (v6,4) (v3,5) }
v3: { (v3,0) (v4,4) (v6,4) }
v5: { (v5,0) (v3,1) (v4,3) (v6,5) }
v4: { (v4,0) (v6,3) }
v6: { (v6,0) }
v6: { (v6,0) }
Figure 2: Left part: FI and HI built from the POI map in Figure
1. Right Part: Given a query Q, retrieve POI candidates VQ
by retrieving the subindices FIQ and HIQ from FI and HI.
i ,h for POI vi , sorted in descending order of F
FI is an inverted index mapping each feature h to a list of POIs
having non-zero rating on h. An entry (vi , Fi ,h) indicates the fea-
ture rating F
i ,h. FI
helps retrieving the POIs related to the features specified by a query.
The least traveling costTi , j between two arbitrary POIs i and j is
frequently required in the online component. To compute Ti , j effi-
ciently, we employ the 2-hop labeling [9] for point-to-point short-
est distance querying on weighted graphs. [9] shows scalable re-
sults for finding 2-hop labels for both unweighted and weighted
graphs, and the constructed labels return exact shortest distance
queries. Our HI index is built using the 2-hop labeling method.
HI. For an undirected graph, there is one list of labels for each
node vi , where each label (u, d) contains a node u ∈ V, called pivot,
and the least traveling cost d between vi and u. HI(vi ) denotes the
list of labels for vi , sorted in the ascending order of d. According
to [9], Ti , j between vi and vj is computed by
Ti , j =
min
(u ,d1)∈HI(vi )∩(u ,d2)∈HI(vj )
(d1 + d2).
(4)
Figure 2 (left part) shows the FI and HI for the POI map in Figure
1. For example, to compute T2,5, we search for the common pivot
nodes u from the pivot label lists of v2 and v5 and find that v3
minimizes the traveling cost between v2 and v5, so T2,5 = 5 +1 = 6.
In the case of a directed graph, each POI vi will have two lists
) for vi as the source, and HI(vin
) for vi as
i
and vj with
of labels in HI, HI(vout
the destination. And we simply replace vi with vout
vin
j
in Eqn. (4) to compute Ti , j .
i
i
4.2 Online Sub-index Retrieval
Given a query Q, the first thing is to retrieve the POI candidates VQ
that are likely to be used in the routes search part. In particular, the
POIs that do not contain any feature in the preference vector w or
do not pass any threshold in θ will never be used, nor the ones that
cannot be visited on the way from the source x to the destination
y within the budget b. This is implemented by retrieving the query
specific sub-indices FIQ from FI and HIQ from HI.
Figure 2 (right part) shows how the retrieval works for a query
Q = (x = v6, y = v2, b = 13, w = (0.5, 0.5, 0), θ = 0.6, α = 1),
where the weights in w are for (Park, Museum, Food), and α is the
Top-k Route Search through Submodularity Modeling of Recurrent POI Features
SIGIR'18, July 2018, Ann Arbor, MI, USA
power law exponent in Eqn. (3). Here the elements in each vector
θ and α have the same value for all features.
FIQ, a sub-index of FI, is retrieved using w and θ. w directly
locates the lists for the user preferred (with w
h > 0) features. θ is
used to cut off lower rated POIs on the sorted lists indicated by red
scissors. VQ = {v1, v2, v3, v4} contains the remaining POIs.
HIQ, a sub-index of HI, is then formed by retrieving the lists for
each POI in VQ and also those for x and y, and b is used to cut off
the sorted lists, indicated by red scissors. We also check whether
a POI i in current VQ is actually reachable by checking the single-
point visit cost: if sx + Tx ,i + si + Ti ,y + sy > b, we remove i from
VQ and remove its list from HIQ , as indicated by the blue shading.
Then we get the final POI candidates VQ . Typically, VQ ≪ V .
FIQ and HIQ are retrieved only once and kept in memory.
5 OPTIMAL ROUTES SEARCH
With POI candidate set VQ and the sub-indices extracted, the next
step is the Routes Search phase. We present an optimal routes search
algorithm in this section. Considering the complexity and general-
ity of the problem, a standard tree search or a traditional algorithm
for the orienteering problem does not work. An ideal algorithm de-
sign should meet the following goals: i. search all promising routes
in a smart manner without any redundancy; ii. prune unpromising
routes as aggressively as possible while preserving the optimality
of the top-k answers; iii. ensure that the search and pruning strate-
gies are applicable to any nonnegative, monotone and submodular
aggregation functions Φh. To this end, we propose a novel algo-
rithm, Prefix bAsed Compact statEs gRowth (PACER), that incor-
porates the idea of dynamic programming and fuses a cost-based
pruning strategy and a gain-based pruning strategy in an unified
way.
Next, we present our enumeration and pruning strategies, fol-
lowed by the detailed algorithm and the complexity analysis.
5.1 Prefix-based Compact State Growth
A route P is associated with several variables: PV , Gain(PV ), the
ending POI end(P), and cost (P). If x is not visited, sx and Fx ,h for
every h are set to 0; the same is applied to y. A POI sequence is an
open route if it starts from x and visits several POIs other than y;
it is a closed route if it starts from x and ends at y. The initial open
route includes only x. An open route P is feasible if its closed form
P → y satisfies cost (P → y) ≤ b. In the following discussion,
P denotes either an open route or a closed route. An open route
P− with end(P−) = i can be extended into a longer open route
P = P− → j by a POI j < P−
V ∪ {y}. The variables for P are
PV = P−
V ∪ {j}
Gain(PV ) =h
w
h
Φ
h(PV )
end(P) = j
cost (P) = cost (P−) + Ti , j + sj .
(5)
Compact states C. PV and Gain(PV ) depend on the POI set
of the route P but are independent of how the POIs are ordered.
Hence, we group all open routes sharing the same PV as a compact
state, denoted as C, and let CL denote the list of open routes having
0Ø
1{A}
2{B}
4{C}
8{D}
3{AB}
{AB}
{A}→B
{B}→A
5{AC}
{AC}
{A}→C
{C}→A
6{BC}
{BC}
{B}→C
{C}→B
9{AD}
{A}→D
{D}→A
10{BD}
{BD}
{B}→D
{D}→B
12{CD}
{CD}
{C}→D
{C}→D
{D}→C
{AB}→C
{AB}→C
7{ABC}{AC}→B
{BC}→A
11{ABD}
{AB}→D
{AD}→B
{BD}→A
13{ACD}
{AC}→D
{AD}→C
{CD}→A
14{BCD}
{BC}→D
{BD}→C
{CD}→B
15{ABCD}
{ABC}→D
{ABD}→C
{ACD}→B
{BCD}→A
Figure 3: The compact state enumeration tree for PACER.
The number indicates the order of enumeration.
C as the POI set. C is associated with the following fields:
(cid:26) Gain(C) : the gain of routes grouped by C
CL : ∀P ∈ CL, end(P), cost (P).
(6)
These information is cached in a hash map with C as the key.
We assume that the POIs in VQ are arranged in the lexicograph-
ical order of POI IDs. The compact states are enumerated as the
subsets of VQ . x is included in every compact state, so we omit x.
Figure 3 shows a compact state enumeration tree for VQ =
{A, B, C , D}, excluding x and y. Each capital letter represents a POI,
each node represents a compact state. We define the set of POIs that
precede i, in the above order, in a POI set as the prefix of a POI i,
e.g., prefix of C is {AB}. The compact states are generated in a spe-
cific prefix-first depth-first manner so that longer open routes are
extended from earlier computed shorter ones. Initially, the root is
the empty set ∅. A child node C of the current node C− is generated
by appending a POI i that precedes any POIs in C− to the front of
C−, and all child nodes are arranged by the order of i. For exam-
ple, Node 7 {ABC } is generated as a child node of Node 6 {BC } by
appending A to the front of {BC } because A precedes B and C.
At node C, the open routes in CL are generated by extending the
cached routes in every compact state C−j = C \ {j} where j ∈ C.
There are C such C−j . We generate each route P = P− → j by
−j
selecting the routes P− from each C
L and append j at the end, and
compute the gain and cost of P based on the accessed information
for C−j from the hash map. P is kept in CL if it is feasible.
For example, to generate the open routes at the node {ABC }, we
access the cached open routes at nodes {AB}, {AC } and {BC } and
append the missing POI. {AB} → C represents all the open routes
ended with C and the first two POIs in any order, i.e., x → A →
B → C and x → B → A → C. Note that it materializes only the
current expanded branch of the tree, instead of the entire tree.
A closed route P → y for each P ∈ CL is used to update the
top-k routes topK. If CL is empty, this compact state is not kept.
If no compact state is expandable, we stops the enumeration and
yield the final topK. Note that each CL can include C! open routes
and enumerating all the routes can be very expensive. We present
two strategies to prune unpromising routes.
SIGIR'18, July 2018, Ann Arbor, MI, USA
Hongwei Liang and Ke Wang
5.2 Cost-based Pruning Strategy
Consider two feasible open routes P and P ′. We say P dominates
P ′ if PV = P ′
V , end(P) = end(P ′) and cost (P) ≤ cost (P ′). Be-
cause, if a route P ′ → P is feasible, P → P with the same exten-
sion P must be also feasible and cost (P → P) ≤ cost (P ′ → P).
Pruning-1: cost dominance pruning. Leveraging the above
dominance relationship, at the compact state C, when generating
P = P− → j for a given j, we only select the open route P− from
−j
L such that P is feasible and has the least cost, thus, dominates
C
−j
all other routes P ′− → j with P ′− from C
L . This reduces C!
open routes to at most C dominating open routes at the compact
state C, one for each j in C, without affecting the optimality. We
call this strategy cost dominance pruning.
For example, {AB} → C on node 7 {ABC } now represents only
one open route with the least cost chosen from A → B → C and
B → A → C. Note that Pruning-1 is a subtree pruning, e.g., if A →
B on node 3 is pruned, all the open routes starting with A → B,
such as A → B → C on node 7 and A → B → D on node 11, will
never be considered.
Though all dominated open routes are pruned, many of the re-
maining dominating open routes are still unpromising to lead to
the top-k closed routes. This further motivates our next strategy.
5.3 Gain-based Pruning Strategy
We can extend a dominating open route P step by step using the
remaining budget ∆b = b − cost (P) into a closed route P → P.
The POIs used for extension at each step should be reachable from
the current end(P), therefore, chosen from the set
U = {i Tend (P),i + si + Ti ,y + sy ≤ ∆b },
(7)
where i is an unvisited POI other than y. Tend (P),i and Ti ,y can be
computed through HIQ . P → P has gain Gain(PV ∪ PV ). Then
the marginal gain by concatenating P to the existing P is
∆Gain( PV PV ) = Gain(PV ∪ PV ) − Gain(PV ).
(8)
Let P → P∗ denote the P → P with the highest gain. If P →
P∗ ranks lower than the current k-th top routes topK [k], P is not
promising and all the open routes extended from P can be pruned.
Pruning-2: marginal gain upper bound pruning. However,
finding P∗ is as hard as finding an optimal route from scratch,
so we seek to estimate an upper bound U P of the marginal gain
∆Gain( PV PV ), such that if Gain(PV ) + U P is less than the gain
of topK [k], P is not promising, thus, P and all its extensions can be
pruned without affecting the optimality. We call this marginal gain
upper bound pruning. As more routes are enumerated, the gain of
topK [k] increases and this pruning becomes more powerful.
The challenge of estimating U P is to estimate the cost of the
extended part P without knowing the order of the POIs. Because
∆Gain( PV PV ) is independent of the POIs' order, we can ignore
the order and approximate the "route cost" by a "set cost", i.e., the
sum of some cost c(i) of each POI i ∈ PV , where c(i) is no larger
than i's actual cost when it is included in P. We define c(i) as:
c(i) = si + min(tj,i )/2 + min(ti ,k)/2,
(9)
where tj,i is the cost on an in-edge ej,i and ti ,k is the cost on an
out-edge ei ,k . As the order of POIs is ignored, it is easy to verify
that min ensures the above property of c(i). The destination y is
"one-sided", i.e., c(y) = sy + min(tj,y)/2. To make a tighter cost ap-
proximation, we also count the half out-edge cost min(tend (P),k )/2
for end(P).
Then, U P is exact the solution, i.e., the maximum ∆Gain(S ∗PV ),
to the following optimization problem:
max
S ⊆ U∪{y }
∆Gain(S PV ) s .t .i ∈S
c(i) ≤ B,
(10)
where U is defined in Eqn. (7) and B = ∆b − min(tend (P),k )/2.
Note that S should include y because end( P) = y. As c(i) and
c(end(P)) are no larger than their actual costs, ∆Gain(S ∗PV ) ≥
∆Gain( PV PV ) for any P. Thus, using ∆Gain(S ∗PV ) as U P never
loses the optimality. To solve Eqn. (10), we first show the properties
of the marginal gain function ∆Gain.
Theorem 3. The marginal gain function ∆Gain as defined in Eqn.
(8) is nonnegative, monotone and submodular.
Proof. We only show that ∆Gain is submodular. According to
[13], if a set function ❕ : 2V → R is submodular, and X , Y ⊂ V are
disjoint, the residual function f : 2Y → R defined as f (S) = ❕(X ∪
S)−❕(X ) is also submodular. Since Gain is submodular (Theorem 1)
and since PV , U ⊂ V are disjoint, ∆Gain( PV PV ) = Gain(PV ∪
PV ) − Gain(PV ) is residual on PV , thus, is submodular.
(cid:3)
Apparently, Eqn. (10) is a submodular maximization problem
subject to a knapsack constraint, which unfortunately is also NP-
hard [13]. Computing ∆Gain(S ∗PV ) is costly, thus, we consider
estimating its upper bound.
One approach, according to [22], is to run a Ω(B U 4) time (B is
defined in Eqn. (10)) greedy algorithm in [12] to obtain an approx-
imate solution ∆Gain(S ′PV ) for the above problem with approxi-
mation ratio of 1 − e −1, then the upper bound of ∆Gain(S ∗PV ) is
achieved by ∆Gain(S ′PV )/(1 − e −1). A less costly version of this
algorithm runs in O(B U ) but its approximation ratio is 1
2 (1−e −1).
Compared with the above mentioned offline bounds, i.e., 1 − e −1
and 1
2 (1 − e −1) that are stated in advance before running the ac-
tual algorithm, the next theorem states that we can instead use the
submodularity to acquire a much tighter online bound.
Theorem 4. For each POI i ∈ U ∪ {y}, let δi = ∆Gain({i }PV ).
Let ri = δi /c(i), and let i1, · · · , im be the sequence of these POIs with
j =1c(ij ) ≤ B and
ri in decreasing order. Let l be such that C = l −1
l
j =1c(ij ) > B. Let λ = (B − C)/c(il ). Then
(11)
U P =l −1
j =1
δi j
+ λδil ≥ ∆Gain(S ∗PV ).
Proof. [16] showed a theorem that a tight online bound for ar-
bitrary given solution A (obtained using any algorithm) to a con-
strained submodular maximization problem can be got to measure
A is from the optimal solution. By applying [16] to the
how far
problem in Eqn. (10) and let
A = ∅, Theorem 4 is deduced.
(cid:3)
By this means, U P is computed without running a greedy algo-
rithm. We also empirically proved that this online bound in Eqn.
(11) outperforms the offline bounds on both tightness and compu-
tational cost. Thus, we finally choose the online bound.
Top-k Route Search through Submodularity Modeling of Recurrent POI Features
SIGIR'18, July 2018, Ann Arbor, MI, USA
Algorithm 1: PACER(C−
Globals
, I ) (Recursive funcion)
:Q = (x, y, b, w, θ , Φ), VQ , FIQ and HIQ to
compute Gain(C) and cost (P), and k
Parameters :compact state C− and the set of POIs I
Output
: a priority queue topK
1 forall POI i in set I in order do
2
3
4
5
6
7
8
9
10
11
12
13
C ← {i } ∪ C−;
compute Gain(C);
forall POI j in C do
C−j ← C \ {j};
P− ← the dominating route in C
cost (P− → j) is minimum; // prune-1
P ← P− → j;
if cost (P → y) ≤ b then
−j
L such that
Compute U P using Eqn. (11);
if Gain(C) + U P ≥ Gain(topK [k]) then
insert route P into CL; // prune-2
UpdateTopK(CL, topK );
PACER(C, prefix of i in I );
5.4 Algorithm
Algorithm 1 incorporates the above enumeration and pruning strate-
gies. Given the global variables, PACER(C−
, I ) recursively enumer-
ates the subtree at the current compact state C− with the POI set I
available for extending C−, and finally return the k best routes in
topK. The initial call is PACER(∅, VQ ), when only x is included.
As explained in Section 5.1, Line 1 - 3 extends C− by each i in
the set I in order, creating the child node C and computing Gain(C).
Lines 4 - 11 generate the dominating and promising open routes CL.
Specifically, for each j ∈ C selected as the ending POI, Line 5 - 6
−j
find the dominating route P− from the previously computed C
L .
This corresponds to Pruning-1. Only when the new open route P
is feasible, Pruning-2 is applied to check if P has a promising gain,
and if so, P is inserted into CL (Lines 8 - 11). After CL is finalized, it
selects an open route P in CL such that P → y has the least cost to
update topK (Line 12). The information of the new compact state
C, as in Eqn. (6), is added to the hash map. At last, C is extended
recursively with the POIs in the prefix of i in current I (Line 13).
Summary of the properties of PACER. (1) PACER works
for any nonnegative, monotone, and submodular Gain function
so as to deal with the personalized diversity requirement. (2) Open
routes are enumerated as compact states in a prefix-first depth-first
order to construct open routes incrementally, i.e., dynamic pro-
gramming. (3) With Pruning-1, we compute at most C domi-
nating feasible open routes at each compact state C, instead of C!
routes. (4) Pruning-2 further weeds out the dominating feasible
open routes not having a promising estimated maximum gain.
5.5 Complexity Analysis
We measure the computational complexity by the number of routes
examined. Two main factors affecting this measure are the size of
the POI candidate set, i.e., VQ denoted by n, and the maximum
length of routes examined (excluding x and y), i.e., the maximum
P denoted by p. p ≪ n. We analyze PACER relatively to the brute-
force search and a state-of-the-art approximation solution.
PACER. The compact states on the l-th level of the enumeration
tree (Figure 3) compute the routes containing l POIs; thus, there
are at most(cid:0)n
l(cid:1) compact states on level l. And thanks to Pruning-1,
each compact state represents at most l dominating open routes.
There are n dominating open routes with single POI on level l = 1.
Starting from l = 2, to generate each dominating open route on
level l, we need to examine (l −1) sub-routes having the same set of
POIs as the prefix and add the same ending to find the dominating
one, according to the cost dominance pruning. Hence, with p ≪ n
and the Pascal's rule [2], the number of routes examined is at most
n +
l (l − 1)(cid:18)n
l(cid:19) = n + n(n − 1)
pl =2
p − 3(cid:19)) = n(n − 1)(cid:18)n − 1
+ (cid:18)n − 2
p − 2(cid:19) =
p − 2(cid:19)
l − 2(cid:19) ≈ n(n − 1)((cid:18)n − 2
(cid:18)n − 2
pl =2
n − 1
(n − p + 1)(p − 2)!
n!
(n − p)!
.
(12)
(n−p)! ) with
Therefore, the computation cost of PACER is O(
p ≪ n. If Pruning-2 is also enabled and it prunes the γ percent of
the routes examined by PACER with Pruning-1, the computation
cost of PACER is O((1 − γ )
(p−2)!
1
1
n!
n!
(n−p)! ).
(p−2)!
Brute-force algorithm (BF). The brute-force algorithm based
on the breadth-first expansion examines O( n!
(n−p)! ) routes.
Approximation algorithm (AP). [4] proposed a quasi-polynomial
time approximation algorithm for the Orienteering Problem. We
modified AP to solve our problem. It uses a recursive binary search
to produce a single route with the approximation ratio ⌈log p⌉ + 1
and runs in O((n · OPT · log b)log p ), where OPT and b are the num-
bers of discrete value for an estimated optimal Gain and for the
budget, respectively. The cost is expensive if b or OPT has many
discrete values. For example, for b = 512 minutes, n = 50, p = 8 and
OPT = 10.0 (100 discrete values with the single decimal point pre-
cision), the computation cost is (50 · 100 · log 512)log 8 = 9.11 × 1013.
Lower precision leads to smaller computation cost, but also lower
accuracy. [21] noted that AP took more than 104 seconds for a small
graph with 22 nodes. Compared with AP, the computation cost of
PACER with Pruning-1 given by Eqn. (12) is only 50 × 49 × (cid:0)49
6(cid:1) =
3.43 ×1010. This cost is further reduced by Pruning-2. PACER finds
the optimal top-k routes whereas AP only finds single approximate
solution. We will experimentally compare PACER with AP.
6 HEURISTIC SOLUTIONS
PACER remains expensive for a large budget b and a large POI can-
didate set VQ . The above approximation algorithm is not scalable.
Hence, we design two heuristics when such extreme cases arise.
State collapse heuristic. The cost dominance pruning in PACER
keeps at most l open routes for a compact state representing a set
of l POIs (excluding x and y). A more aggressive pruning is to
keep only one open route having the least cost at each compact
state, with the heuristic that this route likely visits more POIs. We
denote this heuristic algorithm by PACER-SC, where SC stands
SIGIR'18, July 2018, Ann Arbor, MI, USA
Hongwei Liang and Ke Wang
for "State Collapsing". Clearly, PACER-SC trades optimality for ef-
ficiency, but it inherits many nice properties from PACER and Sec-
tion 7.2 will show that it usually produces k routes with quite good
quality.
Analogous to the complexity analysis for PACER in Section 5.5,
with p ≪ n, PACER-SC examines no more thanp
routes, which is around 1/p of that for PACER.
l =1 l(cid:0)n
l(cid:1) ≈ n(cid:0) n
p−1(cid:1)
Greedy algorithm. PACER-SC's computation complexity re-
mains exponential in the route length p. Our next greedy algorithm
runs in polynomial time. It starts with the initial route x → y and
iteratively inserts an unvisited POI i to the current route to maxi-
mize the marginal gain/cost ratio
Gain({i } ∪ C) − Gain(C)
si + Tx ,i + Ti ,y
,
(13)
where C denotes the set of POIs on the current route. It inserts i
between two adjacent POIs in the current route so that the total
cost of the resulting route is minimized. The term Tx ,i + Ti ,y con-
strains the selected POIs i to be those not too far away from the
two end points. The expansion process is repeated until the budget
b is used up. The algorithm only produces a single route and exam-
ines O(pn) routes because each insertion will consider at most n
unvisited POIs.
7 EXPERIMENTAL EVALUATION
All algorithms were implemented in C++ and were run on Ubuntu
16.04.1 LTS with Intel i7-3770 CPU @ 3.40 GHz and 16G of RAM.
7.1 Experimental Setup
7.1.1 Datasets. We use two real-world datasets from [24]. Sin-
gapore denotes the Foursquare check-in data collected in Singa-
pore, and Austin denotes the Gowalla check-in data collected in
Austin. Singapore has 189,306 check-ins at 5,412 locations by 2,321
users, and Austin has 201,525 check-ins at 6,176 locations by 4,630
users. Same as suggested in [3, 24], we built an edge between two
locations if they were visited on the same date by the same user.
The locations not connected by edges were ignored. We filled in
the edge costs ti , j by querying the traveling time in minute using
Google Maps API under driving mode. The staying time si were
generated following the Gaussian distribution, si ∼ N (µ, σ 2), with
µ = 90 minutes and σ = 15. The features are extracted based on
the user mentioned keywords at check-ins, same to [24]. We obtain
the rating of a feature h on POI i by
Fi ,h = min{
N Ch(i)
1/Sh ×j ∈Sh N Ch(j)
×
β
2
, β },
(14)
where N Ch(i) is the number of check-ins at POI i containing the
feature h, Sh is the set of POIs containing h, β is the maximum
feature rating and is set to β = 5 for both data sets. The calculation
scales the middle value β
2 by the ratio of a POI's check-in count
to the average check-in count on h. Table 2 shows the descriptive
statistics of the datasets after the above preprocessing.
Both datasets were used in [24], which also studied a route plan-
ning problem. The datasets are not small considering the scenario
for a daily trip in a city where the user has a limited cost budget.
Even with 150 POIs to choose from, the number of possible routes
Table 2: Dataset statistics
Singapore
Austin
# POI
1,625
2,609
# Edges Average ti , j
16.24 minutes
24,969
34,340
11.12 minutes
# Features
202
252
consisting of 5 POIs can reach 70 billions. Compared to our work,
[17] evaluated its itinerary recommendation methods using theme
park data, where each park contains only 20 to 30 attractions.
7.1.2 Algorithms. We compared the following algorithms. BF
is the brute-force method (Section 5.5). PACER+1 is our proposed
optimal algorithm with only Pruning-1 enabled. PACER+2 enables
both Pruning-1 and Pruning-2. PACER-SC is the state collapse al-
gorithm and GR is the greedy algorithm in Section 6. AP is the
approximation algorithm proposed by [4] (see Section 5.5). A* is
the A* algorithm proposed by [24]. Since A* works only for its spe-
cific keyword coverage function, it is not compared until Section
7.3 where we adapt their coverage function in our method. To be
fair, all algorithms use the indices in Section 4 to speed up. Note
that BF, PACER+1, PACER+2 and A* are exact algorithms, while
PACER-SC, GR, and AP are greedy or approximation algorithms.
7.1.3 (cid:30)eries. A query Q has the six parameters x, y, b, w, θ , Φ.
For concreteness, we choose Φh in Eqn. (3) with α controlling the
diversity of POIs on a desired route. We assume θ h and α h are the
same for all features h. For Singapore, we set x as Singapore Zoo
and y as Nanyang Technological University; and for Austin, we set
x as UT Austin and y as Four Seasons Hotel Austin.
For each dataset, we generated 50 weight vectors w to model the
feature preferences of 50 users as follows. For each w, we draw m
features, where m is a random integer in [1, 4], and the probability
of selecting each feature h is Pr(h) =
N Ch (i ) . N Ch(i)
and Sh are defined in Eqn. (14). Let HQ be the set of selected fea-
tures. For each h ∈ HQ , wh =
i ∈Sh
h ∈Hi ∈Sh
N Ch (i ) .
i ∈Sh
N Ch (i )
N Ch (i )
h ∈HQ i ∈Sh
Finally, we consider b ∈ {4, 5, 6, 7, 8, 9} in hours, θ ∈ {0, 1.25, 2.5,
3.75}, and α ∈ {0, 0.5, 1, 2} with the default settings in bold face.
For each setting of b, θ , α , we generated 50 queries Q = (x, y, b, w, θ , α )
using the 50 vectors w above. All costs are in minutes, therefore,
b = 5 specifies the budget of 300 minutes.
We first evaluate the performance of our proposed algorithms
(Section 7.2), then we compare with the A* algorithm (Section 7.3).
7.2 Performance Study
Evaluation metrics. As we solve an optimization problem, we
evaluate Gain for effectiveness, CPU runtime and search space (in
the number of examined open routes) for efficiency.
For every algorithm, we evaluate the three metrics for process-
ing a query, and report the average for the 50 queries (i.e., vectors
w) under each setting of (b, θ , α ) chosen from the above ranges.
GR and AP only find single route, thus, we first set k = 1 to com-
pare all algorithms, and discuss the impact of larger k in Section
7.2.4.
Figures 4 and 5 report the experiments for Singapore and Austin,
respectively. Each row corresponds to various settings of one of
b, θ , α while fixing the other two at the default settings. OPTIMAL
Top-k Route Search through Submodularity Modeling of Recurrent POI Features
SIGIR'18, July 2018, Ann Arbor, MI, USA
BF
PACER+1
PACER+2
OPTIMAL
PACER-SC
BF
PACER+1
PACER+2
OPTIMAL
PACER-SC
PACER-SC
GR
AP
GR
AP
PACER-SC
GR
AP
GR
AP
31/50
42/50
)
c
e
s
(
e
m
i
t
n
u
R
103
101
10-1
10-3
4
5
6
7
8
9
Time budget b (hour)
(a) Runtime vs. b
)
c
e
s
(
e
m
i
t
n
u
R
103
101
10-1
10-3
t
s
e
u
o
r
f
o
#
0
1.25
2.5
3.75
t
s
e
u
o
r
f
o
#
1010
108
106
104
102
31/50
42/50
4
5
6
7
8
9
Time budget b (hour)
37/50 40/50
)
c
e
s
(
e
m
i
t
n
u
R
103
101
10-1
10-3
4
5
6
7
8
9
Time budget b (hour)
t
s
e
u
o
r
f
o
#
1010
108
106
104
102
37/50 40/50
4
5
6
7
8
9
Time budget b (hour)
6
5
4
9
Time budget b (hour)
7
8
(b) # of routes vs. b
1010
108
106
104
102
0
1.25
2.5
3.75
(c) Gain vs. b
(a) Runtime vs. b
46/50
)
c
e
s
(
e
m
i
t
n
u
R
103
101
10-1
10-3
t
s
e
u
o
r
f
o
#
0
1.25
2.5
3.75
0
1.25
2.5
3.75
46/50
(b) # of routes vs. b
1010
108
106
104
102
0
1.25
2.5
3.75
i
n
a
G
i
n
a
G
14
12
10
8
6
4
10
8
6
4
5
6
4
9
Time budget b (hour)
7
8
(c) Gain vs. b
0
1.25
2.5
3.75
(d) Runtime vs. θ
(e) # of routes vs. θ
(f) Gain vs. θ
(d) Runtime vs. θ
(e) # of routes vs. θ
(f) Gain vs. θ
i
n
a
G
i
n
a
G
14
12
10
8
6
4
10
8
6
4
16
12
8
4
)
c
e
s
(
e
m
i
t
n
u
R
101
100
10-1
10-2
10-3
107
105
103
s
e
t
u
o
r
f
o
#
i
n
a
G
)
c
e
s
(
e
m
i
t
n
u
R
101
100
10-1
10-2
10-3
107
105
103
s
e
t
u
o
r
f
o
#
i
n
a
G
101
0
0.5
1
2
16
12
8
4
0
0.5
1
2
0
0.5
1
2
101
0
0.5
1
2
0
0.5
1
2
0
0.5
1
2
(g) Runtime vs. α
(h) # of routes vs. α
(i) Gain vs. α
(g) Runtime vs. α
(h) # of routes vs. α
(i) Gain vs. α
Figure 4: Experimental results for Singapore. Run time and
search space (# of routes) are in logarithmic scale. The labels
beside data points indicate the ratio of queries successfully
responded by the algorithm under the parameter setting. No
label if no query fail. Data point or bar is not drawn if more
than half fail. AP can only respond queries with small b.
denotes the same optimal gain of PACER+2, PACER+1 and BF. We
terminated an algorithm for a given query after it runs for 1 hour
or runs out of memory, and used the label beside a data point to
indicate the percentage of finished queries. If more than a half of
the queries were terminated, no data point is shown.
7.2.1
Impact of budget b (Figure 4a - 4c and 5a - 5c). b affects
the length of routes (the number of POIs included).
AP is the worst. This is consistent with the analysis in Section
5.5 that AP suffers from a high complexity when b and OPT have
many discrete values. b = 6 has 360 discrete values in minute, a ma-
jority of the queries cannot finish. The efficiency of BF drops dra-
matically as b increases, since the number of open routes becomes
huger and processing them is both time and memory consuming.
PACER+1's search space is two orders of magnitude smaller than
that of BF, thanks to the compact state enumeration and the cost
dominance pruning. PACER+2 is the best among all the exact al-
gorithms. Compared with PACER+1, the one order of magnitude
speedup in runtime and two orders of magnitude reduction in search
space clearly demonstrates the additional pruning power of the
Gain based upper bound pruning. PACER-SC trades optimality for
efficiency. Surprisingly, as shown in Figure 4c and 5c, PACER-SC
performs quite well with Gain being close to that of OPTIMAL.
GR always finishes in less than 10−2 seconds. For Singapore, the
achieved gain is far worse than that of OPTIMAL, compared with
Figure 5: Experimental results for Austin
the difference for Austin. This is because x and y for Singapore are
relatively remote to the central city. GR will greedily select a POI
i not too far away from x and y (Eqn. (13)), thus, many POIs with
possibly higher feature ratings located in the central city are less
likely to be chosen. In contrast, x and y for Austin are in the down-
town area and this situation is avoided in most cases.
7.2.2
Impact of of filtering threshold θ . In Figure 4d - 4f and
5d - 5f, as θ increases, the POI candidate set becomes smaller and
all the algorithms run faster. The majority of the queries for AP
cannot finish and its results are not shown. The study suggests
that a reasonable value of θ, e.g., 2.5, reduces the searching cost
greatly while having little loss on the quality of the found routes.
7.2.3
Impact of route diversity parameter α (Figure 4g - 4i and 5g
- 5i). PACER+2 and PACER-SC are slightly affected when α varies.
As α increases, the marginal return diminishes faster and Φh be-
haves more towards the max aggregation. In this case, Pruning-2
becomes less effective. When α = 0 (the sum aggregation), both
Gain and the difference between OPTIMAL and GR reach the max-
imum.
Figure 6 illustrates the effectiveness of our power law function
in Eqn. (3) for modeling the personalized route diversity require-
ment. We run two queries on Singapore, one with α = 0.5, which
specifies a diversity requirement, and one with α = 0, which speci-
fies the usual sum aggregation. The other query parameters are the
same. The figures show the best routes found for each query, with
the POIs on a route labeled sequentially as A, B · · · . The red dots
represent the source x and destination y. The route for α = 0.5
covers all specified features, i.e., two POIs for each feature, while
maximizing the total Gain. While the route for α = 0 has four
SIGIR'18, July 2018, Ann Arbor, MI, USA
Hongwei Liang and Ke Wang
Hilton Singapore
A: National Museum
B: Fort Canning Park
C: Singapore Art Museum
D: Esplanade Park
F: Tiong Shian Eating House
E: Peach Garden
Hilton Singapore →
A (M:5.0): National Museum →
B (P:4.1): Fort Canning Park →
C (M:5.0): Singapore Art Museum →
D (P:3.1): Esplanade Park →
E (R:3.6): Peach Garden →
F (R:5.0): Tiong Shian Eating House →
(cid:1)
Hilton
(cid:1)
Gain
Singapore;
=(cid:1) 7.34115;(cid:1) Cost
(cid:1) =(cid:1) 540(cid:1)
mins
(a) α = 0 .5 (with diversity requirement)
E: Bukit Timah Nature Reserve
D: Tampines Eco Green
C: Bedok Reservoir Park
A: National Museum
Hilton Singapore
B: Fort Canning Park
Hilton Singapore →
A (M:5.0): National Museum →
B (P:4.1): Fort Canning Park →
C (P:4.0): Bedok Reservoir Park →
D (P:5.0): Tampines Eco Green →
E (P:4.8): BukitTimah Nature Reserve →
Hilton Singapore;
Gain = 8.66; Cost = 535 mins
(b) α = 0 (without diversity requirement)
Figure 6: Two routes found from Singapore by PACER+2 for
the query Q = (x, y, b = 9, w = (P : 0.4, M : 0.3, R : 0.3), θ =
2.5, α ), where x and y are Hilton Singapore, and P, M and R
represent Park, Museum, and Chinese Restaurant.
parks out of five POIs due to the higher weight of Park in w; thus,
it is less preferred by a user who values diversity. In fact, the second
route's Gain value when evaluated using α = 0.5 is only 6.60.
7.2.4
Impact of k. We vary k in range [1, 100] while fixing b, θ , α
at the default values and run the algorithms, except GR and AP, on
both datasets. As k only influences the gain-based pruning, the per-
formance of BF and PACER+1 are unchanged. For PACER+2 and
PACER-SC, the change is limited (less than 25% slower for k = 100).
Because when k is small, the Gain of the k-th best route is usually
not far away to that of the best route, thus, the marginal gain up-
per bound pruning is not seriously influenced. We omit the figures
due to limited space.
h(PV ) =
7.3 Comparison with A*
A* [24] only works for their keyword coverage function: Φ
1 −i ∈PV [1 − Fi ,h], and finds single route. In [24], Fi ,h is in the
range [0, 1] and it is set to 1 if the number of check-ins on POI i for
feature h is above average. In this case, the single POI in P yields
the maximum Φh (PV ) value; the feature h of other POIs will be
ignored. For a fair comparison, we set β = 0.5 in Eqn. (14) for both
algorithms, we also leverage our indices to speed up A*. Note that
the maximum b in [24] is 15 kilometers in their efficiency study,
which is about 20 minutes by Google Maps under driving mode.
Figure 7 shows the comparison between PACER+2 and the mod-
ified A* on both datasets. The report of Gain is omitted as they
are both exact algorithms. We also omit the comparison of search
space due to page limit (PACER+2 searches one to two orders of
magnitude less than A*). Apparently, PACER+2 outperforms A*, es-
pecially for a large b. A few queries of A* on Austin even failed for
b = 9. Although A* has a pruning strategy specifically for their key-
word coverage function, the search strategy itself is a bottleneck.
Besides, their pruning based on the greedy algorithm in [12] has
a bound looser than ours. In fact, the experiments in [24] showed
that A* is just 2-3 times faster than the brute-force algorithm.
Gain, it is only 6.6045, which is smaller than that of
Gain, it is only 6.6045, which is smaller than that of
in Figure ??
in Figure ??
8. CONCLUSIONS
8. CONCLUSIONS
9. REFERENCES
9. REFERENCES
T. B
T. B
evolutionary computation. New York: Oxford, 1997.
D. B. Fogel, and Z. Michalewicz. Handbook of
D. B. Fogel, and Z. Michalewicz. Handbook of
PACER+2
A*
)
c
e
s
(
e
m
i
t
n
u
R
103
101
10-1
)
c
e
s
(
e
m
i
t
n
u
R
103
101
10-1
PACER+2
A*
39/50
4
5
6
7
8
9
Time budget b (hour)
4
5
6
7
8
9
Time budget b (hour)
(a) Runtime - Singapore
(b) Runtime - Austin
Figure 7: PACER+2 vs. A* (logarithmic scale).
8 CONCLUSION
We considered a personalized top-k route search problem. The large
scale of POI maps and the combination of search in feature space
and path space make this problem computationally hard. The per-
sonalized route diversity requirement further demands a solution
that works for any reasonable route diversity specification. We pre-
sented an exact search algorithm with multiple pruning strategies
to address these challenges. We also presented high-performance
heuristic solutions. The analytical evaluation suggested that our
solutions significantly outperform the state-of-the-art algorithms.
Acknowledgments. Ke Wang's work was partially supported
by a discovery grant from The Natural Sciences and Engineering
Research Council of Canada (NSERC).
REFERENCES
[1] Senjuti Basu Roy, Gautam Das, Sihem Amer-Yahia, and Cong Yu. 2011. Interac-
tive itinerary planning. In ICDE. IEEE, 15–26.
[2] David M Burton. 2006. Elementary number theory. Tata McGraw-Hill Education.
[3] Xin Cao, Lisi Chen, Gao Cong, and Xiaokui Xiao. 2012. Keyword-aware optimal
route search. VLDB Endowment 5, 11 (2012), 1136–1147.
[4] Chandra Chekuri and Martin Pal. 2005. A recursive greedy algorithm for walks
in directed graphs. In FOCS. IEEE, 245–253.
[5] Jian Dai, Bin Yang, Chenjuan Guo, and Zhiming Ding. 2015. Personalized route
recommendation using big trajectory data. In ICDE. IEEE, 543–554.
[6] Munmun De Choudhury, Moran Feldman, Sihem Amer-Yahia, Nadav Golbandi,
Ronny Lempel, and Cong Yu. 2010. Automatic construction of travel itineraries
using social breadcrumbs. In ACM Hypertext and Hypermedia. ACM, 35–44.
[7] Qiming Diao, Minghui Qiu, Chao-Yuan Wu, Alexander J Smola, Jing Jiang, and
Chong Wang. 2014. Jointly modeling aspects, ratings and sentiments for movie
recommendation (jmars). In the 20th ACM SIGKDD. ACM, 193–202.
[8] Aristides Gionis, Theodoros Lappas, Konstantinos Pelechrinis, and Evimaria
Terzi. 2014. Customized tour recommendations in urban areas. In WSDM. 313–
322.
[9] Minhao Jiang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, and Yanyan Xu.
2014. Hop doubling label indexing for point-to-point distance querying on scale-
free networks. VLDB Endowment 7, 12 (2014), 1203–1214.
[10] Iris A Junglas and Richard T Watson. 2008. Location-based services. Commun.
ACM 51, 3 (2008), 65–69.
[11] David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the spread of
influence through a social network. In ACM SIGKDD. ACM, 137–146.
[12] Samir Khuller, Anna Moss, and Joseph Seffi Naor. 1999. The budgeted maximum
coverage problem. Inform. Process. Lett. 70, 1 (1999), 39–45.
[13] Andreas Krause and Daniel Golovin. 2012. Submodular function maximization.
Tractability: Practical Approaches to Hard Problems 3, 19 (2012), 8.
[14] Andreas Krause and Carlos Guestrin. 2008. Beyond convexity: Submodularity
in machine learning. ICML Tutorials (2008).
[15] Takeshi Kurashima, Tomoharu Iwata, Go Irie, and Ko Fujimura. 2010. Travel
route recommendation using geotags in photo sharing sites. In CIKM. 579–588.
[16] Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne Van-
Briesen, and Natalie Glance. 2007. Cost-effective outbreak detection in networks.
In Proceedings of the 13th ACM SIGKDD. ACM, 420–429.
[17] Kwan Hui Lim, Jeffrey Chan, Shanika Karunasekera, and Christopher Leckie.
2017. Personalized itinerary recommendation with queuing time awareness. In
Proceedings of the 40th ACM SIGIR. ACM, 325–334.
[18] Qi Liu, Yong Ge, Zhongmou Li, Enhong Chen, and Hui Xiong. 2011. Personalized
travel package recommendation. In ICDM. IEEE, 407–416.
Top-k Route Search through Submodularity Modeling of Recurrent POI Features
SIGIR'18, July 2018, Ann Arbor, MI, USA
[19] Eric Hsueh-Chan Lu, Ching-Yu Chen, and Vincent S Tseng. 2012. Personalized
trip recommendation with multiple constraints by mining user check-in behav-
iors. In SIGSPATIAL. ACM, 209–218.
[20] Daniele Quercia, Rossano Schifanella, and Luca Maria Aiello. 2014. The shortest
path to happiness: Recommending beautiful, quiet, and happy routes in the city.
In ACM Hypertext and Social media. ACM, 116–125.
[21] Amarjeet Singh, Andreas Krause, Carlos Guestrin, William J Kaiser, and
Maxim A Batalin. 2007. Efficient Planning of Informative Paths for Multiple
Robots.. In IJCAI, Vol. 7. 2204–2211.
[22] Maxim Sviridenko. 2004. A note on maximizing a submodular set function sub-
ject to a knapsack constraint. Operations Research Letters 32, 1 (2004), 41–43.
[23] World Travel and Tourism Council. 2017. Travel and Tourism Global Economic
Impact and Issues 2017. https://www.wttc.org/ (2017).
[24] Yifeng Zeng, Xuefeng Chen, Xin Cao, Shengchao Qin, Marc Cavazza, and Yan-
ping Xiang. 2015. Optimal Route Search with the Coverage of Users' Preferences.
In 24th IJCAI. AAAI Press, 2118–2124.
[25] Chenyi Zhang, Hongwei Liang, and Ke Wang. 2016. Trip recommendation meets
real-world constraints: POI availability, diversity, and traveling time uncertainty.
ACM TOIS 35, 1 (2016), 5.
[26] Wei Zhang and Jianyong Wang. 2015. Location and Time Aware Social Col-
laborative Retrieval for New Successive Point-of-Interest Recommendation. In
Proceedings of the 24th ACM CIKM. ACM, 1221–1230.
[27] Bolong Zheng, Nicholas Jing Yuan, Kai Zheng, Xing Xie, Shazia Sadiq, and Xiao-
fang Zhou. 2015. Approximate keyword search in semantic trajectory database.
In 31st ICDE. IEEE, 975–986.
[28] Yu Zheng, Lizhu Zhang, Xing Xie, and Wei-Ying Ma. 2009. Mining interesting
locations and travel sequences from GPS trajectories. In WWW. 791–800.
|
1802.04475 | 1 | 1802 | 2018-02-13T06:31:15 | Graph-Based Ascent Algorithms for Function Maximization | [
"cs.SI",
"math.NA",
"math.OC",
"stat.ML"
] | We study the problem of finding the maximum of a function defined on the nodes of a connected graph. The goal is to identify a node where the function obtains its maximum. We focus on local iterative algorithms, which traverse the nodes of the graph along a path, and the next iterate is chosen from the neighbors of the current iterate with probability distribution determined by the function values at the current iterate and its neighbors. We study two algorithms corresponding to a Metropolis-Hastings random walk with different transition kernels: (i) The first algorithm is an exponentially weighted random walk governed by a parameter $\gamma$. (ii) The second algorithm is defined with respect to the graph Laplacian and a smoothness parameter $k$. We derive convergence rates for the two algorithms in terms of total variation distance and hitting times. We also provide simulations showing the relative convergence rates of our algorithms in comparison to an unbiased random walk, as a function of the smoothness of the graph function. Our algorithms may be categorized as a new class of "descent-based" methods for function maximization on the nodes of a graph. | cs.SI | cs | Graph-Based Ascent Algorithms for Function
Maximization
Muni Sreenivas Pydi∗
[email protected]
Varun Jog∗
[email protected]
Po-Ling Loh∗†
[email protected]
Department of Electrical & Computer Engineering∗
Department of Statistics†
University of Wisconsin - Madison
1415 Engineering Drive
Madison, WI 53706
8
1
0
2
b
e
F
3
1
]
I
S
.
s
c
[
1
v
5
7
4
4
0
.
2
0
8
1
:
v
i
X
r
a
February 2018
Abstract
We study the problem of finding the maximum of a function defined on the nodes of a
connected graph. The goal is to identify a node where the function obtains its maximum. We
focus on local iterative algorithms, which traverse the nodes of the graph along a path, and
the next iterate is chosen from the neighbors of the current iterate with probability distribution
determined by the function values at the current iterate and its neighbors. We study two
algorithms corresponding to a Metropolis-Hastings random walk with different transition kernels:
(i) The first algorithm is an exponentially weighted random walk governed by a parameter γ.
(ii) The second algorithm is defined with respect to the graph Laplacian and a smoothness
parameter k. We derive convergence rates for the two algorithms in terms of total variation
distance and hitting times. We also provide simulations showing the relative convergence rates
of our algorithms in comparison to an unbiased random walk, as a function of the smoothness
of the graph function. Our algorithms may be categorized as a new class of "descent-based"
methods for function maximization on the nodes of a graph.
1
Introduction
Social media and big data analysis have led to an explosion of graph-structured datasets in diverse
domains such as neuroscience, economics, sensor networks, and databases.
In many important
instances, the object of interest may be expressed as a function defined on the vertices of the graph.
For example, in social network analysis, it is useful to identify a node or nodes with a maximal
centrality (or "influence") score relative to the other nodes, for the purpose of performing strategic
interventions [7,14]. In electrical network modeling, the edges of a graph correspond to connections
in an electrical grid, and the amount of power available at each node may similarly be represented
using a graph-structured function [25]. This has led to a variety of statistical studies in graph
function estimation, including Laplacian smoothing [15, 23] and graph trend filtering [27], when
noisy measurements of graph characteristics may be available.
In this paper, we focus on the problem of obtaining the maximum value of a function defined
on the nodes of a graph. We assume a setting where only local information is available, and any
algorithm must make decisions based on graph information obtained by traversing the nodes of the
graph in a sequential manner. For instance, such a setting may arise in web crawling [6], respondent-
driven sampling [12], or other demographic studies [3]. Although basic properties of Markov chains
imply that an unbiased random walk on the nodes of a connected graph will eventually visit every
1
node-hence produce a function maximum-we wish to use information about the value of the
function on neighboring nodes to guide the path of the algorithm, borrowing ideas from the extensive
literature on function optimization in the continuous domain.
For continuous optimization, several algorithms such as gradient descent, stochastic gradient
descent, stochastic gradient Langevin dynamics, and momentum-based descent algorithms [4,18,28]
provide guarantees for finding local and global optima when the function is sufficiently smooth.
Common classes of smooth functions include Lipschitz functions, convex functions, and Polyak-
Łojasiewicz functions [19]. Most of these notions, however, do not have direct analogs in the
discrete domain of graphs. For instance, there is no obvious analog of a convex function on a
graph [13, 17]. In this paper, we take a step toward systematically studying function optimization
on graphs by considering a certain class of smooth graph functions, where the notion of smoothness
is motivated by the theory of band-limited graph signals. Such topics constitute an area of study in
graph signal-processing [22], which has become popular within the signal processing community in
recent years [2,20]. The algorithms we propose exploit the underlying graph structure to construct
efficient algorithms for maximizing such smooth graph functions, producing a promising analogy to
gradient descent algorithms for continuous functions. Two key features of all our algorithms are that
they are iterative and local; i.e., the random walk relies only on the function values of neighboring
nodes when deciding its next step. This is a direct analogy to first-order optimization methods in
continuous domains.
Our proposed algorithms employ random walk methods based on Monte Carlo approaches,
specifically the Metropolis-Hastings (MH) algorithm [8]. An important idea is to reformulate the
problem of graph function maximization as a problem involving sampling vertices with high function
values. Such strategies have recently gained traction in continuous domain optimization, as well [9,
21,29]. Starting with a proposal probability density on the vertices of the graph that is related to the
original function values in an appropriate manner, we construct random walk transition kernels that
converge to the desired proposal distribution. Our approach differs significantly from comparable
approaches in the literature in the following way: In constructing the MH random walk kernel,
we exploit the graph-connectivity information implied by the graph Laplacian matrix to construct
rapidly-mixing walks that converge to the function maximum. Through hitting time analysis, we
provide theoretical guarantees for the speed of convergence of these algorithms.
The remainder of the paper is organized as follows: In Section 2, we introduce the mathematical
formulation of the graph maximization problem and the types of local algorithms and smooth
functions we will consider. In Section 3, we provide a formal statement of our proposed algorithms,
which are analyzed rigorously in Section 4. In Section 5, we provide simulations demonstrating the
behavior of our algorithms. We conclude with a list of interesting open questions in Section 6.
Notation: We write (cid:107) · (cid:107)T V to denote the total variation norm and (cid:107) · (cid:107)2 to denote the Euclidean
norm of a vector. For a matrix A ∈ Rn×n, we write diag(A) to denote the n × n matrix with
diagonal entries equal to the components of A and all other entries equal to zero. We write (cid:98)·(cid:99) to
denote the floor operator.
2 Background and Problem Setup
Consider an unweighted, undirected graph G with vertex set V of size n and symmetric adjacency
matrix W . For a node i ∈ V , we write di to denote the degree of i and N (i) to denote the
neighborhood set of i. We write dmax = maxi∈V di. We refer to a function f : V → R as a graph
function defined on the vertices of G, and sometimes write fi to denote the function value f (i). Our
2
goal is to design a local algorithm that finds the maximum value of an unknown graph function in
an efficient manner.
2.1 Local Search Algorithms
Formally, we define a local search algorithm as a discrete time Markov process, where the states
of the process are the n nodes, and a Markov chain in state Xt at time t chooses the next state
Xt+1 among the neighbors of Xt, with transition probability distribution defined as a function of
the value f (Xt) and the set of values {f (Vt) : Vt ∈ N (Xt)} at neighboring nodes in the graph.
We briefly mention some related work. Borgs et al. [5] studied the problem of finding the first
node in a preferential attachment network, where the algorithm is given access to all nodes in a
frontier of radius r around the set of previously queried nodes. Frieze and Pegden [10] proposed an
alternative algorithm of finding the root of a preferential attachment graph, where the algorithm
is given access to a sorted list of the highest-degree neighbors of the current iterate. Brautbar and
Kearns [6] studied algorithms for finding nodes with high degrees or high clustering coefficients
using a "jump and crawl" method, where a crawl step consists of randomly querying a neighbor of
the existing iterate, and a jump step allows the algorithm to query a uniformly sampled node from
the vertex set of the graph. Note, however, that our methods differ from the studies of Borgs et
al. [5] and Frieze and Pegden [10] due to the fact that we are interested in different classes of graph
functions besides the age function (indeed, the age of the nodes in the graph may not constitute a
smooth function), and from the study of Brautbar and Kearns [6] due to the fact that successive
steps may only visit immediate neighbors, rather than jumping to an entirely different node in the
graph.
2.2 Metropolis-Hastings Algorithm
Many of our algorithms are based on versions of the Metropolis-Hastings Algorithm, which we review
in this section. Given a state space V and a target probability density pf (·), the MH algorithm
constructs a Markov chain with transition probability matrix P whose stationary distribution π is
the same as the target probability density (i.e., π(i) = pf (i) ∀ i ∈ V ). The matrix P is defined in
terms of a "proposal" distribution Q, as follows:
(cid:40)
1 −(cid:80)
(cid:18)
QijR(i, j),
j(cid:54)=i Pij,
R(i, j) = min
1,
j (cid:54)= i
j = i,
(cid:19)
.
pf (j)Qji
pf (i)Qij
Pij =
where
(1)
(2)
The general idea behind the MH algorithm is that successive steps are guided by the proposal
distribution, such that the move from node i to node j depends on the ratio pf (j)
pf (i) , but is also
moderated by the proposal distribution according to the ratio Qji
. Known results in probability
Qij
theory guarantee the convergence of the MH algorithm to the target density [11].
In addition to generating samples from a desired distribution, however, the MH algorithm is also
a valuable tool in stochastic optimization [8]. The key idea is that if a function f with domain V is
encoded into an appropriate density pf , such that larger values of f correspond to larger values of
pf , the random walk generated by the MH algorithm will be more likely to visit nodes with larger
density values, hence larger values of f.
3
The independent MH algorithm corresponds to the choice of proposal distribution Qij = pg(j),
where pg is some probability measure over the state space V . In Section 3, we present a variety
of algorithms for function maximization based on running the MH algorithm with different choices
of proposal distributions and target densities, for which we may obtain provable guarantees for the
rate of convergence.
2.3 Smooth Graph Functions
We wish to leverage information about local changes in the graph function across edges in the graph
to guide the movement of an algorithm. Intuitively, this will lead to improvements in the rate of
convergence of an algorithm to the graph maximum when the function satisfies certain smoothness
properties, as a rough analog of the convergence results of gradient descent for smooth functions on
a real domain. In order to make these notions rigorous, we now define the smooth class of graph
functions to be analyzed in our paper, borrowing from the literature on graph signal processing.
j=1 Wij
The unnormalized graph Laplacian for a graph G with adjacency matrix W is given by L =
D−W , where D = diag
is the degree matrix. Since the Laplacian is symmetric, we can
calculate the eigendecomposition of L as U ΛU T , where U ∈ Rn×n is an orthonormal matrix whose
ith column ui is the eigenvector corresponding to the eigenvalue λi, and Λ is a diagonal matrix with
sorted eigenvalues 0 = λ1 ≤ ··· ≤ λn.
Since U is unitary, the columns of U form an orthogonal basis for any graph function f. In the
basis of Laplacian eigenvectors, the function f may be written as f = U f, where f is defined as the
graph Fourier transform f = U T f. The ith column ui of U is the ith Fourier mode of the graph,
corresponding to the ith smallest graph frequency, also equal to
√
(cid:16)(cid:80)n
(cid:17)
Intuitively, a "smooth" graph function is a function that does not vary much across vertices that
are connected by edges. This notion of smoothness is captured by the term f T Lf, as shown in the
following identity [26]:
λi [22].
wij(fi − fj)2.
(3)
n(cid:88)
i,j=1
f T Lf =
1
2
n(cid:88)
For a smooth function, the sum of squared differences (fi − fj)2 across all the connected vertices is
small, implying that f T Lf is small. Representing f in the Fourier basis, we have
f T Lf = ( f T U T )U ΛU T (U f ) = f T Λ f =
λi fi
2
.
Since the λi's are arranged in ascending order, setting the higher-order Fourier coefficients fi's close
to zero leads to a small value for f T Lf, implying that f is smooth. We have the following definition:
Definition 1. A function f : G → R is called k-smooth if there exists a vector α ∈ Rk such that
f = Ukα, where Uk ∈ Rn×k is the matrix consisting of the first k columns of U.
i=1
In general, any graph function f can be decomposed as f = fks + fr, where fks = UkU T
k-smooth component and fr is the residual component. Note that fr⊥fks, so
k f is the
(cid:107)f(cid:107)2
2 = (cid:107)fks(cid:107)2
2 + (cid:107)fr(cid:107)2
2.
In graph signal processing, a k-smooth function is viewed as a band-limited graph signal restricted
to the lowest k Fourier modes of the graph. The vector α represents the projection of f onto the
lowest k graph frequencies [20].
Denote δi to be the vector with 1 in the ith coordinate and zeros elsewhere. We then have the
following definition:
4
Figure 1: Examples of randomly generated smooth functions with k = 10, k = 20, and k = 30 on
a 32 × 32 2D grid graph of n = 1024 nodes. The eigenvectors u10, u20 and u30 are plotted in the
first row. A higher intensity on a pixel indicates a higher positive value for the vector at that node.
Note that as expected, functions corresponding to a smaller value of k have fewer undulations.
Definition 2. The term (cid:107)U T
at node i [24]. The LC-k quantity satisfies
k δi(cid:107)2 is referred to as the local cumulative coherence of order k (LC-k)
k δi(cid:107)2
(cid:107)U T
(cid:107)U T δi(cid:107)2
.
=
k δi(cid:107)2
(cid:107)U T
(cid:107)δi(cid:107)2
(cid:107)U T
From equation (4), we see that (cid:107)U T
k δi(cid:107)2 =
(4)
k δi(cid:107)2 gives the proportion of the energy of the graph impulse
function δi that is concentrated on the top k Fourier modes [20]. The LC-k varies between 0 and
1. Whereas we do not usually associate δi with smoothness, it may happen that for certain graph
topologies, the value of LC-k at node i is close to 1, implying that δi is an approximately k-smooth
function on the graph. Although LC-k cannot be computed locally, methods exist for computing
the value approximately, without having to perform an eigendecomposition of a potentially large
graph Laplacian matrix [20, 24].
3 Algorithms
We now describe the local algorithms that we will compare in this paper. A theoretical analysis of
the relative convergence rates is provided in the next section.
3.1 Vanilla Random Walk
We begin by formally writing out the algorithm for an unbiased random walk on the vertices of
the graph. The random walk proceeds around the nodes of the graph that are connected by edges.
5
Algorithm 1 Vanilla RW
Require: Local access to graph G (i.e., at every node, all its neighbors are accessible) and number
of iterations T .
1. initialize:
i ← Unif{1, . . . , n} (Uniform sampling from V )
imax ← i
fmax ← fi
2. repeat for T iterations:
i ← Unif{j : wij = 1}
if fi > fmax:
fmax ← fi
imax ← i
return imax
The transition kernel for the vanilla random walk is given by P = D−1W . Thus, the transition
probability from node i to node j is given by Pij = wij
, where wij = 1 if an edge exists between i
di
and j, and wij = 0 otherwise.
The vanilla random walk is agnostic to the function f, and converges to a stationary distribution
that is proportional to the degrees of the graph nodes [1]. Note, however, that we cannot immediately
conclude that such a function-agnostic random walk will not optimize the function efficiently-the
class of k-smooth functions on graphs does not have a simple description, and it may happen that
optimizers of such functions lie at high-degree nodes, which are precisely those nodes that attract
the vanilla random walk.
3.2 Exponentially-Weighted Walk
The second algorithm involves biasing the choices of each move in the vanilla random walk according
to the function values on the neighboring nodes. We choose an exponential weight function, so that
the target probability density is defined by pf (i) ∝ exp (γfi). Starting with a proposal distribution
Q = D−1W , we use the MH method in equation (1) to construct the transition kernel for the
exponentially-weighted walk, as follows:
(cid:40) 1
1 −(cid:80)
di
wijR(i, j)
j(cid:54)=i Pij
Pij =
j (cid:54)= i,
j = i,
(cid:18)
(cid:19)
(5)
(cid:19)
.
where
(cid:18)
R(i, j) = min
1,
pf (j)(1/dj)
pf (i)(1/di)
= min
1, eγ(fj−fi) di
dj
Thus, the transition probability between any two nodes in the exponentially-weighted walk depends
on the difference in function value fi− fj and the degrees of the nodes. The parameter γ determines
the "peakiness" of the target density pf .
Unlike in the vanilla random walk, we assume that at every node, it is possible to access the
function value and the degree of its neighbors. However, we do not make use of the smoothness
constraint on the function. The parameter γ may be viewed as controlling the greedy nature of this
algorithm. When γ = +∞, the random walk always ascends; i.e., if f (j) < f (i), then P (i, j) = 0.
6
However, such a greedy walk is susceptible to getting stuck at local maxima and failing to find
the global maxima quickly. At the other extreme, when γ = 0, the exponential random walk is
function-agnostic (as in the vanilla random walk), and converges to the uniform distribution over
vertices.
Algorithm 2 Exponential RW(γ)
Require: Local access to graph G and function f (i.e., at every node, all its neighbors and their
function values are accessible), number of iterations T , and tuning parameter γ.
1. initialize:
i ← Unif{1, . . . , n} (Uniform sampling from V )
imax ← i
fmax ← fi
2. repeat for T iterations:
Generate j according to Pij given in equation (5)
i ← j
if fi > fmax:
fmax ← fi
imax ← i
return imax
3.3 Graph Laplacian Walk
For the third algorithm, we use a proposal distribution that is derived from the graph Lapla-
cian, instead of the vanilla random walk proposal distribution Q = D−1W that we used for the
exponentially-weighted walk.
Let Uk represent the matrix containing k eigenvectors corresponding to the smallest k eigenvalues
of the graph Laplacian. Let δi ∈ {0, 1}n represent the indicator vector for node i. The proposal
distribution for the graph Laplacian walk is given by
(cid:80)
k δj(cid:107)2
(cid:107)U T
j:wij =1 (cid:107)U T
k δj(cid:107)2
ij =
Q(cid:48)
wij.
(6)
2
2
Note that the Laplacian-based proposal distribution Q(cid:48) is indeed "local," since Q(cid:48)
ij = 0 whenever
Qij = 0. For the Laplacian walk, we choose a target probability density according to pf (i) ∝ f 2
i .
The squaring of the function restricts our analysis to maximizing positive functions. Using the MH
method in equation (1), we derive the transition kernel for graph Laplacian walk, as follows:
where we set R(i, j) = 0 if wij = 0; and if wij = 1, we have
(cid:107)U T
(cid:107)U T
pf (j)Q(cid:48)
pf (i)Q(cid:48)
R(i, j) = min
= min
1,
1,
ji
f 2
j
f 2
i
ij
k δi(cid:107)2
k δj(cid:107)2
2
2
(cid:18)
(7)
(8)
(cid:33)
.
(cid:80)
(cid:80)
j:wij =1 (cid:107)U T
i:wji=1 (cid:107)U T
k δj(cid:107)2
k δi(cid:107)2
2
2
Pij =
Q(cid:48)
ijR(i, j)
(cid:40)
1 −(cid:80)
(cid:32)
(cid:19)
j(cid:54)=i Pij
j (cid:54)= i,
j = i,
7
Algorithm 3 Laplacian RW(k)
Require: Function smoothness k, local access to graph G, function f and LC-k (i.e., at every
node, all its neighbors, their function values, and their LC-k values are accessible/computable),
and number of iterations T
1. initialize:
i ← Unif{1, . . . , n} (Uniform sampling from V )
imax ← i
fmax ← fi
2. repeat for T iterations:
Generate j according to Pij given in equation (7)
i ← j
if fi > fmax:
fmax ← fi
imax ← i
return imax
An important difference between the exponentially-weighted walk and the graph Laplacian walk
is that the former algorithm is truly a local algorithm. Indeed, only the function values of the neigh-
boring nodes are needed to determine the probability distribution for the next step of Algorithm 2.
This differs from Algorithm 3, for which we assume knowledge of the graph Laplacian (or at least
its top k eigenvectors) in order to compute (cid:107)U T
2 for the neighboring nodes of every iterate.
We now describe a variant of Algorithm 3 applicable to approximately smooth functions. We
k δi(cid:107)2
begin with a definition:
Definition 3. A function f is -approximately k-smooth if for the decomposition f = fks + fr where
fks = U T
k Ukf, we have
for all i ∈ V and some > 0.
fr(i) ≤ (cid:107)fks(cid:107)2,
For the class of -approximate k-smooth functions, the proposal distribution for the graph Lapla-
cian walk given in equation (6) is replaced by
k δj(cid:107)2 + (cid:1)2
(cid:0)(cid:107)U T
(cid:0)(cid:107)U T
k δj(cid:107)2 + (cid:1)2 wij.
j:wij =1
(cid:80)
Q(cid:48)
ij =
(9)
The transition kernel for the Laplacian walk will remain the same as in equation (7), with the
modified Q(cid:48)
ij in equation (9).
4 Theoretical Analysis
In this section, we provide results concerning the convergence rate of the local search algorithms. For
both of our algorithms, we derive bounds on (i) the total variation distance between the probability
distribution at time t and the stationary distribution of the Markov chain; and (ii) bounds on the
hitting time of the algorithm in expectation and in high probability. A practical consequence of
8
the total variation bounds is that if we run the corresponding local algorithms for sufficiently many
steps, we are guaranteed that taking the maximizer of the empirically constructed distribution will
be provably close to the function maximizer. The hitting time bounds may be interpreted as a
bound on the amount of time needed to first visit a maximum-thus, if we halt the algorithms
after a prescribed number of steps and choose the node with the largest function value so far, we
are guaranteed to obtain a maximum with high probability. In fact, if we are given slightly more
knowledge (i.e., that we have located a function maximizer upon visiting it for the first time),
the theorems provide stronger guarantees for a variant of the local algorithms that halt once they
identify a maximum.
4.1 Exponentially-Weighted Walk
In this section, we analyze the exponentially-weighted random walk in Algorithm 2.
4.1.1 Convergence
In the first theorem, we show the convergence of the exponentially-weighted random walk to the
target density pf in total variation norm.
Theorem 1 (Convergence of Algorithm 2). For a connected graph G with diameter r, and for a
graph function f that is nonzero on all vertices, the rate of convergence of the random walk proposed
in Algorithm 3 to its stationary distribution pf is given by
(cid:32)
Pt
i∗ − pfT V ≤
1 −
δr−1
f
(dmax∆f )r
, ∀ i ∈ V,
(10)
i∗ is the ith row of Pt (the transition probability matrix after t steps), δf = mini pf (i),
where Pt
∆f = maxi pf (i).
Proof. For any two vertices i and j connected by an edge, we have
(cid:33)(cid:98) t
r(cid:99)
(cid:17)
Pij = Qij min
(cid:16)
(cid:16)
(cid:16) 1
,
di
min
1,
=
1
di
= min
1,
(cid:17)
pf (j)Qji
pf (i)Qij
pf (j)di
pf (i)dj
pf (j)
pf (i)dj
1
(cid:16)
(cid:17)
,
= pf (j) min
≥
1
dmax∆f
≥
δf
dmax∆f
,
pf (j)
(cid:17)
1
dipf (j)
djpf (i)
For any two vertices i and j that are not connected by an edge, it is possible to find at most r − 1
vertices that connect i to j, since the diameter of the graph is r. Hence, in all cases,
(cid:18) δf
(cid:19)r−1
ij ≥
Pr
dmax∆f
dmax∆f
9
1
pf (j) =
δr−1
f
(dmax∆f )r pf (j),
implying that
Prs+m
i∗
− pfT V = θs(QsP m)i∗ − pfT V ≤ θs.
We now adopt a proof technique from Theorem 4.9 in Levin and Peres [16]. Define Pf ∈ Rn×n such
that Pf (i, j) = pf (j). We may write
P r = (1 − θ)Pf + θB,
where θ = 1 − δr−1
f
(dmax∆f )r and Q is a stochastic matrix. By induction, we will prove that
P rs = (1 − θs)Pf + θsBs.
(11)
Assuming equation (11) is true for s, we have
P r(s+1) = P rsP r = (1 − θs)Pf P r + θsBs((1 − θ)Pf + θB)
= (1 − θs)Pf + (1 − θ)θsBsPf + θs+1Bs+1
= (1 − θs+1)Pf + θs+1Bs+1,
since Pf P r = Pf B = Pf Pf = Pf . Multiplying equation (11) by P m, where 0 ≤ m < r, we then
have
P rs+m = (1 − θs)Pf P m + θsBsP m = Pf + θs(BsP m − Pf ),
implying that
Hence,
Taking t = rs + m, where s =(cid:4) t
(cid:107)Prs+m
i∗
r
P rs+m − Pf = θs(BsP m − Pf ).
− pf(cid:107)T V = θs(cid:107)(BsP m)i∗ − pf(cid:107)T V ≤ θs.
(cid:5), completes the proof.
4.1.2 Results on Hitting Times
In the next theorem, we prove an upper bound on the expected number of steps it takes for Algorithm
2 to reach the function maximum.
Theorem 2 (Expected hitting time). For Algorithm 2, let vt ∈ V be the state at time t, and define
Thit = min{t ≥ 0 : fvt = fmax} to be the number steps it takes for Algorithm 2 to reach the function
maximum. Let fmin denote the minimum value of the function f. Then the expected value of the
hitting time is bounded by
EThit ≤ dr
Proof. From the proof of Theorem 3, we have
maxeγ(r−1)(fmax−fmin).
(12)
P t − Pf = θs (QsP m − Pf ) ,
(dmax∆f )r , and t = rs + m and s =(cid:4) t
for θ = 1 − δr−1
0 : vt = i}. Let EiTj denote the expected hitting time for state j given that the MH Markov chain
starts at state i. From Lemma 2.12 in Aldous [1], we have
(cid:5). Define hitting time for state i as Ti = min{t ≥
(13)
r
f
pf (j)EiTj = Zjj − Zij,
10
where Zij =(cid:80)∞
∞(cid:88)
pf (j)EiTj =
t=0(P t
ij − pf (j)). Using equation (13), we then have
∞(cid:88)
θt(cid:0)(QsP m)t
jj − (QsP m)t
(cid:1) ≤
jj − P t
∞(cid:88)
ij) =
ij
(P t
t=0
t=0
t=0
θt =
1
1 − θ
=
(dmax∆f )r
δr−1
f
.
Hence,
and
EiThit ≤ (dmax∆f )r
δr−1
f ∆f
,
f
δr−1
EiTj ≤ (dmax∆f )r
pf (j)
(cid:19)r−1
(cid:18) ∆f
= dr
max
δf
= dr
maxeγ(r−1)(fmax−fmin).
We now derive a high-probability bound on the hitting time.
Theorem 3 (High-probability bound on hitting time). For any initial distribution µ and any s > 0,
we have
,
(14)
(cid:19)(cid:98)t/s(cid:99)
(cid:18) t(cid:63)
hit
s
Pµ[Thit > t] ≤
hit = dr
maxeγ(r−1)(fmax−fmin) and t > 0.
where t(cid:63)
Proof. For any integer m ≥ 1, we have
Pµ[Thit > ms Thit > (m − 1)s] ≤ max
By induction on m, we obtain Pµ[Thit > ms] ≤(cid:16) t(cid:63)
j
hit
s
Pj(Thit > s) ≤ Ej(Thit)
(cid:17)m
s
=
t(cid:63)
hit
s
.
, which implies inequality (14).
4.2 Graph Laplacian Walk
We begin by proving a few lemmas concerning the proposal distribution Q(cid:48) used in Algorithm 3 for
k-smooth and -approximately k-smooth functions. We establish the following envelope condition:
pf (j) ≤ Q(cid:48)
ij,
1
M
(15)
for an appropriate constant M, when wij = 1.
Lemma 1 (Dominance for k-smooth graph functions). Suppose f is k-smooth. For the proposal
distribution Q(cid:48) given in equation (6), the envelope condition (15) holds with M = k.
Proof. Since f is k-smooth, we have f = Ukα for some α ∈ Rk. It follows that fi = δT
(cid:104)U T
i Ukα =
k δi, α(cid:105). Hence,
k δi, α(cid:105)2 ≤ (cid:107)U T
k δi(cid:107)2
2(cid:107)α(cid:107)2
2,
implying that
i = (cid:104)U T
f 2
(cid:88)
i∈V
11
i = (cid:107)f(cid:107)2
f 2
2 = (cid:107)U T
k α(cid:107)2
2 = (cid:107)α(cid:107)2
2.
Thus, for j (cid:54)= i, we have
j(cid:80)
f 2
i∈V f 2
i
pf (i) =
≤ (cid:107)U T
k δi(cid:107)2
2.
Using equation (6), for wij = 1, we then have
Q(cid:48)
ij =
(cid:80)
(cid:107)U T
k δj(cid:107)2
j:wij =1 (cid:107)U T
2
k δj(cid:107)2
2
(cid:80)
pf (j)
j:wij =1 (cid:107)U T
k δj(cid:107)2
2
(cid:80)n
pf (j)
j=1 (cid:107)U T
k δj(cid:107)2
2
≥
=
1
k
pf (j).
≥
Lemma 2 (Dominance for -approximate k-smooth graph functions). Suppose f is -approximate
k-smooth. For the proposal distribution Q(cid:48) given in equation (9), the envelope condition (15) holds
with
√
M = k + 2k
n + n2.
(16)
Proof. Let fks = U T
k α for some α ∈ Rk.Then
f (i)2 = (fks(i) + fr(i))2 ≤(cid:0)(cid:104)U T
k δi, α(cid:105) + (cid:107)fks(cid:107)2
(cid:1)2 ≤(cid:0)(cid:107)U T
k δi(cid:107)2(cid:107)α(cid:107)2 + (cid:107)α(cid:107)2
(cid:1)2
,
implying that
Thus, for j (cid:54)= i, we have
(cid:88)
i∈V
f (i)2 = (cid:107)f(cid:107)2
2 = (cid:107)fks(cid:107)2
2 + (cid:107)fr(cid:107)2
2. ≥ α2
2
≤(cid:0)(cid:107)U T
k δi(cid:107)2 + (cid:1)2
.
f 2
i∈V f 2
i
From equation (9), for j (cid:54)= i and wij = 1, we have
pf (i) =
j(cid:80)
k δj(cid:107)2 + (cid:1)2
(cid:0)(cid:107)U T
(cid:0)(cid:107)U T
k δj(cid:107)2 + (cid:1)2 ≥
(cid:80)
k + n2 + 2(cid:0)√
n(cid:80)
pf (i)2
j:wij =1
i∈V (cid:107)U T
Q(cid:48)
ij =
≥
(cid:80)n
k δi(cid:107)2
2
pf (i)
(cid:0)(cid:107)U T
k δj(cid:107)2 + (cid:1)2
(cid:1) =
pf (i)2
.
M
j=1
4.2.1 Convergence
The first theorem concerns convergence in TV distance.
Theorem 4 (Convergence of Algorithm 3). For a connected graph G with diameter r, and for a
k-smooth graph function f (either exact or -approximate) that is nonzero on all the vertices, the
rate of convergence of the random walk proposed in Algorithm 3 to its stationary distribution pf is
given by
(cid:107)Pt
i∗ − pf(cid:107)T V ≤
, ∀ i ∈ V,
(17)
(cid:33)(cid:98) t
r(cid:99)
(cid:32)
1 − δr−1
f
M r
where Pt
Lemmas 1 and 2.
i∗ is the ith row of Pt, δf = mini pf (i), and M is the dominance constant established in
12
Proof. From equations (7) and (8), for any two vertices i and j connected by an edge, we have
(cid:18) Q(cid:48)
Q(cid:48)
ji
pf (i)
,
ij
pf (j)
(cid:19)
≥ 1
M
pf (j),
(cid:32)
(cid:33)
pf (j)Q(cid:48)
pf (i)Q(cid:48)
ji
ij
Pij = Q(cid:48)
ij min
1,
= pf (j) min
where the last inequality follows from Lemmas 1 and 2.
For any two vertices i and j that are not connected by an edge, it is possible to find at most
r − 1 vertices that connect i to j, since the diameter of the graph is r. This leads to the following
inequality:
ij ≥(cid:16) δf
M
Pr
(cid:17)r−1 1
pf (j) =
δr−1
M r pf (j).
f
M
Similar to proof of Theorem 1, define Pf ∈ Rn×n such that Pf (i, j) = pf (j). We then write
P r = (1 − θ)Pf + θB,
where θ = 1 − δr−1
with the modified θ completes the proof.
f
M r and B is a stochastic matrix. Following a similar analysis as that in Theorem 1
4.2.2 Results on Hitting Times
In the next theorem, we prove an upper bound on the expected number of steps it takes for Algorithm
3 to reach the function maximum.
Theorem 5 (Expected hitting time). For Algorithm 3, suppose vt ∈ V be the state at time t, and
define Thit = min{t ≥ 0 : fvt = fmax}. The expected value of the hitting time is bounded by
EThit ≤ (Mf2)r
maxf 2(r−1)
f 2
min
.
(18)
Proof. Following the analysis of Theorem 2 with θ = 1 − δr−1
M r , we have
M r
δr−1
pf (j)EiTj ≤ 1
1 − θ
=
,
f
f
where EiTj is the expected hitting time to reach node j, starting from node i. For Thit, we substitute
j = imax, so that
Hence,
pf (imax) = max
i
pf (i) = ∆f .
EThit ≤ M r
δr−1
f ∆f
=
(Mf2)r
maxf 2(r−1)
f 2
min
.
The high-probability bound on expected time would be same as that in Theorem 3, with
t(cid:63)
hit =
(Mf2)r
maxf 2(r−1)
f 2
min
.
13
Figure 2: An example run of the algorithms on a 20-smooth function on a 32 × 32 2D grid graph.
White pixels in rows 2–5 indicate nodes that have been visited by the algorithm. White pixels in
the function plot denote high function values. Notice that the Laplacian RW is very effective at
traversing regions of the graph where the function takes large values. The exponential RW with
γ = 1 is also effective at reaching the function peaks located at the coordinates (15,10). The vanilla
random walk covers a large area but without any preferred direction, as expected.
14
5 Experiments
n
In this section, we consider various graph topologies and approximately k-smooth functions defined
on the nodes of the graphs and compare the algorithms described in Section 3. We simulated
Algorithms 1, 2 and 3 on the following graph models: (i) 2D Grid graph, (ii) Erdős-Renyi (ER)
graph, (ii) and Barabasi-Albert (BA) graph. For the 2D grid graph, we ran the algorithms on a
32 × 32 grid of n = 1024 nodes. For the ER graph, we generated a random graph with n = 1000
nodes with the probability of an edge between any two nodes being p = 1.1 log n
, and discarded the
graphs with isolated nodes so that the entire graph formed one connected component. For the BA
graph, we generated a random graph with n = 1000 nodes starting with a seed set of m = 3 nodes.
For each of these graphs, we generated random smooth functions for varying values of k. For
each value of k, we sampled α from a k × 1 vector of standard normal random variables, and
constructed the smooth function as f = Ukα, where U ∈ Rn×k is the matrix containing the top k
eigenvectors of the graph Laplacian matrix. The functions were then made nonnegative by lifting
the function value at every node by the minimum. Since the constant vector is the first eigenvector
of the graph Laplacian, this process of adding a constant vector does not affect the smoothness of
the function.
The algorithms were run till the random walk "hit" the maximum, or up to a maximum of
10, 000 steps. The hitting times were then averaged over 100 iterations for each value of k, and for
10 randomly chosen functions (i.e., a total of 1000 iterations for each value of k). For Algorithm 2,
we ran the experiments with two different values of γ. The case γ = 0 corresponds to a function-
agnostic random walk that converges to a uniform stationary distribution across all the nodes.
The case γ = 1 corresponds to a moderately greedy random walk that converges to a stationary
distribution proportional to eγf . A high value of γ would reduce Algorithm 2 to a 'greedy' walk
that gets stuck in local minima, which is not desirable. For instance, in our experiments, γ = 10
led to very poor performance due the algorithm often being unable to move out of local minima.
Figures 3, 4, and 5, report the results. As can be seen, the Laplacian walk of Algorithm 3
consistently outperformed all other algorithms for all the three classes of graphs we considered. It
is also worth noting that changing the comparison criterion from hitting the global maximum to
hitting the top 1% of nodes did not change the performance of the algorithms in our simulations.
6 Discussion
We have presented two new algorithms for graph function maximization based on local movements
around the nodes of a graph. Our first algorithm concerns an exponentially weighted random graph,
and our second algorithm uses information about the spectrum of the graph Laplacian matrix. We
have provided theoretical results concerning the rate of convergence of our algorithms in terms of
total variation distance and hitting time when the graph function belongs to a certain smoothness
class.
The algorithms we have studied in this paper only involve local movements along edges, from
one node to an adjoining neighbor. However, one might imagine variants of the algorithms that
allow "jump" movements that reinitialize the walk at a randomly drawn vertex, either uniformly
selected from all the nodes or all the nodes previously explored in previous time steps. It would
be interesting to see how incorporating the option of a jump move might affect the convergence
analysis of the algorithms.
Another question to explore is the tightness of our bounds on rates of convergence of the algo-
rithms. Our results are derived based on a seemingly coarse analysis, and it would be interesting
15
Figure 3: Comparison of hitting times for Erdős-Renyi graphs as a function of smoothness
Figure 4: Comparison of hitting times for Barabasi-Albert graphs as a function of smoothness
16
Figure 5: Comparison of hitting times for 2D grid graphs as a function of smoothness
to see if it is possible to find worst-case graphs and classes of smooth functions for which one can
also derive lower bounds for the rate of convergence of any local algorithm. This also gives rise to
the important related question of the landscape of local and global optima of a k-smooth function,
where the smoothness is defined in terms of eigenvalues of the graph Laplacian. This appears to
be a challenging problem even for k = 2 and for Erdős-Renyi random graphs. Ideally, we would
also like to be able to translate the bounds on total variation distance and hitting time into precise
recommendations regarding the number of iterates required for each of our algorithms to locate a
maximum.
A final question concerns improving the convergence rate of local algorithms when the next
iterate is allowed to depend on the values of the function in a neighborhood of radius r around the
current iterate. The algorithms described in this paper are limited to the case when r = 1. However,
if the local algorithm were given information about a larger neighborhood at each step, perhaps
it would be possible to devise an analog of higher-order descent algorithms, which are known to
exhibit faster rates of convergence in continuous optimization settings.
References
[1] D. Aldous and J. Fill. Reversible Markov chains and random walks on graphs, 2002.
[2] A. Anis, A. Gadde, and A. Ortega. Efficient sampling set selection for bandlimited graph signals
using graph spectral proxies. IEEE Transactions on Signal Processing, 64(14):3775–3789, 2016.
[3] A. Banerjee, A. G. Chandrasekhar, E. Duflo, and M. O. Jackson. Gossip: Identifying central
individuals in a social network. Technical report, National Bureau of Economic Research, 2014.
[4] D. P. Bertsekas. Nonlinear Programming. Athena Scientific Belmont, 1999.
17
[5] C. Borgs, M. Brautbar, J. Chayes, S. Khanna, and B. Lucier. The power of local information
In International Workshop on Internet and Network Economics, pages
in social networks.
406–419. Springer, 2012.
[6] M. Brautbar and M. J. Kearns. Local algorithms for finding interesting individuals in large
networks. 2010.
[7] D. Chen, L. Lü, M.-S. Shang, Y.-C. Zhang, and T. Zhou.
Identifying influential nodes in
complex networks. Physica A: Statistical Mechanics and Its Applications, 391(4):1777–1787,
2012.
[8] P. R. Christian and G. Casella. Monte Carlo Statistical Methods. Springer New York, 1999.
[9] A. S. Dalalyan. Theoretical guarantees for approximate sampling from smooth and log-concave
densities. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 79(3):651–
676, 2017.
[10] A. Frieze and W. Pegden. Looking for vertex number one. The Annals of Applied Probability,
27(1):582–630, 2017.
[11] G. Grimmett and D. Stirzaker. Probability and Random Processes. Probability and Random
Processes. OUP Oxford, 2001.
[12] D. D. Heckathorn. Respondent-driven sampling: A new approach to the study of hidden
populations. Social Problems, 44(2):174–199, 1997.
[13] H. Hirai. Discrete convex functions on graphs and their algorithmic applications. In Combina-
torial Optimization and Graph Algorithms, pages 67–100. Springer, 2017.
[14] M. O. Jackson. Social and Economic Networks. Princeton University Press, 2010.
[15] R. I. Kondor and J. Lafferty. Diffusion kernels on graphs and other discrete input spaces. In
ICML, volume 2, pages 315–322, 2002.
[16] D. A. Levin and Y. Peres. Markov Chains and Mixing Times, volume 107. American Mathe-
matical Soc., 2017.
[17] Y. Lin, L. Lu, and S.-T. Yau. Ricci curvature of graphs. Tohoku Mathematical Journal, Second
Series, 63(4):605–627, 2011.
[18] Y. Nesterov. A method of solving a convex programming problem with convergence rate
o(1/k2). In Soviet Mathematics Doklady, volume 27, pages 372–376, 1983.
[19] Y. Nesterov.
Introductory Lectures on Convex Optimization: A Basic Course, volume 87.
Springer Science & Business Media, 2013.
[20] G. Puy, N. Tremblay, R. Gribonval, and P. Vandergheynst. Random sampling of bandlimited
signals on graphs. Applied and Computational Harmonic Analysis, 2016.
[21] M. Raginsky, A. Rakhlin, and M. Telgarsky. Non-convex learning via stochastic gradient
Langevin dynamics: a nonasymptotic analysis. arXiv preprint arXiv:1702.03849, 2017.
[22] D. I. Shuman, S. K. Narang, P. Frossard, A. Ortega, and P. Vandergheynst. The emerging
field of signal processing on graphs: Extending high-dimensional data analysis to networks and
other irregular domains. IEEE Signal Processing Magazine, 30(3):83–98, 2013.
18
[23] A. J. Smola and R. Kondor. Kernels and regularization on graphs. In Learning Theory and
Kernel Machines, pages 144–158. Springer, 2003.
[24] N. Tremblay, G. Puy, R. Gribonval, and P. Vandergheynst. Compressive spectral clustering.
In International Conference on Machine Learning, pages 1002–1011, 2016.
[25] N. K. Vishnoi.
lx = b laplacian solvers and their algorithmic applications. Foundations and
Trends in Theoretical Computer Science, 8(1–2):1–141, 2013.
[26] U. Von Luxburg. A tutorial on spectral clustering. Statistics and Computing, 17(4):395–416,
2007.
[27] Y.-X. Wang, J. Sharpnack, A. J. Smola, and R. J. Tibshirani. Trend filtering on graphs. Journal
of Machine Learning Research, 17(105):1–41, 2016.
[28] M. Welling and Y. W. Teh. Bayesian learning via stochastic gradient Langevin dynamics. In
Proceedings of the 28th International Conference on Machine Learning, pages 681–688, 2011.
[29] Y. Zhang, P. Liang, and M. Charikar. A hitting time analysis of stochastic gradient Langevin
dynamics. arXiv preprint arXiv:1702.05575, 2017.
19
|
1709.02339 | 2 | 1709 | 2019-07-17T00:03:27 | When Labels Fall Short: Property Graph Simulation via Blending of Network Structure and Vertex Attributes | [
"cs.SI"
] | Property graphs can be used to represent heterogeneous networks with labeled (attributed) vertices and edges. Given a property graph, simulating another graph with same or greater size with the same statistical properties with respect to the labels and connectivity is critical for privacy preservation and benchmarking purposes. In this work we tackle the problem of capturing the statistical dependence of the edge connectivity on the vertex labels and using the same distribution to regenerate property graphs of the same or expanded size in a scalable manner. However, accurate simulation becomes a challenge when the attributes do not completely explain the network structure. We propose the Property Graph Model (PGM) approach that uses a label augmentation strategy to mitigate the problem and preserve the vertex label and the edge connectivity distributions as well as their correlation, while also replicating the degree distribution. Our proposed algorithm is scalable with a linear complexity in the number of edges in the target graph. We illustrate the efficacy of the PGM approach in regenerating and expanding the datasets by leveraging two distinct illustrations. Our open-source implementation is available on GitHub. | cs.SI | cs | When Labels Fall Short: Property Graph Simulation
via Blending of Network Structure and Vertex
Attributes
Pacific Northwest National Laboratory, Seattle, WA,
Pacific Northwest National Laboratory, Richland, WA,
Sutanay Choudhury
Arun V. Sathanur
USA
[email protected]
Cliff Joslyn
USA
[email protected]
[email protected]
Sumit Purohit
USA
USA
[email protected]
9
1
0
2
l
u
J
7
1
]
I
S
.
s
c
[
2
v
9
3
3
2
0
.
9
0
7
1
:
v
i
X
r
a
Pacific Northwest National Laboratory, Seattle, WA,
Pacific Northwest National Laboratory, Richland, WA,
ABSTRACT
Property graphs can be used to represent heterogeneous net-
works with labeled (attributed) vertices and edges. Given a
property graph, simulating another graph with same or greater
size with the same statistical properties with respect to the
labels and connectivity is critical for privacy preservation and
benchmarking purposes. In this work we tackle the problem
of capturing the statistical dependence of the edge connec-
tivity on the vertex labels and using the same distribution to
regenerate property graphs of the same or expanded size in
a scalable manner. However, accurate simulation becomes
a challenge when the attributes do not completely explain
the network structure. We propose the Property Graph Model
(PGM) approach that uses a label augmentation strategy to
mitigate the problem and preserve the vertex label and the
edge connectivity distributions as well as their correlation,
while also replicating the degree distribution. Our proposed
algorithm is scalable with a linear complexity in the number
of edges in the target graph. We illustrate the efficacy of the
PGM approach in regenerating and expanding the datasets by
leveraging two distinct illustrations. Our open-source imple-
mentation is available on GitHub 1.
KEYWORDS
Property Graphs, Attributed Graphs, Joint Distribution, Graph
Generation, Label Augmentation, Label-Topology Correla-
tion
1 INTRODUCTION
Most real-world datasets that naturally lend themselves to
a graph representation also contain significant amounts of
label (or attribute) information. This situation is promoting
the popularity of property graphs: multi-graphs where the
1https://github.com/propgraph/pgm
vertices and edges are labeled with key-value pairs [10]. For
example, the Microsoft Academic Graph has labels such as af-
filiation, field of study, etc., for every person. These attributes
help answer questions such as: 1) how strong are collabora-
tions between two fields? 2) where is a person with a certain
affiliation and field of study likely to publish most? Simi-
lar motivating examples are abound in other domains such
as bioinformatics (protein-interaction networks), medicine
(clinical records) and cyber-security (network-traffic data).
The need for accurate and scalable simulation arises as an
important capability for property graphs. We often need to
re-generate datasets with equivalent properties for privacy
reasons, or expand a dataset by multiple orders of magnitude
for benchmarking studies.
THE PROBLEM In this work we consider the problem of
capturing the relationships between given and (in general)
correlated vertex labels and edge connectivity in property
graphs through the use of two different joint distributions.
We show that a straightforward approach to capturing the
label-structure relationships can be accuracy-limited when
the given labels cannot explain the structure completely. We
mitigate this problem by modeling the dependence of the
edge connectivity on the vertex labels and the structure itself
via the introduction of an augmented label that categorizes
the vertex degree distribution. We demonstrate the modeling
of graphs with vertices of the same type, connected by one
specific type of relationship. General property graphs with
heterogeneous vertices and multiple relationships can be mod-
eled by introducing vertex types as new labels and building
multiple distributions for the typed edges.
CONTRIBUTIONS Our Property Graph Model (PGM) re-
tains the generative nature of the Multiplicative Attribute
Graph (MAG) model [4] by expressing the probability of
edge connection as a function of the vertex labels. However,
while MAG deals with latent labels, PGM caters to correlated,
meaningful real-world labels. In this way it is similar to the
Attribute Graph Model (AGM) approach [8]. PGM has the
added benefit of not needing to assume a model for the graph
topology, making it general enough to model property graphs
across domains. The use of label and edge categories to define
multinomial distributions provides for a scalable implemen-
tation linear in the number of edges required in the target
dataset. Finally, we demonstrate our results on two datasets:
a synthetic dataset generated by a role-based approach [3]
and a real-world dataset extracted from the Facebook Social
Graph [5].
1, li
2, . . . , li
k , . . . , li
M
¯L(vi) =(cid:10)li
(cid:11) drawing a label value li
2 THE BASIC PGM APPROACH
Consider a source property graph GS = ⟨VS , ES , L, L(VS)⟩
with the set of vertices VS and the set of edges ES ⊆ VS × VS .
L = {Lk}M
k =1 is a set of M vertex label sets. Associated with
the kth label is Lk , the set of possible label values for that
label and nk = Lk . For example, in a social graph, the first
label, Income-Range, may have 6 possible values where as the
second label, Education-Level, may have 4 possible values.
Associated with each vertex vi ∈ VS is a random M-vector
k ∈ Lk ,
for each of the M labels. We denote by L(VS), the set of all
the VS label value vectors in one to one correspondence
with the set of vertices VS .The target property graph GT =
⟨VT , ET , L, L(VT)⟩ is defined analogously, and is generated by
capturing appropriate statistics on GS . Note that both GS and
GT share the same set of vertex labels L.
Each realized vertex label vector ¯L(vi) can be considered as
a draw from the set of joint label assignments L =
M
k =1 Lk .
k =1 nk possible joint label assignments
called label categories and the jth label category is denoted
by cj. In doing so, we flatten the joint distribution to a multi-
nomial label distribution PL over these N categories such that
j=1 pj = 1. With the observations of the
pj = PL
vertex labels in the source dataset GS , we can estimate the
parameters pj via the maximum-likelihood method as
There are N = M
(cid:1), andN
(cid:0)cj
i =1 1cj(¯L(vi))
VS
.
(1)
(cid:1) =
(cid:0)cj
PL
VS
Here the indicator function is 1 only when the label vector for
vertex i is equal to the joint label category cj.
over pairs of label categories (cid:0)cj , cj′(cid:1) which we call edge
Next, we model the edge connectivity by a joint distribution
categories. We denote this distribution by PC. PC is defined
over the sample space L × L and has one entry per pair of
label vector realizations. PC can be estimated from data as
⟨vi,vi′⟩∈ES 1(cj,cj′)(cid:0)¯L(vi), ¯L(vi′)(cid:1)
(cid:0)(cid:0)cj , cj′(cid:1)(cid:1) =
PC
ES
.
(2)
2
2
Here the indicator function is 1 only when the two vertices vi
and vi′ have an edge between them and their label vectors take
on categories cj and cj′ respectively. Note that for undirected
graphs, where the order of cj and cj′ does not matter, PC can
be represented as a more compact multinomial distribution
(cid:1) categories. When we draw an edge from PC,
with N =(cid:0)N
the successful category gives the vertex label categories cor-
responding to the two end points that form the edge. Using
a data structure such as a map (C2V in Algorithm 1), the
participating vertices can be randomly drawn from the pools
of vertices corresponding to those label categories. Drawing
the edges from the multinomial distribution PC renders the
algorithm linear in the number of edges required as opposed
to a naive implementation over vertex pairs which will lead
to an algorithm that is quadratic in the number of vertices
required. Algorithm 1 describes the basic PGM approach.
Algorithm 1 The input to the algorithm is the source property
graph dataset DS and the number of vertices and edges in the
target property graph - nt = VT and mt = ET . The output
is the target property graph ⟨VT , ET , L, L(VT)⟩.
1: procedure PGM-BASIC(DS , nt , mt )
⟨VS , ES , L, L(VS)⟩ = processSourceDataSet (DS)
2:
GT = SIMATTRGRAPH(⟨VS , ES , L, L(VS)⟩ , nt , mt )
3:
4: end procedure
5: procedure SIMATTRGRAPH(⟨V , E, L, L(V)⟩ , nt , mt )
PL = computeV ertexLabelDist (V , L(V))
6:
PC = computeEdдeConnectivityDist (V , E, L(V))
7:
VX = ϕ, L(VX) = ϕ, EX = ϕ
8:
for idx = 1 to nt do
9:
10:
11:
(cid:0)v, ¯L(v)(cid:1) = sampleFromMultiNomialDist (PL)
VX = VX ∪ {v}, L(VX) = L(VX) ∪(cid:8)¯L(v)(cid:9)
categories
for i = 1 to N do
▷ Create map C2V for all N
C2V [ci] = Set of all vertices with label category
for idx = 1 to mt do
▷ Draw one edge at a time
[c1, c2] = sampleFromMultiNomialDist(PC)
Draw v1 and v2 at random from C2V [c1] and
EX = EX ∪ {(v1, v2)}
return ⟨VX , EX , L, L(VX)⟩
C2V [c2]
17:
18:
19: end procedure
12:
13:
14:
15:
16:
ci
Lines 6 and 7 compute the label and edge connectivity dis-
tributions PL and PC from the source graph dataset GS . Lines
9-11 sample from the distribution PL, the vertex label set
L(VT) for the target graph. Lines 14-17 construct the edge set
ET by drawing one edge at a time by sampling from a multi-
nomial distribution over the edge categories. The resultant
vertices to be connected are drawn at random from the sets of
vertices corresponding to the label categories obtained from
the edge category. Self and repeated edges can be removed
by post-processing.
3 WHEN LABELS FALL SHORT
We use two example graphs with contrasting properties to
illustrate the strengths and limitations of the PGM method.
The first example is a role-based graph [3] such as an enter-
prise network where the connectivity depends on roles that
the vertices serve [2]. Thus, it is possible that there is a high
chance of an edge between a SERVER-CLIENT pair while
the chance of an edge between a SERVER-SERVER or a
CLIENT-CLIENT pair is small. By considering two binary
labels that can explain the edge connectivity, we synthesized
a role-based graph with 2000 vertices and 90,000 undirected
edges. Our next example consists of an anonymized Facebook
social graph from the SNAP website [5]. The data is available
as a number of ego-nets, each associated with a large number
of binary vertex features that vary across the ego-nets. We
collected the 4 labels that were common to all vertices across
the ego-nets and leveraged the combined graph for our ex-
periments. The graph has around 4000 vertices and 88,000
undirected edges with nearly a power-law degree distribution.
We then run the steps presented in Algorithm 1 to re-
generate target property graphs of same size as the source
property graphs. We compare the distributions PL and PC.
The design of the algorithm ensures that PL and PC for the
source and target distributions will match well in expectation
and the same was verified. We also quantify the comparison
with respect to the degree distributions between the ground
truth graph and the regenerated graph by means of the Jenson-
Shannon Divergence (JSD) measure [6]. JSD is small when
the distributions are closer to each other.
The results for both the example datasets are shown in
Figure 1. The top sub-figure shows the degree distribution
comparisons between the source and regenerated versions of
the role-based graph, for which there is a very good match.
The degree distribution is plotted as a complementary cumu-
lative distribution function (CCDF). The bottom sub-figure
shows comparisons for the Facebook graph (on a log-log
scale) for which we don't see a good match.
The joint distribution based approach that we described in
Algorithm 1 assumes that the edge connectivity is a function
of label values alone.This assumption is often violated in the
case of real-world datasets rendering the basic PGM approach
ineffective in recovering the structural properties such as the
degree distributions. It might be impossible to identify and
collect all the vertex labels that can explain the graph structure.
Even if all the possible labels can be collected, it is possible
that the graph is grown temporally and as a result, when
new vertices arrive and form edges, the connectivity is not
only dependent on the label combination pairs but also on
Figure 1: Top: Degree distribution comparison (linear
scale) for the scenario where the graph structure is fully
explained by the given labels. (JSD = 0.036). Bottom: De-
gree distribution comparison (log-log scale) for the Face-
book graph where the graph structure is not fully ex-
plained by the given labels (JSD = 0.354)
the structure of the graph itself at the time point of their
arrival. The next section bridges this gap and extends the
PGM approach to replicate the topological features under
limited label information.
4 LABEL AUGMENTATION TO RESCUE
In [7], the authors introduce the notion that the probability
of edge formation between a new vertex and a vertex already
present in the graph is dependent on both the similarity be-
tween the two vertices and the popularity of already present
vertex. The similarity notion refers to affinity based on vertex
attributes. The popularity notion captures phenomena such as
preferential attachment where vertices tend to get attached to
popular vertices which are vertices with existing high degree
values. Strict role-based networks such as communication
networks will favor similarity while networks such as social
networks will favor a combination of similarity and popular-
ity. In the case of the PGM approach, the joint distribution
implicitly encodes and generalizes the notion of similarity
by quantifying the average likelihood of edge connectivity
between all possible pairs of label categories (not necessarily
between vertices having the same label categories). The label
augmentation process that we describe next, will bring in the
popularity aspect into the PGM approach.
Adopting the above philosophy, in order to better match
the degree distribution of the given graph, we propose to aug-
ment the given set of labels with an additional label La that
describe the vertex popularity. The number of values that this
additional label can take on is denoted by na, corresponding
3
The same is reflected in the observation that the JSD measure
decreases with increasing na.
5 DATASET EXPANSION
Next we consider the expansion of the dataset by using the
estimated joint distributions of the vertex labels and the edge
connectivity, PL and PC respectively. The results are illus-
trated in Figure. 3 for both the role-based and the Facebook
graphs. The number of vertices were expanded by 10X where
as the number of edges were expanded by 12.5X. It's clear
from the observed results that the PGM approach in its ba-
sic or extended form works well in expanding the attributed
graphs and preserves the degree distribution shapes. Lever-
aging a serial implementation, we generated graphs with 1
million vertices, 31 million edges and total of 16 vertex label
categories (2 binary labels and an augmented label with 4
values) in about 42 minutes on a 2.6GHz Mac workstation.
Drawing of independent edges facilitates easy parallelization
of the code which is ongoing.
to the division of the range of the degree values for the given
graph GS into na intervals. Vertex-specific label values for
are assigned based on the interval in which a given vertex
degree falls. We then run an iterative procedure by increment-
ing na by 1 at each step till an error measure over the source
and target distributions of structural properties of interest is
acceptable. In each iteration, the interval lengths can be opti-
mally adjusted by means of an optimizer to minimize the error
metric. Note that both the distributions PL and PC without La
will be retained as before due to the marginalization property
of the joint probability mass functions. Algorithm 2 reflects
the updated flow.
Algorithm 2 The updated approach that uses label augmen-
tation. This algorithm calls the simAttrGraph procedure in
Algorithm. 1.
1: ⟨VS , ES , L, L(VS)⟩ = processDataSet (DS)
2: na ← 1 ▷ na is the number of intervals in degree range
3: error ← ∞
4: procedure PGM-AUGMENTED(⟨VS , ES , L, L(VS)⟩ , nt , mt )
5:
6:
7:
na ← na + 1
Divide degree range of the source graph into na
for each v ∈ VS do
while (error > tolerance) do
intervals
Assign la(v) value based on the degree(v)
Append the label vector ¯L(v) with la(v)
8:
9:
10:
11:
GRAPH(⟨VS , ES , L, L(VS)⟩ , nt , mt )
GT
error ← computeError (GS , GT)
=
12:
13: end procedure
SIMATTR-
Figure 2: Degree distribution comparison (log-log) be-
tween the Facebook graph and the simulated graph with
augmented label La and for various values of na.
In our experiments, for a given value of na, we assigned
the interval lengths based on a logarithmic scale and the end-
points of the intervals were fixed. For the Facebook graph, the
results of augmenting with La with na = 0,2,4,8 are shown
in Figure 2. As seen the reproduction of the degree distribu-
tion is very poor without augmentation (na = 0) and gets
progressively better with augmentation and by increasing na.
4
Figure 3: Comparing degree distributions shapes for a
10X dataset expansion. Top : Role-based graph. Bottom
: Facebook graph with 8 label values for the augmented
label (log-log scale).
6 RELATED WORK
Synthetic generation of property graphs is a nascent area of
research when compared to models for network topologies.
Approaches based on exponential random graph (ERG) [9]
model the link probability as a linear model in a number of
topological features. While such formulations are general
enough to accommodate vertex labels, these methods have
high computational cost beyond a few thousand vertices [8].
The Multiplicative Attribute Graph (MAG) approach models
[2] PY Chen, S. Choudhury, and A. Hero. 2016. Multi-centrality graph
spectral decompositions and their application to cyber intrusion detec-
tion. In IEEE ICASSP.
[3] K. Henderson and et al. 2012. Rolx: structural role extraction & mining
in large graphs. In ACM SIGKDD.
[4] M. Kim and J. Leskovec. 2012. Multiplicative attribute graph model of
real-world networks. Internet Mathematics 8, 1-2 (2012).
[5] J. Leskovec and A. Krevl. 2014. SNAP Datasets: Stanford Large Net-
work Dataset Collection. http://snap.stanford.edu/data. (June 2014).
[6] J. Lin. 1991. Divergence measures based on the Shannon entropy.
IEEE Transactions on Information theory 37, 1 (1991), 145 -- 151.
[7] F. Papadopoulos and et al. 2012. Popularity versus similarity in growing
networks. Nature 489, 7417 (2012), 537 -- 540.
[8] J.J Pfeiffer III and et al. 2014. Attributed graph models: Modeling
network structure with correlated attributes. In WWW. ACM.
[9] G. Robins and et al. 2007. An introduction to exponential random
graph (p*) models for social networks. Social networks 29, 2 (2007).
[10] M. Simeonovski and et al. 2017. Who Controls the Internet?: Analyzing
Global Threats Using Property Graph Traversals. In WWW.
the link probability between two vertices in terms of affinities
along a number of independent vertex level latent labels. How-
ever, MAG's drawback also lies in its reliance on latent labels.
Generating vertex labels as observed in the data becomes
difficult in a latent label based approach [8]. An alternate
approach is presented in Attributed Graph Model (AGM) [8]
that combines two sources of information: a) it learns the
correlation between vertex labels and the graph structure, and
b) exploits a known generative model for the graph topol-
ogy in the form or Kronecker Product Graph Model or the
Chung-Lu model. The AGM approach can perform well in
replicating the graph topology and the correlation with the
label values for any given set of labels. However the approach
is agnostic to the explanatory power of the labels. Further,
modeling and expanding arbitrary property graph datasets
can be a challenge with the AGM approach that relies on
specific models for the graph topology. In a recent work [1]
the authors focus on the problem of cloning social networks
in a privacy preserving fashion. The authors use preferential
attachment model to generate the graph, followed by genetic
algorithms to align the statistical distribution of attributes
in the source and derived dataset. The use of optimization
process in conjunction with the preferential attachment based
model limits the applicability and scalability of this approach.
7 CONCLUSIONS AND ONGOING WORK
We present a property graph generation algorithm that bridges
two state of the art approaches, [4] and [8], by leveraging on
their strengths, and addresses their respective weaknesses in
modeling realistic property graphs. We initiate the simulation
with observed labels and then introduce an augmented label
to explain when the connectivity is not explained by the given
set of labels. Our approach reproduces or expands property
graphs with a single edge relation and homogeneous vertices
while being able to match the degree distributions closely.
We are addressing several theoretical and implementation
challenges as part of ongoing research. They include sup-
porting heterogeneous vertices and relationships, better label
augmentation strategies for large-scale dataset expansion and
preservation of properties beyond degree distribution.
ACKNOWLEDGMENTS
This research was supported by the High Performance Data
Analytics program at the Pacific Northwest National Labora-
tory (PNNL). PNNL is a multi- program national laboratory
operated by Battelle Memorial Institute for the US Depart-
ment of Energy under DE-AC06- 76RLO 1830.
REFERENCES
[1] A. M. Ali and et al. 2014. Synthetic Generators for Cloning Social
Network Data. In International Conference on Social Informatics. Cam-
bridge, MA.
5
|
1211.6512 | 1 | 1211 | 2012-11-28T03:45:14 | Using Friends as Sensors to Detect Global-Scale Contagious Outbreaks | [
"cs.SI",
"physics.soc-ph"
] | Recent research has focused on the monitoring of global-scale online data for improved detection of epidemics, mood patterns, movements in the stock market, political revolutions, box-office revenues, consumer behaviour and many other important phenomena. However, privacy considerations and the sheer scale of data available online are quickly making global monitoring infeasible, and existing methods do not take full advantage of local network structure to identify key nodes for monitoring. Here, we develop a model of the contagious spread of information in a global-scale, publicly-articulated social network and show that a simple method can yield not just early detection, but advance warning of contagious outbreaks. In this method, we randomly choose a small fraction of nodes in the network and then we randomly choose a "friend" of each node to include in a group for local monitoring. Using six months of data from most of the full Twittersphere, we show that this friend group is more central in the network and it helps us to detect viral outbreaks of the use of novel hashtags about 7 days earlier than we could with an equal-sized randomly chosen group. Moreover, the method actually works better than expected due to network structure alone because highly central actors are both more active and exhibit increased diversity in the information they transmit to others. These results suggest that local monitoring is not just more efficient, it is more effective, and it is possible that other contagious processes in global-scale networks may be similarly monitored. | cs.SI | cs | Using Friends as Sensors to Detect Global-Scale
Contagious Outbreaks
Manuel Garcia-Herranz1, Esteban Moro Egido2,3,4, Manuel Cebrian5,6,7, Nicholas A. Christakis8,9,
James H. Fowler 10,11
1 Escuela Politécnica Superior, Universidad Autónoma de Madrid, Madrid 28049, Spain
2Departamento de Matematicas & GISC, Universidad Carlos III de Madrid, 28911 Leganés, Spain
3 Instituto de Ingeniería del Conocimiento, Universidad Autónoma de Madrid, Madrid 28049, Spain
4Instituto de Ciencias Matemáticas CSIC-UAM-UCM-UC3M (ICMAT), 28049, Madrid, Spain
5 Computer Science & Engineering Department, University of California, San Diego, CA 92093, USA
6 Media Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
7 National Information and Communications Technology Australia, Melbourne, Victoria 3010, Australia
8 Department of Sociology, Harvard University, Cambridge, MA 02138, USA
9 Department of Medicine, Harvard Medical School, Boston, MA 02115, USA
10 Medical Genetics Division, School of Medicine, University of California, San Diego, CA 92103, USA
11 Political Science Department, University of California, San Diego, CA 92103, USA
* Corresponding Author: JHF, [email protected]
Recent research has focused on the monitoring of global-scale online data for improved
detection of epidemics1,2,3,4, mood patterns5,6, movements in the stock market7 political
revolutions8, box-office revenues9, consumer behaviour3,10 and many other important
phenomena. However, privacy considerations and the sheer scale of data available online
are quickly making global monitoring infeasible, and existing methods do not take full
advantage of local network structure to identify key nodes for monitoring. Here, we
develop a model of the contagious spread of information in a global-scale,
publicly-articulated social network and show that a simple method can yield not just early
detection, but advance warning of contagious outbreaks. In this method, we randomly
choose a small fraction of nodes in the network and then we randomly choose a “friend” of
each node to include in a group for local monitoring. Using six months of data from most of
the full Twittersphere, we show that this friend group is more central in the network and it
helps us to detect viral outbreaks of the use of novel hashtags about 7 days earlier than we
could with an equal-sized randomly chosen group. Moreover, the method actually works
better than expected due to network structure alone because highly central actors are both
more active and exhibit increased diversity in the information they transmit to others.
These results suggest that local monitoring is not just more efficient, it is more effective,
and it is possible that other contagious processes in global-scale networks may be similarly
monitored.
Modern social, informational, and transactional platforms offer a means for information to
spread naturally (e.g, as in the case of the “Arab Spring”11), and there is increasing interest in
1
using these systems to intentionally promote the spread of information and behaviour12,13,14,15.
They they also yield a brand-new and large-scale global view of social interactions and dynamics
of formerly hidden phenomena16. However, the advent of global monitoring has recently
heightened concerns about privacy17 and scholars have shown that anonymization is insufficient
to guarantee it18. Thus, future efforts to monitor global phenomena may be restricted to analysis
at a local scale4,19. Moreover, the explosive growth of online data has made it more and more
difficult to perform a complete global analysis. As a result, scholars are beginning to develop
local methods that sample small but relevant parts of the system20,21 .
Here, we elaborate a new sampling technique that takes advantage of the local structure
inherent in large-scale online social networks, and we use it to test an important hypothesis about
social contagion. If a message is transmitted via broadcast, then all individuals in a network are
equally likely to receive it. On the other hand, if a message is transmitted from person to person
to person via contagion, then individuals at the centre of a network are likely to receive it sooner
than randomly-chosen members of the population because central individuals are a smaller
number of steps (degrees of separation) away from the average individual in the network22,23. As
a result, for contagious processes, we would expect the S-shaped cumulative “epidemic curve”24
to be shifted to the left (forward in time) for centrally located individuals compared to the
population as a whole.
If so, then the careful collection of information from a sample of central individuals within
human social networks could be used to detect contagious outbreaks before they happen in the
population at large22. We call this the sensor hypothesis. In fact, the very discrepancy in the
time to infection between central and randomly-chosen individuals could serve as a means to
distinguish between broadcast and contagion mechanisms, either ex post by comparing their
2
mean times of infection or in real time by looking for the first day in which there is a significant
difference in their cumulative incidences.
Using 6 months of data from Twitter recorded in 2009, we analyse a network containing 40
million users around the world who are connected by 1.5 billion directed relationships
(“follows”). Over six months, these users sent nearly half a billion messages (“tweets”), of
which 67 million contained a user-supplied topic keyword called a “hashtag.” These hashtags are
prefixed by a pound sign (“#”) and are used to denote unique people, events, or ideas, making
them useful for studying the spread of information online25,26,27.
To test the sensor hypothesis, we need a sample of individuals with higher network centrality
(the “sensor” group) to compare with a sample of randomly-chosen individuals (the “control”
group). However, measuring centrality can be a computationally expensive task in large-scale
networks like Twitter. Therefore, we use a simplified approach that first randomly selects a set
of users for the control group, and then randomly chooses one “friend” of each member of this
group to put in the sensor group. This procedure generates a sensor group with higher centrality
than the control group because of the “friendship paradox”: high-degree individuals are more
likely to be connected to a randomly chosen person than low-degree individuals22,28. In other
words, “your friends have more friends than you do.”29
In Fig.1a we demonstrate that the sensor group contains more high degree individuals and
fewer low degree individuals, and this is true even if we remove duplicates from the sensor group
(duplicates occur when the same person is randomly chosen as a friend by multiple individuals in
the control group). However, this difference between the sensor and control groups depends on
what fraction of the network is sampled. As the fraction increases, there is increasing overlap
between the two groups, reducing the difference in their degree distributions (Fig.1b). We
derive closed form equations that characterize the expected degree distribution for both the
3
sensor groups (with and without duplicates) and control groups based on the fraction of nodes
sampled and an arbitrary known degree distribution for the network as a whole (see SI).
Fig.1c,d show that these equations fit the data well for a random sample of 1.25% of all users
(500,000 total) on Twitter, confirming our expectation that the sensor group is more central than
the control group.
To test whether sensors can provide early warning of a contagious message spreading through
the network, suppose tα
denotes the time at which a sampled user i first mentions hashtag α (i.e
i
the infection time). We would expect tα
to be smaller on average for users belonging to a
i
central sensor group S than for those of a random control group C. If we denote
i 〉i∈S−〈tα
Δtα=〈tα
i 〉i∈C for hashtag α, the sensor hypothesis is that Δtα<0.
However, note that Δtα depends on the size of the samples in two ways. For small samples,
the number of “infected” users (i.e. users mentioning hashtag α) will be scarce, leading to large
statistical errors. On the other hand, for big samples, the degree distribution the of control and
sensor groups tend to overlap and consequently Δtα approaches 0. Therefore it may be
necessary to find an optimal “Goldilocks” sample size that gives statistical power while still
preserving the high-centrality characteristic of the sensor group. Fig.2a shows results from a
theoretical simulation of an infection30 spreading in a synthetic network (see SI) while Fig.2b
shows an empirical analysis of widely used hashtags in our Twitter database. Both theory and
data suggest that there exists an optimal (and moderate) sample size that may perform best for
detecting large and significant differences between the sensor and control group resulting from
contagious processes.
4
To analyse the performance of the sensor mechanism, we collected five random control
samples of 50,000 users and a random set of their followees of the same size to use as sensors for
each one. Focusing on the 32 most widespread hashtags that appear at least 10 times in each
control sample, Fig.2c shows that Δtα is negative (i.e., the sensor sample uses the hashtag prior
to the control sample) in all but two cases , with a mean for all hashtags of –7.1 days (SEM 1.1
days). In the SI we also show this distribution for a wider range of hashtags, and these all show
that Δtα tends to be negative. In other words, the sensor groups provide early warning of the
usage of a wide variety of hashtags.
We also hypothesized that comparative monitoring of a sensor group and a control group may
help distinguish which hashtags are spreading virally via a contagious process and which are
spreading via broadcast. We studied 24 hashtags (Fig.3a) that were “born” during our sample
period (they first appeared at least 25 days after the start date of data collection) and then became
widely used (they were eventually used more than 20,000 times). Notably, the users using these
hashtags tended to be highly connected and many were connected to a giant component, a sign
that the hashtags may have spread virally online from user to user (see Fig.3d and SI for more
examples).
For each of these hashtag networks, we constructed a random control sample of 5% its size
and a similarly-sized sensor sample of their followees to calculate Δtα. We then repeated this
process 1,000 times to generate a statistical distribution of these observed lead times (Fig.2b).
Δtα < 0
) 79.9% (SE 1.2%) of the time. However, note
The sensor group led the control group (
that there was considerable variation in lead times, from 20 days to a few hours or no advance
warning.
5
To see how the sensor method works for hashtags that are not spreading virally, we generated
a null distribution in which we randomly shuffled the time of each hashtag use within the fully
observed data, and then measured the resulting difference in the sensor and control group
samples,
. Again, we repeated the procedure 1,000 times to generate a statistical
distribution (see SI). The results show that the observed distribution of lead times falls outside
the null distribution for 65.4% (SE 1.2%) of the hashtags, suggesting they did, in fact, spread
virally (Fig.3a).
Most hashtags also showed a shift forward in their daily and cumulative incidence curves of
the sensor group compared to the control one (Fig.3c,d). This shift forward, another sign of
virality in itself, could allow for identification of an outbreak in advance, as the sensor’s
deviation from the trajectory of the control group identifies a process that is spreading through
the network, affecting central individuals faster than random ones. Estimating the models each
day using all available information up to that day, for #openwebawards users, we find two
consecutive days of significant (p<0.05) lead time by the sensor group compared to the control
group on day 13, a full 15 days before the estimated peak in daily incidence (see SI), and also 15
full days before the control sample reaches the same incidence as the sensor group (See Figure
3c).
Finally, while the sensor mechanism allows us to identify a more central group that can be
used to detect contagious outbreaks in advance, it may also allow us to focus on users who have
other characteristics that could improve monitoring. In particular, users in the sensor group may
be more central because they are more active, and indeed we find this to be true (Fig.4a). On
average, users in the sensor group sent 154 tweets (SE 2.8) during the six months they were
monitored, while users in the control group tweeted only 55 times (SE 1.0, difference of means t
6
= 36, p < 2.2e-16). However, we also find that more central users tend to use a greater variety
of hashtags, even controlling for activity levels (Fig.4b).
The distribution of the number of users using any one hashtag follows a heavy tailed
distribution (see SI) with most hashtags being used by less than a few hundred people and very
few reaching the tens of thousands. Therefore, for most hashtags, the probability of finding
sufficient users to perform a significant analysis in a random sample of Twitter is very small.
Yet despite the relatively small size of the infected populations, the sensor mechanism we test
here seems to anticipate the global spread of information in a wide variety of cases. And,
importantly, it only requires a tiny fraction of the network as a whole to be monitored.
We believe that this method could be applied in a wide variety of contexts in which scholars,
policy-makers, and companies are attempting to use “big data” online to predict important
phenomena. For example, the sensor method could be used in conjunction with online search to
improve surveillance for potential flu outbreaks22,2. By following the online behaviour of a
group known to be central in a network (for example, based on e-mail records which could be
used to construct a friend sensor group), Google or other companies that monitor flu-related
search terms might be able to get high-quality, real-time information about a real-world epidemic
with greater lead time, giving public health officials even more time to plan a response.
Similarly, policy-makers could monitor global mood patterns6 to anticipate important changes in
public sentiment that may influence economic growth, elections, opposition movements, or even
political revolutions8. We also conjecture that investors might use these methods to better
predict movements in the stock market7.
How much advance detection would be achieved in other contexts or in populations of
different size or composition remains unknown. Just as we find variation in lead time for
different hashtags, we expect that the ability of the sensor method to detect outbreaks early, and
7
how early it might do so, will depend on intrinsic properties of the phenomenon that is spreading;
how this is measured; the nature of the population, including the overall prevalence of susceptible
or affected individuals; the number of people in the sensor group; the topology of the network
(for example, the degree distribution and its variance, or other structural attributes)23; and other
factors, such as whether the outbreak modifies the structure of the network as it spreads (for
example, by affecting the tendency of any two individuals to remain connected after the
information is transmitted). In future work, we hope to explore these factors in order to
generalize the conditions under which friends can be used effectively as sensors to detect
contagious outbreaks.
Acknowledgements This research was supported by a grant from the National Institute on
Aging (P-01 AG-031093) and by a Pioneer Grant from the Robert Wood Johnson Foundation.
8
Figure 1: Twitter exhibits the “friendship paradox”: a) Expected degree distributions for a
1.25% random sample of the Twitter network (black line), friends of this randomly chosen
group (red line), and the same friends group with duplicates removed (blue line); b)
Larger samples of friends show a smaller difference in degree distribution from the
overall network (black = overall network, red = 25% sample, green = 7.5% sample, blue =
1.25%); c) and d) Respectively, In-degree (follower) and out-degree (followee)
distribution of a random sample of 500,000 users, 1.25% of Twitter’s users (the “control”
group, black line) and the theoretical (red line) and observed (blue line) in-degree and
out-degree distributions of their friends (the “sensor” group) with duplicates from the
friends group removed.
9
Figure 2: Friends as sensors yield early detection of the use of hashtags. a) Measures
of lead times based on simulations of an infection spreading through a network with
infection probability λ=0.1 and recovery probability γ=0.01 on a Barabasi-Albert random
network with tail exponent β>3 show that a sensor group tends to provide earlier warning
than a randomly-chosen control group in smaller samples, but decreasing sampling
variation in larger sample sizes means that the statistical likelihood of providing early
warning is maximized in moderately-sized samples. b) Observed results for hashtags
on Twitter used by 1% of the individuals using a hashtag of each sample. c) Average
lead time of first usage of each hashtag in the sensor group vs. the control group for all
hashtags used by at least 10 users in each of 5 random samples of 50,000 random
users.
10
Figure 3: Signs of virality in hashtag usage. a) The average lead for the 24 most-used
hashtags time across 1,000 trials of the sensor group (in blue) vs. the same calculated
lead time when all times of first usage are randomly shuffled (in red). Vertical bars are
SEM.; b) daily incidence and c) cumulative daily incidence for the hashtag
#openwebawards show a shift forward in the S-shaped epidemic curve and a burst in the
sensor group relative to the control group that could be used to predict the outbreak of
this hashtag on the 13th day (the first day on which, using all available information up to
that day , there is a significant difference between the sensor and control groups with
p-value < 0.05), 15 days before the control group reaches the same cumulative incidence
and before the estimated peak in daily incidence; d) greatest connected component of
the follower network of users using the #openwebawards hashtag shows that many
users are connected in a large component.
11
Figure 4. Users in the sensor group (blue) are more active (a) and also use a wider
variety of hashtags (b) than those in the control group (red), even controlling for activity.
These attributes both contribute to early warning provided by the sensor group’s
structural position.
12
References
[1] Ginsberg J, Mohebbi MH, Patel RS, Brammer L, Smolinski MS, et al. (2009) Detecting influenza epidemics
using search engine query data. Nature 457.
[2] Achrekar, H., Gandhe, A., Lazarus, R., Yu, S.H. & Liu, B. (2011). Predicting flu trends using twitter data.
IEEE Computer Communications Workshops (INFOCOM WKSHPS), 702–707.
[3] Goel S., Hofman JM., Lahaie S., Pennock DM & Watts DJ. (2010) Predicting consumer behaviour with Web
search. Proceedings of the National Academy of Sciences 107 (41), 17486-17490
[4] Salathé M, Bengtsson L, Bodnar TJ, Brewer DD, Brownstein JS, et al. (2012) Digital Epidemiology. PLoS
Comput Biol 8(7)
[5] Dodds P. S. & Danforth C. M. (2010) Measuring the happiness of large-scale written expression: Songs, blogs,
and presidents. J. Happiness Stud. 11, 441.
[6] Golder, S.A. & Macy, M.W. (2011). Diurnal and seasonal mood vary with work, sleep, and day length across
diverse cultures. Science, 333(6051), 1878–1881.
[7] May, R., Levin, S. & Sugihara G. (2008). Complex systems: Ecology for bankers. Nature 451, 893–895
[8] González-Bailón, S., Borge-Holthoefer, J., Rivero, A. & Moreno, Y. (2011). The Dynamics of Protest
Recruitment through an Online Network. Scientific reports, Nature.
[9] Asur S. & Huberman BA. (2010) Predicting the future with social media. arXiv preprint arXiv:1003.5699.
[10] Robust dynamic classes revealed by measuring the response function of a social system, Riley Crane and
Didier Sornette, PNAS October 14, 2008 vol. 105 no. 41 15649-15653
[11] Gilad Lotan, Erhardt Graeff, Mike Ananny, Devin Gaffney, Ian Pearce & Danah Boyd. (2011). The
Revolutions Were Tweeted: Information Flows during the 2011 Tunisian and Egyptian Revolutions.
International Journal of Communications 5, Feature 1375–1405.
[12] Bond, R.M., Fariss, C.J., Jones, J.J., Kramer, A.D.I., Marlow, C., Settle, J.E. & Fowler, J.H. (2012) A
61-million-person experiment in social influence and political mobilization. Nature 489, 7415, 295–298.
[13] Centola, D. (2010) The spread of behaviour in an online social network experiment. Science 329, 5996,
1194-1197.
[14] Aral, S. & Walker, D. (2012). Identifying Influential and Susceptible Members of Social Networks. Science,
Vol. 337 no. 6092 pp. 337–341.
[15] Boyd, D. & Crawford K. (2011) Six provocations for big data.
[16] Leskovec J., Backstrom L. & Kleinberg J.. (2009) Meme-tracking and the dynamics of the news cycle. Proc.
15th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining.
[17] Gross R. & Acquisti A. (2005) Information revelation and privacy in online social networks. Proceedings of the
2005 ACM workshop on Privacy in the electronic society, 71-80.
[18] Backstrom L., Dwork C. & Kleinberg, J. (2007) Wherefore art thou r3579x?: anonymized social networks,
hidden patterns, and structural steganography. Proceedings of the 16th ACM international conference on World
Wide Web, 181-190.
[19] Lazer D., Pentland AS., Adamic L. & Aral S. (2009) Life in the network: the coming age of computational
social science. Science.
[20] Brautbar, M & Kearns, M. (2010) Local algorithms for finding interesting individuals in large networks.
Innovations in Computer Science.
[21] The Power of Local Information in Social Networks, Christian Borgs, Michael Brautbar, Jennifer Chayes,
Sanjeev Khanna, Brendan Lucier, arXiv:1202.6033 [cs.SI]
[22] Christakis, N.A., & Fowler, J.H. (2010). Social network sensors for early detection of contagious outbreaks.
PLoS ONE, 5(9), e12948.
[23] Kitsak, M., Gallos, L.K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H.E. & Makse, H.A. (2010)
Identification of influential spreaders in complex networks. Nature Physics 6, 11, 888-893.
[24] Ross R. (1915). Some a priori pathometric equations. Br Med J. 1(2830), 546–7.
[25] Huang, J., Thornton, K.M. & Efthimiadis, E.N. (2010). Conversational tagging in twitter. Proceedings of the
21st ACM conference on Hypertext and hypermedia, 173–178.
[26] Yang, J. & Leskovec, J. (2011). Patterns of temporal variation in online media, Proceedings of the fourth ACM
international conference on Web search and data mining, 177–186.
[27] Romero, D.M. and Meeder, B. and Kleinberg, J. (2011). Differences in the mechanics of information diffusion
across topics: Idioms, political hashtags, and complex contagion on Twitter. Proceedings of the 20th
international conference on World wide web. 695–704.
[28] Liu YY., Slotine JJ. & Barabási AL. (2012) Control Centrality and Hierarchical Structure in Complex
13
Networks. PLoS ONE 7(9)
[29] Feld, S. (1991). Why your friends have more friends than you do. The American Journal of Sociology, 96(6),
1464–1477.
[30] Kermack, W.O. & McKendrick, A.G. (1927) A Contribution to the Mathematical Theory of Epidemics,
Proceedings of the Royal Society of London. Series A, Vol. 115, 700-721.
14
Supplemental Information for
Using Friends as Sensors to Detect Global-Scale
Contagious Outbreaks
Manuel Garcia-Herranz1, Esteban Moro Egido2,3,4, Manuel Cebrian5,6,7, Nicholas A. Christakis8,9, James H.
Fowler10,11,*
1 Escuela Politécnica Superior, Universidad Autónoma de Madrid, Madrid 28049, Spain
2Departamento de Matematicas & GISC, Universidad Carlos III de Madrid, 28911 Leganés, Spain
3 Instituto de Ingeniería del Conocimiento, Universidad Autónoma de Madrid, Madrid 28049, Spain
4Instituto de Ciencias Matemáticas CSIC-UAM-UCM-UC3M (ICMAT), 28049, Madrid, Spain
5 Computer Science & Engineering Department, University of California, San Diego, CA 92093, USA
6 Media Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
7 National Information and Communications Technology Australia, Melbourne, Victoria 3010, Australia
8 Department of Sociology, Harvard University, Cambridge, MA 02138, USA
9 Department of Medicine, Harvard Medical School, Boston, MA 02115, USA
10 Medical Genetics Division, School of Medicine, University of California, San Diego, CA 92103, USA
11 Political Science Department, University of California, San Diego, CA 92103, USA
* Corresponding Author: JHF, [email protected]
Table of Contents
An Analytic Elaboration of the Friendship Paradox .................................................................... 16
The Twitter Data .......................................................................................................................... 17
Sensor Performance in a Simulated Infection Model .................................................................. 18
Sensor Performance in Real Data ................................................................................................ 20
Using the Sensor Method with a Small Set of Samples ............................................................... 20
Using the Sensor Method with Hashtag Networks ...................................................................... 22
Differences in Sensor and Control Characteristics That Also Affect Propagation ...................... 23
Figures .......................................................................................................................................... 25
References .................................................................................................................................... 41
15
An Analytic Elaboration of the Friendship Paradox
The “Friendship Paradox” was first elaborated by Feld (1991) who proved that for any arbitrary network the average
number of friends of friends is greater than the average number of friends (“Your Friends Have More Friends Than
You Do”).
Mathematically, we can define µ as the average number of connections per vertex in a network with V vertices and E
edges:
kv
v∈V∑
V
2 E
V
=
µ=
(1)
where each vertex v∈V has kv connections.
Using the same notation, we can derive the number of two-degree connections ρ (the friends of friends). Since the
degree kv of a vertex v is counted kv times (if a person has 5 friends, each of them will be added 5 times to the
kv
2
v∈V∑
total number of friends of friends), there are
two-degree connections, and we can divide this by the total
kv
v∈V∑
to get the average number of two-degree connections ρ:
number of direct connections
ρ=
v∈V∑
v∈V∑
kv
2
kv
(2)
Using a property of the variance σ2 in the distribution of kv, note that:
kv
2
)2
σ2 = E k −µ(
"
#
% = E k 2"#
$
$% − E k[ ]
(
)2
v∈V∑
V
=
)2
kv
v∈V∑(
V 2
(3)
−
From this, it is easy to show that:
ρ=
v∈V∑
v∈V∑
kv
2
kv
= µ+
σ2
µ
(4)
greater, to be precise) and this difference thus increases with the variance σ2 of
Therefore ρ is greater than µ ( σ2
µ
the degree distribution in the network.
Equation (2) implies that the expected distribution of two-degree connections Q(k) will be a function of the degree
distribution P(k). Since each vertex of degree k is connected to k other vertices, each vertex’s degree is counted k
times in the distribution and therefore there will be k vertices of degree k, leading to the following distribution of
two-degree connections:
16
(5)
Q(k ) =
kP(k )
µ
Since we want to sample only a part of the network of monitoring, we need to know the dregree distribution we can
expect to find for a random sample of a given size. If we sample a portion of the network (0 ≤ γ ≤ 1), the degree
distribution P(k) will remain the same since every person has the same probability γ of being chosen. However, the
expected distribution of the two-degree connections for the “friends” sample will differ since a person with more
friends has more chances of having a friend being chosen in the random sample and therefore appearing in the
friends sample.
The probability of not chosing a person with k friends is equal to the probability of not chosing any of thir k friends
1 −γ(
and thus their probability of appearing in the friends sample is 1 − 1 −γ(
) k
) k
. Drawing on Equation (5),
we can use these probabilities to derive the degree distribution of a random sample and a corresponding friends
sample for a portion γ of the population:
% P(k )
k 1 − 1 −γ(
) k
$
"
#
Aγ
Q(k ) =
(6)
Where Aγ is a normalization factor.
For the complete network (γ = 1), Equation (6) simplifies to Equation (5), and both of these demonstrate the
friendship paradox, Q(k) > P(k) for large k. This effect is amplified for small γ since it maximizes the multiplying
effect of counting k times each vertex with degree k (see Figure S1). Thus, a sensor group composed of the friends
of a randomly-sampled control group will tend to have a larger number of high-degree vertices than the control
group, itself.
One issue with constructing a sensor group is that people with many friends may be friends of several persons of the
randomly-sampled control group and therefore may be counted several times as members of the sensor group. In
fact, a person with k friends will be counted k times when γ = 1. However, we remove such duplicates when
constructing the sensor sample, so that each person is counted only once. This means that the degree distribution of
the sensor group will not be multiplied by k:
1 − 1 −γ(
) k
"
#
Aγ
% P(k )
$
Q(k ) =
(7)
Notice that this sensor group with duplicates removed also exhibits higher centrality than the network as a whole
since 1 − 1 −γ(
) k
(
) increases with k. However, like the friends degree distribution described in equation (6), the
difference between the sensor group Q(k ) and the control group P(k) disappears as γ increases (see Figure S1).
Thus, the centrality advantage of the sensor group declines as the size of the sample increases.
The Twitter Data
We used the data gathered by Kwak et al.1, collected between the 1st of June 2009 and the end of December 2009,
that represents a near-complete graph collected by snowball-sampling the online social networking site, Twitter.
Most (active) SNS users are connected to the giant connected component to which Paris Hilton belongs (a user with
over one million followers that was used for the snowball sample). Additionally all users mentioning trending topics
from June to August were also crawled. Summarizing, the sample includes:
1. those users connected to the giant connected component (no matter whether following or
followed)
17
2. those who mentioned trending topics.
The data includes:
• 476,553,560 tweets
• 66,935,466 tweets using a hashtag (a key term prefixed by ‘#’)
• 4,093,624 different hashtags
• 40,171,624 registered users
• 1,620,896 registered users using at least once a hashtag
• 1,468,365,182 follow relationships
• 531,703,974 reciprocal follow relationships (i.e. 265,851,987 bidirectional links)
The popularity of different hashtags, measured as the number of different people using each of them at some point
along this period, approximately follows a power law. In addition, Figure S2 shows a global increase in the number
of tweets per day with a seasonal peak in summer as well as a weekly pattern in the number of hashtags used per day.
In Figure S3 we show the popularity and start date for all hashtags appearing for the first time after June 25th, 2009.
Since the start date for data collection is June 1st, 2009, and we did not observe these hashtags in the first 25 days,
we assume that we have recorded their “birth” in the Twittersphere and therefore their possible initial outbreak.
We focus our analysis on the most used hashtags to analyze their virality in order to identify big local propagation
communities. Figure S4 shows the relative size of the greatest components for each network made up of all users
using a particular hashtag, and compares it to the total number of users who used the hashtag.
Sensor Performance in a Simulated Infection Model
To test the theoretical behavior of the sensor mechanism in an environment with a known spreading process, we
created a simple program in R to generate a synthetic Barabasi-Albert random undirected network with tail exponent
β>3 over which we simulated 10 cascades (each beginning at a different vertex of the network) and an
infection-recovery process with infection probability λ=0.1 and recovery probability γ=0.01:
library(igraph)
# generate the network
g <- barabasi.game(50000,power=1,m=5,directed=F)
mm <- data.frame(get.edgelist(g))+1 #network edges
colnames(mm) <- c("id1","id2")
tend = 10000 # we simulate the model for 10000 time units
ntot <- max(c(mm$id1,mm$id2))
time <- rep(tend,ntot) #infection times
infected <- rep(0,ntot) #infected nodes (0=S, 1=I, 2=R)
ncascades <- 10 #number of cascades
lambda <- 0.1 #infection probability
gamma <- 0.01 #recovery probability
for(k in 1:ncascades){ # simulate 10 casacades
i0 <- sample(1:ntot,1) # select a random seed for the cascade
time[i0] <- 0 # ...that gets initialy infected
infected[i0] <- 1
ni <- c(1) # 1 node infected (just the seed)
nr <- c(0) # no nodes recovery yet
for(i in 1:tend){ # begin the cascade
#infecteds get recoverd with probability gamma
infected[infected==1 & (runif(ntot) < gamma) ] = 2
ii <- which(infected==1) # get the list of still infected
18
nb <- unique(c(mm[is.element(mm$id1,ii),2],mm[is.element(mm$id2,ii),1]))
#neighbors of the infected nodes
# Sucsceptible neighbors get infected with prob. lambda
nb <- nb[runif(length(nb)) < lambda]
nb <- nb[infected[nb]==0]
infected[nb] <- 1
time[nb] <- I # record time of infection
ni <- c(ni,sum(infected==1)) # update infected list
nr <- c(nr,sum(infected==2)) # update recovery list
if(ni[i]==0) break # stop if there are no more infected
}
}
We then used data generated by these simulations to collect 350 random samples of 7 different sizes (0.124% of the
network to 12.5% of the network), 50 of each, and a similarly sized sample of its neighbors to use as sensor:
# function to get the neighbors of a node
neighbors <- function(id){
unique(c(mm[mm$id1==id,2],mm[mm$id2==id,1]))
}
samples <- c(62,125,312,625,1250,2500,6250) # sample sizes
final <- c()
for (samp in 1:length(samples)){ # for eac sample size...
dtc <-c() # initialize control times
dts<-c() # initialize sensor times
for(i in 1:50){ # repeat 50 times
# get a control sample
control <- sample(1:ntot,samples[samp])
# and a sensor sample of its neighbors \wo repetition
sensor <- sample(unique(unlist(lapply(control, neighbors))),samples[samp])
# get the times of infection of the infected nodes
tcontrol <- time[control]
tsensor <- time[sensor]
tcontrol <- tcontrol[tcontrol!=tend]
tsensor <- tsensor[tsensor!=tend]
# get the mean time of infection of controls
dtc <- c(dtc,mean(tcontrol))
#and sensors
dts <- c(dts,mean(tsensor))
}
finalmean <-mean(dts-dtc) # mean Delta t
finalesem <-sd(dts-dtc)/sqrt(length(dts)) # SEM Delta t
Save the mean and SEM Delta t of this sample size
final<-rbind(final,c(as.character(sample[samp]), as.numeric(finalmean),
as.numeric(finalesem)))
}
finaldf <- data.frame(final)
colnames(finaldf)<-c("sample","mean","sem")
The results can be seen in Figure 2a of the main text, showing that as the sample size grows the SEM decreases and
the mean Δt approaches 0, suggesting that middle sized samples are the best choice for detecting significant lead
times.
19
Sensor Performance in Real Data
We analyzed random control samples of various sizes (50K, 100K, 250K, 500K, 1M, 1.5M, 2M and 5M users), and
compared each one against 30 random sensor samples of the same size. In these sensor samples we ensured that no
user appeared more than once within a single sensor sample.
In order to detect a viral process with the sensor mechanism two factors are crucial. First, the sensor sample should
be more central than the control one. Second, the viral outbreak is large enough to be detected. We study viral
outbreaks in retrospect (once the spreading process is finished), focusing our attention on those that affected the
largest number of nodes in the network.
In Figure S5 all hashtags used by more than 0.01% of each sample’s users (or about 0.25% of all hashtag users) have
been plotted and compared to the theoretical infection model, finding that the mean Δtα and variance approach 0 as
the sample size grows, as predicted by the model. Figure S6 shows the same thing for hashtags used by more than
0.04% of the sample (or about 1% of hashtag users). Notice that in both cases, small sample sizes are not large
enough for lead times (Δtα) to be reliably less than zero (due to sampling variation), while in large samples the
control and sensor groups tend to overlap, causing the mean Δtα to approach 0 (see Figure 2a,b in the main text).
Many of the important events of 2009 appearing on Twitter show a lead time for the sensor group. They also show
a relationship with the control group by sample size similar to that of the infection model. For example, Figure S7
shows hashtags for:
• #h1n1: Current level of the novel H1N1 influenza pandemic alert raised from phase 5 to 6,
June 11
• #indonesiaunite: Sucide bombers hit two hotels in the center of Jakarta, July 17
• #cop15: UN Climate Change Conference 2009, December 7
• #iran: Protests following 2009 Iranian presidential election, June 13
• #michaeljackson: Michael Jackson’s death, June 25.
• #forasarney: Social movement demanding the departure of Senator Jose Sarney of their
duties in the National Congress of Brazil, June 17.
Figure S8 shows that viral hashtags that grow in usage and spread from person to person over time like
#mobsterworld and those used in response to an exogenous event like #indonesiaunite show negative Δtα,
suggesting that the sensor method elaborated here may be a reliable way to predict their widespread usage. In
contrast, a few hashtags like #health yield a positive Δtα(when the sensor group lags the control group). There is
variation in the amount of lead time provided by the sensor group. Hashtags like #beatcancer, a one day campaign
granting donations for each tweet using it, spread extremely quickly through the Twitter network. As a result, they
display an almost flat curve around zero and no variance, suggesting that, in these cases, the sensor mechanism is not
sensitive enough to predict an epidemic in advance.
Additional examples of viral and nonviral hashtags can be found in Figures S9 and S10. We also show the network
of users using a given hashtag and the cumulative distribution for the sensor and control groups for several example
hashtags in Figures S11-S14. Notice that many of these show that the cumulative distribution of usage in the sensor
group is shifted to the left, a sign that the center of the network is being infected before the network as a whole, on
average.
Using the Sensor Method with a Small Set of Samples
Here, we study the use of multiple sensor and control samples for detecting contagious outbreaks. We choose 5
random samples of 50,000 Twitter users (to be used as control) with their complete set of followees (from which to
obtain the sensor samples), calculating their in and out degree and the times at which they mention any hashtag in a
20
tweet. Obtaining a complete list of followers from a random sample over the whole Twittersphere is a costly
process, especially for large samples. Therefore we reduced our statistical analysis to 5 samples and followed the
same methodology we later repeated with 1,000 samples when we did not need to tackle Twitter as a whole.
We trim the control samples to those users that have mentioned a hashtag at least once. Since only 4% of Twitter
users have ever used a hashtag, our control samples are trimed to about 2,000 users and the followees samples to
about 150,000 users.
For each control we randomly select a similarly-sized sensor sample (without duplicates) from its followees. We
then remove all hashtags that have appeared before June 20th 2009 (20 days after our first records) reducing our
analysis to those hashtags that were very likely “born” during our sample period. For each of the hashtags we
calculate the mean first time of use in the control and sensor samples. We then calculate the mean control time
minus the mean sensor time for those hashtags used by at least 10 individuals in 1 or more of 5 samples.
Notice that the total population of these hashtags can be described with the following probability distribution:
ns
i
(8)
P(α, ns , s) =
ns
!
$
!
$
&& P(α)i 1 − P(α)
)ns −i
∑
#
&
(
##
#
&
"
%
i=s
"
%
Where ns is the total number of samples (i.e. 5) and s is the minimum number of samples (i.e. 1) in which we
require the hashtag to appear in at least xs users (i.e. 10). Therefore it is the probability of appearing in s samples
and not appearing in the other ns − s samples multiplied by the number of posible combinations of ns samples
taken in groups of s, plus the same probabilities for every I samples where s > i ≥ ns .
Now, the probability of finding xs or more users of a hashtag α in a random sample of S users drawn from a
total population of N users is defined through the hypergeometric function, which indicates the probability of finding
exactly xs individuals of the Xα users of hashtag α in a random sample of S users drawn from a population of N
individuals:
!
#
#
"
!
#
#
"
Xα
ns
P(ns ; N , Xα, S ) =
N − Xα
$
&
S − ns
&
%
N
!
$
#
&
S
"
%
The probaility of finding xs or more individuals is simply the cumulative distribution of Equation (9):
(9)
$
&
&
%
D(ns ; N , Xα, S ) =
Xα
P(
∑ k; N , Xα, S )
k=ns
(10)
while the cumulative distribution for not finding xs − 1 or less individuals is:
P(α) ≡ D(ns ; N , Xα, S ) = 1 −
ns −1
P(
∑ k; N , Xα, S )
k=0
(11)
21
Where P(α) is the probability for hashtag α to have at least xS users in a random sample of S users drawn from a
population of N individuals.
Complementing equation (8), equation (11) allows us to estimate the number of total hashtag users for hashtags with
10 or more users appearing in 1 or more of the 5 samples, 2 or more, and so on. The distribution of the total
number of users of hashtags appearing in each of these cases and the distribution of their mean Δt can be seen in
Figure 2c of the main text and Figure S15.
Forcing a hashtag to have representatives in all 5 samples restricts our analysis to the most widespread hashtags (32
in our case), while lowering this restriction to hashtags that have enough representatives in at least one of the
samples opens up the analysis to more hashtags (134 in our case) even though they do not necessarily have a global
spread as wide as the former. In every analysis (i.e. hashtags having enough representatives in 1 or more of the 5
samples, 2 or more, 3 or more, 4 or more and in all of them) more than 70% of the hashtags show a negative Δtα (in
80.55% in average 7.27% sd)
Nevertheless, the results show that raising the threshold number of samples required for detection of the global
spread of a hashtag reduces noise and yields a Δt < 0 for nearly all hashtags, providing advance warning of their
outbreak. In other words, the wider audience a hashtag has reached, the greater probability that the sensor
mechanism will detect it in advance.
Using the Sensor Method with Hashtag Networks
Given the comparatively low number of hashtag uses on Twitter (about 14% of the tweets and only 4% of the users
use hashtags) and the high diversity of hashtags (4 million different hashtags for 66 million tweets displaying a
hashtag), the probability of finding enough users of a hashtag for statistical analysis in a small random sample of
Twitter is very small.
Therefore, to analyze particular hashtags, we focused on the complete network of their users, composed only of those
people that have used the hashtag in at least one tweet and their follow relations. This allows us to individually
analyze the dynamics of well known hashtags as well as to try to identify smaller networks through which a viral
process has spread.
We selected all hashtags that were used more than 20,000 times on Twitter, identified their users and their follow
relations to construct, for each of them, its hashtag network.
For each of these hashtag networks, we selected a random control sample of 5% its size and a similarly-sized sensor
sample of their followees to calculate Δtα. We then repeated this process 1,000 times to generate a statistical
distribution of these observed lead times (Fig.2b of the main text). The sensor group led the control group (
Δtα < 0 ) 79.9% (SE 1.2%) of the time (52.9%, SE 1.12% for Δt p−value=0.05
%& < 0 ). However, note that there was
α#$
considerable variation in lead times, from 20 days to a few hours or no advance warning.
Moreover, one could use the difference in the sensor and control group to determine whether or not a viral process is
under way. Estimating the models each day using all available information up to that day, for a control and a
sensor sample of #openwebawards users, we find a significant lead time (p<0.05) on day 13, a full 15 days before the
estimated peak in daily incidence, and also 15 full days before the control sample reaches the same incidence as the
sensor group has on day 13 (See Figure 3c in the main text and right figures of Figures S11-S14).
While these results are promising, a Δtα < 0 does not necessarily indicate a viral process. Consider a non-viral
hashtag with fixed probability of use λ. A user tweeting at a rate of 10 tweets per hour will use a hashtag with
probability 10λ in the first hour, 10 times bigger than that of a user tweeting at a rate of 1 tweet per hour. Due to
22
the correlation between degree and tweet frequency (see Figure 4a in the main text) a Δtα < 0 could be observed
for a hashtag not because of its virality but because of the higher tweeting rates of users in the sensor group.
To see how the sensor method works for hashtags that are not spreading virally, we generated a null distribution in
which we randomly shuffled the time of each hashtag use within the fully observed data, and then measured the
resulting difference in the sensor and control group samples, Δ R tα . This method preserves any effect that
correlation between degree and activity level might have on lead times. Again, we repeated the procedure 1,000
times to generate a statistical distribution (see SI). The results show that the observed distribution of lead times
falls outside the null distribution for 65.4% (SE 1.2%) of the hashtags (25%, SE 0.95% for
%& < Δ R t p−value=0.05
Δt p−value=0.05
α#$
&( ), suggesting they did, in fact, spread virally.
$'
α
Notice that this method gives us greater confidence that the sensor method detects viral processes, but it also
suggests that the non-viral component of Δt could help the sensor mechanism work better than expected, since
sensors not only get reached sooner by an epidemic (due to their centrality) but also react earlier (due to their higher
tweeting rates).
Differences in Sensor and Control Characteristics That Also Affect
Propagation
By construction, control and sensor groups differ in the local structure of their networks. This is reflected in
properties such as degree, betweenness or k-coreness. For instance, in the #openwebawards user network, for 30
control/sensor samples of 10% its user base, sensor users have a mean degree of 24.6 (SEM 1.4), 6.6 times greater in
average (SEM 0.6) than the 4.5 (SEM 0.6) mean degree of control users, and a mean betweenness centrality 6.2
times greater too (SEM 0.4), 17,615.9 (SEM 492.9) compared to the 3,119.7 (SEM 192.5) of the controls. For 340
random control and sensor samples of 34 different hashtag networks (from 4,645 to 108,073 users) in only 3 cases
did the sensor group have a lower mean degree than the control group. Nevertheless, in all of them the sensor group
had a higher mean betweenness than the control one (see Figure S16).
Nevertheless, this is not the only factor affecting how much a user may contribute to a contagious outbreak. They
may also exhibit different patterns of communication that contribute to the spread of information from person to
person to person.
From a 1,000,000 random user sample we identified a control group of 36,499 users using at least one hashtag and a
sensor group of the same size composed of the control group’s followees. After removing from users from the
control group that are present in the sensor group, we end up with 16,332 users in the control group.
Figure 4a of the main text shows how the sensor and control groups differ by degree. The mean number of
followers and followees are 25 and 28 in the control group, respectively, but they are 422 and 243 in the sensor
group. These numbers reiterate the main result from Figure 1 that sensor samples tend to be much more central
than control samples. But there is also a large difference in communication behavior. The sensor group tweets
more (152 tweets per user compared to the control group’s 55) and also uses more hashtags per tweet (26 compared
to the control group’s 9). Both of these comparisons show that the sensor group is about three times more active
than the control group, but Figure 4a shows that this is a trivial consequence of the relationship between number of
tweets and number of connections. In both the control group and the sensor group, the better connected you are, the
more messages you send.
Although the quantity of communication is the same for the sensor and control group once we control for differences
in connectivity, we find a difference in the quality of these messages net of the difference in activity levels. Since
hashtags are used to denote topics, we can study the extent to which users participate in many different topics or just
a few.
Analyzing the number of different hashtags used per tweet and the number of unique hashtag uses, we find a
different trend between the control and sensor samples (see Figure 4b in the main text). Sensors use each different
23
hashtag 2.53 times on average (95 percent confidence interval: 2.23 2.83), slightly more than control users who use
each hashtag on average 2.15 times (95 percent confidence interval: 2.03 2.28). Nevertheless, as we have shown,
sensors tweet significantly more than controls and when controling for the frequency of hashtag usage (hashtags per
tweet), we find that users in the sensor group tend to use a significantly wider variety of hashtags than control users
(i.e. they get involved in a larger number of topics), 96.85 different hashtags per tweet (95 percent CI: 93.51 to
100.20) compared to 38.66 different hashtags per tweet for the controls (95 percent CI: 37.47 to 39.85).
This fact could be of special importance when using the sensor mechanism to anticipate hashtag epidemics as
sensors act not only as social hubs (by having more connections) but also as faster responders (by tweeting more)
and as information hubs (by being involved in more topics).
24
Figures
Figure S1. Larger samples of friends (as a percentage of the total number of users in he network) show a
smaller difference in degree distribution from the overall network both for a) groups of friends with
duplicates (e.g. a friend of two users is counted twice) and b) groups of friends without duplicates (a friend
of several users is counted only once)
25
Figure S2. Popularity distribution of all hashtags appearing between June 2009 and
January 2010 measured as the number of users of each hashtag. This distribution
approximately follows a power law. The bottom plots show the total number of tweets and
hashtag uses per day.
26
Figure S3. Appearance time and number of users of all hashtags appearing for the first
time after June 25th. The diameter is proportional to the number of times the hashtag has
been used. In blue are all hashtags used more than 20,000 times.
27
Figure S4. Number of nodes in each hashtag network (composed of all users of a
particular hashtag and their follow relations to others using the hashtag) and relative size
of its greatest component for all hashtags used more than 20,000 times (those in blue in
Figure S3). The size of the nodes is proportional to the number of components of the
network. Most networks show a large greatest component and many small isolated
components.
28
Figure S5. Sensor lead time (Δtα) distribution for hashtags used by more than 0.01% of
all users in various sample sizes.
29
Figure S6. Sensor lead time (Δtα) distribution for hashtags used by more than 0.04% of
users in various sample sizes.
30
Figure S7. Relationship of lead time in the sensor group compared to the control group
(Δtα) in different sample sizes for hashtags related to important events in 2009.
31
Figure S8. Evolution of Δtα with different control samples for #mobsterworld, an
endogenous viral hashtag; #ff, which despite its non virality shows a Δtα<0 similar to
that of the simulated infection model on the synthetic network; #health, a nonviral
hashtag and #indonesiaunite and #beatcancer, two hashtags for which the sensor
mechanism respectively works and does not work.
32
Figure S9. Relationship of lead time in the sensor group compared to the control group
(Δtα) in different sample sizes for viral hashtags: #musicmonday, #openwebawards,
#fun140, #twitdraw and #forasarney.
33
Figure S10. Relationship of lead time in the sensor group compared to the control group
(Δtα) in for nonviral hashtags: #shazam, #livestrong, #iwillneverforget, #wheniwaslittle
and #politics.
34
Figure S11. Networks and cumulative distributions for the hashtags showing the biggest lead times in
Figure 4 of the main text. #lightupnigeria is a small network showing the biggest difference between the
cumulative distributions of the control and sensor groups. #fun140 shows the third biggest lead time of
the hashtags analyzed and its network displays an unusually large hub at its center.
35
Figure S12. Two additional examples showing a considerable lead time for the sensor
group.
36
Figure S13. Two additional examples showing a considerable lead time for the sensor
group.
37
Figure S14. Although these two hashtag networks have large giant components, they
show signs of very rapid increase in usage, suggesting the sensor mechanism may not
give much advance warning in these cases. Their lead times overlap with a those
based on randomly shuffling the data as shown in Figure 4 in the main text.
38
Figure S15. Sensor lead time (Δtα) distribution and total number of users probability
distributions for hashtags having at least 10 users in 1 or more of 5 random samples of
50,000 users, 2 or more, 3 or more, 4 or more and in the 5 of them.
39
Figure S16. Mean degree and betweenness for 340 control groups and their
corresponding sensors of 34 different hashtags user networks (those of Figure S6). Each
point in the plot correspond to the mean value of 10 different samples of a single hashtag
network. Each hashtag network is drawn in a different color. Control and sensor samples
are 10% the size of the user network. The sensor mechanism shows to be a reliable
method for obtaining not only a sample with higher mean degree but also with higher
40
References
[1] Kwak, H., Lee, C., Park, H., & Moon, S. (2010). What is Twitter, a social network or a news media.
Proceedings of the 19th international conference on World wide web, 591–600.
41
|
1507.04215 | 2 | 1507 | 2015-07-21T08:11:49 | Relevance of Negative Links in Graph Partitioning: A Case Study Using Votes From the European Parliament | [
"cs.SI",
"cs.RO",
"math.OC",
"physics.soc-ph"
] | In this paper, we want to study the informative value of negative links in signed complex networks. For this purpose, we extract and analyze a collection of signed networks representing voting sessions of the European Parliament (EP). We first process some data collected by the VoteWatch Europe Website for the whole 7 th term (2009-2014), by considering voting similarities between Members of the EP to define weighted signed links. We then apply a selection of community detection algorithms, designed to process only positive links, to these data. We also apply Parallel Iterative Local Search (Parallel ILS), an algorithm recently proposed to identify balanced partitions in signed networks. Our results show that, contrary to the conclusions of a previous study focusing on other data, the partitions detected by ignoring or considering the negative links are indeed remarkably different for these networks. The relevance of negative links for graph partitioning therefore is an open question which should be further explored. | cs.SI | cs | Relevance of Negative Links in Graph Partitioning:
A Case Study Using Votes From the European
Parliament
Israel Mendonc¸a, Rosa Figueiredo, Vincent Labatut, Philippe Michelon
Emails:{mendonci, rosa.figueiredo, vincent.labatut, philippe.michelon}@univ-avignon.fr
Universit´e d’Avignon, LIA EA 4128, France
5
1
0
2
l
u
J
1
2
]
I
S
.
s
c
[
2
v
5
1
2
4
0
.
7
0
5
1
:
v
i
X
r
a
Abstract—In this paper, we want to study the informative value
of negative links in signed complex networks. For this purpose, we
extract and analyze a collection of signed networks representing
voting sessions of the European Parliament (EP). We first process
some data collected by the VoteWatch Europe Website for the
whole 7th term (2009-2014), by considering voting similarities
between Members of the EP to define weighted signed links.
We then apply a selection of community detection algorithms,
designed to process only positive links, to these data. We also
apply Parallel Iterative Local Search (Parallel ILS), an algorithm
recently proposed to identify balanced partitions in signed
networks. Our results show that, contrary to the conclusions of a
previous study focusing on other data, the partitions detected by
ignoring or considering the negative links are indeed remarkably
different for these networks. The relevance of negative links for
graph partitioning therefore is an open question which should
be further explored.
Index Terms—signed graphs, structural balance, graph parti-
tion, European Parliament.
I. INTRODUCTION
In signed graphs, each link is labeled with a sign + or −,
which indicates the nature of the relationship between the
considered adjacent nodes. This type of graphs was primarily
introduced in Psychology, with the objective of describing
the relationship between people belonging to distinct social
groups [1]. More generally, a signed graph can be used
to model any system containing two types of antithetical
relationships, such as like/dislike, for/against, etc. This work
and its extensions by Cartwright and Harary in the 1950’s [2],
[3], [4] are the basis for the concept of Structural balance.
A signed graph is considered structurally balanced if it can
be partitioned into two [2] or more [5] mutually hostile
subgroups each having internal solidarity. Here, the words
hostile and solidary mean: connected by negative and positive
links, respectively.
However, it is very rare for a real-world network to have a
perfectly balanced structure: the question is then to quantify
how balanced it is. For this purpose, one must first define a
measure of balance, and then apply a method to evaluate the
network balance according to this measure. For instance, one
could consider counting the numbers of positive links located
inside the groups, and of negative links located between them.
Such a measure is expressed relatively to a graph partition,
so processing the graph balance amounts to identifying the
partition corresponding to the highest balance measure. In
other words, calculating the graph balance can be formulated
as an optimization problem.
By using different variants of the balance measure and/or
by introducing some additional constraints, one can express
various versions of the notion of balance. Each one poten-
tially leads to a different optimization problem to be solved.
However, besides the very classic measures such as the one
mentioned previously, only a few recent works explored this
aspects from an Operations Research perspective [6], [7], [8],
[9], [10]. A deep investigation of efficient approaches and
mathematical formulations to problems related with signed
graph balance is therefore still missing.
Independently from the Operations Research domain, the
study and partition of signed graph has also recently been the
object of several works in the domain of Complex Network
Analysis, and more particularly community detection. The
community detection problem originally concerns unsigned
graphs. It consists in partitioning such a graph, in a way
such that most links are located inside the groups (aka. com-
munities) and only few remain between them. By definition,
an unsigned graph focuses on a single type of relationships,
say the positive ones. A signed graph representing the same
system can therefore be considered as more informative, since
it additionally contains the links of the other type (in our
example, the negative ones). For this reason, a few authors
tried to adapt existing community detection methods, in order
to take advantage of this additional information [11], [12],
[13], [6].
Other authors tried to study how informative these ad-
ditional
links really are [14]. Indeed, retrieving a signed
network is a task potentially more costly than for an unsigned
network, be it in terms of time, money, or methodological
complications. For example, in the context of a ground survey,
it is much easier to get people to name their friends than their
foes. So, the question to know whether this extra cost is worth
it is extremely relevant. In their work, Esmailian et al. [14]
suggested that
if one detects the communities based only
on positive links (by ignoring negative ones), most negative
links are already placed between the communities, and that
the few ones located inside do not significantly affect the
communities. The latter point is tested by checking that no
additional division of the community allows increasing the
overall balance. Consequently, using algorithms that do not
take negative links into consideration, such as InfoMap [15],
it is possible to obtain a reasonably well partitioned network.
However, we see two limitations to this work. First, in order
to assess the significance of the negative links located inside
the communities, Esmailian et al. considered each community
separately, instead of the graph as a whole. Second, these ob-
servations were made only for two datasets, both representing
Social Networking Services (Slashdot and Epinions), so they
do not necessarily apply to all networks, or event to all types
of networks.
In this paper, we want to explore further the informative
value of negative links in the context of graph partitioning. To
this purpose, we present a method to extract signed networks
from voting data describing the activity of the Members of
the European Parliament (MEPs). Based on this new data,
we apply state-of-the-art tools in order to partition the graph,
on the one hand in terms of community structure, and on the
other hand according to the notion of structural balance. We
then compare the obtained partitions and show the presence
of significant differences between them.
The contributions of this paper are essentially two-fold.
First, we constitute a new dataset of signed networks and make
it publicly available to the community, with the scripts used to
obtain it. We treat the voting patterns using several parameters,
leading to a collection of signed networks describing the
behavior of MEPs according to various modes (time, topic...).
Second, based on these data, we experimentally show that
negative links can be essential when partitioning networks.
We see our work as complementary to that of Esmailian et
al., first because the use of a method taking negative links
into account as a reference allows us to avoid the issue
regarding the assessment of intra-community negative links;
and second because we treat a different type of signed real-
world networks, in which the links represent vote similarity
instead of self-declared social relationships.
The rest of this paper is organized as follows. Section II
presents a review of the literature regarding the graph partition
task. Section III describes the method we used to extract
signed networks from the raw data constituted of the sequences
of MEPs votes. Section IV summarizes the algorithms we
selected to partition our signed networks. In Section V, we
present and discuss our experimental results regarding network
extraction and network partition. Finally, we conclude by
highlighting the main points of the article, and identifying
some possible perspectives.
II. RELATED WORKS
As mentioned before, the concepts of signed graph and
structural balance were introduced by Heider [1]. Later,
Cartwright et al. [2] formalized Heiders theory, stating that a
balanced social group could be partitioned into two mutually
hostile subgroups, each having internal solidarity. Observing
that a social group may contain more than two hostile sub-
groups, Davis [5] proposed the notion of clusterable signed
graph.
The clustering problem consists in finding the most balanced
partition of a signed graph. Evaluating this balance according
to the structural balance (SB) measure amounts to solving an
optimization problem called Correlation Clustering (CC) [16].
This problem was addressed first by Doreian & Mrvar [17],
who proposed an approximate solution and used it to analyze
the structural balance of real-world social networks. In [11],
Yang et al. called the CC problem Community Mining, and
proposed an agent-based heuristic called FEC to find an ap-
proximate solution. Elsner & Schudy performed a comparison
of several strategies for solving the CC problem in [18], and
applied them to document clustering and natural language
processing issues. In this context, these authors identified the
best strategy as a greedy algorithm able to quickly achieve
good objective values with tight bounds. The solution of
the CC problem and of some of its variants has already
been used as a criterion to measure the balance of signed
social networks [19], [17], [20], [8], [6], and as a tool to
identify relations contributing to their imbalance [21]. In [6],
the authors provide an efficient solution of the CC problem,
by the use of a ILS metaheuristic. The proposed algorithm
outperforms other methods from the literature on 3 huge
signed social networks. In this work, we will use this tool
to evaluate the imbalance of the MEPs networks.
In the complex networks field, works dedicated to signed
networks focus only on the clustering problem, as defined by
Davis [5]. Various methods were proposed for this purpose:
evolutionary approaches [22], [23], [24], [25], agent-based
systems [11], matrix transformation [26], extensions of the
Modularity measure [27], [9], [28], [29], [30], simulated
annealing [31], spectral approaches [32], [33], [34], particle
swarm optimization [35], [36], and others. Some authors
performed the same task on bipartite networks [37], while
others relaxed the clustering problem in order to identify
overlapping communities [38]. Although the methods listed
here were applied to networks representing very different
systems, authors did not investigate the possibility that some
alternative versions of the clustering problems were more
appropriate to certain data.
Few works tried to compare the CC and community detec-
tion approaches. As mentioned in the introduction, Esmailian
et al showed that, in certain cases, partitions estimated in
signed networks by community detection methods, i.e. based
only on the positive links, can be highly balanced [14].
However, this work was conducted only on two networks
of self-declared social
interaction networks (Epinions and
Slashdot), and using a single community detection method
(InfoMap [15]). Moreover, they did not compare their results
to partitions detected by algorithms designed to solve the CC
problem. We investigate if this statement also holds for other
real-world networks and community detection methods, and
how these compare to results obtained with CC methods.
III. NETWORK EXTRACTION
In this section, we describe the source we used to retrieve
our raw data, and the process we applied to extract signed
networks from these data.
A. European Parliament Votes
In order to be able to conduct our experiments, we were
looking for data allowing to extract some form of signed
network of interactions. Moreover, in future works, we want to
study how the network and the structural balance evolve, so the
data had to be longitudinal, with stable nodes (nodes should
not change too much through time). The best data we could
find relatively to these criteria are those describing the activity
of the European Parliament1. More precisely, we focused on
the votes of the Members of the European Parliament (MEPs).
The Website VoteWatch Europe2 is a non-partisan interna-
tional non-governmental organization, completely independent
from national and local governments, from the European
Union, as well as from political parties, institutions, agencies,
businesses and all other bodies. Their goal
is to provide
easy access to the votes and other activities of the European
parliament (among other European institutions). Votewatch
compiles data provided by the EP to give a full overview of
the MEPs activity. In particular, they describe the vote cast
by each MEP for each document considered at the EP. Each
MEP is also described through his name, country and political
group. Other fields are available too, which we have not used
yet, such as how loyal the MEP is to his political group. To
summarize, the behavior of a MEP is represented by the series
of votes he cast over a certain time period (e.g. a year, a term).
For a given document, a MEP can express his vote in one of
the three following ways: FOR (the MEP wants the document
to be accepted), AGAINST (he wants the document to be
rejected) and ABSTAIN (he wants to express his neutrality).
Besides these expressed votes,
is also possible for the
MEP not to vote at all, leading to the following possibilities:
ABSENT (the MEP was not present during the vote), DID
NOT VOTE (he was there, but did not cast his vote), and
DOCUMENTED ABSENCE (he was not there but justified his
absence).
it
For each document, we also have access to the category it
belongs to, called Policy. It corresponds roughly to the main
theme treated in the considered document. All the policies
treated during the 7th term of the EP are listed in Table I,
with the numbers of documents they concern.
VoteWatch gives us access to raw data, which could be
described as individual data, in the sense they describe the state
and behavior of the MEPs when considered independently
from each others. However, a network is by nature relational,
i.e. it represents the relationships between some objects of
interest. Thus, we need to process the VoteWatch data in order
to retrieve the networks we want.
B. Extraction Process
Our extraction process is two-stepped. As mentioned before,
in the data received from VoteWatch, the behavior of each
MEP is represented by a series of votes, corresponding to
1http://www.europarl.europa.eu/
2http://www.votewatch.eu/
TABLE I
LIST OF ALL POLICIES RELATIVE TO THE DOCUMENTS VOTED AT THE
EUROPEAN PARLIAMENT, WITH THE CORRESPONDING NUMBERS OF
DOCUMENTS, FOR THE 7TH TERM
Policy
Agriculture
Budget
Budgetary control
Civil liberties, justice & home affairs
Constitutional and inter-institutional affairs
Culture & education
Development
Economic & monetary affairs
Employment & social affairs
Environment & public health
Fisheries
Foreign & security policy
Gender equality
Industry, research & energy
Internal market & consumer protection
Internal regulations of the EP
International trade
Legal affairs
Petitions
Regional development
Transport & tourism
Number of documents
53
179
113
99
40
19
29
128
44
100
53
191
28
51
39
7
106
67
5
35
40
all the documents reviewed by the EP during one term. In
this article, we focused on the 7th term (from june 2009 to
june 2014). We first filter these data depending on temporal
and topical criteria. In other terms, if required, it is possible
to focus only on the documents related to a specific policy
and/or a specific period of the term, for instance a given year.
The second step consists in comparing individually all MEPs
in terms of similarity of their voting behaviors. The result
of this process is what we call the agreement matrix M.
Each numerical value muv contained in the matrix represents
the average agreement between two MEPs u and v, i.e. how
similarly they vote over all considered documents.
The filtering step is straightforward, however the agreement
processing constitutes a major methodological point: depend-
ing on how it is conducted, it can strongly affect the resulting
network. For a pair of MEPs u and v and a given document
di, we define the document-wise agreement score muv(di) by
comparing the votes of both considered MEPs. It ranges from
−1 if the MEPs fully disagree, i.e. one voted FOR and the
other AGAINST, to +1 if they fully agree, i.e. they both voted
FOR or AGAINST.
However, as we mentioned previously, a vote can take other
values than just FOR and AGAINST, and those must also be
treated. Let us consider first the non-expressed votes: ABSENT,
DID NOT VOTE and DOCUMENTED ABSENCE. The EU distin-
guishes these different forms of absence not for political, but
rather for administrative reasons, so we decided to consider
them all simply as absences. The common approach when
treating this type of vote data [39], [40] is to ignore all docu-
ments di for which at least one of the considered MEPs was
absent. However, certain MEPs are absent very often, which
mean they would share a very small number of documents
with others. This approach could therefore artificially produce
extremely strong agreement or disagreement scores. To avoid
this, we assign a neutral score of 0 when at least one person
is absent for a given document.
Handling the abstentions is a bit trickier, because such a
behavior can mean different things. A MEP can choose not to
vote because he is personally FOR or AGAINST, but undergoes
some pressure (from his political group, his constituents, etc.)
to vote the other way: in this case, voting ABSTAIN is a
way of expressing this conflicting situation. But abstaining
could also simply represent neutrality, meaning the MEP is
neither FOR nor AGAINST the considered document. There is
no consensus in the literature, and different approaches were
proposed to account for ABSTAIN-FOR, ABSTAIN-AGAINST
and ABSTAIN-ABSTAIN situations [29], [39], [40]. Here, we
present two variants corresponding to different interpretations.
In the first, described in Table II, an abstention is considered
as half an agreement with FOR or AGAINST, leading to a score
of +0.5. In the second, described in Table III, two abstaining
MEPs are considered to fully agree (+1). But, when only one
of them abstains, we consider there is not enough information
to determine whether they agree or disagree, and we therefore
use a 0 score. Note absences were left out of the tables for
clarity.
VOTE WEIGHTS REPRESENTING ABSTENTION AS HALF AN AGREEMENT
TABLE II
FOR
FOR
+1
ABSTAIN +0.5
−1
AGAINST
ABSTAIN
+0.5
+0.5
+0.5
AGAINST
−1
+0.5
+1
VOTE WEIGHTS REPRESENTING ABSTENTION AS AN ABSENCE OF OPINION
TABLE III
FOR
ABSTAIN
AGAINST
FOR
+1
0
−1
ABSTAIN
0
+1
0
AGAINST
−1
0
+1
The document-wise agreement score is completely defined
by selecting one of the proposed tables. The average agreement
is then obtained by averaging this score over all considered
documents. More formally, let us consider two users u and v
and note d1, ..., d(cid:96) the documents remaining after the filtering
step, and for which u and v both cast their votes. The average
agreement muv between these two MEPs is:
(cid:96)(cid:88)
i=1
muv =
1
(cid:96)
muv(di)
(1)
IV. PARTITION METHODS
In this section, we present the methods used to partition the
signed network extracted from the VoteWatch data. We first
introduce the community detection approaches we selected
for our experiment. Then we formally define the Correlation
Clustering problem and describe the algorithm we used in this
article to estimate its solutions.
A. Community Detection
In the literature, the problem of community detection is
usually defined in an informal way. It consists in finding a
partition of the node set of a graph, such that many links lie
inside the parts (communities) and few lie in-between them.
An other way of putting it is that we are looking for groups
of densely interconnected nodes, relatively to the rest of the
network [41]. It is difficult to find a formal definition of this
problem, or rather, to find a unique formal definition: many
authors present and solve their own variant. Because of this,
the algorithms presented in the literature do not necessarily
solve the exact same problem, although it
is still named
community detection. To account for this variance, we selected
several methods for our experiments, which we briefly present
here. All of them are able to process weighted networks.
InfoMap [15]. The community structure is represented
through a two-level nomenclature based on Huffman coding:
one level to distinguish communities in the network and the
other to distinguish nodes in a community. The problem of
finding the best community structure is expressed as mini-
mizing the quantity of information needed to represent some
random walk in the network using this nomenclature. With a
partition containing few intercommunity links, the walker will
probably stay longer inside communities; therefore only the
second level will be needed to describe its path, leading to
a compact representation. The authors optimize their criterion
using simulated annealing.
EdgeBetweenness [42]. This divisive hierarchical algorithm
adopts a top-down approach to recursively split communities
into smaller and smaller node groups. The split is performed
by iteratively removing the most central link of the network.
This centrality is expressed in terms of edge-betweenness, i.e.
number of shortest paths running through the considered link.
The idea behind this method is that links connecting different
communities tend to be present in the many shortest paths
connecting one community to the other. Once the network has
been split in two separate components, each one is split again
applying the same process, and so on. The resulting compo-
nents correspond to communities in the original network.
WalkTrap [43]. To the contrary of EdgeBetweenness, this
is an agglomerative hierarchical algorithm, which means it
uses a bottom-up approach to merge communities into larger
and larger groups, starting from singletons. To select
the
communities to merge, WalkTrap uses a random walk-based
distance. Indeed, random walkers tend to get trapped into
communities, because most
locally available links lead to
nodes from the same communities, while only a few links all
to escape this community (by definition). If two nodes u and
v are in the same community, the probability to reach, through
a random walk, a third node located in the same community
should not be very different for u and v. The distance is
constructed by summing these differences over all nodes, with
a correction for degree.
FastGreedy [44]. Like WalkTrap, this algorithm adopts
an agglomerative hierarchical approach. But this time, the
merges are not decided using a distance measure, but rather
by locally optimizing the well-known objective function called
Modularity [45]. Briefly, this measure compares the proportion
of intra-community links present in the network of interest, to
the expectation of the same quantity for a randomly generated
network of similar size and degree distribution. The process
stops when it
is not possible to improve the modularity
anymore, or when there is no more communities to merge.
B. Correlation Clustering
Before formally describing the CC problem, we need to
introduce some notations and definitions first. Let G =
(V, E, s, w) be a weighted undirected signed graph. The sets V
and E correspond to the nodes and links constituting the graph.
The functions s : E → {+,−} and w : E → [0; +1] assign a
sign and a positive weight to each link in E, respectively.
A link e ∈ E is called negative if s(e) = − and positive
if s(e) = +. Let E− ⊂ E and E+ ⊂ E denote the sets
of negative and positive links in G, respectively. Notice that,
according to the above definitions, E = E− ∪ E+. We define
the negative and positive subgraphs of G as G− = (V, E−)
and G+ = (V, E+), respectively. The complementary negative
graph is G− = (V, E−), where E− = P2(V ) \ E−, P2(V )
being the set of all unordered pairs from V .
Let us consider a partition P of V such that P =
{V1, ..., Vk}. A link is said to be cut if it connects nodes
from two different parts. We note E[Vi : Vj] ⊂ E the set
of links connecting two nodes from Vi and Vj (cut links), and
E[Vi] ⊂ E the set of links connecting two nodes from Vi (so,
E[Vi] = E[Vi : Vi]) (uncut links).
As mentioned before, negative links located inside parts
(uncut negative links) and positive links located between parts
(cut positive links) are considered to lower the graph balance.
For Vi, the total weight of uncut negative links is:
Ω−(Vi) =
we
(2)
e∈E−∩E[Vi]
And for two parts Vi and Vj, the total weight of cut positive
links Ω+ is:
(cid:88)
(cid:88)
Ω+(Vi, Vj) =
we
(3)
e∈E+∩E[Vi:Vj ]
The Imbalance I(P ) of a partition P can be defined as the
sum of uncut negative and cut positive links over the whole
graph:
I(P ) =
Ω−(Vi) +
Ω+(Vi, Vj)
(4)
(cid:88)
1≤i≤k
(cid:88)
1≤i<j≤k
Finally, the Correlation Clustering problem is the problem
of finding a partition P of V such that the imbalance I(P ) is
minimized.
In this work we will solve the CC problem using the
Parallel ILS algorithm presented in [6], which was designed
to solve the CC problem in large real-world networks. ILS
is itself a metaheuristic approach allowing to obtain good
quality solutions by applying iteratively greedy search methods
[46]. Starting from an initial solution estimated through a
greedy method, the general principle is two-stepped: first,
some perturbations are introduced to modify the current best
solution; second, some local searches are performed to find
better solutions within the neighborhood. This iterative process
is stopped when some condition is met (minimal quality, time
limit, etc.). This specific implementation is parallelized, in
order to improve speed.
Considering that the networks extracted from the VoteWatch
data are very dense, we had to perform some minor modi-
fications on the original Parallel ILS algorithm, so that the
processing time was acceptable. First, the search space used
in the local search was reduced by adding a probably (0.7)
of visiting a neighbor solution. In other terms, in average we
limit the search to only a part of the neighborhood. Second,
the perturbation level had to be reduced to 15, half of the
maximum run number in the original work.
V. RESULTS AND DISCUSSION
In this section, we first describe the networks extracted from
the VoteWatch data, and how they are affected by the param-
eters controlling this extraction process. Then, we discuss the
results obtained with the partition methods presented in section
IV.
In order to process the VoteWatch data, we developed a
tool called NetVotes, which takes the form of a collection of
R scripts. It implements the method described in section III-B,
and additionally calculates some metrics describing the studied
networks and their partitions. It is generic enough to treat any
type of data of the same form. To perform the community
detection, we used the igraph R package, which contains all
the algorithms we selected. For the CC problem, we used
the author’s version of Parallel ILS, which we modified as
explained in section IV-B. All our source code, as well as
the data it outputs, are publicly available on GitHub3 and
FigShare4, respectively.
A. Networks Extraction
As described in section III-B, our extraction method takes
three parameters: the table used to process the agreement
scores, the policy and the time period. We proposed 2 different
tables, there are 21 policies and we also considered all doc-
uments independently from their policies, and we considered
each year separately as well as the whole 5-year long 7th
term (2009-2014). This amounts to a total of 264 different
modalities. However, in certain cases, the filtering step led to
less than 2 documents, so we were not able to extract networks
for all combinations of policies and time periods.
We first study how the choice of the table used to process
the agreement scores affects the extracted network. Figure 1
shows the average agreement distribution for Table II (top
plot) and Table III (bottom), using all documents for the
whole term (i.e., not applying any filter). Both distributions
are very similar, with a clear separation between the negative
3https://github.com/CompNet/NetVotes/
4http://figshare.com/articles/NetVotes Data/1456268
and positive values. The agreement side is bimodal, with
larger frequencies around 0 and 0.6–0.7. The right peak can
be explained by the fact the majority of MEPs tend to vote
similarly most of the time. The other peak, located at zero,
is due to the frequent absence of a certain number of MEPs.
When a MEP is absent for a given document, his agreement
score with all other MEPs is zero. It is not as contrasted on the
disagreement side, with a much flatter distribution. Moreover,
there is no strong disagreement since the smaller values are
around −0.5 (by comparison, the agreement values can get
close to 0.9). This means only a small proportion of MEPs
systematically disagree with the rest of the EP.
The same observations can be made when considering the
different policies independently, as well as when considering
each year separately. There are some variations in terms of
position and amplitude of the right peak, but this is mainly
due to large differences in the number of documents discussed
for each policy. The nature of the table used to process the
agreement scores does not seem to have any clear effect on
the average agreement distribution. We additionally tried to
use a variant of Table II, replacing the +0.5 (half-agreement)
by −0.5 (half-disagreement) for the situations involving AB-
STAIN vs. FOR or AGAINST. The results where extremely
similar, confirming our observation. Consequently, in the rest
of the article, we present only the results obtained with Table
III.
B. Partition Comparison
We now want to study how the selected community de-
tection methods behave on the CC problem, when compared
to Parallel ILS, an algorithm specifically designed to treat
this problem. However, as mentioned in Section IV-A, these
methods can only take positive links into account, so they
cannot be applied directly to our signed networks, unlike
Parallel ILS. To solve this issue, we proposed to consider
two subgraphs of the original signed networks: the signed
graph and the complementary negative graph, noted G+ and
G− in Section IV-B, respectively. The former is a version of
the original graph retaining only its positive links. The latter
contains all possible links but the ones labeled negative in
the original graph. In both cases, the result is a graph with
only one type of unlabeled links, representing a part of the
information originally conveyed by the original graph. This is
very consistent with our objective, since we want to study if
the information loss translates in terms of detected partitions.
We applied all the selected community detection algorithms
to both types of graphs, for all the modalities described in the
previous subsection. For space matters, it is not possible to
display and comment all of them, so we decided to focus on
two policies of interest, over all years and over the whole term.
We picked Foreign & Security Affairs because it is the most
frequent, with 191 documents, and Agriculture because it is
also well represented (51 document) and topically very distant
from the former.
The obtained results are shown in Figure 2. The top plot
is dedicated Agriculture and the bottom one to Foreign &
Fig. 1. Agreement distribution for the whole term and all policies when using
Table II (top) and Table III (bottom)
Security Affairs. Each group of bars represents the results
obtained by one algorithm for each year taken independently,
and for the whole term (see the legend). The bar heights are
proportional to the imbalance of the estimated partitions, as
described in equation (4), only they are expressed in terms
of percents relatively to E. The numbers on top of the
bars indicate how many parts (communities) the corresponding
partitions contain. Note the displayed results are representative
of the other policies.
Let us compare the algorithms performances. EdgeBetween-
ness, FastGreedy and WalkTrap are far from finding optimal
results when processing the positive subgraphs: they obtain
scores ranging from 20% to more than 60% imbalance, and
Second Agreement Score TableAgreementFrequency−1.0−0.50.00.51.0050001000015000First Agreement Score TableFrequency−1.0−0.50.00.51.0050001000015000or fourth groups. It is worth noticing that the imbalance is
more marked for both algorithms for the year 2013, for both
considered policy. This might be due to this year being the last
in the 7th term, and therefore coinciding with the negotiation
of the 8th term budgets and changes in the policies orientation.
For instance, the CAP (Common Agricultural Policy) was
made greener5. Such changes lead to stronger discussions in
the EP, and may challenge the balance of certain political
groups.
In average, InfoMap identifies partitions 3 times more im-
balanced than Parallel ILS and also tends to partition the graph
in more clusters. Table IV compares the InfoMap and Parallel
ILS partitions in terms of Normalized Mutual Information,
which is the standard measure to compare partitions in the do-
main of unsupervised classification [47]. This measure ranges
from −1 (completely different) to +1 (completely identical),
whereas 0 represents statistical
independence. The values
obtained for both considered policies, and for all the time
periods, are extremely close to zero. This means the partitions
detected by the two algorithms have little in common, even
though their number of clusters and/or imbalance level are
sometimes similar.
COMPARISON OF THE INFOMAP AND PARALLEL ILS PARTITIONS IN
TABLE IV
TERMS OF NMI
Policy
Agriculture
Foreign Affairs
2009
0.01
0.01
2010
0.04
0.01
2011
0.01
0.01
2012
0.02
0.01
2013
0.01
0.03
Term
0.02
0.02
We can conclude by stating that, on these data, our results
do not confirm the findings of Esmailian et al. [14] regarding
the low informative value of negative links. Taking negative
links into account leads to a lower imbalance and a different
partition, containing larger clusters. Moreover, among our
selection of community detection algorithms, InfoMap is the
only one to exhibit a behavior comparable to that of Parallel
ILS. This means the notion of community implemented in this
algorithm, which relies on an information compression-based
approach, can be considered as compatible enough with the
concept of structural balance. However, this is not the case for
the other considered methods, based on link centrality, node
distance and modularity. Discussing collectively the different
methods proposed to solve the community detection problem
might not be relevant, since the notions of community they
rely upon are different (despite a common name).
VI. CONCLUSION
In this article, we have investigated some of the aspects
inherent to the partition of signed networks, using data from
the European Parliament (EP). We first extracted a collection
of networks using the voting patterns of the Members of the
EP. Then, we applied a selection of community detection meth-
ods to these networks, as well as Parallel ILS, an algorithm
5http://www.europarl.europa.eu/pdfs/news/expert/infopress/
20131118IPR25538/20131118IPR25538 en.pdf
Fig. 2.
Imbalance of the partitions (bars) and numbers of detected clusters
(blue values), obtained through Parallel ILS (left bar group) and community
detection methods (other bar groups), for each year and the whole term (see
legend), processed for the Agriculture (top plot) and Foreign & Security
(bottom plot) policies
generally find a high number of clusters. The multitude of
clusters is certainly the cause for these large imbalances.
Note this observation is not inconsistent with being efficient
at detecting communities, since this task implies taking link
density into account. The behavior of the same algorithms is
very different when applied to the complementary negative
subgraph. The number of detected clusters is much smaller
(generally around 2–5), and the imbalance is smaller, but still
around 20%. The reason for that is certainly that the graphs
being much denser, it becomes harder to distinguish dense
subroups, i.e. communities.
The InfoMap algorithm is much more successful at detect-
ing balanced partitions, and reaches much smaller imbalance
than the other community detection algorithms (always less
than 20%, often less than 5%). However, on the negative
complementary graphs, InfoMap simply puts all the nodes
in the same cluster, so these results cannot be considered
as relevant. On the positive graphs, the imbalance is very
low (with the exception of the year 2013), close to 1%, and
the algorithm finds 4–14 clusters. The results obtained with
Parallel ILS are even better, in terms of imbalance, since they
consistently get close to 0%. Moreover, the number of clusters
is relatively low (2–3), which corresponds to what we were
expecting a priori. Indeed, the EP is known to be split in
two major political sides (EPP and S&P), with some punctual
alliances of smaller parties, leading to the formation of third
020406080Foreign & Security Policy20092010201120122013Term33233312574961111111458410722222213474105222222141525391148565339Parallel ILSPositiveInfomapComp. Neg.InfomapPositiveEdgeBetw.Comp. Neg.EdgeBetw.PositiveFastGreedyComp. Neg.FastGreedyPositiveWalkTrapComp. Neg.WalkTrapParallel ILSPositiveInfomapComp. Neg.InfomapPositiveEdgeBetw.Comp. Neg.EdgeBetw.PositiveFastGreedyComp. Neg.FastGreedyPositiveWalkTrapComp. Neg.WalkTrap020406080Agriculture Policy20092010201120122013Term333233745814911111185810161022232385681582222222054165154443411411specifically designed to treat signed graphs. Among the former,
the best results in terms of structural balance are obtained, by
far, by InfoMap. However, in average, Parallel ILS detected
partitions three times more balanced. This seems to be due to
the fact community detection methods ignore negative links
and focus instead on link density. Independently from the
balance aspect, the number of clusters detected by ILS is
lower, which is more consistent with the studied system.
These results are in opposition with the finding of Esmailian
et al. [14], however they do not invalidate them. Indeed, in
both cases, the experiments were performed on a very limited
number of networks. The process should be conducted on
a large number of different datasets in order to draw more
reliable conclusions. In our future work, we plan to constitute
a collection of real-world signed networks in order to perform
this task. We also want to continue studying the MEPs voting
data in further details, focusing on the interpretation of the
identified balanced clusters.
REFERENCES
[1] F. Heider. Attitudes and cognitive organization. Journal of Psychology,
21:107–112, 1946.
[2] D. Cartwright and F. Harary. Structure balance: A generalization of
heider’s theory. Psychological Review, 63(5):277–293, 1956.
[3] J. A. Davis. Structural balance, mechanical solidarity, and interpersonal
relations. American Journal of Sociology, 68:444–462, 1963.
[4] F. Harary. On the notion of balance of a signed graph. Michigan Math.
[5] J. A. Davis. Clustering and structural balance in graphs. Human
Journal, 2(2):143–146, 1953.
Relations, 20:181–187, 1967.
[6] M. Levorato, L. Drummond, Y. Frota, and R. Figueiredo. An ils
algorithm to evaluate structural balance in signed social networks. In
Symposium on Applied Computing, pages 1117–1122, 2015.
[7] R. Figueiredo and Y. Frot. The maximum balanced subgraph of a
signed graph: Applications and solution approaches. European Journal
of Operational Research, 236:473–487, 2014.
[8] R. Figueiredo and G. Moura. Mixed integer programming formulations
for clustering problems related to structural balance. Social Networks,
35:639–651, 2013.
[9] J. Bruggeman, V. A. Traag, and J. Uitermark. Detecting communities
through network data. American Sociology Review, 77(6):1050–1063,
2012.
[10] M. Brusco and D. Steinly. Integer programas for one- and two-model
blockmodeling based on prespecified image matrices for structural and
regular equivalence. Journal of Mathematical Psychology, 53:577–585,
2009.
[11] B. Yang, W. K. Cheung, and J. Liu. Community mining from signed so-
cial networks. IEEE Transactions on Knowledge and Data Engineering,
19(10):1333–1348, 2007.
[12] J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and
negative links in online social networks. Social Networks, 31:1–11,
2009.
[13] P. Doreian and A. Mrvar. Partitioning signed social networks. In ACM
International Conference on World Wide Web, pages 641–650, 2010.
[14] P. Esmailian, S. E. Abtahi, and M. Jalili. Mesoscopic analysis of online
social networks - the role of negative ties. Phys. Rev. E, 90:042817,
2014.
[15] M. Rowvall and C. T. Bergstrom. Maps of random walks on complex
networks reveal community structure. PNAS, 105(4):1118–1123, 2008.
In 43rd
[16] N. Bansal, A. Blum, and S. Chawla. Correlation clustering.
[17] P. Doreian and A. Mrvar. A partitioning approach to structural balance.
IEEE FOCS, pages 238–250, 2002.
Social Networks, 18:149–168, 1996.
[18] M. Elsner and W. Schudy. Bounding and comparing methods for
In Workshop on Integer Linear
correlation clustering beyond ilp.
Programming for Natural Language Processing, pages 19–27, 2009.
[19] P. Doreian. A multiple indicator approach to blockmodeling signed
networks. Social Networks, 30:247–258, 2008.
[20] P. Doreian and A. Mrvar. Partitioning signed social networks. Social
Networks, 31:1–11, 2009.
[21] P. Abell and M. Ludwig. Structural balance: a dynamic perspective.
Journal of Mathematical Sociology, 33:129–155, 2009.
[22] Y. Li, J. Liu, and C. Liu. A comparative analysis of evolutionary
and memetic algorithms for community detection from signed social
networks. Soft Computing, 18(2):329–348, 2014.
[23] C. Liu, J. Liu, and Z. Jiang. A multiobjective evolutionary algorithm
based on similarity for community detection from signed social net-
works. IEEE Transactions on Cybernetics, 42(12):2274–2287, 2014.
[24] B. Yang. Self-organizing network evolving model for mining network
community structure. Lecture Notes in Computer Science, 4093:404–
415, 2006.
[25] Y. Zeng and J. Liu. Community detection from signed social networks
using a multi-objective evolutionary algorithm. Proceedings in Adapta-
tion, Learning and Optimization, 1:259–270, 2015.
[26] B. Yang and D.-Y. Liu. A heuristic clustering algorithm for mining
Journal of Computer Science and
communities in signed networks.
Technology, 22(2):320–328, 2007.
[27] A. Amelio and C. Pizzuti. Community mining in signed networks: A
In IEEE-ACM International Conference on
multiobjective approach.
Advances in Social Networks Analysis and Mining, pages 95–99, 2013.
[28] S. Gomez, P. Jensen, and A. Arenas. Analysis of community structure
in networks of correlated data. Phys. Rev. E, 80:016114, 2009.
[29] K. T. Macon, P. J. Mucha, and M. A. Porter. Community structure in the
united nations general assembly. Physica A, 391(1-2):343–361, 2012.
[30] V. A. Traag and J. Bruggeman. Community detection in networks with
positive and negative links. Phys. Rev. E, 80:036115, 2008.
[31] P. Bogdanov, N. D. Larusso, and A. Singh.
Towards community
discovery in signed collaborative interaction networks. In IEEE ICDM
SIASP, pages 288–295, 2010.
[32] P. Anchuri and M. Magdon-Ismail. Communities and balance in signed
networks: A spectral approach. In International Conference on Advances
in Social Networks Analysis and Mining, pages 259–270, 2012.
[33] J. Kunegis, S. Schmidt, A. Lommatzsch, J. Lerner, E. W. de Luca, and
S. Albayrak. Spectral analysis of signed graphs for clustering, prediction
and visualization. In SDM, pages 559–570, 2010.
[34] L. Wu, X. Ying, X. Wu, A. Lu, and Z.-H. Zhou. Spectral analysis of k-
balanced signed graphs. In 15th Pacific-Asia Conference on Knowledge
Discovery and Data Mining, volume 6635, pages 11–12, 2011.
[35] Q. Cai, M. Gong, B. Shen, L. Ma, and L. Jiao. Discrete particle
swarm optimization for identifying community structures in signed
social networks. Neural Networks, 58:4–13, 2014.
[36] M. Gong, Q. Cai, X. Chen, and L. Ma. Complex network clustering by
multiobjective discrete particle swarm optimization based on decompo-
sition. IEEE Transactions on Evolutionary Computation, 18(1):82–97,
2013.
[37] A. Mrvar and P. Doreian. Partitioning signed two-mode networks.
Journal of Mathematical Sociology, 33(3):196–221, 2009.
[38] X. L. Chen, Y. Wang, B. Yuan, and B. Z. Tang. Overlapping community
Journal of
detection in networks with positive and negative links.
Statistical Mechanics, 03:P03021, 2014.
[39] M. A. Porter, P. J. Mucha, M. E. J. Newman, and C. M. Warmbrand.
A network analysis of committees in the u.s. house of representatives.
PNAS, 102(20):7057–7062, May 2005.
[40] C. dal Maso, G. Pompa, M. Puliga, G. Riotta, and A. Chessa. Voting
behavior, coalitions and government strength through a complex network
analysis. PLoS ONE, 9(12):e116046, 2014.
[41] S. Fortunato. Community detection in graphs. Physics Reports, 486(3-
5):75–174, February 2010.
[42] M. E. J. Newman and M. Girvan. Finding and evaluating community
structure in networks. Phys. Rev. E, 69:026113, 2003.
[43] P. Pons and M. Latapy. Computing communities in large networks using
random walks. Lecture Notes in Computer Science, 3733:284–293, 2005.
[44] A. Clauset, M. E. J. Newman, and C. Moore. Finding community
structure in very large networks. Phys. Rev. E, 70:066111, 2004.
[45] M. E. J. Newman. Modularity and community structure in networks.
PNAS, 103(23):8577–8582, 2006.
[46] H. R. Loureno, O. Martin, and T. Sttzle. Iterated local search: Framework
In Handbook of Metaheuristics, volume 146 of
and applications.
International Series in Operations Research & Management Science,
pages 363–397. Kluwer Academic Publishers, 2010.
[47] A. L. N. Fred and A. K. Jain. Robust data clustering.
In Computer
Vision and Pattern Recognition, volume 2, pages 128–133, 2003.
|
1607.04318 | 1 | 1607 | 2016-07-14T21:02:21 | Understanding Citizen Reactions and Ebola-Related Information Propagation on Social Media | [
"cs.SI",
"cs.CY"
] | In severe outbreaks such as Ebola, bird flu and SARS, people share news, and their thoughts and responses regarding the outbreaks on social media. Understanding how people perceive the severe outbreaks, what their responses are, and what factors affect these responses become important. In this paper, we conduct a comprehensive study of understanding and mining the spread of Ebola-related information on social media. In particular, we (i) conduct a large-scale data-driven analysis of geotagged social media messages to understand citizen reactions regarding Ebola; (ii) build information propagation models which measure locality of information; and (iii) analyze spatial, temporal and social properties of Ebola-related information. Our work provides new insights into Ebola outbreak by understanding citizen reactions and topic-based information propagation, as well as providing a foundation for analysis and response of future public health crises. | cs.SI | cs | 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Understanding Citizen Reactions and Ebola-Related
Information Propagation on Social Media
Thanh Tran
Department of Computer Science
Utah State University, Logan, UT 84322
Email: [email protected]
Kyumin Lee
Department of Computer Science
Utah State University, Logan, UT 84322
Email: [email protected]
6
1
0
2
l
u
J
4
1
]
I
S
.
s
c
[
1
v
8
1
3
4
0
.
7
0
6
1
:
v
i
X
r
a
Abstract -- In severe outbreaks such as Ebola, bird flu and
SARS, people share news, and their thoughts and responses
regarding the outbreaks on social media. Understanding how
people perceive the severe outbreaks, what their responses are,
and what factors affect these responses become important. In
this paper, we conduct a comprehensive study of understanding
and mining the spread of Ebola-related information on social
media. In particular, we (i) conduct a large-scale data-driven
analysis of geotagged social media messages to understand citizen
reactions regarding Ebola; (ii) build information propagation
models which measure locality of information; and (iii) analyze
spatial, temporal and social properties of Ebola-related infor-
mation. Our work provides new insights into Ebola outbreak
by understanding citizen reactions and topic-based information
propagation, as well as providing a foundation for analysis and
response of future public health crises.
I. INTRODUCTION
The World Health Organization declared that Ebola became
an international public health problem in August 8, 2014. A
person infected by Ebola entered the US in September 19,
2014 and passed away on October 8, 2014. Two nurses, who
cared the infected person, also got infected. A physician was
positively diagnosed on October 23, 2014.
Ebola outbreak has created not only severe public health
challenges directly in the areas of infections, but also a
tumultuous public health information crisis in the US and
abroad. For example, when the 2014 Ebola crisis in West
Africa erupted, there were strong US-based reactions with
schools closed, voluntary quarantines of students who had
merely visited a country in Africa, HazMat teams deployed
to scenes of everyday illness, among other potentially costly
reactions.
Ebola outbreak caused public panic and concerns, and
people expressed their responses on social media. Examples of
tweets expressing concerns about Ebola on Twitter are "What
if we all put In so much hard work & when we graduate & get
our diplomas, we die of Ebola", and "Another #Ebola patient
in #Orlando? Just saw police escorted ambulance going to
#MCO airport". While the sharing of public health information
and personal health updates (e.g., "I'm sick") has grown with
the commensurate spread of social media [1] -- [3], there is a
research gap in our understanding of the landscape of reactions
to severe outbreaks, the factors affecting these reactions, and
the spatial and temporal patterns of these reactions.
IEEE/ACM ASONAM 2016, August 18-21, 2016, San Francisco, CA,
USA
978-1-5090-2846-7/16/$31.00 c(cid:13)2016 IEEE
In this paper, we aim to (i) conduct a data-driven analysis
of the Ebola outbreak to understand citizen reactions, (ii)
build novel Ebola-related information propagation models, and
(iii) examine how spatial, temporal and social properties are
related to Ebola-related information propagation. Specifically,
we seek to answer following research questions: What kind
of Ebola related messages people posted? Can we group their
messages by topics? Can we measure locality of Ebola-related
information? By conducting two US Ebola case studies, can
we understand how Ebola-related information was propagated
over time? Which topic of citizen responses was more broadly
propagated?
To answer these questions, we collected 2 billion tweets
from Twitter and extracted geotagged Ebola-related tweets.
Then, we make the following contributions in this paper:
‚ We conducted a comprehensive data-driven analysis of
the geotagged Ebola-related tweets to understand language
distribution and geographic distribution.
‚ We built topic models from citizen reactions and found six
topics. Then we measured how locally or globally each
topic was spread.
‚ Finally, we defined three locality measures called Ebola
focus, entropy and spread. Then, we conducted two US
case studies like Dallas case and New York City case with
analyzing spatial, temporal and social properties.
II. RELATED WORK
Ebola virus became a very serious problem in the world,
researchers began studying Ebola-related information on social
media. Seltzer et al. [4] collected 1,217 Ebola-related images
posted on Instagram and Flickr, and grouped the images by 9
themes. Lazard et al. [5] collected 2,155 tweets containing a
hashtag #CDCchat, which were posted from the Centers for
Disease Control and some Twitter users, and then found 8
topics from the tweets. Fung et al. [2] analyzed how the fre-
quency of Ebola-related tweets is correlated with the frequency
of searches on Google. Alicino et al. [6] analyzed Google
search queries related to the Ebola outbreak to understand
the correlation between the number of web searches and the
number of Ebola cases.
Compared to the previous research works, we collect and
analyze a large-scale Ebola-related tweets, especially focusing
on geotagged tweets. We build topic models to understand
Fig. 1. A distribution of the number of geotagged tweets over time.
what kind of responses people had. Then, we analyze how
citizen responses are related to spatial, temporal and social
properties by designing Ebola propagation models.
III. DATASET
Ebola virus disease/Ebola was first identified in 1976 in
Nzara, South Sudan1. Between 1976 and 2013, 1,716 people
got infected by Ebola. According to the report of Centers
for Disease Control and Prevention (CDC), there were 20,171
Ebola cases and 7,889 patients were died in 20142. In partic-
ular, the total number of cases in 2014 increased from 1,437
to 20,171 between August 2014 and December 2014.
In this paper, we focus on Ebola-related tweets posted
between August 2014 and December 2014 (i.e., during the
major Ebola outbreak). First, we collected 2 billion tweets
by using Twitter Streaming APIs and running two crawlers
-- one collecting random tweets (random crawler) and the
other one collecting only geotagged tweets (geo crawler).
Out of 2 billion tweets, we searched a keyword "ebola" in
each of 90 languages to extract tweets containing "ebola".
Then, we grouped the retrieved tweets by a language, removed
duplicated tweets, and counted the number of tweets in each
group. We removed if a group consists of less than 100 tweets
(i.e., the language was used in less than 100 tweets). Out of
90 languages, each of 35 ones was used in at least 100 tweets.
The total number of the remaining Ebola-related tweets was
1,167,539 tweets (569,888 geotagged tweets from geo crawler
and 597,651 non-geotagged tweets from random crawler).
To estimate geolocation of the remaining 597,651 non-
geotagged tweets, we estimated a home location of the non-
geotagged tweet posters/users. Based on the previous works
estimating a Twitter user's home location [7], [8], we estimated
a non-geotagged tweet poster's home location as follows: first,
we collected 200 most recent tweets from each user. Among
the 200 tweets, we checked how many tweets contained
geolocation information. If at least two out of 200 tweets of
a user contained geolocation information, we would consider
estimating a home location of the user. Otherwise, we filtered
the user's Ebola-related tweets from the home location estima-
tion process. Given a user's geotagged tweets, we measured
the median latitude and median longitude, and used them as
geolocation of the user's Ebola-related tweets. Finally, we
1https://en.wikipedia.org/wiki/Ebola virus disease
2http://www.cdc.gov/vhf/ebola/outbreaks/2014-west-africa/previous-case-
counts.html
estimated geolocation of 199,576 non-geotagged tweets. In
the following sections, we use 769,464 (569,888+199,576)
geotagged tweets3, posted by 422,596 users for in-depth
analysis and study.
IV. ANALYSIS OF ALL GEOTAGGED TWEETS
In this section, we analyze the 769,464 geotagged tweets.
First, we analyzed a distribution of the number of geotagged
tweets in our dataset. Figure 1 shows how many geotagged
tweets were posted over time. We clearly observed that most
tweets were posted between September 30 and October 30,
2014. We highlighted dates of the US imported and domestic
cases in the figure. According to a Wikipedia page [9], the
first US imported case happened when Thomas Eric Duncan
visited his relatives in Dallas, Texas traveled from Liberia on
September 30, 2014. Then, he died on October 8, 2014 and
infected two nurses (two US domestic cases) who took care
of him at Texas Health Presbyterian Hospital. The second US
imported case happened when a physician Craig Spencer from
Guinea was positively diagnosed on October 23, 2014 in New
York City.
Next, we analyzed what languages users used in Ebola-
related tweets. English was used the most, taking 62.24% of
tweets. Then, Spanish, Portuguese, French, Japanese, Italian
were used in 18.63%, 8.18%, 3.07%, 1.16% and 1.14% of
tweets, respectively. 5.58% of tweets were posted in other
languages.
An interesting question is "From where tweets were
posted?". To answer the question, we analyzed geolocation
information associated with tweets in our dataset. In particular,
we grouped tweets by a country and counted the frequency.
Top 5 countries were United States, Spain, Brazil, U.K. and
Niger where 47.06%, 8.03%, 6.72%, 5.24%, 3.12% of tweets
were posted from, respectively. Interestingly, most top coun-
tries were the ones which had evacuated or imported cases.
The remaining top countries were their neighbor countries.
V. ANALYSIS OF GEOTAGGED ENGLISH TWEETS
So far, we analyzed all the geotagged tweets. Now we turn
to analyze geotagged English tweets by topic modeling since
English is a major language (62.24% of tweets) in our dataset.
In particular, we are interested in understanding what kind of
topics users discussed.
3From now on, we call both geotagged tweets and geolocation-estimated
tweets as geotagged tweets.
Aug 01Aug 11Aug 21Aug 31Sep 10Sep 20Sep 30Oct 10Oct 20Oct 30Nov 09Nov 19Nov 29Dec 09Dec 19Dec 290K10K20K30KNumber of Geotagged Tweets0K10K20K30KFirst US imported caseFirst US imported casepassed awayFirst US domestic caseSecond US domestic caseSecond US imported case6 LDA TOPICS, NUMBER OF ASSOCIATED TWEETS AND SAMPLE TWEETS.
TABLE I
Topics (tweets)
1. Ebola cases in US (33,828)
Sample Tweets
a. Ebola infected missionaries returning to US for treatment. NYC hospitals on alert but no imminent threat. @ABC7NY #ABC7WakeUp
b. Top reason Houston is better than Dallas RT @KUT: A Dallas hospital says it has isolated a patient who may have contracted the #Ebola
virus
2. Ebola outbreak in the world
(37,195)
a. The World Health Organization says the Ebola outbreak in West Africa is spreading faster than efforts to control it. #GNreport
b. Nigeria Government will be like.....we are fighting EBola; but doctors are on strike for months now! @Emmydny
3. Fear and pray (44,307)
a. Praying God will catch this strain of Ebola. Jesus be a mighty fence!
b. This EBOLA scares me.... I'm preparing for a break out
4. Ebola spread and warning
(44,301)
a. The United States has issued travel warning for three West African countries hit by the deadly Ebola virus outbreak. #GNreport
b. With this Ebola crisis going on, why aren't we stopping flights in and out of Africa. It seems very dangerous to allow people to travel.
5. Jokes, swear and disapproval
of joke (63,648)
a. Ebola jokes are for stupid people...bananyana! very unfunny
b. "@PrncessAriel: Ebola is scaring the shit out of me" right? Shit's no joke
6. Impact of Ebola to daily life
(78,444)
a. Feeling not to work tomorrow cos there's bare fobs and I'm shook of Ebola
b. Talk on #Ebola: #Ebola stopped me from going to school. #Ebola stopped me from playing.#Ebola stopped me visiting my friends
@PlanGlobal
working and schooling. Among the six topics, topics 5 and 6
contained the largest number of tweets while topic 1 contained
the smallest number of tweets. In other words, many Twitter
users talked about jokes, swear and disapproval of joke, and
impact of Ebola to their daily life. Compared to 8 topics found
by analyzing Centers for Disease Control and Prevention's
Ebola live Twitter chat at [5], our topics are more general.
Next, we visualized which topic was the most popular in
each country on the world map as shown in Figure 2. Topic
2 "Ebola outbreak in the world" was the most popular topic
in the world. Specially it was popular in most Ebola countries
like Guinea, Sierra Leone, Liberia, Nigeria, Senegal, U.K.
and Mali. The next most popular topic was topic 6 "Impact
of Ebola to daily life", which was mostly talked in Ebola
countries like US and Spain, and some European countries
nearby Ebola countries (e.g., France, Morocco, Ireland, Poland
and Netherlands nearby Spain, U.K. and Italy).
VI. MINING EBOLA-RELATED INFORMATION
PROPAGATION
In this section, we analyze Ebola-related information prop-
agation on social media. To measure how Ebola-related in-
formation was spread, we conducted two US imported case
studies. According to a Wikipedia page [9],
the first US
imported case happened on September 30, 2014 in Dallas.
The second US imported case happened on October 23, 2014
in New York City. These two imported cases became two
events/sources of Ebola-related information to measure how
such Ebola-related information was spread. We chose Texas
Health Presbyterian Hospital at Dallas and Bellevue at New
York City as two center points where Ebola-related tweets first
appeared and began spreading to other regions. Note that we
used geotagged tweets posted in US in this section since we
focused on two US imported cases.
Figure 3 shows the number of Ebola-related tweets of each
case during five days since each case was confirmed (i.e.,
positively diagnosed). Interestingly, even though the first case
was confirmed on September 30, a peak day was October 1
while a peak day of the second case was October 23, the same
day, when the case was confirmed. We conjecture that it took
Fig. 2. Major LDA topics in each country.
To answer the question, first we extracted geotagged English
tweets from our dataset. Then, we removed news tweets each
of which contained a title of a news article (e.g., CNN or New
York Times articles) because these tweets did not contain a
user's opinion or response. Finally, 301,723 geotagged English
tweets were extracted and used in this section.
Next, we developed topic models based on Latent Dirichlet
Allocation (LDA) [10]. Given a collection of Ebola-related
messages/tweets, output of LDA is a group of topics each
of which contains a set of messages belonging to the topic.
From each topic, we can analyze what kind of Ebola-related
messages/tweets people posted to social media toward under-
standing their responses.
Since LDA works better with long documents, instead of
using each tweet/message as a document, we aggregated each
user's Ebola-related tweets to make a longer document. Based
on a perplexity score, we chose K as 6. In other words, we
found six topics from the collection of Ebola-related tweets.
Table I presents inferred topic labels, the number of associated
tweets and sample tweets. Topic 1 and 2 are related to "Ebola
cases in US" and "Ebola outbreak in the world", respectively.
Topic 3 contains tweets related to "Fear and pray". Users in
topic 4 mentioned about "Ebola spread and warning". Topic
5 represents "Jokes, swear and disapproval of joke". Topic 6
contains tweets about "Impact of Ebola to daily life" such as
Topic 1Topic 2Topic 3Topic 4Topic 5Topic 6(a) Dallas case
(b) New York City case
Fig. 3. The number of Ebola-related tweets posted in US for five days which
were related to two cases.
(a) Dallas case
(b) New York City case
Fig. 5. Distributions of tweets in each 30-minute interval of two events.
(a) Dallas case
(b) New York City case
EbolaEntropy(cid:52)t " ´
Next, we define Ebola entropy, which measures spatial
distribution of Ebola-related tweets during a time interval, as
follows:
ÿ
liPL
nli(cid:52)t
n(cid:52)t
log2
nli(cid:52)t
n(cid:52)t
(2)
Fig. 4. CDFs of distance between a center point and each geotagged tweet
in two cases.
time for social media users in US to pay attention on the first
case (i.e., 1 day delay), but they responded so quickly when
the second case happened.
Authors of the previous works [11] suggested that a peak
day is the starting day to analyze spread of information, so we
chose October 1, 2014 and October 23, 2014 as two starting
days to measure the propagation of Ebola-related tweets. Kwak
et al. [12] found that the half of tweets were propagated within
an hour, and 75% of tweets were propagated within a day for
each event. Based on the results, we extracted 32,262 tweets
posted in US between October 1 and October 2, 2014 for the
first case and 14,336 tweets posted in US between October 23
and October 24, 2014 for the second case. Overall we extracted
46,598 tweets posted in US from our dataset to investigate
how spatial, temporal and social properties were related to
information propagation.
Before performing our analysis, we first define how to
measure locality of each case/event.
A. Locality Measures
and a
set of
To measure locality of Ebola-related tweets, we propose
and use three locality measures based on previous studies [13],
[14]: (i) Ebola focus; (ii) Ebola entropy and (iii) Ebola spread.
Given a set of Ebola-related tweets/messages M "
tm1, m2, m3, ..., mau
locations L "
tl1, l2, l3, ..., lbu, Ebola focus during a time interval (e.g., 30
minutes) is defined as follows:
EbolaF ocus(cid:52)t " 1
n(cid:52)t
(1)
, where n(cid:52)t is the total number of tweets posted during a
time interval (cid:52)t and nli(cid:52)t is the number of tweets posted at a
certain location li during the time interval.
Equation 1 is to measure the largest fraction of tweets
posted in a location during the time interval. The larger Ebola
focus is, the more number of tweets was posted in a single
location/region. Intuitively, as Ebola-related tweets were prop-
agated from one location/region to multiple locations/regions,
Ebola focus will be reduced.
pnli(cid:52)tq
max
liPL
If all of Ebola-related tweets are posted in a single re-
gion/location, Ebola entropy will be zero. As tweets are
posted in more number of locations/regions, Ebola entropy will
increase accordingly, reflecting spread of Ebola information.
To measure how far Ebola-related information was spread,
we define Ebola spread of Ebola-related tweets as:
Dpl0, liq
EbolaSpread(cid:52)t " 1
L
(3)
Lÿ
i"1
which measures the mean distance for all Ebola-related
tweets of an Ebola case/event from its geographic midpoint
l0. The midpoint of the those tweets is measured by Haversine
distance, taking into account the curvature of the Earth.
In the following sub-sections, we use Ebola focus, entropy
and spread to understand how Ebola-related tweets were
propagated.
B. Analysis of Spatial Properties
Given two events (i.e., Dallas and New York City cases), we
analyzed spatial properties like how far Ebola-related tweets
were spread, and what Ebola focus, entropy and spread values
of the two events are. Figure 4 shows CDFs of distance
between a center point and each geotagged tweet of each
event. We observed that only a small portion of tweets was
spread locally. For example, about 7% and 29% of tweets
were posted within 50 miles in Dallas and New York City
cases, respectively. In contrast, most Ebola-related tweets were
widely spread. For example, in Dallas case, about 46% of
tweets were posted in between 100 and 1,000 miles while
about 41% of tweets were posted in between 1,000 and 1,500
miles. In New York City case, 37% of tweets were posted
in between 100 and 1,000 miles while 13% of tweets were
posted in between 1,000 and 1,500 miles and 16% of tweets
were posted in over 1,500 miles from a center point. This result
shows that both cases got attention from people nationally.
Next, we measured Ebola focus, entropy and spread for each
of the two events. In particular, in each event, we grouped
46,598 tweets by a US state, considering each state as a
location for Ebola focus and Ebola entropy in Equations 1
and 2. For Ebola spread, we used Equation 3. As shown in
(a) Ebola focus
(b) Ebola entropy
(c) Ebola spread
Fig. 6. Ebola focus, entropy and spread in 30-minute interval in Dallas and New York City cases.
EBOLA FOCUS, ENTROPY AND SPREAD OF DALLAS AND NEW YORK CITY
TABLE II
CASES.
Ebola Case
Dallas
New York City
Focus
0.19
0.27
Entropy
4.62
4.27
Spread (miles)
774
734
Table II, focus, entropy and spread of Dallas case were 0.19,
4.62 and 774, respectively while focus, entropy and spread of
New York City case were 0.27, 4.27 and 734, respectively.
New York City case had larger focus, smaller entropy and
smaller spread than Dallas case. It means tweets related to
New York City case were posted more locally or in nearby
areas than Dallas case.
C. Analysis of Temporal Properties
So far we analyzed spatial properties like how far Ebola-
related tweets were propagated in US and measured Ebola
focus, entropy and spread of the two events. Other interesting
research questions are: (i) did both events have similar patterns
in terms of the number of posted tweets over time?; and (ii)
how did Ebola focus, entropy and spread of the events have
been changed over time after a peak?
To answer the first question, we divided tweets in each
event (again, two day period) by every 30 minutes. Figure 5
shows distributions of tweets in each 30-minute interval for
two events. 0 in x-axis means 00:00 (midnight) of the first day.
Tweets reached a peak at 42nd interval (9pm) in Dallas case
and 40th interval (8pm) in New York City case. Overall, tweet
distributions of the events were similar in the first day reaching
the peak point, but in the second day users consistently posted
tweets in Dallas case than New York City case. We conjecture
that since Dallas case is the first imported Ebola case in US,
people had longer attention and posted news and responses
consistently.
To answer the second question, we measured focus, entropy
and spread in each 30-minute interval as shown in Figure 6. 0
in x-axis means the time when the number of tweets reached
a peak (again, 9pm on October 1 in Dallas case and 8pm
on October 23 in New York City case). Since there was
some noisy up-and-down in the raw lines, we applied locally
weighted scatter plot smoothing (LOWESS) [15] to make the
raw lines smoother. Then we analyzed the smoother lines (i.e.,
LOWESS lines). Focus in Dallas case gradually increased
until 270 minutes, then decreased until 600 minutes. It next
increased again until 840 minutes, and became stable. It means
people nearby Dallas/Texas areas posted more tweets until
270 minutes by paying attention on the Ebola case. Then
people outside Dallas/Texas posted more tweets between 270
and 600 minutes, by paying more attention on the case and
related news and indicating Ebola-related tweet propagation.
Entropy in Dallas case decreased until 360 minutes and
then increased until 690 minutes with Ebola-related tweet
propagation. Spread in Dallas case increased until 270 minutes
after a peak, indicating that even though more tweets were
locally posted (increasing focus), people in far areas (e.g.,
Washington state) also increased the number of related tweets.
Then, spread decreased until 630 minutes, indicating people in
far areas relatively decreased their tweets compared with local
people. Then, spread gradually increased until 900 minutes and
became stable.
Interestingly, New York City case had different patterns in
the change of Ebola focus and entropy over time. In particular,
focus in New York City case decreased until 360 minutes
after a peak, reaching 0.25 focus. Then, focus increased until
660 minutes and then decreased. Entropy decreased until 480
minutes after a peak and then gradually increased. However,
New York City case had similar spread pattern with Dallas
case. Overall, New York City case had larger focus, smaller
entropy and slightly smaller spread compared with Dallas case.
It indicates that Ebola-related information in Dallas case was
more widely propagated (or Dallas case got attention from
geographically wider areas) since it was the first imported case
in US.
D. Analysis of Social Properties
On Twitter, a followee's posting is automatically displayed
to his follower's timeline. In Ebola cases, we are interested
in how social ties play an important role in spreading Ebola-
related tweets. In other words, will followers post/retweet more
Ebola-related tweets as time goes after followees posted Ebola-
related tweets?
To answer the question, we crawled Twitter following
network of users and built propagation trees in which there
are two types of nodes: (i) a root node; and (ii) a child node.
A root node is a user who first posted an Ebola-related tweet
in his social network (i.e., none of his followees had posted
Ebola-related tweets before). A child node is a user who posted
an Ebola-related tweet and at least one of his followees had
posted an Ebola-related tweet before the user.
−120012024036060072084096010800.10.150.20.250.30.350.40.45480 Time (minutes)Ebola Focus0.05 Dallas − rawDallas − lowessNew York City − rawNew York City − lowess(peak time)−1200120240360600720840960108033.544.55480 Time (minutes)Ebola Entropy2.5 Dallas − rawDallas − lowessNew York City − rawNew York City − lowess(peak time)−1200120240360600720840960108050060070080090010001100480 Time (minutes)Ebola Spread400 Dallas − rawDallas − lowessNew York City − rawNew York City − lowess(peak time)EBOLA FOCUS, ENTROPY AND SPREAD OF 6 LDA TOPICS.
TABLE III
Topic
1
2
3
4
5
6
Focus
0.748
0.577
0.719
0.711
0.761
0.762
Entropy
1.906
2.865
1.945
2.162
1.728
1.695
Spread (miles)
1,918.36
3,043.10
2,025.27
2,280.94
1,812.36
1,810.23
child nodes gradually increased until a few hours after a peak
of each case, meaning that social ties played an important
role in spreading Ebola-related tweets. Our work provides
new insights into Ebola outbreak by understanding citizen
reactions and topic/event-based information propagation, as
well as providing a foundation for analysis and response of
future public health crises.
ACKNOWLEDGMENT
This work was supported in part by NSF grant CNS-
1553035. Any opinions, findings and conclusions or recom-
mendations expressed in this material are the author(s) and do
not necessarily reflect those of the sponsors.
REFERENCES
[1] A. J. Rodriguez-Morales, D. M. Castaneda-Hern´andez, and A. Mc-
Gregor, "What makes people talk about ebola on social media? a
retrospective analysis of twitter use." Travel medicine and infectious
disease, vol. 13, no. 1, 2015.
[2] I. C.-H. Fung, Z. T. H. Tse, C.-N. Cheung, A. S. Miu, and K.-W. Fu,
"Ebola and the social media," The Lancet, vol. 384, no. 9961, 2014.
[3] S. O. Oyeyemi, E. Gabarron, and R. Wynn, "Ebola,
twitter, and
misinformation: a dangerous combination?" BMJ, vol. 349, 2014.
[4] E. Seltzer, N. Jean, E. Kramer-Golinkoff, D. Asch, and R. Merchant,
"The content of social media's shared images about ebola: a retrospective
study," Public health, vol. 129, no. 9, 2015.
[5] A. J. Lazard, E. Scheinfeld, J. M. Bernhardt, G. B. Wilcox, and
M. Suran, "Detecting themes of public concern: A text mining analysis
of the centers for disease control and prevention's ebola live twitter
chat," American journal of infection control, vol. 43, no. 10, 2015.
[6] C. Alicino, N. L. Bragazzi, V. Faccio, D. Amicizia, D. Panatto, R. Gas-
parini, G. Icardi, and A. Orsi, "Assessing ebola-related web search
behaviour: insights and implications from an analytical study of google
trends-based query volumes," Infectious diseases of poverty, vol. 4, no. 1,
2015.
[7] Z. Cheng, J. Caverlee, and K. Lee, "You are where you tweet: a content-
based approach to geo-locating twitter users," in CIKM, 2010.
[8] C. A. Davis Jr, G. L. Pappa, D. R. R. de Oliveira, and F. de L Arcanjo,
"Inferring the location of twitter messages based on user relationships,"
Transactions in GIS, vol. 15, no. 6, pp. 735 -- 751, 2011.
[9] Wikipedia, "Ebola virus cases in the united states," https://en.wikipedia.
org/wiki/Ebola virus cases in the United States, 2016.
[10] D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," J.
Mach. Learn. Res., vol. 3, pp. 993 -- 1022, Mar. 2003.
[11] R. Crane and D. Sornette, "Robust dynamic classes revealed by mea-
suring the response function of a social system," Proceedings of the
National Academy of Sciences, vol. 105, no. 41, 2008.
[12] H. Kwak, C. Lee, H. Park, and S. Moon, "What is twitter, a social
network or a news media?" in WWW, 2010.
[13] A. Brodersen, S. Scellato, and M. Wattenhofer, "Youtube around the
world: geographic popularity of videos," in WWW, 2012.
[14] K. Y. Kamath, J. Caverlee, K. Lee, and Z. Cheng, "Spatio-temporal
dynamics of online memes: a study of geo-tagged tweets," in WWW,
2013.
[15] W. S. Cleveland, "Lowess: A program for smoothing scatterplots by
robust locally weighted regression," The American Statistician, vol. 35,
no. 1, p. 54, 1981.
Fig. 7. Change of a proportion of child nodes in different time slots of Dallas
and New York City cases.
Next, we examined what percentage of nodes were child
nodes in each 30-minute interval. We cumulatively added
nodes/users, who posted Ebola-related tweets, as we added
more 30 minutes. In the meantime, we measured how a
proportion of child nodes changed over time.
Figure 7 shows the change of a proportion of child nodes
over time. Again 0 in x-axis is a peak of each event in terms
of the number of posted Ebola-related tweets. In Dallas case,
a proportion of child nodes gradually increased until 240
minutes after a peak, and then became stable, reaching 35%
(i.e., 35% of nodes were child nodes). Likewise, in New York
City case, a proportion of child nodes gradually increased until
120 minutes after a peak, and then became stable, reaching
23%. This analysis shown that social ties played an important
role to propagate Ebola-related information within a few hours
after a peak. In other words, social properties/ties affected the
propagation of Ebola-related information over social media.
VII. FOCUS, ENTROPY AND SPREAD OF SIX TOPICS
Now we apply three locality measures -- Ebola focus,
entropy and spread -- to 6 LDA topics that we found in
Section V. Given a set of Ebola-related tweets associated with
each topic, we examined which topic was more globally or
locally discussed by applying the locality measures to each
topic. As shown in Table III, topic 2 "Ebola outbreak in
the world" had the lowest focus, highest entropy and highest
spread which mean the topic was discussed more globally than
the rest. It makes sense because the topic itself is related to
the world. However, topic 5 "Jokes, swear and against jokes"
and topic 6 "Impact of Ebola to daily life" had the highest
focus, lowest entropy and lowest spread which mean that the
topics were discussed more locally than the rest.
VIII. CONCLUSION
In this paper, we have presented a comprehensive analysis
of the spread of Ebola-related information. In particular, we
have conducted a large-scale data-driven analysis of 0.77
million geotagged tweets extracted from 2 billion tweets. By
building topic models, we have found 6 topics. Then, we
have analyzed how spatial,
temporal and social properties
were related to propagation of those tweets. We have found
that (i) tweets related to New York City case were more
locally propagated than tweets related to Dallas case; (ii)
New York City case had consistently larger focus, smaller
entropy and smaller spread over time; and (iii) a proportion of
|
1703.06231 | 1 | 1703 | 2017-03-18T01:43:17 | Network Comparison: Embeddings and Interiors | [
"cs.SI"
] | This paper presents methods to compare networks where relationships between pairs of nodes in a given network are defined. We define such network distance by searching for the optimal method to embed one network into another network, prove that such distance is a valid metric in the space of networks modulo permutation isomorphisms, and examine its relationship with other network metrics. The network distance defined can be approximated via multi-dimensional scaling, however, the lack of structure in networks results in poor approximations. To alleviate such problem, we consider methods to define the interiors of networks. We show that comparing interiors induced from a pair of networks yields the same result as the actual network distance between the original networks. Practical implications are explored by showing the ability to discriminate networks generated by different models. | cs.SI | cs | Network Comparison: Embeddings and Interiors
Weiyu Huang and Alejandro Ribeiro
1
Abstract -- This paper presents methods to compare networks
where relationships between pairs of nodes in a given network
are defined. We define such network distance by searching for the
optimal method to embed one network into another network, prove
that such distance is a valid metric in the space of networks modulo
permutation isomorphisms, and examine its relationship with other
network metrics. The network distance defined can be approximated
via multi-dimensional scaling, however, the lack of structure in
networks results in poor approximations. To alleviate such problem,
we consider methods to define the interiors of networks. We show
that comparing interiors induced from a pair of networks yields
the same result as the actual network distance between the original
networks. Practical implications are explored by showing the ability
to discriminate networks generated by different models.
Index Terms -- Network theory, networked data, network compar-
ison, metric spaces, pattern recognition
7
1
0
2
r
a
M
8
1
]
I
S
.
s
c
[
1
v
1
3
2
6
0
.
3
0
7
1
:
v
i
X
r
a
I. INTRODUCTION
The field of network science is predicated on the empirical
observation that network structure carries important information
about phenomena of interest. Network structures have been ob-
served to be fundamental in social organizations [1] and dif-
ferences in the structure of brain networks have been shown
to have clinical value in neurology and psychology [2]. The
fundamental value of network structure has led to an extensive
literature on network identification that is mostly concerned with
the identification of network features that serve as valuable
discriminators in different contexts. Examples of these features
and application domains are clustering coefficients [3] and motifs
[4] in social networks; neighborhood topology [5], betweenness
[6], and wavelets [7] in protein interaction networks; as well as
graphlet degree distributions [8], graph theoretic measures [9], and
single linkage dendrogram [10] and homology [11] in different
contexts. However valuable, it is material to recognize that it is
possible for very different networks to be indistinguishable from
the perspective of specific features, or, conversely, to have similar
networks that differ substantially on the values of some features.
One way to sidestep this limitation it to define and evaluate proper
network distances. This is the objective of this paper.
Without getting into the details of how a valid distance might
is apparent that their computation is bound to
be defined, it
be combinatorial. Indeed, since permutations of unlabeled nodes
result in identical networks, distances must rely on comparison
between a combinatorial number of node correspondences --
evaluating distances is relatively simpler if nodes are labeled
[12] -- [14]. An important observation in this regard is that the
space of finite metric spaces is a subset of the space of networks
composed of those whose edges satisfy the triangle inequality.
This observation is pertinent because there is a rich literature on
the comparison of metric spaces that we can adopt as a basis
for generalizations that apply to the comparison of networks. Of
particular interest here are the Gromov-Hausdorff distance, which
measures the size of the smallest modification that allows the
spaces to be mapped onto each other [15], [16], and the partial
Electrical and Systems Engineering, University of Pennsylvania, 200 S 33rd
Street, Philadelphia, PA 19104. Email: whuang, [email protected].
embedding distance, which measures the size of the smallest
modification that allows a space to be embedded in the other [17] --
[19]. The computation of either of these distances is intractable.
However, Gromov-Hausdorff distances can be tractably approxi-
mated using homological features [20] and embedding distances
can be approximated using multi-dimensional scaling (MDS) [17].
In prior work we have defined generalizations of the Gromov-
Hausdorff distance [21], [22] to networks, and utilized homologi-
cal features for computationally tractable approximate evaluations
[23], [24]. Our starting point here is the partial embedding
distance for metric spaces [16] -- [19]. Our goal is to generalize
embedding distances to arbitrary networks and utilize MDS tech-
niques for their approximate computation.
A. Organization And Contributions
Networks, metrics, embedding metrics, and the Gromov-
Hausdorff distance for networks are defined in Section II. The
issue of defining an embedding distance for networks is addressed
in Section III. The idea of an embedding distance d(A, B) is to
analyze how much we have to modify network A to make it
a subset of network B. This is an asymmetric relationship. In
particular, having d(A, B) = 0 means that network A can be
embedded in network B but the opposite need not be true. The
first contribution of this paper is to:
(i) Define network embeddings and a corresponding notion of
partial embedding distances. Partial embedding distances
define an embedding metric d such that d(A, B) = 0 if and
only if A can be embedded in B.
We attempt to use the MDS techniques in [18] to approximate
the computation of embedding distances but observe that the
methodology yields poor results -- see Figure 1 for an illustration
of why this is not unexpected. To improve these results we observe
that when edge dissimilarities satisfy a triangle inequality, an
Euclidean interior is implicitly defined. In the case of arbitrary
networks this is not true and motivates the definition of the
interior of a network that we undertake in Section IV. The second
contribution of this paper is to:
(ii) Provide a definition of the interior of a network. The interior
of a set of nodes is the set of points that can be written as
convex combinations of the nodes. When the network forms
a metric space, the dissimilarity between a pair of points in
the interior is the distance on the shortest path between the
pair. When the dissimilarities in the network do not form
a metric space, e.g. representing travel time between nodes,
such construction would yield conflict. The problem can be
solved by defining the dissimilarity between a pair of points
as the travel time on the shortest path between the pair.
Having the ability to extend networks into their interiors,
we extend different networks and compute partial embedding
distances between their extensions. In principle, distances between
two networks and their respective extensions need not be related.
In Section IV-A we show that a restriction in the embedding of
the extended networks renders them identical. Our third and most
important contribution is to:
(iii) Define embeddings for extended networks such that points
in one of the original networks -- prior to extension -- can
only be embedded into original points of the other network.
We show that
the embedding distance that results from
this restriction is the same embedding distance between the
original networks.
The definition of interior is somewhat arbitrary, however be-
cause of (iii), the practical implication of interior definition is
justified. We point out that a network extension is a dense set
that includes all the convex combinations of sets of points. To
make interior extensions practical we consider samplings of the
interior in Section IV-B. It is not difficult to show in light of
Contribution (iii) that the embedding distance between a a pair of
networks extended to samples of their interiors is also identical
to the embedding distance between the original pair of networks
-- if the restriction in the mapping of original nodes is retained.
We exploit Contributions (ii) and (iii) to approximate the
computation of embedding distances using the MDS techniques
in [18] but applied to networks extended to their interiors. The
definition of an interior markedly improves the quality of MDS
distance approximations. We illustrate this fact in Section V with
an artificial illustrative example and also demonstrate the ability to
discriminate networks with different generative models. We only
extend by adding points that are mid-points of original nodes
in the networks, in order to make the process computationally
tractable. The small number of points considered in interiors is
sufficient to distinguish networks of different processes, despite
that the original networks may possess different number of nodes.
II. PRELIMINARIES
A network is defined as a pair NX = (X, rX ), where X is a
finite set of nodes and rX : X 2 = X × X → R+ is a function
encoding dissimilarity between pairs. For x, x′ ∈ X, values of this
function are denoted as rX (x, x′). We assume that rX (x, x′) = 0
if and only if x = x′ and we further restrict attention to symmetric
networks where rX (x, x′) = rX (x′, x) for all pairs of nodes
x, x′ ∈ X. The set of all such networks is denoted as N .
When defining a distance between networks we need to take
into consideration that permutations of nodes amount to rela-
belling nodes and should be considered as same entities. We there-
fore say that two networks NX = (X, rX ) and NY = (Y, rY ) are
isomorphic whenever there exists a bijection φ : X → Y such
that for all points x, x′ ∈ X,
rX (x, x′) = rY (φ(x), φ(x′)).
(1)
Such a map is called an isometry. Since the map φ is bijective,
(1) can only be satisfied when X is a permutation of Y . When
networks are isomorphic we write NX ∼= NY . The space of
networks where isomorphic networks NX ∼= NY are represented
by the same element
is termed the set of networks modulo
isomorphism and denoted by N mod ∼=. The space N mod ∼=
can be endowed with a valid metric [21], [22]. The definition
of this distance requires introducing the prerequisite notion of
correspondence [25, Def. 7.3.17].
Definition 1 A correspondence between two sets X and Y is a
subset C ⊆ X × Y such that ∀ x ∈ X, there exists y ∈ Y
such that (x, y) ∈ C and ∀ y ∈ Y there exists x ∈ X such that
(x, y) ∈ C. The set of all correspondences between X and Y is
denoted as C(X, Y ).
2
A correspondence in the sense of Definition 1 is a map between
node sets X and Y so that every element of each set has at
least one correspondent in the other set. Correspondences include
permutations as particular cases but also allow mapping of a
in X to multiple correspondents in Y or, vice
single point
versa. Most importantly, this allows definition of correspondences
between networks with different numbers of elements. We can
now define the distance between two networks by selecting the
correspondence that makes them most similar as stated next.
Definition 2 Given two networks NX = (X, rX ) and NY =
(Y, rY ) and a correspondence C between the node spaces X and
Y define the network difference with respect to C as
The network distance between NX and NY is then defined as
ΓX,Y (C) :=
.
(2)
max
(x,y),(x′,y ′)∈C(cid:12)(cid:12)(cid:12)
rX (x, x′) − rY (y, y′)(cid:12)(cid:12)(cid:12)
C∈C(X,Y )nΓX,Y (C)o.
dC(NX , NY ) := min
(3)
For a given correspondence C ∈ C(X, Y ) the network
difference ΓX,Y (C) selects the maximum distance difference
rX (x1, x2) − rY (y1, y2) among all pairs of correspondents --
we compare rX (x1, x2) with rY (y1, y2) when the points x1 and
y1, as well as the points x2 and y2, are correspondents. The
distance in (3) is defined by selecting the correspondence that
minimizes these maximal differences. The distance in Definition
2 is a proper metric in the space of networks modulo isomorphism.
It is nonnegative, symmetric, satisfies the triangle inequality, and
is null if and only if the networks are isomorphic [21], [22]. For
future reference, the notion of metric is formally stated next.
Definition 3 Given a space S and an isomorphism ∼=, a function
d : S × S → R is a metric in S mod ∼= if for any a, b, c ∈ S
the function d satisfies:
(i) Nonnegativity. d(a, b) ≥ 0.
(ii) Symmetry. d(a, b) = d(b, a).
(iii) Identity. d(a, b) = 0 if and only if a ∼= b.
(iv) Triangle inequality. d(a, b) ≤ d(a, c) + d(c, b).
A metric d in S mod ∼= gives a proper notion of distance.
Since zero distances imply elements being isomorphic, the dis-
tance between elements reflects how far they are from being
isomorphic. The distance in Definition 2 is a metric in space N
mod ∼=. Observe that since correspondences may be between
networks with different number of elements, Definition 2 defines
a distance dC(NX , NY ) when the node cardinalities X and Y
are different. In the particular case when the functions rX satisfy
the triangle inequality, the set of networks N reduces to the set of
metric spaces M. In this case the metric in Definition 2 reduces
to the Gromov-Hausdorff (GH) distance between metric spaces.
The distances dC(NX , NY ) in (3) are valid metrics even if the
triangle inequalities are violated by rX or rY [21], [22].
A related notion is that of an isometric embedding. We say that
a map φ : X → Y is an isometric embedding from NX = (X, rX )
to NY = (Y, rY ) if (1) holds for all points x, x′ ∈ X. Since
rX (x, x′) = rY (φ(x), φ(x′)) for any x, x′ ∈ X, rX (x, x′) > 0
for x 6= x′ and rY (y, y) = 0, the map φ is injective. This implies
that the condition can only be satisfied when NX = (X, rX ) is a
sub-network of NY = (Y, rY ). Such a map is called an isometric
embedding. When NX can be isometrically embedded into NY ,
we write NX ⊑ NY . Related to the notion of isometric embedding
is the notion of an embedding metric that we state next.
Definition 4 Given a space S and an isometric embedding ⊑, a
function d : S × S → R is an embedding metric in S if for any
a, b, c ∈ S the function d satisfies:
(i) Nonnegativity. d(a, b) ≥ 0.
(ii) Embedding identity. d(a, b) = 0 if and only if a ⊑ b.
(iii) Triangle inequality. d(a, b) ≤ d(a, c) + d(c, b).
The embedding distance dPE(NX , NY ) from one network NX
to another network NY is not a metric due to its asymmetry. We
can construct a symmetric version from dPE(NX , NY ) by taking
the maximum from the embedding distance dPE(NX , NY ) and
dPE(NY , NX ). This would give us a valid metric distance in N
mod ∼=. A formal definition and theorem are shown next.
Definition 6 Given two networks NX = (X, rX ), NY = (Y, rY ),
define the embedding distance between the pair as
dE(NX , NY ) := max {dPE(NX , NY ), dPE(NY , NX )} .
(6)
3
It
is apparent
that metrics are embedding metrics because
bijections are injective, and that in general embedding metrics
are not metrics because they are asymmetric. In this paper,
we consider defining an embedding distance between networks
and evaluate its relationship with the Gromov-Hausdorff distance
(Section III). We then consider the problem of augmenting the
networks by adding points to fill their "interior". The interior is
defined so that embedding metrics between the original networks
and embedding metrics between these augmented spaces coincide
(Section IV).
III. EMBEDDINGS
As is the case with correspondences, mappings also allow defi-
nition of associations between networks with different numbers of
elements. We use this to define the distance from one network to
another network by selecting the mapping that makes them most
similar as we formally define next.
Definition 5 Given two networks NX = (X, rX ), NY = (Y, rY ),
and a map φ : X → Y from node space X to the node space Y ,
define the network difference with respect to φ as
partial
distances
where
dPE(NX , NY ) are defined in Definition 5.
embedding
dPE(NX , NY )
and
Theorem 1 The function dE : N × N → R+ defined in (6) is a
metric in the space N mod ∼=.
Since embedding distances between two networks generate a
well-defined metric, they provide a means to compare networks
of arbitrary sizes. In comparing the embedding distance in (6) with
the network distance in (3) we see that both find the bottleneck
that prevents the networks to be matched to each other. It is not
there surprising to learn that they satisfy the relationship that we
state in the following proposition.
Proposition 2 The network distance dC(NX , NY ) defined in (3)
can also be written as
dC(NX , NY ) = min
φ:X→Y
ψ:Y →X
max {∆X,Y (φ),∆Y,X (ψ),δX,Y (φ,ψ)},
(7)
where the network differences ∆X,Y (φ) and ∆Y,X (ψ) with re-
spect to mappings φ and ψ are defined in (4) and δX,Y (φ, ψ)
measures how far the mappings φ and ψ are from being the
inverse of each other, and is defined as
The partial embedding distance from NX to NY is defined as
∆X,Y (φ) := max
x,x′∈X(cid:12)(cid:12)(cid:12)
rX (x, x′) − rY (φ(x), φ(x′))(cid:12)(cid:12)(cid:12)
φ:X→Y n∆X,Y (φ)o.
dPE(NX , NY ) := min
.
(4)
δX,Y (φ, ψ) = max
x∈X,y∈Y
rX (x, ψ(y)) − rY (φ(x), y) .
(8)
A direct consequence of Lemma 2 is that
the embedding
(5)
distance (6) is a lower bound of the network distance (3).
Both, Definition 2 and Definition 5 consider a mapping between
the node space X and the node space Y , compare dissimilarities,
and set the network distance to the comparison that yields the
smallest value in terms of maximum differences. The distinction
between them is that in (2) we consider correspondence, which
requires each point in any node spaces (X or Y ) to have a
correspondent in the other node space, whereas in (4) we examine
mappings, which only require all points in node space X to have
one correspondent in the node set Y . Moreover, in (2), a node
x ∈ X may have multiple correspondents, however, in (4), a
node x ∈ X can only have exactly one correspondent. Except for
this distinction, Definition 2 and Definition 5 are analogous since
∆X,Y (φ) selects the difference rX (x1, x2) − rY (y1, y2) among
all pairs. The distance dPE(NX , NY ) is defined by selecting the
mapping that minimizes these maximal differences. We show in
the following proposition that the function dPE : N × N → R+
is, indeed, an embedding metric in the space of networks.
Proposition 1 The function dPE : N × N → R+ defined in (5) is
an embedding metric in the space N .
Proof: See Appendix A for proofs in Section III.
(cid:4)
Corollary 1 Function dE is a lower bound with dC in (3), i.e.
dE(NX , NY ) ≤ dC(NX , NY ),
(9)
for any networks NX and NY .
The relationships in Lemma 2 and Corollary 1 are extensions
of similar analyses that hold for the Gromov-Hausdorff distance
between metrics spaces, [26], [27]. As in the case of metric spaces,
these results imply that the embedding distance dE(NX , NY )
can be used to lower bound the network distance dC(NX , NY )
[cf. (9)]. This value is in addition to the ability of the partial
embedding distance dPE(NX , NY ) of Definition 5 to measure how
far the network X is to being a subnetwork of network Y .
In the comparison of surfaces and shapes, the partial embedding
distance dPE(NX , NY ) has the attractive property of being approx-
imable using multidimensional scaling techniques [17], [19]. Our
empirical analysis shows that the use of analogous techniques to
estimate dPE(NX , NY ) for arbitrary networks yields poor results
and that this is related to how far the dissimilarities in NX
and NY are from satisfying the triangle inequality -- see the
example in Figure 1 and the numerical analysis in Section V. To
improve the accuracy of multidimensional scaling estimates we
NX
c
c
1
0
-1
-6
1
-4
-2
a
11
a
0
1
b
b
2
4
6
NY
c
c
1
0
-1
-6
3
-4
-2
a
11
a
0
3
b
b
2
4
6
NZ
c
c
1
0
-1
-6
5
-4
-2
a
11
a
0
5
b
b
2
4
6
Fig. 1. An example where different networks result in identical multi-dimensional scaling results. We emphasize that the number of dimension used in multi-dimensional
scaling would not distinguish networks since the triangle inequality property for relationships between nodes in the networks is violated. Such a caveat would be
solved by inducing semimetrics in the space defined by the given networks, as we develop throughout Section IV.
4
NX = (X, rX )
a
(1, 0, 0)
a
(SX , sX )
rX (a, b)
rX (a, b)
rX (a, c)
⇒
f
rX (a, c)
(0.5, 0, 0.5)
e
m
(ma, mb, mc)
c
rX (b, c)
b
c
(0, 0, 1)
g
rX (b, c)
b
(0, 1, 0)
Fig. 2. An example of induced space with points defined in the original network.
We would like to induce a space (SX , sX ) such that SX includes infinite number
of points formed by the convex of the original points a, b, and c, and sX is
a semimetric for any pair of points in SX . We want to induce the semimetric
from the original network such that sX (a, b) = rX (a, b), sX (a, c) = rX (a, c),
and sX (b, c) = rX (b, c). Middle points, e.g. e, can be considered as the entity
represents 50% of a and 50% of b. An important observation is that any points
in the space, e.g. m, can be written as a convex combination representing the
proportion of their contents from original nodes -- (ma, mb, mc) with ma +
mb + mc = 1.
propose to define the interior of a network by defining a space
where dissimilarities between any pair of points represented by a
convex combination of nodes in the given networks are defined
(Section IV). We will further demonstrate that
the proposed
definition of the interior of a network is such that the partial
embedding distances between networks with interiors are the same
as the partial embedding distances between the corresponding
original networks (Theorems 2 and 3). Empirical demonstrations
will show that the comparison of networks with interiors using
MDS techniques yields better results that are comparable to those
obtained when comparing shapes and surfaces (Section V).
IV. INTERIORS
We provide a different perspective to think of networks as
semimetric spaces where: (i) There are interior points defined by
convex combinations of given nodes. (ii) Dissimilarities between
these interior points are determined by the dissimilarities between
the original points. To substantiate the formal definition below
(Definition 7) we discuss the problem of defining the interior of
a network with three points. Such network is illustrated in Figure
2 where nodes are denoted as a, b, and c and dissimilarities are
denoted as rX . Our aim is to induce a space (SX , sX) where the
dissimilarities in the induced space are sX : SX × SX → R+.
We require that SX preserve the distance of original points in
NX such that sX (a, b) = rX (a, b), sX (a, c) = rX (a, c), and
sX (b, c) = rX (b, c).
Points inside the network are represented in terms of convex
combinations of the original points a, b, and c. Specifically, a
point m in the interior of the network is represented by the tuple
(ma, mb, mc) which we interpret as indicating that m contains an
ma proportion of a, an mb proportion of b, and an mc proportion
of c. Points e, f , and g on Figure 2 contain null proportions of
some nodes and are interpreted as lying on the edges. Do notice
that although we are thinking of m as a point inside the triangle,
a geometric representation does not hold.
First we consider the case that the triangle inequality is satisfied
by rX . To evaluate the dissimilarities between p represented by
(1, 0, 0)
a
q3
(pa, pb, pc)
p
q4
q2
(0, 0, 1)
c
w⋆
ab
q1
(ma, mb, mc)
m
w⋆
bc
b
(0, 1, 0)
Fig. 3. Comparing arbitrary points inside the space induced from networks of
three nodes. Given a pair of nodes p and m in the induced space, we need to find
paths from p to m that are consisted of vectors parallel to the direction of original
nodes in the networks, e.g. a to b, a to c, and/or b to c. We assume the direction
of original nodes in the networks have unit amount of transformation. Potential
choices of paths from p to m include: p to m via q1, via q2, or via q3. Of them,
the path p to m via q1 has the smallest amount of transformation traversed along
the path. There are paths in the form which involves vectors p to q2, q2 to q4,
and q4 to m; such paths would not give the optimal solution to (13).
the tuple (pa, pb, pc) and m represented by the tuple (ma, mb, mc)
using dissimilarities in the original network, we need to find a
path consisting of vectors parallel to the edges in the network
that go to m from p. Specifically, denote wab as the proportion
transversed in the direction from a to b in the path. For a positive
value wab, compared to p, m becomes more similar to b by wab
units and less similar to a by −wab units; for a negative wab,
compared to p, m becomes more similar to a and less similar
to b. Proportion transversed in other directions, e.g. from a to c
and from b to c, are denoted as wac and wbc, respectively. For
the path transversing wab from a to b, wac from a to c, and wbc
from b to c, the dissimilarity can be denoted as wabrX (a, b) +
wacrX (a, c) + wbcrX (b, c). There may be many different paths
from p to m, as illustrated in Figure 3. Out of all paths, only
the one yielding the smallest distance should be considered. This
means the dissimilarity sX (p, m) between p and m can be defined
by solving the following problem,
wab rX (a, b) + wac rX (a, c) + wbc rX (b, c)
min
s. t. ma = pa − wab − wac,
mb = pb + wab − wbc,
mc = pc + wac + wbc.
(10)
the path starts with tuple
The constraints make sure that
(ma, mb, mc) and ends with tuple (pa, pb, pc). This is like the
definition of Manhattan distance. In fact, if Manhattan was a
triangle with three endpoints and the roads in Manhattan were
in a triangle grid, then the distance between any pair of points in
Manhattan would be evaluated as in (10).
When relationships in rX do not satisfy triangle inequality,
e.g. rX (a, b) + rX (b, c) < rX (a, c), however, the construction in
(10) is problematic since the optimal solution in (10) would yield
sX (a, c) = rX (a, b) + rX (b, c), which violates our requirement
that sX (a, c) should be the same as rX (a, c). The problem arises
because each segment in a given path contains two pieces of in-
formation -- the proportion of transformation, and the dissimilarity
created of such transformation. E.g. for the path segment pq1 in
Figure 3, it represents w⋆
ab units of transformation from a to b, and
also denotes a dissimilarity between p and q1 as w⋆
abrX (a, b).
The two pieces of information unite when rX is a metric, however,
create conflicts for dissimilarities in a general network. To resolve
such issue, we could separate the amount of transformation from
the dissimilarity incurred due to transformation. Firstly, we find
the path with the smallest amount of transformation
wab + wac + wbc
min
s. t. ma = pa − wab − wac,
mb = pb + wab − wbc,
mc = pc + wac + wbc.
(11)
Then, for the optimal path w⋆
dissimilarity as the distance transversed on the path, i.e.
ac, and w⋆
ab, w⋆
bc in (11), define the
sX (p, m) = w⋆
ab rX (a, b)+w⋆
bc rX (b, c)+w⋆
ac rX (a, c). (12)
The problem in (11) can always be solved since it is underdeter-
mined due to the facts that ma + mb + mc = pa + pb + pc = 1.
It traces back to (10) when relationships in network are met-
rics. Moreover, it satisfy our requirement sX (a, b) = rX (a, b),
sX (a, c) = rX (a, c), and sX (b, c) = rX (b, c) for any networks.
Regarding our previous example of a triangle-shaped Manhattan
with three endpoints, suppose relationships in the network denote
the amount of travel time between the endpoints. These relation-
ship may not necessarily satisfy triangle inequalities. Suppose
roads in Manhattan form a triangle grid, the problem in (11) is
finding the shortest path between a pair of locations in Manhattan.
The dissimilarity in (12) describes the travel time between this pair
of locations using the shortest path.
Given any network with arbitrary number of nodes, we define
the induced space as a generalization to the case for nodes with
three nodes we developed previously.
Definition 7 Given a network NX = (X, rX ) with X =
{1, 2, . . . , n}, the induced space (SX , sX ) is defined such that
the space SX is the convex hull of X with SX = {m =
of nodes m, p ∈ SX , the path yielding the smallest amount of
transformation from p to m is obtained through the problem
(m1, m2, . . . , mn) mi ≥ 0,Pi∈X mi = 1}. Given a pair
ij(cid:9) = argmin Xi,j∈X,i<j
(cid:8)w⋆
wij
(13)
s. t. mi = pi − Xj∈X,j>i
wij + Xj∈X,j<i
wji, ∀i
The distance between p and m is then the distance traversed
proportional to the original relationships weighted by the path,
sX (p, m) = Xi,j∈X,i<j(cid:12)(cid:12)w⋆
ij(cid:12)(cid:12) rX (i, j).
(14)
The induced space SX is the convex hull constructed by all
nodes i ∈ X. Each node in the induced space m ∈ SX can
be represented as a tuple (m1, m2, . . . , mn) with Pi∈X mi = 1
where mi represents the percentage of m inheriting the property
of node i ∈ X. To come up with distance between pairs
of points p, m ∈ SX with the respective tuple representation
(p1, p2, . . . , pn) and (m1, m2, . . . , mn), we consider each edge
in the original space X, e.g. from i to j, represents one unit
of cost to transform i into j. All edges are considered similarly
with one unit of cost to transform the starting node into the
ending node. We want to find the smallest amount of cost to
transform p into m. This is solved via (13), which is always
solvable since the problem is underdetermined due to the facts that
5
(QX , rX )
a
x1
x3
φ
φ
φ
q
x4
x2
φ
b
x5
x6
c
φ
(QY , rY )
u
φ
y1
y2
φ
v
Fig. 4. An example of regular sample pair (QX , rX ) and (QY , rY ), where
QX = {a, b, c, x1, x2, x3, x4, x5, x6, q} collects original points and induced
points that are combination of one-third of original nodes, and QY =
{u, v, y1, y2}. Here we illustrate a specific mapping φ with φ(a) = φ(b) = u
and φ(c) = v; it is apparent that φ(x) ∈ QY for any x ∈ QX . Note that
QX = QX /{q} also form a regular sample pair with QY .
Pi∈X mi = Pi∈X pi = 1. This gives us the optimal path with
weights {w⋆
ij } meaning that the most cost-saving transformation
from p into m is to undertaking w⋆
ij unit of transformation along
the direction of transforming i into j. The distance in the induced
space sX (p, m) is then the distance traversed proportional to the
original relationships weighted by the path defined in (14).
Proposition 3 The space (SX , sX ) induced from NX = (X, rX )
defined in Definition 7 is a semimetric space in SX . Moreover,
the induced space preserves relationships: when p, m ∈ X,
sX (p, m) = rX (p, m).
Proof: See Appendix B for proofs in Section IV.
(cid:4)
The semimetric established in Proposition 3 guarantees that the
points in the induced space with their dissimilarity sX (p, m) are
well-behaved. We note that semimetric is the best property we can
expect, since the triangle inequality may not be satisfied even for
the dissimilarities in the original networks. Next we show that the
embedding distance is preserved when interiors are considered.
A. Distances Between Networks Extended To Their Interiors
Since semimetrics are induced purely from the relationships
in the original network, a pair of networks NX and NY can be
compared by considering their induced space, as we state next.
Definition 8 Given two networks NX = (X, rX ) and NY =
(Y, rY ) with their respective induced space (SX , sX ) and
(SY , sY ), for a map φ : SX → SY from the induced space SX to
the induced space SY such that φ(x) ∈ Y for any x ∈ X, define
the network difference with respect to φ as
∆SX ,SY (φ) := max
dPE, S(NX , NY ) :=
The partial embedding distance from NX to NY measured with
respect to the induced spaces is then defined as
.
x,x′∈SX(cid:12)(cid:12)(cid:12)
sX (x, x′) − sY (φ(x), φ(x′))(cid:12)(cid:12)(cid:12)
φ:SX →SY φ(x)∈Y,∀x∈Xn∆SX ,SY (φ)o.
min
(15)
(16)
The partial embedding distance dPE, S(NX , NY ) with respect
to the induced space in (16) is defined similarly as the partial
embedding distance dPE(NX , NY ) in (5) however considers the
mapping between all elements in the induced spaces. Observe that
we further require that the embedding satisfy φ(x) ∈ Y for any
x ∈ X. This ensures the original nodes of network X are mapped
to original nodes of network Y . The restriction is incorporated
because it makes the embedding distance dPE, S(NX , NY ) with
respect to the induced spaces identical to the original embedding
distance dPE(NX , NY ) as we state next.
(QX , rX )
0.5
0.5
c
e
0.5
5.5
a
5.5
6
f
f
0.5
0.5
d
5.5
d
0.5
b
1.5
c
b
3
2
1
0
-1
-2
-3
-6
e
c
a
0
-4
-2
2
4
6
(QY , rY )
1.5
e
1.5
5.5
3
2
1
0
-1
-2
-6
b
e
-4
-2
a
5.5
7
f
f
a
0
1.5
1.5
d
5.5
1.5
b
2.5
c
d
c
2
4
6
6
2.5
b
2.5
2.5
d
5.5
e
b
2
4
6
(QZ , rZ )
2.5
e
2.5
5.5
3
2
1
0
-1
-2
-3
-6
d
c
-4
-2
a
5.5
8
f
f
a
0
Fig. 5. The caveat illustrated in Figure 1 where different networks results in identical multi-dimensional scaling results could be solved by considering the induced
sample space where we utilize the same predetermined sampling strategy -- taking midpoints for all edges -- in the network. Multi-dimensional scaling by adding
interiors would distinguish different networks. The dissimilarities between nodes a and f are not illustrated in the respective induced network due to space limit.
Theorem 2 The function dPE, S : N ×N → R+ defined in (16) is
an embedding metric in the space N and yields the same distance
as the function dPE defined in (5),
dPE, S(NX , NY ) = dPE(NX , NY ),
for all NX , NY .
(17)
The statement in Theorem 2 justifies comparing networks via
their respective induced space. Similar as in Definition 6, defining
max{dPE, S(NX , NY ), dPE, S(NY , NX)} would yield a metric in
the space N mod ∼= and this maximum is the same as dE defined
in (6). Since the induced spaces incorporate more information of
the original networks while at the same time dPE, S(NX , NY ) =
dPE(NX , NY ), an approximation to dPE, S(NX , NY ) via the in-
duced space would be a better approximation to dPE(NX , NY ).
It may appear that the evaluation of the induced space is costly.
However, we demonstrate in the next subsection that the partial
embedding distances have a nice property that if we sample a
number of points in the induced spaces respectively according to
the same rule, the distance between the sampled induced space
is the same as the original distance. Despite that the definition of
interiors of networks is somewhat arbitrary, its practical usefulness
can be justified from Theorem 2.
B. Sampling Of Interiors
In this section, we consider a practical scenario where we
only take several samples in the induced space. We show that
comparing the combination of nodes in the respective original
networks and sampled nodes in the induced space would yield the
same result as comparing the original networks. Given a network
NX = (X, rX ), our aim is to define a sampled induced space
(QX , rX ) where QX ⊃ X includes more nodes compared to X.
An example is in Figure 5, where the original node space is given
by {a, b, c}, and one version of sampled induced node space is
QX = {a, b, c, e, f, g}, the union of the original nodes and the
nodes in the midpoints of the edges in the original networks. The
distance in the sampled induced space rX : QX × QX → R+
should preserve the distance of original points in X. A natural
choice for rX is the restriction of the distance sX defined for the
induced space SX : i.e. given any pair of points x, x′ ∈ QX , let
rX (x, x′) := sX (x, x′). Our key observation for such construction
is that if the nodes in the induced spaces of a pair of networks are
sampled according to the same strategy, then the distance between
the sampled induced space is identical to the original distance.
We start by formally describing what do we mean by a pair of
networks sampled according to the same rule as next.
Definition 9 Given a pair of networks NX = (X, rX ) and NY =
(Y, rY ), their respective sampled space (QX , rX ) and (QY , rY )
form a regular sample pair, if for any mapping φ : X → Y in the
original node set, we have φ(x) ∈ QY for any x ∈ QX , where
φ : SX → SY is the map induced from φ such that φ : x 7→ φ(x)
whose the i-th element in the tuple representation [φ(x)]i is
[φ(x)]i = Xj∈X
1n φ(j) = io xj,
(18)
and for any mapping ψ : Y → X in the original node set, we
have ψ(y) ∈ QX for any x ∈ QX where ψ : SY → SX is
the map induced from ψ such that the j-th element in the tuple
representation of ψ(y) is
[ψ(y)]j =Xi∈Y
1n ψ(i) = jo yi.
(19)
In the definition, 1{ φ(j) = i} is the indicator function such that
it equals one if φ maps j ∈ X to i ∈ Y and 1{ φ(j) = i} = 0
otherwise. The notation [φ(x)]i denotes the proportion of φ(x)
coming from i-th node in Y . It is easy to see that φ in (18) is
well-defined. Firstly, [φ(x)]i ≥ 0 for any i ∈ Y , and
Xi∈Y
[φ(x)]i =Xi∈Y Xj∈X
1n φ(j) = io xj = Xj∈X
xj = 1,
(20)
ensuring φ(x) is in the induced convex hull space SY . Secondly,
for any j ∈ X in the original nodespace, its mapping φ(j) would
have the tuple representation with [φ(j)]i = 1{ φ(j) = i}, a node
in the original node space of Y . Consequently, for any j ∈ X, we
have that φ(j) ∈ Y . Combining these two observations imply that
φ : SX → SY is well-defined. By symmetry, ψ induced from ψ is
also well-defined from SY to SX . Definition 9 states that for any
point x in QX , no matter how we relate points in QX to points in
QY , the mapped node φ(x) should be in the induced sample space
QY . An example of regular sample pair is illustrated in Figure 4,
where QX = {a, b, c, x1, x2, x3, x4, x5, x6, q} is the collection of
original node space and points that are combination of one-third
of original nodes and QY = {u, v, y1, y2}. Figure 4 exemplifies
the scenario for a specific mapping φ with φ(a) = φ(b) = u and
φ(c) = v; it is apparent that φ(x) ∈ QY for any x ∈ QX . We note
that QX = QX/{q} also form a regular sample pair with QY .
A pair of networks NX and NY can be compared by evaluating
their difference in their respective sampled induced space as next.
Definition 10 Given two networks NX = (X, rX ) and NY =
(Y, rY ) with their respective sampled induced space (QX , rX )
and (QY , rY ), for a map φ : QX → QY such that φ(x) ∈ Y for
any x ∈ X, define the difference with respect to φ as
∆QX ,QY (φ) := max
x,x′∈QX(cid:12)(cid:12)(cid:12)
rX (x, x′) − rY (φ(x), φ(x′))(cid:12)(cid:12)(cid:12)
.
(21)
The partial embedding distance from NX to NY measured with
respect to the sampled induced spaces is then defined as
dPE, Q(NX , NY ) :=
φ:QX →QY φ(x)∈Y,∀x∈Xn∆QX ,QY (φ)o. (22)
min
Our key result is that dPE, Q(NX , NY ) is the same as the
partial embedding distance dPE(NX , NY ) defined in (5) when the
sampled space form a regular sample pair.
Theorem 3 When the sampled spaces QX and QY form a
regular sample pair, the function dPE, Q : N ×N → R+ defined in
(21) is an embedding metric in the space N . Moreover, it yields
the same distance as the function dPE defined in (5), i.e.
dPE, Q(NX , NY ) = dPE(NX , NY ),
(23)
for any networks NX and NY .
differentiating
their
sampled
The
statement
networks
as previous
in Theorem 3 gives proper
via
treatments, we
reasoning
induced
for
space. Similar
could define
max{dPE, Q(NX , NY ), dPE, Q(NY , NX )} as a metric in the
space N mod ∼=. Since the sampled induced spaces incorporate
more information of the original networks, an approximation
to dPE, Q(NX , NY ) via the sampled induced space would
be a better approximation to dPE(NX , NY ). Moreover, since
we can construct the sampled induced space following some
predetermined strategy -- taking midpoints for all edges in the
networks, comparing networks via their sampled induced space
is plausible in terms of complexity. Figure 5 illustrate the same
network considered in Figure 1 where the multi-dimensional
scaling based on the sampled induced points would succeed
in distinguishing networks that are different. We illustrate the
practical usefulness of such methods in the next section.
V. APPLICATION
We first illustrate the usefulness of considering interiors of
networks. We consider 10 networks in the form Figure 6 (a)
where γ = 1, 2, . . . , 10. Approximations of network embedding
distances are evaluated. Figure 6 (b) and (c) illustrate the heat-
maps of the distance approximations where the indices in both
horizontal and vertical directions denote the value of γ in the
networks. When interiors are considered by adding midpoints of
edges, e.g. nodes e, f , and g in Figure 6 (a), network distance
approximations illustrated in Figure 6 (b) yield more desired
results, as networks with similar γ are close to each other with
respect to their network distance approximations. This is more
apparent for networks with γ ≤ 5, where the relationships in
the original networks fail to satisfy triangle inequality. A detailed
analysis indicates that adding interior points in the networks
(i) preserve the desired property of embedding distance when
interiors are not considered (the distance approximations in Figure
6 (b) and (c) are very similar for γ > 5 where triangle inequalities
are satisfied) and (ii) fix the undesired issue when the relationships
in the original networks fail to satisfy triangle inequality.
We next consider the comparison and classification of three
types of synthetic weighted networks. Edge weights in all three
types of networks encode proximities. The first type of networks
are with weighted Erdos-R´enyi model [28], where the edge weight
between any pair of nodes is a random number uniformly selected
from the unit interval [0, 1]. In the second type of networks, the
coordinates of the vertices are generated uniformly and randomly
in the unit circle, and the edge weights are evaluated with the
7
Gaussian radial basis function exp(−d(i, j)2/2σ2) where d(i, j)
is the distance between vertices i and j in the unit circle and
σ is a kernel width parameter. In all simulations, we set σ to
0.5. The edge weight measures the proximity between the pair of
vertices and takes value in the unit interval. In the third type of
networks, we consider that each vertex i represents an underlying
feature ui ∈ Rd of dimension d, and examine the Pearson's linear
correlation coefficient ρij between the corresponding features ui
and uj for a given pair of nodes i and j. The weight for the
edge connecting the pair is then set as ρij /2 + 0.5, a proximity
measure in the unit interval. The feature space dimension d is
set as 5 in all simulations. We want to see if network comparison
tools proposed succeed in distinguishing networks generated from
different processes.
We start with networks of equal size X = 25 and construct
20 random networks for each aforementioned type. We then
use the multi-dimensional scaling methods introduced in [17],
[18] to approximate the embedding network distance dE defined
in Definition 6. To evaluate the effectiveness of considering
interiors of networks described in Section IV, we add midpoints
for all edges in a given network; it is apparent that any pair
of networks with interiors defined in this way would form a
regular sample pair. Approximations of the embedding network
distance dE between these networks with midpoints added are then
evaluated. Figure 7 (a) and (b) plot the two dimensional Euclidean
embeddings [29] of the network metric approximations with and
without interiors respectively. All embeddings in the paper are
constructed with respect to minimizing the sum of squares of
the inter-point distances; other common choices to minimize the
sum of four power of the inter-point distances yields similar
results. Networks constructed with different models form clear
separate clusters (1 out of 60 errors with 1.67%) with respect
to approximation of network distances between networks with
interior points added, where networks with Erdos-R´enyi model
are denoted by red circles, networks with unit circle model are
described by blue diamonds, and correlation model represented as
black squares. The clustering structure is not that clear (4 out of
60 errors with 6.67%) in terms of with respect to approximation of
network distances between networks without interior points, but
networks constructed from different models are in general much
more different compared to networks from the same model.
Next we consider networks with number of nodes ranging
between 20 and 25. Two networks are randomly generated for
each network type and each number of nodes, resulting in 60
networks in total. Interiors are examined similarly as before by
adding midpoints for all edges in a given network. Figure 7 (c)
and (d) illustrate the two dimensional Euclidean embeddings of
the network metric approximations with and without interiors
respectively. Despite the fact that networks with same model have
different number of nodes, dissimilarities between network dis-
tance approximations are smaller when their underlying networks
are from the same process. Similar as in the case with same
number of nodes, considering interiors result in a more distinctive
clustering pattern. An unsupervised classification with two linear
boundaries would yield 1 out of 60 errors (1.67%) for networks
with interiors added and 5 errors (8.33%) without interiors.
These results illustrate that (i) comparing networks by using
embedding distance succeeds in identifying networks with differ-
ent properties, and (ii) adding interiors to networks to form regular
sample pair as in Section IV would yield better approximations
to the actual network distances. Admittedly, other methods to
a
g
rX (a, b) = γ
e
rX (b, c) = 11
b
f
rX (a, c) = γ
c
1
2
3
4
5
6
7
8
9
10
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
1
2
3
4
5
6
7
8
9
10
8
0.6
0.5
0.4
0.3
0.2
0.1
0
1
2
3
4
5
6
7
8
9
10
1
2
3
4
5
6
7
8
9
10
(a) 10 networks with γ = 1, 2, . . . , 10
(b) with interiors
(c) without interiors
Fig. 6. Example of the usefulness of considering the interior of networks. We consider 10 networks in the form (a) where γ = 1, 2, . . . , 10. Approximations of
network embedding distances are evaluated. (b) and (c) illustrate the heat-maps of the distance approximations where the indices in both horizontal and vertical
directions denote γ in the networks. When interiors are considered by adding midpoints of edges, e.g. nodes e, f , and g in (a), network distance approximations (b)
yield more desired results, especially for γ ≤ 5 where the relationships in the original networks fail to satisfy triangle inequality.
15
10
5
0
-5
-10
-15
-100
15
10
5
0
-5
20
15
10
5
0
-5
-10
-50
0
50
100
-10
-30
-20
-10
0
10
20
30
40
-15
-40
-30
-20
-10
0
10
20
30
40
50
20
15
10
5
0
-5
-10
-15
-30
-20
-10
0
10
20
30
(a) with interiors, 25 nodes
(b) without interiors, 25 nodes
(c) with interiors, 20 to 25 nodes
(d) without interiors, 20 to 25 nodes
Fig. 7. Two dimensional Euclidean embeddings of the networks constructed from three different models with different number of nodes with respect to the approximation
to the network embedding distance. In the embeddings, red circles denote networks constructed from the Erdos-R´enyi model, blue diamonds represent networks
constructed from the unit circle model, and black squares the networks from the correlation model.
compare networks may also succeed in distinguishing networks,
after some proper treatment towards the issue of different sizes.
Nonetheless,
interior and embedding method would be more
universal, not only for the reason that it establishes an approxi-
mation to the actual network metrics, but also since it provides a
systematic way to analyze if one network can be well matched to
a subset of another network.
VI. CONCLUSION
We present a different perspective to consider networks by
defining a semimetric space induced from all the relationships in
a given network. We demonstrate that comparing the respective
induced space between a pair of networks outputs the identical dis-
tance as evaluating the discrepancy between the original network
by embedding one network into another network, which we prove
to be a valid metric in the space of all networks. Therefore, better
approximations to the network metric distances can be constructed
by examining the respective induced space. We illustrate that
such methods succeed in classifying weighted pairwise networks
constructed from different processes.
APPENDIX A
PROOFS IN SECTION III
Proof of Proposition 1: To prove that dPE is an embedding
metric in the space of networks, we prove the (i) nonnegativity,
(ii) embedding identity, and (iii) triangle inequality properties in
Definition 4.
Since rX (x, x′) −
Proof of nonnegativity property:
rY (φ(x), φ(x′)) is nonnegative, ∆X,Y (φ) defined in (4) also is.
The partial embedding distance must then satisfy dPE(NX , NY ) ≥
0 because it is a minimum of nonnegative numbers.
(cid:4)
Proof of embedding identity property: First, we need to show
that if NX can be isometrically embedded into NY , we must have
dPE(NX , NY ) = 0. To see that this is true recall that for isometric
embeddable networks, there exists a mapping φ : X → Y that
preserves distance functions (1). Then, under this mapping, we
must have ∆X,Y (φ) = 0. Since φ is a particular mapping, taking
a minimum over all mappings as in (5) yields
dPE(NX , NY ) ≤ ∆X,Y (φ) = 0.
(24)
Since dPE(NX , NY ) ≥ 0, it must be that dPE(NX , NY ) = 0 when
NX can be isometrically embedded into NY .
Second, we need to prove dPE(NX , NY ) = 0 must imply that
NX can be isometrically embedded into NY . If dPE(NX , NY ) =
0, there exists a mapping φ : X → Y such that rX (x, x′) =
rY (φ(x), φ(x′)) for any x, x′ ∈ X. This implies that φ is
an isometric embedding and therefore NX can be isometrically
embedded into NY .
(cid:4)
Proof of triangle inequality: To show that the triangle inequality,
let the mapping φ between X and Z and ψ between Z and Y be
the minimizing mappings in (5). We can then write
dPE(NX , NZ) = ∆X,Z (φ), dPE(NZ , NY ) = ∆Z,Y (ψ).
(25)
Since both φ and ψ are mappings, ψ ◦φ would be a valid mapping
from X to Y . The mapping ψ ◦ φ may not be the minimizing
mapping for the distance dPE(NX , NY ). However since it is a
valid mapping with the definition in (5) we can write
dPE(NX , NY ) ≤ ∆X,Y (ψ ◦ φ).
(26)
Adding and subtracting dZ (φ(x), φ(x′)) in the absolute value of
∆X,Y (ψ ◦ φ) = maxx,x′∈X(cid:12)(cid:12)rX (x, x′) − rY (ψ(φ(x)), ψ(φ(x′ )))(cid:12)(cid:12)
and using the triangle inequality of the absolute value yields
∆X,Y (ψ ◦ φ) ≤ max
x,x′∈Xn(cid:12)(cid:12)rX (x, x′) − dZ(φ(x), φ(x′))(cid:12)(cid:12)
dZ (φ(x), φ(x′)) − rY(cid:0)ψ(cid:0)φ(x)(cid:1), ψ(cid:0)φ(x′)(cid:1)(cid:1)(cid:12)(cid:12)(cid:12)o.
+(cid:12)(cid:12)(cid:12)
(27)
We can further bound (27) by taking maximum over each sum-
mand,
(28)
∆X,Y (ψ ◦ φ) ≤ max
x,x′∈X(cid:12)(cid:12)rX (x, x′) − dZ (φ(x), φ(x′))(cid:12)(cid:12)
dZ (φ(x), φ(x′))−rY(cid:0)ψ(cid:0)φ(x)(cid:1), ψ(cid:0)φ(x′)(cid:1)(cid:1)(cid:12)(cid:12)(cid:12)
.
+ max
x,x′∈X(cid:12)(cid:12)(cid:12)
The first summand in (28) is nothing different from ∆X,Z(φ).
Since φ(x), φ(x′) ∈ Z, the second summand in (28) can be further
bounded by
max
dZ (φ(x), φ(x′)) − rY(cid:0)ψ(cid:0)φ(x)(cid:1), ψ(cid:0)φ(x′)(cid:1)(cid:1)(cid:12)(cid:12)(cid:12)
x,x′∈X(cid:12)(cid:12)(cid:12)
z,z ′∈Z(cid:12)(cid:12)dZ (z, z′) − rY(cid:0)ψ(z), ψ(z′)(cid:1)(cid:12)(cid:12) = ∆Z,Y (ψ).
≤ max
These two observations implies that
(29)
∆X,Y (ψ ◦ φ) ≤ ∆X,Z (φ) + ∆Z,Y (ψ).
(30)
Substituting (25) and (26) into (30) yields triangle inequality. (cid:4)
Having proven all statements, the global proof completes.
(cid:4)
Proof of Theorem 1: To prove that dE is a metric in the space
of networks modulo isomorphism, we prove the (i) nonnegativity,
(ii) symmetry, (iii) identity, and (iv) triangle inequality properties
in Definition 3.
Proof of nonnegativity property: Since dPE(NX , NY ) as well
as dPE(NY , NX) are both nonnegative, the embedding distance
must then satisfy dE(NX , NY ) ≥ 0.
(cid:4)
symmetry property:
Since dE(NX , NY ) =
Proof of
dE(NY , NX ) = max{dPE(NX , NY ), dPE(NY , NX )}, the symme-
try property follows directly.
(cid:4)
Proof of identity property: First, we need to show that if NX
and NY are isomorphic, we must have dE(NX , NY ) = 0. To see
that this is true recall that for isomorphic networks there exists a
bijective map φ : X → Y that preserves distance functions (1).
This implies φ is also an injection, and we can find an injection
ψ : Y → X that preserves distance functions (1). Then, under the
injection φ, we must have ∆X,Y (φ) = 0. Since φ is a particular
mapping, taking a minimum over all mappings as in (5) yields
dPE(NX , NY ) ≤ ∆X,Y (φ) = 0.
(31)
Since dPE(NX , NY ) ≥ 0, as already shown, it must be that
dPE(NX , NY ) = 0 when NX are isomorphic to NY . By symmetry
we have dPE(NY , NX ) = 0, which combines with previous
observation implies that dE(NX , NY ) = 0.
Second, we need to prove dE(NX , NY ) = 0 must imply that
NX and NY are isomorphic. By the definition of embedding
distance, dE(NX , NY ) = 0 means dPE(NX , NY ) = 0 and
dPE(NY , NX) = 0. If dPE(NX , NY ) = 0, there exists a mapping
φ : X → Y such that rX (x, x′) = rY (φ(x), φ(x′)) for any
x, x′ ∈ X. Moreover, this also implies the function φ must be
injective. If it were not, there would be a pair of nodes x 6= x′
with φ(x) = φ(x′) = y for some y ∈ Y . By the definition of
networks, we have that
rX (x, x′) > 0,
rY (φ(x), φ(x′)) = rY (y, y) = 0,
(32)
the
contradicts
observation
=
which
rY (φ(x), φ(x′)) for any x, x′ ∈ X and shows that φ must
be injective. By symmetry, simultaneously, if dPE(NY , NX ) = 0,
there exists an injective mapping ψ : Y → X such that
rY (y, y′) = rX (ψ(y), ψ(y′)) for any y, y′ ∈ Y . By applying
that
rX (x, x′)
9
the Cantor-Bernstein-Schroeder Theorem [30, Section 2.6] to the
reciprocal injections φ : X → Y and ψ : Y → X, the existence
of a bijection between X and Y is guaranteed. This forces X and
Y to have same cardinality and φ and ψ being bijections. Pick
the bijection φ and it follows rX (x, x′) = rY (φ(x), φ(x′)) for
all nodes x, x′ ∈ X. This shows that NX ∼= NY and completes
the proof of the identity statement.
(cid:4)
Proof of triangle inequality: To show that the triangle inequality
holds, from the definition of embedding distance, we have that
dE(NX , NY ) = max {dPE(NX , NZ), dPE(NZ , NY )} .
(33)
Since partial embedding distance is a valid embedding metric,
it satisfies triangle inequality in Definition 4, therefore, we can
bound (33) by
dE(NX , NY ) ≤ max(cid:8)dPE(NX , NZ)+dPE(NZ, NY ),
dPE(NY , NZ)+dPE(NZ , NX)(cid:9).
To further bound (34) we utilize the relationship as next.
(34)
Fact 1 Given real numbers a, b, c, d, it holds that
max{a, c} + max{b, d} ≥ max{a + b, c + d}.
(35)
Proof: If a ≥ c and b ≥ d, the inequality holds since the left hand
side is a+b and the right hand side is also a+b. Similarly, if c ≥ a
and d ≥ b, the inequality also holds. What remains to consider are
scenarios of a ≥ c, d ≥ b as well as c ≥ a, b ≥ d. By symmetry,
it suffices to consider the first scenario with a ≥ c, d ≥ b. Under
this scenario, the statement becomes
a + d ≥ max{a + b, c + d}.
(36)
It follows that the state is correct following the assumption. Since
we have considered all scenarios, the proof concludes.
(cid:4)
Back to the proof of triangle inequality, applying Fact 1 onto
(34) yields
dE(NX , NY ) ≤ max(cid:8)dPE(NX , NZ), dPE(NZ, NX )(cid:9)
+ max(cid:8)dPE(NY , NZ ), dPE(NZ, NY )(cid:9).
Substituting the definition of dE(NX , NZ) and dE(NZ , NY ) into
(37) yields
(37)
dE(NX , NY ) ≤ dE(NX , NZ) + dE(NZ , NY ),
(38)
which is the triangle inequality and completes the proof.
Having proven all statements, the global proof completes.
(cid:4)
(cid:4)
Denote d′
C(NX , NY )
Proof of Lemma 2:
to represent
minφ:X→Y,ψ:Y →X max{∆X,Y (φ), ∆Y,X (ψ), δX,Y (φ, ψ)}. In or-
der to prove prove the statement, we show that given any networks
NX and NY , we have that (i) d′
C(NX , NY ) ≤ dC(NX , NY ) and
that (ii) dC(NX , NY ) ≤ d′
Proof of d′
From the defini-
tion of dC(NX , NY ), there exists a correspondent C such that
rX (x, x′) − rY (y, y′) ≤ dC(NX , NY ) for any (x, y), (x′, y′) ∈
C. Define a function φ : X → Y that associates x with an
arbitrary y chosen from the set that form a pair with x in C,
C(NX , NY ) ≤ dC(NX , NY ):
C(NX , NY ).
φ : x 7→ y0 ∈ {y (x, y) ∈ C}.
(39)
Since C is a correspondence the set {y (x, y) ∈ C} is nonempty
for any x implying that φ is well-defined for any x ∈ X. Hence,
(cid:12)(cid:12)rX (x, x′) − rY (φ(x), φ(x′))(cid:12)(cid:12) ≤ dC(NX , NY ),
(40)
for any x, x′ ∈ X. Since (40) is true for any x, x′ ∈ X, it also
true for the maximum pair, and therefore
∆X,Y(φ) =max
x,x′∈X(cid:12)(cid:12)rX (x,x′)−rY (φ(x),φ(x′))(cid:12)(cid:12)≤ dC(NX ,NY). (41)
Define a function ψ : Y → X that associates y with an arbitrary
x chosen from the set that form a pair with y in C,
ψ : y 7→ x0 ∈ {x (x, y) ∈ C}.
Following the similar argument as above would yield us
∆Y,X (ψ) ≤ dC(NX , NY ).
(42)
(43)
recall
Finally,
as
maxx∈X,y∈Y rX (x, ψ(y)) − rY (φ(x), y). In the same time, we
have (x, ψ(y)) ∈ C as well as (φ(x), y) ∈ C, and therefore
δX,Y (φ, ψ)
defined
that
is
max
x∈X,y∈Y
rX (x, ψ(y)) − rY (φ(x), y) ≤ dC(NX , NY ).
(44)
Taking a maximum on both sides of inequlities (41), (43), and
(44) yields
max{∆X,Y (φ), ∆Y,X (ψ), δX,Y (φ, ψ)} ≤ dC(NX , NY ).
(45)
The specific φ and ψ may not be the minimizing mappings for the
left hand side of (45). Nonetheless, they are valid mappings and
therefore taking a minimum over all mappings yields the desired
inequality d′
(cid:4)
C(NX , NY ) ≤ dC(NX , NY ).
Proof of dC(NX , NY ) ≤ d′
C(NX , NY ): From the definition of
d′
C(NX , NY ), there exists a pair of mappings φ : X → Y and
ψ : Y → X such that
rX (x, x′) − rY (φ(x), φ(x′)) ≤ d′
rX (ψ(y), ψ(y′)) − rY (y, y′) ≤ d′
rX (x, ψ(y)) − rY (φ(x), y) ≤ d′
C(NX , NY ),
C(NX , NY ),
C(NX , NY ),
(46)
(47)
(48)
for any x, x′ ∈ X and y, y′ ∈ Y . Define a correspondence by
taking the union of the pairs associated by φ and ψ such that
C = {(x, φ(x)) x ∈ X} ∪ {(ψ(y), y) y ∈ Y } .
(49)
Since φ(x) is defined for any x and ψ(y) is defined for any
y, C is a well-defined correspondence. Notice that any pair
(x, y) ∈ C in the correspondence would be one of the follow-
ing two forms: (x, φ(x)) or (ψ(y), y). Therefore, for any pairs
(x, y), (x′, y′) ∈ C, they must be from one of the following three
forms (i) (x, φ(x)), (x′, φ(x′)), (ii) (ψ(y), y), (ψ(y′), y′), or (iii)
(x, φ(x)), (ψ(y), y). If they are in the form (i), from (46), we can
bound the difference between the respective relationship as
rX (x, x′) − rY (y, y′) ≤ d′
C(NX , NY ).
(50)
If the pairs are in the form (ii), (47) also implies the correct-
ness of (50). Finally, if the pairs are in the form (iii), (50)
would be established from (48). Consequently, (50) holds for
any (x, y), (x′, y′) ∈ C. Therefore, they must also hold true
for the bottleneck pairs achieving the maximum ΓX,Y (C) in
(2) which implies that ΓX,Y (C) ≤ d′
C(NX , NY ). The specific
correspondence C may not be the minimizing one in defining
dC(NX , NY ). Nonetheless, they are valid mappings and therefore
taking a minimum over all mappings yields the desired inequality
dC(NX , NY ) ≤ d′
(cid:4)
C(NX , NY ).
Since we have proven the two inequalities, it follows that dC ≡
d′
C and this completes the proof of the statement.
(cid:4)
10
Proof of Corollary 1: The network distance dC(NX , NY ) would
be no smaller than the right hand side of (7), if we remove the
term δX,Y (φ, ψ) in the maximum, i.e.
dC(NX ,NY ) ≥
min
max{∆X,Y (φ),∆Y,X (ψ)}.
(51)
φ:X→Y,ψ:Y →X
The right hand side of (51) would become smaller if we take
the respective minimum for mappings φ and ψ before taking the
maximum, yielding us
dC(NX ,NY ) ≥ max(cid:26) min
φ:X→Y
∆X,Y (φ), min
φ:Y →X
∆Y,X (ψ)(cid:27). (52)
and (6)
in Definitions 6 and 5,
is not
From (5)
hard to observe
is
(52)
max{dPE(NX , NY ), dPE(NY , NX )} =: dE(NX , NY ), yielding
the desired result dE(NX , NY ) ≤ dC(NX , NY ).
(cid:4)
it
right hand side of
that
the
APPENDIX B
PROOFS IN SECTION IV
Proof of Proposition 3: To prove that space (SX , sX ) induced
from NX = (X, rX ) is a semimetric space, we prove the (i)
nonnegativity, (ii) symmetry, (iii) identity properties in Definition
3 and (iv) sX (p, m) = rX (p, m) when p, m ∈ X.
Since rX (i, j) > 0 for
Proof of nonnegativity property:
any different nodes in the original networks i, j ∈ X, i 6= j,
w⋆
the induced distance
(cid:4)
ij rX (i, j) ≥ 0 in (14). Therefore,
ij rX (i, j) ≥ 0.
sX (p, m) =Pi6=j w⋆
Proof of symmetry property: Given a pair of nodes p, m ∈
SX , we would like to demonstrate that sX (p, m) = sX (m, p).
Denote {w⋆
ij} as the collection of units of transformation along
the direction from i to j in the original network. These vectors
together make up the path from p to m with smallest amount
of transformation. By definition, {w⋆
ij } is the optimal solution to
(13). Denote {v⋆
ij} as the collection of units of transformation
along the direction from i to j which makes up the path from m
to p with the smallest amount of transformation. By definition,
{v⋆
ij} is the optimal solution to the following problem
ij(cid:9) = argmin Xi,j∈X,i<j
(cid:8)v⋆
vij
s. t. pi = mi − Xj∈X,j>i
(53)
vji, ∀i
vij + Xj∈X,j<i
Comparing (13) with (53), it is easy to observe that if we take
vij = −wij for any i < j, the two problems becomes identical.
Therefore, for the optimal solutions, we have the relationship
v⋆
ij = −w⋆
ij for any i < j. By definition in (14), this implies
the two relationships are the same
sX (p, m) = Xi,j∈X,
i<j
ij(cid:12)(cid:12) rX (i, j) = Xi,j∈X,
(cid:12)(cid:12)w⋆
i<j
and completes the proof.
(cid:12)(cid:12)v⋆
ij(cid:12)(cid:12) rX (i, j) = sX (m, p),
(54)
(cid:4)
Proof of identity property: First we want to show that if m and
p are identical points, their induced relationship sX (p, m) = 0.
In such scenario, m and p must have same tuple representation
(m1, . . . , mn) and (p1, . . . , pn) with mi = pi for any i ∈ X. In
this case, it is apparent that the optimal solution {w⋆
ij} in (13) is
w⋆
ij = 0 for any i 6= j. Therefore, sX (p, m) = 0 shows the first
part of the proof for identity property.
2
2
1
1
1
3
2
3
4
1
0-simplex
1-simplex
2-simplex
3-simplex
Fig. 8. Examples of (n − 1)-simplex used in the proof of Proposition 3. The
induced space is the simplex with interior. Points in the original spaces are vertices
of the simplex. The shortest path connecting two vertices is the edge joining them.
can be written sX (p, m) =Pi6=j w⋆
Second, we need to prove sX (p, m) = 0 must imply that p and
m are the same. By definition in (14), the induced relationship
ij rX (i, j), where the original
relationship is always positive with rX (i, j) > 0 for any i 6= j.
Therefore, sX (p, m) = 0 must imply that w⋆
ij given any i 6= j.
Combining this observation with the constraints in (13) imply that
pi = mi for any i ∈ X. Therefore, p and m are identical point
in the induced space, and this completes the proof.
(cid:4)
Proof of the property that sX (p, m) = rX (p, m) when p, m ∈
X: When both p, m ∈ X, the respective tuple representation in
the space is p = (p1, . . . , pn) with pi = 1 if i = p and pi = 0
otherwise, and m = (m1, . . . , mn) with mi = 1 if i = m and
mi = 0. It is apparent that the path with the smallest amount of
transformation from p into m is the exact vector from p to m. Here
we give a geometric proof using Figure 8. The induced space is the
(n − 1)-simplex with interior defined. Nodes p and m correspond
to the vertices in the simplex with their coordinates given by the
tuple representations p = (p1, . . . , pn) and m = (m1, . . . , mn).
The problem in (13) searches for the shortest path in the simplex
joining p to m. It is then apparent that the shortest path should
be the edge joining then; consequently w⋆
pm = 1 for the edge and
w⋆
ij = 0 for any other edges ij. Taking this observation into (14)
implies that sX (p, m) = rX (p, m) and concludes the proof. (cid:4)
Having proven all statements, the global proof completes.
(cid:4)
Proof of Theorem 2: To prove the statements, it suffices to show
dPE, S ≡ dPE. Then the fact that dPE, S is an embedding metric in
the space N follows since dPE is an embedding metric in N .
To prove the equivalence of the pair of distances, we show that
given any networks NX and NY , we have that (i) dPE(NX , NY ) ≤
dPE, S(NX , NY ) and (ii) dPE, S(NX , NY ) ≤ dPE(NX , NY ).
Proof of dPE(NX , NY ) ≤ dPE, S(NX , NY ): From the definition
of dPE, S(NX , NY ), there exists a mapping φ : SX → SY in the
induced space such that
sX (x, x′) − sY (φ(x), φ(x′)) ≤ dPE, S(NX , NY ),
(55)
for any x, x′ ∈ SX . Define a map φ : X → Y with φ : i 7→ φ(i)
for all i ∈ X. The map φ is well defined since φ(x) ∈ Y for any
x ∈ X. Proposition 3 guarantees that rX (i, j) = sX (i, j) when
i ∈ X and j ∈ X. Therefore, we also have rY ( φ(i), φ(j)) =
sY ( φ(i), φ(j)). Substituting these two observations in (55) and
searching for the maximum over all nodes i, j ∈ X yields
≤dPE, S(NX ,NY ). (56)
∆X,Y( φ)=max
i,j∈X(cid:12)(cid:12)(cid:12)
rX (i,j)−rY ( φ(i), φ(j))(cid:12)(cid:12)(cid:12)
The specific φ may not be the minimizing mapping for the left
hand side of (56). Nonetheless, it is a valid mapping and therefore
taking a minimum over all mappings φ : X → Y yields the
desired inequality dPE(NX , NY ) ≤ dPE, S(NX , NY ).
(cid:4)
11
Proof of dPE, S(NX , NY ) ≤ dPE(NX , NY ): From the definition
of dPE(NX , NY ), there exists a mapping φ : X → Y in the
original node space such that
≤ dPE(NX , NY ),
(57)
(cid:12)(cid:12)(cid:12)
rX (i, j) − rY ( φ(i), φ(j))(cid:12)(cid:12)(cid:12)
for any i, j ∈ X. Denote the cardinality of the node sets as X =
n and Y = n′. For any x ∈ SX , it has the tuple representation of
(x1, . . . , xn), and any y ∈ SY possess the tuple representation of
(y1, . . . , yn′). Define a map φ : SX → SY as in (18). We showed
in (20) that φ is a well-defined mapping. For a given pair of points
x, x′ ∈ SX , denote {w⋆
ij} as the collection of weights consisting
the shortest path from x to x′ solving the problem in (13). By
(14), the distance between x and x′ in the induced space SX is
ij rX (i, j). For the mapped
pair φ(x) and φ(x′) in the induced space SY , we show in the next
fact that the optimal path between φ(x) and φ(x′) is the optimal
path between x and x′ mapped under φ.
then given by sX (x, x′) = Pi<j w⋆
Fact 2 Given a pair of networks (X, rX ) and (Y, rY ) with their
respective induced space (SX , sX ) and (SY , sY ), for any pair of
nodes x, x′ in the induced space SX , if {w⋆
ij} is the collection
of weights consisting the optimal path from x to x′ solving the
problem in (13), then {w⋆
φ(i)φ(j)} is the collection of weights
consisting the optimal path from φ(x) to φ(x′) solving the problem
in (13), where w⋆
φ(i)φ(j) is the length traversed along the path
parallel to the direction from φ(i) to φ(j).
Proof : Notice that the map φ may not be surjective; in other
words, if we define SY = {φ(x) x ∈ SX } as the image under
φ, then it is likely that SY ( SY . We first show that the entire path
of the shortest path from φ(x) to φ(x′) must lie entirely inside the
space SY . To see this, define n′′ = { φ(i) i ∈ X} ⊆ Y as the
number of unique elements in Y hit by nodes in X under the map
φ. It then follows that SY is the (n′′ − 1)-simplex (convex hull)
defined by vertices of φ(i) for all i ∈ X. It follows naturally that
n′′ ≤ n′. Therefore, in the language of topology, the (n′′ − 1)
simplex describing SY would be a face of the larger (n′ − 1)-
simplex SY . As an example, if SY is the 3-simplex on the right
of Figure 8 given by vertices [0, 1, 2, 3], then SY would be the
face of this 3-simplex: it may be one of the 2-simplices [0, 1, 2],
[0, 1, 3], [0, 2, 3], or [1, 2, 3], or one of the 1-simplices [0, 1], [0, 2],
[0, 3], [1, 2], [1, 3] or [2, 3], or one of the 0-simplices [0], [1], [2],
or [3]. Both φ(x) and φ(x′) are on this (n′′ − 1)-simplex. It then
follows geometrically that the optimal path transforming φ(x) into
φ(x′) would also be on this (n′′ − 1)-simplex. This implies that
the entire path of the optimal path from φ(x) to φ(x′) must lie
entirely inside the space SY .
Now, suppose the statement in Fact 2 is false, that the optimal
path transforming φ(x) into φ(x′) is not given by {w⋆
φ(i)φ(j)}
as the collection of weights. Since this path is entirely inside
the space SY , it needs to be of the form φ(x) → φ(k0) →
φ(k1) · · · → φ(kL) → φ(x′) for some φ(k0), . . . , φ(kL) ∈ SY .
Denote the collection of weights for this path as {v⋆
φ(i)φ(j)}, where
v⋆
φ(i)φ(j) is the length traversed along the path parallel to the
direction from φ(i) ∈ SY to φ(j) ∈ SY . The assumption that
Fact 2 is false implies that
Xi,j∈X,i<j(cid:12)(cid:12)(cid:12)
v⋆
φ(i)φ(j)(cid:12)(cid:12)(cid:12)
< Xi,j∈X,i<j(cid:12)(cid:12)(cid:12)
w⋆
φ(i)φ(j)(cid:12)(cid:12)(cid:12)
Since φ(k0), . . . , φ(kL) ∈ SY , we have that k0, . . . , kL ∈ SX ,
and therefore the path of the form x → k0 → k1 · · · → kL → x′
.
(58)
k-dimensional subspace P1
c2
k-dimensional subspace P2
c1
x
a
d1
x′′
b1
k + 1-dimensional subspace P
d2
x′
b2
Fig. 9. Illustration for the proof of Fact 3. In order to prove the statement for k+1
from k, we consider x and x′ living in some (k + 1)-dimensional subspace P .
We can then find a point x′′ sharing n − k tuple coefficients with x and therefore
residing in some k-dimensional subspace P1 with x such that the length of the
path from x to x′′ is upper bounded by 1 − Pn
i=k+1 xi and the length of the
path from x′′ to x′ is upper bounded by xk+1. The existence of the path from x
to x′ via x′′ shows the validity of the statement for k + 1.
would be a path in SX from x to x′. This path has the collection
of weights as {v⋆
ij is the length traversed along the
path parallel to the direction from i ∈ X to j ∈ X. Moreover,
utilizing the relationship in (58) yields
ij}, where v⋆
Xi,j∈X,i<j(cid:12)(cid:12)v⋆
ij(cid:12)(cid:12) < Xi,j∈X,i<j(cid:12)(cid:12)w⋆
ij(cid:12)(cid:12) ,
(59)
which contradicts the assumption beforehand that the optimal
path from x to x′ is given by the collection of weights {w⋆
ij}.
Therefore, it must be that the statement in Fact 2 is true and that
{w⋆
φ(i)φ(j)} is the collection of weights consisting the optimal
path from φ(x) to φ(x′) solving the problem in (13).
(cid:4)
Back to the proof of dPE, S(NX , NY ) ≤ dPE(NX , NY ),
leveraging the relationship established in Fact 2, for any pair
x, x′ ∈ X,
the distance between their mapped points φ(x)
and φ(x′) in the induced space is given by sY (φ(x), φ(x′)) =
φ(i)φ(j)rY (φ(i), φ(j)). Therefore,
w⋆
sX (x, x′) − sY (φ(x), φ(x′))
Xi,j∈X,i<j(cid:12)(cid:12)w⋆
ij(cid:12)(cid:12) rX (i, j)−Xi,j∈X,i<j(cid:12)(cid:12)(cid:12)
Pi<j w⋆
=(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
sX (x, x′)−sY (φ(x), φ(x′)) =Xi<j(cid:12)(cid:12)w⋆
w⋆
from w⋆
hand side of in (60) yields
.
(60)
φ(i)φ(j)(cid:12)(cid:12)(cid:12)
rY (φ(i), φ(j))(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
ij(cid:12)(cid:12) rX (i, j)−rY (φ(i), φ(j)).
φ(i)φ(j) is for notation purposes and its value is no different
ij on the right
ij . Therefore, combining terms for each w⋆
(61)
Note that φ(i) = φ(i) and φ(j) = φ(j) by construction.
Substituting (57) into (61) yields an inequality as
sX (x, x′) − sY (φ(x), φ(x′)) ≤Xi<j(cid:12)(cid:12)w⋆
To finish the proof we further boundPi<j w⋆
ij(cid:12)(cid:12) dPE(NX , NY ).
the following important observation for the induced space.
ij ≤ 1 by utilizing
(62)
Fact 3 Consider a network (X, rX ) with its induced space
(SX , sX ) and X = n, for any pair of nodes x, x′ ∈ SX
in the induced space with their respective tuple representation
n). Suppose that x and x′
x = (x1, . . . , xn) and x′ = (x′
share at least n − k of their tuple coefficient such that for any
0 ≤ k ≤ n, we have xl1 = x′
for 1 ≤ li ≤ n − k, then if
l1
ij } from x to x′ solving
1, . . . , x′
the problem in (13) satisfies that
P1≤i≤n−k xlk = α, the optimal path {w⋆
ij(cid:12)(cid:12) ≤ 1 − α.
Xi<j(cid:12)(cid:12)w⋆
12
1, x′
i=1 xi = 1.
1 = x2 and x′
2, x3, . . . , xn), then it is apparent x′
The case with k = 1 do not exist, since Pi xi = Pi x′
Proof: We prove the statement by induction. The base case with
k = 0 is trivial since x and x′ would be the identical points.
i = 1
and therefore we cannot have a single tuple coefficient being
different. For the case with k = 2, without loss of generality,
suppose the two tuple coefficients being different for x and x′
are the first and second, i.e. x = (x1, x2, x3, . . . , xn) and x′ =
(x′
2 = x1
and that the optimal path from x to x′ only involves a path from
i=3 xi from
node 1 to node 2 with length w12 = x1 − x2 ≤ 1 −Pn
requirement Pn
For the induction, suppose the statement is true for k, we would
like to show the validity of the statement for k + 1. Without
loss of generality, suppose the last n − (k + 1) coefficients in
the tuple representations of x and x′ are the same. Hence, they
can be represented as x = (x1, . . . , xk, xk+1, xk+2, . . . , xn) and
x′ = (x′
k+1, xk+2, . . . , xn). x and x′ can therefore
be considered as points in some k + 1-dimensional subspace P ,
see Figure 9. Without loss of generality, we further assume that
xk+1 ≥ x′
k+1. For any node x′′ ∈ SX with tuple representation
x′′ = (x′′
k, xk+1, . . . , xn), it shares the last n − k coeffi-
cients with x and therefore x and x′′ can be considered as some
point in the k-dimensional subspace P1. The statement holds true
for k; consequently, there exists a path with collection of weights
{v⋆
ij} from x to x′′ solving the problem in (13) such that
1 , . . . , x′′
1, . . . , x′
k, x′
n
Xi<j(cid:12)(cid:12)v⋆
ij(cid:12)(cid:12) ≤ 1 −
Xi=k+1
xk.
(64)
We argue that we can find one such x′′ sharing n − k coefficients
with x in the subspace P1 such that there exists a path from x′′
to x′ that only consists of one vector parallel with the direction
from the (k + 1)-th node in X to some node i ∈ X. We give
a proof by geometry here: for the subspace P1, from any points
at its vertices (e.g. b1, c1, or d1 in Figure 9), we could reach
a corresponding point at the vertices (e.g. b2, c2, or d2) of the
subspace P2 via a link parallel to the direction from node the
(k + 1)-th node in X to some node i ∈ X. For example, from b1,
we can reach b2 simply via the vector from b1 to b2. This means
the subspace P1 can cover the subspace P2 by moving along the
direction only consists of one vector parallel to the direction from
node the (k + 1)-th node in X to some node i ∈ X. Hence, we
can find one such x′′ sharing n − k coefficients with x in P1
which can reach x′ via a path only consisting of one vector with
length xk+1 − x′
k+1). Therefore,
we can construct a path with collection of weights {wij} from
x to x′ by transversing the path from x to x′′ with collection of
ij} followed by the line segment from x′′ to x′. This
weights {v⋆
collection of path would have the property that
k+1 (recall we assume xk+1 ≥ x′
Xi<j
wij =Xi<j(cid:12)(cid:12)v⋆
≤ 1 −
n
ij(cid:12)(cid:12) +(cid:12)(cid:12)xk+1 − x′
Xi=k+1
k+1(cid:12)(cid:12) ≤Xi<j(cid:12)(cid:12)v⋆
ij(cid:12)(cid:12) + xk+1
Xi=k+2
xi.
xi! + xk+1 = 1 −
n
(65)
The path from x to x′ via x′′ with collection of weights {wij } may
not be the optimal path from x to x′, but since it is a valid path,
i=k+2 xk,
which shows the statement for k +1. This completes the induction
step and therefore concludes the proof.
(cid:4)
we can safely boundPi<j w⋆
ij ≤Pi<j wij ≤ 1−Pn
(63)
Back to the proof of dPE, S(NX , NY ) ≤ dPE(NX , NY ), con-
sidering the case with k = n and α = 0 in Fact 3 yields
ij ≤ 1 for any pair of nodes x, x′ ∈ SX . Substituting
this relationship into (62) yields
Pij w⋆
sX (x, x′) − sY (φ(x), φ(x′)) ≤ dPE(NX , NY ).
(66)
Since (66) holds true for any x, x′ ∈ SX ,
it must also be
for the pair of nodes yielding the maximum discrepancy be-
tween sX (x, x′) and sY (φ(x), φ(x′)); consequently, this implies
dPE, S(NX , NY ) ≤ dPE(NX , NY ) and concludes the proof.
(cid:4)
Since we have proven the two inequalities, it follows that
dPE, S ≡ dPE and this completes the proof of the statements. (cid:4)
Proof of Theorem 3: To prove the statements, it suffices to show
dPE, Q ≡ dPE. Then the fact that dPE, Q is an embedding metric in
the space N follows since dPE is an embedding metric in N . To
prove the equivalence of the pair of distances, we show that given
any networks NX and NY with the sample spaces form a regular
sample pair, we have that (i) dPE(NX , NY ) ≤ dPE, Q(NX , NY )
and (ii) dPE, Q(NX , NY ) ≤ dPE(NX , NY ).
Proof of dPE(NX , NY ) ≤ dPE, Q(NX , NY ): Utilizing rX (i, j) =
sX (i, j) = rX (i, j) for i, j ∈ X by the definition the sampled
the proof follows from the proof of dPE(NX , NY ) ≤
space,
dPE, S(NX , NY ) in the first part of proof for Theorem 2 in
Appendix B.
(cid:4)
Proof of dPE, Q(NX , NY ) ≤ dPE(NX , NY ): From the definition
of dPE(NX , NY ), there exists a mapping φ : X → Y in the
original node space such that
≤ dPE(NX , NY ),
(67)
(cid:12)(cid:12)(cid:12)
rX (i, j) − rY ( φ(i), φ(j))(cid:12)(cid:12)(cid:12)
for any i, j ∈ X. Define a mapping φ : SX → SY induced from
φ as in (18). The fact that QX and QY form a regular sample
pair implies that φ′(x) ∈ QY for any x ∈ QX and any mapping
φ′ : QX → QY . Therefore, the specific mapping φ : QX → QY
formed by restricting φ : SX → SY onto QX ⊂ SX is also well-
defined. In the second part of proof for Theorem 2 in Appendix
B, we have demonstrated that
≤ dPE(NX , NY ).
(68)
(cid:12)(cid:12)(cid:12)
sX (x, x′) − sY ( φ(x), φ(x′))(cid:12)(cid:12)(cid:12)
for any pair of nodes x, x′ ∈ SX and φ : SX → SY . Restricting
(68) on pair of nodes x, x′ ∈ QX ⊂ SX and the mapping φ =
φQX and utilizing the fact that
rX (x, x′) = sX (x, x′), rY (φ(x), φ(x′)) = sY (φ(x), φ(x′)), (69)
yields the following relationship
rX (x, x′) − rY (φ(x), φ(x′)) ≤ dPE(NX , NY ).
(70)
Since (70) holds true for any x, x′ ∈ QX ,
it must also
be the case for the pairs yielding the maximum discrepancy
between rX (x, x′) and rY (φ(x), φ(x′)); hence,
this implies
dPE, Q(NX , NY ) ≤ dPE(NX , NY ) and completes the proof.
(cid:4)
Since we have proven the two inequalities, it follows that
dPE, Q ≡ dPE and this concludes the proof of the statements. (cid:4)
REFERENCES
[1] S. Wasserman and K. Faust, Social Network Analysis: Methods And Applica-
tions, ser. Structural Analysis in the Social Sciences. Cambridge University
Press, 1994.
[2] O. Sporns, Networks Of the Brain. MIT press, 2011.
[3] T. Wang and H. Krim, "Statistical classification of social networks," in
Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE Int. Conf.
on, Mar 2012, pp. 3977 -- 3980.
13
[4] S. Choobdar, P. Ribeiro, S. Bugla, and F. Silva, "Comparison of co-
authorship networks across scientific fields using motifs," in Advances in
Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM Int.
Conf. on.
IEEE, Aug 2012, pp. 147 -- 152.
[5] R. Singh, J. Xu, and B. Berger, "Global alignment of multiple protein
interaction networks with application to functional orthology detection."
Proc. Nat. Acad. Sci., vol. 105, no. 35, pp. 12 763 -- 12 768, Sep 2008.
[6] L. Peng, L. Liu, S. Chen, and Q. Sheng, "A network comparison algorithm
for predicting the conservative interaction regions in protein-protein inter-
action network," in 2010 IEEE Fifth Int. Conf. on Bio-Inspired Computing:
Theories and Applications (BIC-TA), Sep 2010, pp. 34 -- 39.
[7] L. Yong, Z. Yan, and C. Lei, "Protein-protein interaction network comparison
based on wavelet and principal component analysis," in 2010 IEEE Int. Conf.
on Bioinformatics and Biomedicine Workshops (BIBMW), Dec 2010, pp.
430 -- 437.
[8] N. Shervashidze, S. Vishwanathan, T. H. Petri, K. Mehlhorn, and K. M.
Borgwardt, "Efficient graphlet kernels for large graph comparison," in Int.
Conf. on Artificial Intelligence and Statistics, vol. 5, Apr 2009, pp. 488 -- 495.
[9] E. Bullmore and O. Sporns, "Complex brain networks: graph theoretical
analysis of structural and functional systems," Nature Reviews Neuroscience,
vol. 10, no. 3, pp. 186 -- 198, Mar 2009.
[10] H. Lee, H. Kang, M. K. Chung, B.-N. Kim, and D. S. Lee, "Persistent
brain network homology from the perspective of dendrogram," IEEE Trans.
Medical Image., vol. 31, no. 12, pp. 2267 -- 2277, Dec 2012.
[11] A. C. Wilkerson, T. J. Moore, A. Swami, and H. Krim, "Simplifying the
homology of networks via strong collapses," in Acoustics, Speech and Signal
Processing (ICASSP), 2013 IEEE Int. Conf. on.
IEEE, May 2013, pp. 5258 --
5262.
[12] J.-P. Onnela, J. Saramaki, J. Hyvonen, G. Szab´o, D. Lazer, K. Kaski,
J. Kert´esz, and A.-L. Barab´asi, "Structure and tie strengths in mobile
communication networks." Proc. Nat. Acad. Sci., vol. 104, no. 18, pp. 7332 --
6, May 2007.
[13] G. Kossinets and D. J. Watts, "Empirical analysis of an evolving social
network," Science, vol. 311, no. 5757, pp. 88 -- 90, Jan. 2006.
[14] D. Khmelev and F. Tweedie, "Using markov chains for identification of
writer," Literary and Linguistic Computing, vol. 16, no. 3, Sep 2001.
[15] F. Memoli, "Gromov-Hausdorff distances in Euclidean spaces," in 2008 IEEE
Computer Society Conference on Computer Vision and Pattern Recognition
Workshops, 2008, pp. 1 -- 8.
[16] F. M´emoli, G. Sapiro, and S. Osher, "Solving variational problems and
partial differential equations mapping into general target manifolds," J. of
Computational Physics, vol. 195, no. 1, pp. 263 -- 292, Mar 2004.
[17] A. M. Bronstein, M. M. Bronstein, and R. Kimmel, "Efficient computation
of isometry-invariant distances between surfaces," SIAM J. on Scientific
Computing, vol. 28, no. 5, pp. 1812 -- 1836, Oct 2006.
[18] -- -- , "Generalized multidimensional scaling: a framework for isometry-
invariant partial surface matching," Proc. Nat. Acad. Sci., vol. 103, no. 5,
pp. 1168 -- 1172, Jan 2006.
[19] -- -- , "Robust expression-invariant face recognition from partially missing
Springer, May 2006, pp.
data," in European Conf. on Computer Vision.
396 -- 408.
[20] F. Chazal, D. Cohen-Steiner, L. J. Guibas, F. M´emoli, and S. Y. Oudot,
"GromovHausdorff Stable Signatures for Shapes using Persistence," Euro-
graphics Symp. on Geometry Processing, vol. 28, no. 5, pp. 1393 -- 1403, Jul
2009.
[21] G. Carlsson, F. Memoli, A. Ribeiro, and S. Segarra, "Axiomatic construction
of hierarchical clustering in asymmetric networks," Sep 2014. [Online].
Available: http://arxiv.org/abs/1301.7724
[22] W. Huang and A. Ribeiro, "Metrics in the space of high order networks,"
IEEE Trans. Signal Process., vol. 64, no. 3, pp. 615 -- 629, Feb 2016.
[23] -- -- , "Persistent homology lower bounds on high order network distances,"
IEEE Trans. Signal Process., vol. 65, no. 2, pp. 319 -- 334, Jan 2017.
[24] -- -- , "Persistent homology lower bounds on network distances," in Acous-
tics, Speech and Signal Processing (ICASSP), 2016 IEEE Int. Conf. on,
Shanghai, China, Mar 2016, pp. 4845 -- 4849.
[25] D. Burago, Y. Burago, and S. Ivanov, A Course In Metric Geometry.
American Mathematical Society Providence, 2001, vol. 33.
[26] N. J. Kalton and M. I. Ostrovskii, "Distances between banach spaces," Forum
Math, vol. 11, no. 17-48, 1997.
[27] N. Linial, E. London, and Y. Rabinovich, "The geometry of graphs and some
of its algorithmic applications," Combinatorica, vol. 15, no. 2, pp. 215 -- 245,
Jun 1995.
[28] P. Erdos and A. R´enyi, "On the evolution of random graphs," Publ. Math.
Inst. Hungar. Acad. Sci, vol. 5, pp. 17 -- 61, Jan 1960.
[29] M. A. A. Cox and T. F. Cox, "Multidimensional scaling," in Handbook
Springer
of Data Visualization, ser. Springer Handbooks Comp.Statistics.
Berlin Heidelberg, 2008, pp. 315 -- 347.
[30] A. N. Kolmogorov, S. V. Fomine, and R. A. Silverman, Introductory Real
Analysis. Dover, 1975.
|
1807.07761 | 1 | 1807 | 2018-07-20T09:47:35 | Controllability of Social Networks and the Strategic Use of Random Information | [
"cs.SI",
"physics.soc-ph"
] | This work is aimed at studying realistic social control strategies for social networks based on the introduction of random information into the state of selected driver agents. Deliberately exposing selected agents to random information is a technique already experimented in recommender systems or search engines, and represents one of the few options for influencing the behavior of a social context that could be accepted as ethical, could be fully disclosed to members, and does not involve the use of force or of deception. Our research is based on a model of knowledge diffusion applied to a time-varying adaptive network, and considers two well-known strategies for influencing social contexts. One is the selection of few influencers for manipulating their actions in order to drive the whole network to a certain behavior; the other, instead, drives the network behavior acting on the state of a large subset of ordinary, scarcely influencing users. The two approaches have been studied in terms of network and diffusion effects. The network effect is analyzed through the changes induced on network average degree and clustering coefficient, while the diffusion effect is based on two ad-hoc metrics defined to measure the degree of knowledge diffusion and skill level, as well as the polarization of agent interests. The results, obtained through simulations on synthetic networks, show a rich dynamics and strong effects on the communication structure and on the distribution of knowledge and skills, supporting our hypothesis that the strategic use of random information could represent a realistic approach to social network controllability, and that with both strategies, in principle, the control effect could be remarkable. | cs.SI | cs |
Controllability of Social Networks and the Strategic
Use of Random Information
Marco Cremonini1, Francesca Casamassima2,
1 University of Milan, Italy
2 Sogetel, Italy
* [email protected]
Abstract
This work is aimed at studying realistic social control strategies for social
networks based on the introduction of random information into the state of
selected driver agents. Deliberately exposing selected agents to random
information is a technique already experimented in recommender systems or
search engines, and represents one of the few options for influencing the
behavior of a social context that could be accepted as ethical, could be fully
disclosed to members, and does not involve the use of force or of deception. Our
research is based on a model of knowledge diffusion applied to a time-varying
adaptive network, and considers two well-known strategies for influencing
social contexts. One is the selection of few influencers for manipulating their
actions in order to drive the whole network to a certain behavior; the other,
instead, drives the network behavior acting on the state of a large subset of
ordinary, scarcely influencing users. The two approaches have been studied in
terms of network and diffusion effects. The network effect is analyzed through
the changes induced on network average degree and clustering coefficient, while
the diffusion effect is based on two ad-hoc metrics defined to measure the
degree of knowledge diffusion and skill level, as well as the polarization of
agent interests. The results, obtained through simulations on synthetic networks,
show a rich dynamics and strong effects on the communication structure and on
the distribution of knowledge and skills, supporting our hypothesis that the
strategic use of random information could represent a realistic approach to
social network controllability, and that with both strategies, in principle, the
control effect could be remarkable.
1
Introduction
Structural controllability of networked systems [31] has been extensively
studied since the end of the past decade, following the growing interest in
network science [40]. The property of structural controllability is central in the
study of how the dynamic of a complex system can be controlled [30]. In short,
from control theory, a dynamic system is said to exhibit structural controllability
if, with a suitable selection of inputs, it can be driven from one state to any other
state in finite time. Inputs to the system are represented by driver nodes
receiving external perturbations. Liu et al. in a seminal paper demonstrated how
the problem of determining the minimum set of driver nodes required for
structural controllability can be mapped into a maximum matching problem [32].
Some remarkable theoretical results have been recently demonstrated for
complex networks [10, 12, 38, 53].
In complex physical, biological and social networks the same goal of
controlling the behavior of large populations of interacting entities has been
studied with models of pinning control regulating networks of coupled
dynamical systems. In this case, nodes are dynamical systems coupled
according to the network topology. Direct actions are implemented with a
certain strength over a subset of selected pinned nodes, whose reactions
propagate into the network [22, 51]. The notion of pinning controllability,
conceptually similar to the structural controllability already mentioned, has been
introduced by specifying a reference temporal evolution of the network and two
parameters: a coupling gain and a vector of control gains [47].
Adaptive (or coevolving) networks are models of complex networks
characterized by a mutual interaction between a time-varying network topology
and nodes own dynamics [23]. These are networks whose behavior is mostly
driven by the coevolution of two feedback loops: Nodes dynamics modify the
network topology by creating or removing edges (or changing their weight), and
at the same time, the modified topology influences the dynamics of nodes.
Many real-world complex networks exhibit the coevolution between topology
and nodes dynamics, such as in epidemics [24, 36], opinion and community
formation [26], or socioeconomics networks [18] and relations among
investors [16].
Adaptive networks represent the conceptual framework for this work, which
is based on a network model of knowledge diffusion that presents a coevolution
between nodes and network topology [9]. Nodes interact based on some local
preferences and on a question-answer protocol driven by the difference of some
key attribute values between neighbors. Interaction between nodes modifies the
network topology, which assumes non trivial properties. In its turn, the
dynamically evolving topology changes neighborhood relations among nodes. It
is in this context that we have studied the practical limitations affecting the
selection of the theoretically best suited driver nodes - as we will discuss, under
2
certain circumstances it is possible that the only realistic strategy is the opposite
of what structural/pinning controllability theory would suggest - and on the type
of actions that could be realistically performed in a social context for controlling
an adaptive network.
A relevant theoretical contribution to the problem of controlling adaptive
networks, which takes into account physical and economic constraints, has been
recently presented [33]. Structural permeability is the metric of the propensity
of a network to be controlled. Differently from previous approaches and because
of this closer to our work, the optimal driver nodes selection is studied in
presence of a richer set of constraints: Only some nodes are admissible as driver
nodes and some other nodes should not be directly perturbed by control actions.
This theoretical framework permits to generalize different problems, including
ours (called problem 2 in [33]), which can be formalized as the selection of the
set of driver nodes of minimum cardinality among the set of admissible nodes,
satisfying the constraints that controllable nodes are all nodes and no one is
excluded from perturbation.
However, demonstrating structural/pinning controllability for a social
network is neither always necessary nor sufficient when realistic scenarios are
considered [19, 39]. It is not strictly necessary because often it is not required to
be able to drive a social context from an arbitrary initial state to a specific final
state. In most practical situations, there is the need to tune the dynamical
evolution from one trajectory driving the population towards a negative outcome
to another trajectory, possibly unknown but leading to a better outcome with
respect to the welfare. So, in many practical situations, it is not an optimization
problem the one we should solve when social networks are considered (i.e.,
applying the best inputs to the smallest set of driver nodes in order to reach the
optimal final state), rather it is a problem of finding heuristics for maximizing
the welfare. A possibility is to perturb the system evolution for modifying the
basin of attraction (i.e., modify the dynamics so that the system that was
attracted towards a certain space of final states becomes attracted towards a
different one) [11, 46]. The property of structural controllability is also not
sufficient as a requirement, because often there are practical limitations to the
type of perturbations that could be injected into the system through driver nodes
and also limitations to the accessibility of driver nodes. In many real cases, we
are neither free to choose the best inputs nor to observe and manipulate all
agents. Most important of all constraints, the individuals subject of the social
control observe, judge, and possibly react to the control measures if they are
perceived as unethical, unfair, abusive, or oppressive. The long experience with
advertising campaigns that ultimately produced adverse reactions (i.e.
reactance) [49] or the many criticisms concerning the lack of ethics in the social
experiment run by Facebook [27] are well known. The human individual and
social rich behavior represents the fundamental difference between control
theory for generic complex systems and a control theory for social
3
networks [50].
Goal and Motivations
Different from structural permeability, in our work we consider two peculiar
constraints derived from empirical observations that fundamentally change the
approach. The first is on the nature of admissible direct actions operated on
driver nodes, while the second is on the possibility to engage optimal driver
nodes. With respect to the nature of direct actions, we assume that in a social
context no explicit direct action controlling the behavior of some individuals is
possible unless a contract is enforced, like establishing a sponsorship or signing
for a professional service. Indirect actions are instead admissible by exposing
individuals to new information, either random information or recommendations,
which may or may not produce a change in future activities. We have considered
the effects of random information enlarging the knowledge base of driver nodes
as a control strategy. With the second constraint, we question the assumption,
common in structural/pinning control and network permeability, that the
minimal and optimal set of driver nodes could be practically engaged for
network control actions. We observe instead that there are situations where this
is not the case, one of the more common is when driver nodes charge a fee for
propagating control actions to their neighbors, for example if they are celebrities
or so called 'influencers' in a social network because of their centrality. In these
cases, the price for enrolling a driver node could be high and budget constraints
could restrict their engagement to a sub-optimal number. It is even conceivable
that the price tag that network celebrities would impose could be so high that in
practice none of the driver node that control theory would prescribe can be
actually enrolled. On the contrary, the opposite strategy could become feasible:
To enroll as driver nodes a large number of nodes with limited ability to
propagate control actions, such as common users and lay people, which however
may have unit cost almost irrelevant and could be addressable in bulk through
mass campaigns. This is the common scenario for propaganda and mass
manipulation through a popular media and, anecdotally, a strategy that has
proved effective in several historical occasions.
The considerations regarding the limitations of structural controllability are
the core motivations for the present paper that extends and improves a previous
one, in which we had set the basis for the analysis and provided an initial
discussion of our hypothesis for a realistically acceptable control of social
networks [7]. Here we focus more explicitly on the two well known strategies
for influencing social contexts: The one based on few 'influencers' and the other
based on many ordinary users.
The approaches have been studied in terms of network and diffusion effects,
two concepts that we have adapted to our scenario to discuss the rich dynamics
produced by the use of random information for social network control. The
4
network effect is analyzed through the changes induced on the network average
degree and the clustering coefficient, while the diffusion effect is based on two
ad-hoc metrics defined to measure the degree of knowledge diffusion and skill
level, and of the polarization of agent interests [48].
More specifically, randomness in agent behavior has been modeled as new
topics exogenously inserted in agents' state during a simulation: This event wish
to represent the typical "unsought encounter" of serendipity and modifies both
an agent's criterion of choice of the peers in knowledge diffusion
communication. A first study regarding how to adapt the serendipity concept to
a social network model has been presented in [14].
Finally, the ultimate goal of our work is to demonstrate that exposing selected
agents to random information could be practically used to modify the evolution
of a social network, nudging it towards behaviors that improve the welfare, and
that different strategies to achieve that goal could be realistically elaborated.
Examples of problematic behaviors spontaneously emerging from social
networks abound, for which the ability to exert a control on the dynamics could
be justified. It is well known and documented that in several situations, agents
exhibit a strong polarization [8, 13]. Agents often form tight communities with
few, if any, weak ties between them, heterogeneity of traits and characteristics of
connected agents tend to disappear with the increase of homophily [21, 37]. In
practice, it was often observed how people on social networks tend to slide into
"filter bubbles" [17, 45] - i.e., self-reinforcing social contexts dominated by
information homogeneity with few occasions to have contacts with critical
analyses, information from unaligned sources or contrasting opinions - or, in
knowledge diffusion and networked learning, how knowledge sometimes
diffuses unevenly, for instance agents showing strong tendency towards
specialization like when students/recipients of information grow strong interests
only in a narrow set of topics disregarding the richness of the full information
spectrum [3, 35].
1 Model
Our model of social network is inspired by question-answer networks [54]
where knowledge is shared from expert agents (with respect to a certain topic)
answering questions received from less skilled ones. We assume a set of agents
and a set of topics to be given. Each agent has a certain level of interest and skill
on each topic, both parameters could change interacting with other agents.
More formally, let N be the set of nodes in the network, T be a set of topics
and K be a set of time steps. Let 1 and K indicate the first and last time step.
For each i ∈ N, t ∈ T and k ∈ K, let lk
it ≥ 0 be the level of interest
and skill, respectively, on topic t for node i at time k. For each i, j ∈ N and
i j ≥ 0 be the amount of interaction between nodes i and j at time k,
k ∈ K, let xk
expressed in terms of number of question-answer interactions.
it ≥ 0 and sk
5
j∈T k
i
(t j,lk
it,sk
i =((cid:83)
it)), where T k
i (what i knows at time step k) and a Friend state FSk
Each agent i has a state characterized by two state-vectors called Personal
state PSk
i (who i knows at
time step k). For each i ∈ N, t ∈ T and k ∈ K, the Personal state has the form
i ⊆ T is the subset of topics that agent i knows
PSk
at time step k. In other words, the Personal state holds the list of topics an agent
knows together with the corresponding level of interest and skill. The Friend
i ⊆ N is the subset of agents with
state has the form FSk
whom agent i had interacted up to time step k. For each peer j of agent i, the
number of question-answer interactions xk
directed and weighted graph G (k) = {V , E k} describing the network at time
step k, where V := N is the set of nodes, and E k =(cid:83)
Together, Friend states define the time-varying adjacency matrix A (k) of the
i j up to time step k is recorded.
i j)), where Nk
i =((cid:83)
j∈Nk
i
i∈N FSk
i is the set of
weighted edges recorded by nodes' Friend states. The element of the adjacency
matrix A (k) is computed as follows:
(xk
if (i,j)∈ E k
otherwise
(cid:40) xk
i j
0
ai j(k) =
1.1 Network Construction
A network is dynamically created according to the following steps:
1. Setup: At setup (time step 0), for each agent i, the Personal state PS0
i and corresponding qualities s0
it is the same for all topics T 0
i has
it selected randomly,
i . The Friend state
i , instead, is empty, because we don't assume any preset network
a number of topics T 0
while the level of interest l0
FS0
structure.
2. Topic Selection: At each time step, an agent i(cid:48) is randomly selected and
for that agent a certain topic (t∗ ∈ T k
i(cid:48) ) is selected from its Personal state.
The choice of the topic is a weighted random selection with values of the
associated interests lk
i(cid:48)t∗ as weights, this way topics with higher interest are
more likely to be selected;
3. Peer Selection: Among agent i(cid:48) friends and friends-of-friends holding
topic t∗, the agent i(cid:48)(cid:48) with the higher skill in topic t∗ is selected
(max(sk
jt∗∀ j ∈ FSk
i(cid:48) ∧ FSk
));
FSk
i(cid:48)
4. Successful Communication: The communication between requester agent
i(cid:48) and the selected peer i(cid:48)(cid:48) succeeds if the peer is more skilled than the
requester in topic t∗. The condition for establishing a communication
involves the skill parameter: sk
i(cid:48)(cid:48)t∗ > sk
i(cid:48)t∗;
6
5. Failed Communication, Random Selected Peer: Otherwise, if either Step 3
or 4 fail (i.e., no peer holds topic t∗ or the selected peer is less skilled than
the requester) then select an agent i(cid:48)(cid:48)(cid:48) at random;
6. Communication with Random Selected Peer: If the randomly selected
node holds the selected topic and has a skill greater than that of the
requester agent, the communication succeeds (WHILE (t∗ ∈ T k
sk
i(cid:48)(cid:48)(cid:48)t∗ > sk
i(cid:48)t∗) Communication Succeed).
i(cid:48)(cid:48)(cid:48) AND
For sake of clarity, it is worth noting that the inclusion of friend-of-friend
agents in Step 2 (Peer Selection) is key for network transitivity and the closure
of triangles, two peculiar characteristics of social networks.
The network formation mechanism at start up, instead, with agents having no
friends, is purely random. In particular, considering the six steps just described,
a communication attempt always fails at start up because there is no peer to
select; Step 5 (Failed Communication, Random Selection) and Step 6 (Condition
for Communication with Random Selection) are then executed and the initial ties
are created by those interactions with randomly selected peers that succeed.
1.2 Skill and Interest Update
After a successful interaction, the agent that started the communication is
updated. For simplicity no change in the respondent's state is produced,
assuming that knowledge, being an intangible good, does not decrease when
shared, and there is no cost of processing and transmission. Skill and interest are
always non negative quantities. For the skill parameter associated to each topic
an agent owns, we assumes that it simply increases in chunks calculated as a
fraction of the knowledge difference between two interacting agents. This
implies that in subsequent interactions between two agents, the less skilled one
accumulates knowledge in chunks of diminishing size. In this simple model of
knowledge transmission, skill is a monotonic positive function with diminishing
marginal increments. For completeness, although not specifically relevant for
this work, the model also considers the effect of trust as an enabling factor for
sharing knowledge: The more trust between the two agents, the better the
diffusion of knowledge. Here the assumption is that trust between two
interacting agents is built with successful communication. In this case, when
agents interact for the first time, the chunk of knowledge transferred is reduced
by a discounting factor representing the absence of trust. This discount factor
progressively vanishes with subsequent communications. This is a simplified
form of trust (and distrust) modeling, but motivations could be found in the
literature about collective behavior [15, 20] and refers both to the prevalence of
egocentrism in assimilating new information and to trust dynamics.
The function modeling how agent i(cid:48) improves the skill associated to a certain
7
topics t∗ by interacting with agent i(cid:48)(cid:48) is:
δ si(cid:48)t∗ =
si(cid:48)(cid:48),t∗ − si(cid:48),t∗
γ + ρe− ν
θ
(1)
with:
• si(cid:48)(cid:48),t∗ − si(cid:48),t∗ is the difference of skill level associated to topic t∗ between
agent i(cid:48) and i(cid:48)(cid:48);
• γ ≥ 1 is the control factor for the size of the chunk of knowledge δ skill
that agent i(cid:48) could learn from agent i(cid:48)(cid:48);
θ is the discount factor representing trust;
i(cid:48)i(cid:48)(cid:48) represents the number of successful communication between
agent ni(cid:48) had with agent ni(cid:48)(cid:48) at time step k;
• ρe− ν
• ν = xk
• − ν
θ controls the slope of the trust function between the two agents, with θ
the control factor.
• ρ is the control factor for the actual value of the trust component;
In short, the skill function says that one agent improves its skill with respect
of a certain topic by learning from someone more skilled. The improvement is
always a fraction of the difference of skills between the two and this passage of
knowledge could be influenced by trust relations. From this derives the
monotonicity with decreasing marginal gains.
The dynamics we have assumed for the interest associated to the topic for
which the interaction takes place is slightly different with respect to skills. The
difference is the assumption of bounded total interest an agent could have. In
other words, one cannot extend indefinitely the number of topics he's interested
in or the amount of interest in a certain topic, for the simple reason that time and
efforts are finite quantities. Beside the common sense, motivations for this
assumption can be found in cognitive science studies, which have shown the
tendency of people to shift their attention and interest, rather than behave
incrementally [20], and in associating the interest for a topic to the time spent
dealing with that topic (studying, experimenting, etc.).
With respect to the model and how agent's state parameters are managed, this
assumption means that either interest in topics are simply assumed as fixed
quantities (a grossly unrealistic assumption) or when the interest associated to a
certain topic increases, some other interests associated to all other topics should
decrease. We have modeled this second case letting interests to dynamically
change, and for simplicity, we assume that the the increase of the interest in one
topic is compensated by uniformly decreasing all other interests. A full
discussion of these model assumptions was presented in [3].
8
The function modeling the interest function, for agent i(cid:48) and associated to
topic t∗ depends on the gain in skill defined by function (1), meaning that the
more one learn the more is interested to learn with respect to that topic.
δ li(cid:48),t∗ = α(1− e− δ si(cid:48),t∗
β
)
(2)
with: α > 1 and β > 1 being the two parameters that control, respectively,
the scale and the slope of the interest function, which, again, present diminishing
marginal increments. A specific analysis of self-organization strategies based on
a manipulation of these two parameters could be found in a previous work [3].
Finally, as mentioned before, to a gain in one interest should correspond a
proportional loss in all other interests.
Together these feature of skill and interest functions produce a rich dynamics
that exhibits interesting effects with regard to knowledge diffusion into the
network. In particular, agents acquire different roles with respect to
communication, with a core of tightly connected agents and hubs, and a large
periphery. The network tends to form a giant component, but specific setups
may broke it into several independent ones. In general, the diffusion of
knowledge produced is typically uneven and locally skewed on just few topics.
These are the basic characteristics often debated for real case studies with
populations showing a strong tendency to polarization of interests, echo
chambers, and forms of cultural isolation even in presence of a social network
with a high-degree of connectivity, as the online space now provide.
These are also the key observations that have driven this work, which is
focused on studying how, realistically, a social network with the characteristics
just presented could be controlled in order to govern the process of knowledge
diffusion, if the goal is to achieve a less skewed distribution of skills, a larger
pool of interests shared by agents, and a more effective knowledge diffusion
process.
2 Control Strategies with Random Information
2.1 Goal and Motivations
Based on the model of social network described so far, in this work we study
ways to control the dynamic behavior resulting from simulations. Differently
from traditional control theory that defines controllability of complex systems as
the ability to drive a system from an arbitrary initial state A to an arbitrary final
state B [30, 31], for knowledge diffusion in a social network, explicit control
mechanisms are typically considered unacceptable, unethical, or severely
questioned by the public opinion. This is the case of propaganda, media
manipulation, or mass indoctrination. In a social network the notion of
controllability must necessarily be weaker and more nuanced than in control
9
theory: It should be an action of nudging the system dynamics with the goal of
improving the welfare, rather then an action of tuning a set of inputs that drives
a system from any initial state to any desired final state within finite time [32].
In this vein, an external controller has a limited set of mechanisms and those
mechanisms must be made explicit to the population, otherwise ethical concerns
are likely to prevail or the recipients of those influence attempts could revolt
against them, as sometimes happened for advertising [49]. With respect to the
goal of a control strategy in social networks, it is unlikely to be as precise as in
control theory, which is assumed to be able to drive a system from one arbitrary
state to any other one. Rather, the realistic goal could be to adjust some macro
characteristics of the system, expressed by some metrics, in order to drive the
social network from one basin of possible states to another one [11, 39]. This is,
for instance, the way public policies are produced and enforced by public
authorities for health, education, employment, or safety reasons.
This difference is important, because it permits to discriminate control
strategies that are not realistic from those that could possibly be considered
acceptable in a social context. Acceptability of a control in a social context
depends both on the control mechanism (i.e., how the control is exerted) and the
control goal (i.e., what the control wishes to achieve). In the former case, we
exclude from our analysis all mechanisms that involves the use of force upon a
population and all social controls based on deception and trickery. There could
be exceptional situations when the use of force is acceptable (e.g., for riots,
wars, catastrophes, etc.), but they are out of the scope of this work. In our
scenario, a control strategy should always be announced as a public policy to the
involved population. For the latter aspect, the goal of the control in a social
context should be aimed at enforcing a public policy to improve the welfare, like
reducing inequalities, improving education or social inclusion, or the access to
public services.
More specifically, we assume that a social control strategy is aimed at
modifying the dynamics of a social network to drive it from a certain expected
basin of resulting states, if the network is left free to evolve for a certain time
and based on present configuration, to a different, desired basin of final states
that increases the welfare.
In our case study, the control goal is to achieve a better distribution of
knowledge among the agents by reducing polarization, augmenting the average
skill level and the average number of topics held by agents.
The control mechanism, which we consider acceptable in practice, is the
strategic use of random information. Selected agents will be exposed to new
random information at certain time steps. The hypothesis is that the controlled
exposure to random information, which would not happen if the network is left
free to evolve autonomously, can be opportunistically managed to nudge the
network evolution. Network metrics and some ad-hoc diffusion metrics are
monitored to evaluate the effectiveness of a control strategy. Examples of a
10
similar idea applied to different contexts can be retrieved in recommender
systems [1, 25] and search engine studies [5, 52], which have the related problem
of producing recommendations or search results too heavily influenced by the
personal profile of the requester.
2.2 Network and Diffusion Metrics
To evaluate the effectiveness of control strategies, we consider how exposing a
subset of agents to random information may influence some basic metrics. This
represents our interpretation of acceptable control mechanism applied to a
social network: Some key parameters of the network topology and its dynamics
are influenced in a predictable way and change the original evolution trajectory.
The structure of the network might be modified, as well as the relevance of some
agents with respect to the connectivity or the diffusion of knowledge; it could
also be reduced the polarization of agents and the average number of topics that
agents learn from interactions with others. In short, an acceptable control
mechanism should be able to influence in a predictable way (at least
stochastically) the coevolution of the adaptive network.
In this work, we evaluate two classes of metrics: network metrics and
diffusion metrics. Among the many network metrics defined in the literature, we
focus the analysis on the average degree and the clustering coefficient. Together
these two metrics provide many information about the network topology and the
communication infrastructure. For instance, the type of network can be inferred,
as well as the connectivity distribution between the core and periphery 1. Some
agents typically becomes hubs and exert a strong influence over the
communication and distribution of information in the network. The ability to
modify network metrics such as the average degree and the clustering
coefficient has influence over the hub agents, for instance their prominence
could decline in favor of a more decentralized communication.
The second class of metrics are defined ad-hoc. We have called them
diffusion metrics because their aim is to measure some important attributes of
the spread of topics and interest among the agents. Two metrics have been
defined: Average Knowledge (AK) and Knowledge Diffusion (KD), used to
evaluate different characteristics of the knowledge diffusion dynamics.
AK is calculated as the average skill with respect to the topics actually owned
by agents. In this sense, AK contributes to measure the
specialization/polarization of agents, because AK could be high when agents
knows few topics with high skill levels.
1Network core and periphery are typically defined in terms of assortative mixing. For
assortative networks, as social networks typically are [44], high-degree nodes tend to link
together forming a group of higher mean degree than the network as a whole. This subnetwork is
called the core. Low-degree nodes, instead, being the majority of nodes, form a generic periphery
of lower mean degree than the core [41, 42].
11
KD, instead, is the average skill of agents with respect to the total number of
topics in the network. This means that, implicitly, a topic that an agent does not
own is averaged with skill zero. The meaning of KD is to evaluate the actual
diffusion of knowledge with respect to the case of perfect diffusion, when all
agents hold all topics with maximum knowledge. In this sense, KD is relevant
because it gives an indication of how effectively topics are spread over the
population and with which skill level.
AK =
PSi
∑N
i=1 ∑
j=1 si, j
i=1PSi
∑N
PSi
∑N
i=1 ∑
j=1 si, j
N × T
(3)
(4)
With PSi the number of topics of agent i's' Personal state and T the total
KD =
number of topics in the population.
2.3 Social Control Strategies
For the social network control based on random topics, we assume that, with a
given frequency, a certain subset of agents is selected and a variable number of
random topics, among the ones existing in the network, is inserted into their
Personal state with an average level of interest. The goal is to force the exposure
of some agents to a larger set of topics and exploit the mechanisms of topic and
peer selection described in Section 1.1 to modify the dynamic network behavior.
With regard to network structure, with new random topics, the network
construction mechanism strictly based on topology is occasionally bypassed and
a bridge effect is produced.
Recalling the terminology typical of control theory, we call driver agents the
agents selected for being exposed to new random topics. The key parameters for
defining a social control strategy are: The selection criteria of driver nodes, the
number of random new topics introduced, and the frequency of introduction of
new topics.
The simulations and results discussed in the following will be based on
different choices of these parameters. We made some assumptions with respect
to the parameters choice. For the selection criteria of driver agents, in this work
we focused on just two particularly relevant options: Driver agents are selected
as a fraction of total agents ranked based on the node degree, either in
decreasing on increasing order.
2.3.1 Selection of high-degree driver agents
In this case, driver agents are a certain subset of agents with higher degree (1%
or 10% are the values used in tests). This means that agents exposed to new
12
topics, and whose behavior will be directly perturbed, are those that mostly
centralize the communication in the network. They are the hubs and the nodes
of the network core, typically densely connected. Therefore, with this choice,
very intuitive and similar to strategies adopted in social media and advertising
(e.g., targeting the network influencers), it is the core of the network and the hub
nodes to be directly manipulated. With respect to our metrics, we expect that
few nodes will have a strong influence over the network dynamics and that hub
nodes will increase their degree. Overall, though, this should stimulate a better
communication, with positive effects on the knowledge diffusion.
2.3.2 Selection of low-degree driver agents
In this other case, instead, driver agents are chosen among those with lower
degree. This option may seem counterintuitive, being these agents the least
connected nodes of the periphery of the network, those that typically have the
least influence on communication and spreading processes. It has, however,
some interesting properties. At network level, targeting the periphery of the
network means to directly stimulate the closure of more triangles. This means to
raise the clustering coefficient and foster a more rich decentralized
communication, which may have effects on the network topology. Regarding
diffusion, these nodes are likely those that had fewer connections, typically
connected with other low-degree nodes (i.e., social networks are typically
assortative [4], although some recent experiments have showed that during the
evolution a network could transit from assortative to disassortative [29]), thus
they have a limited choice of peers for exchanging knowledge. Exposing them
to random topics very likely profoundly change their pattern of interaction,
much more than what happen to hub nodes, which were and remain highly
connected. On the other side, the influence that a typical low-degree node has on
communication is very limited, for this reason the number of low-degree agents
that must be selected to produce a clear control effect on the network is much
higher than in the previous case. In our examples we have showed results with
50% and 70% of agents selected as driver agents. The choice of 50 and 70% is
qualitative and motivated by presentation simplicity. The goal here is to show
that, in principle, targeting ordinary users instead of influencers may produce
relevant effects on the coevolving network dynamics, but whether in one case
the driver nodes are a small subset with respect to the whole network
(potentially requiring a high price to be engaged), in the other case the number
of driver nodes is on a different scale, likely a large subset of nodes (possibly
with low unit cost).
2.3.3 Number of new topics
The second important parameter for defining a social control strategy represents
the amount of perturbation that we are introducing in driver agent's Personal
13
state. Instead of an actual number of topics, it is expressed as a rate of new
topics a driver node will receive with respect to the ones already present in its
Personal state. Typical values we have considered are 1%, 10% or 30%, defined
empirically as simply the rate that, on average, gives just one new topic and two
rates that permit to incrementally add new topics during a simulation. For
simplicity, we have assumed that all driver agents receive the same rate of new
topics. Alternatives would have been possible, like simulating fixed amounts of
new topics (we have tried this approach, but preliminary results were not as
interesting as for the fixed rate option), or adjusting the number/rate of new
topics based on contextual information for each agent (we did not explore this
possibility, because it further complicates the model and the dynamics, but it is
promising for developing a "personalized control strategy").
2.3.4 Frequency of new topics
The considerations for the frequency of introduction of new topics are similar to
what discussed for the number of new topics. In this work, for simplicity we
have considered fixed time intervals (measured in number of simulation steps,
called ticks). 1000 ticks is the value used in the examples, for simulations that
typically span over 100000 ticks. As in the previous case, the value is selected
empirically, mostly for sake of presentation. Again, similar to the previous case,
more elaborate time-based strategies were possible and interesting to study. The
action of inserting new topics, instead of being a fixed frequency, could be
triggered by contextual information, like a particular state of the network or
particular values of the metrics, for instance when the overall communication
stagnates. Another, even more elaborate strategy, could be to trigger the addition
of new topics at agent level, when the specific driver agent exhibits a particular
state or behavior (again, another form of "personalized control strategy").
3 Model Instances and Simulation Results
3.1 Basic Settings
The model of knowledge diffusion with social control mechanism is
implemented in Netlogo 2, a multi-agent programmable modeling environment,
which has a proprietary script language and permits to run simulations of
complex networks through the GUI or the API.
All simulations we present here have the basic setting listed in Table 1
(Parameters shared by all instances), chosen mainly for presentation sake, but
still representative of network behaviors observed during tests with a large
number of settings.
2https://ccl.northwestern.edu/netlogo/
14
For the dynamics produced by our model, the rate between the number of
agents and the number of topics N
T is key, because it directly influences the
average number of topics the agents are assigned at setup and the ability to
select peers. It is to simplify the analysis and the presentation that we fixed the
number of topics T and the maximum number of topics assigned to agents at
setup λT , and varied the number of agents N to analyze, at least partially, how
larger populations affect the results (see Table 1 (Network sizes)). In this study,
we focused on small-to-medium sized populations, possibly representing
situations like network learning for traditional academic courses (or even local
subgroups of participants to large online courses interacting in dedicated
forums), or online social networks built around restricted cultural or
professional contexts. Very large communities represent a structurally different
case study, which needs a specific analysis, out of the scope of this study. The
duration of simulations, defined as the maximum number of time steps K,
instead, has been decided empirically as the number of time steps sufficient for
networks produced by our model to reach a steady state.
3.2 Model Instances
Model instances presented in this work are aimed at discussing how the two
strategies for driver agents selection, one selecting a subset based on agents with
higher node degree and the other agents with lower node degree, could be
exploited for controlling the network behavior. The two options have been
compared also with the case of network evolving without any perturbation. The
choice of node degree as the attribute for selecting driver agents has several
references in control theory literature and is an attribute typically analyzed in
social network studies. Several alternatives to degree centrality exist for
selecting driver agents, like betweenness and eigenvector centrality, or more
elaborate criteria based on community detection. However, we feel that before
exploring alternative strategies and study which one could optimize the outcome,
the goal should be to acquire a better understanding with respect to the
possibility to use random information as a social control mechanism in practical
situations. The simple criteria based on node degree has the important benefit of
being intuitive in practice (i.e., selection of leaders/influencers or of common
users/participants) and already exploited for different applications.
Specifically, for the case of high-degree nodes, driver agents are either the
1% or the 10% of the population (see Table 1 (High-degree agent selection)).
For low-degree nodes, driver agents are either the 50% or the 70% of the
population (see Table 1 (Low-degree agent selection)). As previously discussed,
the different characteristics of high- and low-degree nodes with respect
connectivity and controllability makes the comparison of equally sized subsets
not meaningful.
15
Table 1. Parameters for the model instances.
Parameters shared by all instances
Total Number of topics in the system: T = 100
Max Number of topics per agent at setup: λT = 10
Max Number of time steps (max #ticks): K = 100000
Number of New Random Topics per driver agent (% over Ti): 30%
Time interval of New Random Topics Insertion (in #ticks): 1000
Network sizes
Number of agents: N = [100,200,500,1000]
High-degree agent selection
Number of Driver Agents (% over N): [1%, 10%]
Low-degree agent selection
Number of Driver Agents (% over N): [50%, 70%]
3.3 Network and diffusion effects
With simulations we wish to show two distinct effects that together contribute to
define the effectiveness and feasibility of a social control strategy based on
random topics: the network effect and the diffusion effect.
Network effect describes how the addition of new random topics permits to
modify the topology structure of the social network. This effect is one of the
most fundamental for a social control strategy, because by interfering with the
process that produces the network topology, some critical parameters of the
network structure are affected, like the degree and type of assortativity, the size
of independent components, the weight and number of hub nodes in centralizing
the overall communication, and the relation between the core and the periphery
of the network. From these parameters many emerging behaviors and features
depend, for instance the community structure together with the prevalence of
segregation or of echo chambers, the robustness with respect to failures, attacks,
or deception, and the speed and the spread of a diffusion phenomena [34]. The
network effect is measured by typical social network metrics like centrality
metrics, homophily degree, density degree, the analysis of structural holes and
of tie strength among the others. In this work we focused on two metrics among
the most basic ones: average node degree and clustering coefficient, which let to
consider some fundamental aspects of network topology.
With diffusion effect, instead, we mean how the new random topics modify
16
the specific mechanism of knowledge transmission defined by our model. Our
knowledge transmission is ad hoc, but it wishes to represent a general social
context where agents have different skills and different willingness to acquire
new knowledge. Skills are improved based on personal one-to-one contacts
supported by the network topology. This effect is the one interfering with the
topic selection mechanism of driver agents, which in turn affects the peer
selection criteria and consequently changes how likely is a driver agent to
maximize the skills on few topics only or to distribute the interactions on an
extended set of topics. Also, the diffusion effect influences the average
communication efficiency of agents, because by easing the creation of new
interactions, communication congestions and spikes are less likely. We measure
the diffusion effect with the two previously defined ad hoc metrics called
Average Knowledge (AK) and Knowledge Diffusion (KD). AK represents the
average skill level of agents with respect only to the topics they possess. KD
measures the average skill level of agents with respect to all possible topics.
Then, by design, AK is an upper bound for KD.
In particular, KD necessarily starts very low at the beginning of a simulation
because in our settings the number of topics assigned to agents at start up is
limited and the total amount of skill is bounded (i.e., in these simulations, on
average, agents at start up have 5% of the total number of topics T ). Then KD
monotonically increases with the exchanges of knowledge among agents and the
diffusion of topics, up to a value max(KD), which depends on the specific
settings. It represents a measure of the erudition of the social network and gives
an indication of how effectively skills are spread over the population and the
level of knowledge. For our analysis, it is important how fast it approaches AK.
On the contrary, the meaning of AK depends on the run time network state
and it can either increase or decrease. For the same reason KD always starts low,
AK always starts with a value close to the middle of the scale (i.e., at start up
agents have a fixed total amount of skills spread over few topics). From that
point, AK measures how much the proportion of the two quantities varies. It stay
constant if the two change proportionally during the execution; it increases when
agents acquire skill level faster than they acquire new topics; and it decreases
vice versa.
Given these ad hoc metrics, we say that an agent is polarized when it
concentrates its best skills on just very few topics. Polarization of the social
network is another important global characteristics, together with erudition.
Taking into account AK and KD together, the degree of network polarization can
be evaluated. We say that a network tends to polarize when the difference
between AK and KD is increasing, because it means that agents are gaining
skills mostly on the same subset of topics without a corresponding increase in
erudition. On the contrary, a network tends to heterogeneity when the difference
between AK and KD decreases, meaning that agents are starting to spread their
interests on more topics.
17
3.4 Simulation Results
Results of simulations are presented in Figure 1 and Figure 2, which show,
respectively, the network and the diffusion effects of the strategic use of random
topics.
For the network effect, Figure 1 presents how the average node degree and
the clustering coefficient change with respect to the benchmark represented by
the typical network behavior with no injection of random topics in nodes (label
C0 in Figure 1) for three network sizes (N = [100,500,1000]).
The settings involving the addition of random topics are the ones previously
introduced and whose parameters are summarized in Table 1:
• Label HIGH 1% represents the selection of the 1% of high-degree nodes
as driver agents;
• Label HIGH 10% represents the selection of the 10% of high-degree
nodes as driver agents;
• Label LOW 50% represents the selection of the 50% of low-degree
nodes as driver agents;
• Label LOW 70% represents the selection of the 70% of low-degree
nodes as driver agents;
As discussed, the two general strategies tested could be interpreted as the
selection of influencer agents the one labeled as HIGH and the selection of
ordinary users the one labeled as LOW. The choice of the rate of driver agents is
mostly for presentation sake. However, we note that the values of the selection
of high-degree nodes are aligned with the ones for network controllability of
social communication networks analyzed in [32].
3.4.1 Network effect results
For the average degree, the results of Figure 1 present what is called dynamic
average degree, a representation specific for dynamic network behaviors, which
calculates the average node degree taken on certain time step periods (e.g., in
Figure 1, time step periods are [0,100], [100,5000], [5000,10000],
[10000,20000], [20000,40000], [40000,60000],[60000,80000], and
[80000,100000]). The value for each time step period is the average degree
corresponding to active links (new or reused) in that specific period 3.
The form of the dynamic average degree function produce a rich
representation of network behaviors. One aspect that clearly emerges is the
3The values of the dynamic average degree are not calculated with the traditional formula
< d >= 2∗E
N , with E the number of links and N the number of nodes in the network. Instead,
for each time step period (ti−1,ti), with Eti the number of active links in (ti−1,ti), the dynamic
average degree for each time period is < dti >=
2∗Eti
N .
18
spiky behavior of the original network C0 that tends to quickly saturate all
possible connections. The injection of random topics, instead, in all situations,
even for very few driver nodes (e.g., for N = 100, the setting HIGH 1% means
that the node with the highest degree is the only driver agent) is able to produce
a sensible reduction of the average degree with respect to the benchmark C0.
In tests labeled HIGH, driver agents certainly include hub nodes and the large
influence these nodes have on the network structure is clearly demonstrated by
the fact that it suffices to modify the state of a few of them to obtain a wide
effect on the degree metric. The average degree drops from 50 to 80%. This is a
strong network effect and potentially a powerful way of controlling a network
behavior, because it signals a reconfiguration of the communication within the
network.
At first sight, a strong reduction of average node degree might be interpreted
as a sensible reduction of the weight of hub nodes. However, inspecting the
outcome at agent level, it could be observed that this is not the case. The average
degree of hub nodes actually increases, which is reasonable giving the fact that
they receive new topics. The global reduction of average degree is driven by the
average degree reduction in the large periphery of the network. The
communication is even more centralized by few hub nodes and overall the
network tends to become disassortative, similar to the effects discussed in [29].
With respect to the clustering coefficient, the tests show a general increment
compared to the benchmark. This signals that more triangles have formed, a
direct effect of the new connections produced by the introduction of random
topics in hub nodes. Together, the reduction of the average degree and the
increase of the clustering coefficient tends to enhance the small-worldiness of
the network, a characteristic previously not present, which is an important effect
in terms of controllability [28, 43].
Considering the different network sizes, we observe that the degree reduction
is systematic, with results very similar for the larger networks. The case of
N = 100 represents a peculiar situation because in that setting the
communication efficiency is very high and agents establish quickly many
connections. This is the reason for the initial spikes of the average degree in all
situations.
Another interesting result that emerged from these tests is that with respect to
the ability to influence network metrics, both strategies HIGH and LOW could
be effective. However, to have comparable strength, the number of driver nodes
must be necessarily very different in the two cases, as showed in our simulations.
However, there is an important difference between the LOW and the HIGH
strategy with respect to hub nodes. By selecting low-degree nodes as driver
agents, the formation of hub nodes is more difficult and the communication
becomes more decentralized and local. The effect on the communication
structure of the LOW strategy is the opposite of the HIGH one. This difference
appears very clearly in the following diffusion effect.
19
In general, these observations present an interesting practical control problem
still not fully investigated in the literature. While some theoretical results have
been studied for reference network topologies [11, 32, 38], few studies exist that
consider mechanisms for dynamically adjusting the degree of control during the
evolution of a social network.
Figure 1. Network results for the selection of high or low-degree driver agents.
Dynamic Average Degree and Clustering Coefficient simulation results for N =
[100, 500, 1000]. Label C0 represents results of the natural system dynamics
with no addition of random topics. 1% HIGH and 10% HIGH labels represent
results of, respectively, the 1% and the 10% of the high-degree nodes. 50% LOW
and 70% LOW labels represent results of, respectively, the 50% and the 70% of
the low-degree nodes. The x-axis represents time steps as ticks of the simulation;
y-axis represents the average degree (left) and the clustering coefficient (right).
3.4.2 Diffusion effect results
With these tests we have studied how the control strategies affected the diffusion
of topics and of skills in the agent population. Here the goal is to modify the
dynamics in order to reduce the polarization and increase the erudition of the
network. The results are showed in Figure 2 and describe two very different
scenarios for HIGH and LOW strategies. With respect to the HIGH strategy, the
results do not provide evidence of a clear improvement compared with the
benchmark. For N = 100 there is a slight improvement in the actual values of
AK and KD, meaning a larger diffusion of topics and skills (higher erudition),
20
but same high level of polarization. For N = 500 the outcome is opposite:
Actual values are worse than the benchmark, thus a reduced diffusion of topics
and skills, but also a smaller level of polarization. For N = 1000 the results of
both 1% and 10% HIGH are very close to C0 for both AK and KD. In this
regard, selecting the few hub nodes as driver agents do not seems particularly
effective for a better diffusion of knowledge measured as increased erudition
and reduced polarization.
Opposite is the outcome of the LOW strategy. In this case, it appears a
systematic improvement with respect to the benchmark. For all network sizes
and in both settings, 50% and 70%, KD approaches AK very fast as a result of
the addition of new random topics to many nodes. This is a clear sign of no
polarization, meaning that agents are able to distribute their skill over the
enlarged set of topics. For N = 100 there is also a clear improvement in absolute
values of AK and KD, while for N = 500 and N = 1000 AK grows slowly or
tends to stay flat. This behavior signals that skills increase slowly and with
difficulty. The reason is that many nodes with low-degree receive new random
topics, but, after the initial burst of activity with neighbors, most of the time they
are unable to find a peer within the few friends or friends-of-friends. Overall, for
N = 100 we are able to both improve erudition and have no polarization, the
optimal combination for the welfare. For larger networks, instead, adding new
random topics quickly removes polarization because locally the communication
flow efficiently, but the positive effect is then limited by the fact that with few
hub nodes in the network, agents are unable to easily find new peers.
To summarize, with these tests we have showed two possible effects of a
social control strategy based on the addition of new random topics to selected
driver agents. The results are not conclusive, but we have presented some
important differences between addressing the influencers or the ordinary users.
We have also seen how important is to define the goal of a control strategy,
because the ability of manipulating some network metrics does not necessarily
imply to be able of improving context-dependent features like the diffusion of
knowledge, and vice versa.
4 Conclusions
In this paper we discussed a possible use of random topics as control inputs for
driver nodes, based on an adaptive network model for knowledge diffusion, and
two realistic control strategies, one based on high-degree nodes commonly
analyzed in studies of structural/pinning controllability, the other based on
low-degree nodes, which instead had received few attention in controllability
studies, but has practical application in several situations. The idea of using
random information in control strategies has a long tradition in control theory
and could be also retrieved in recommender systems and search engine research,
which share the same problem of excessive polarization of interest and the need
21
Figure 2. Diffusion results for the selection of high or low-degree driver agents.
Average Knowledge (AK) and Knowledge Diffusion (KD) simulation results for N
= [100, 500, 1000]. Label C0 represents results of the natural system dynamics
with no addition of random topics. 1% HIGH and 10% HIGH labels represent
results of, respectively, the 1% and the 10% of the high-degree nodes. 50% LOW
and 70% LOW labels represent results of, respectively, the 50% and the 70% of
the low-degree nodes. The x-axis represents time steps as ticks of the simulation;
y-axis represents the value of AK and KD, which always ranges in [0,100] for
these tests.
to improve diversity that we consider for knowledge diffusion [2, 6]. However,
explicitly considering random information as a control input for social networks
is a new idea worth exploring, in our opinion. The two general strategies for
influencing the coevolving dynamics are based, respectively, on the selection of
few influencers and the manipulation of their behavior in order to drive the
network; and on the selection of many ordinary users as the driver of the
network as a whole. The two approaches have been studied in terms of network
and diffusion effects.
The problem of controlling social networks presents striking differences with
respect to the study of structural controllability for generic complex networks.
The social context introduces many limitations (ethical, operational, functional),
and often does not strictly require full structural controllability, rather the ability
to nudge the network evolution towards a certain basin of results improving the
welfare. For these reasons, the application of control theory to social networks
could be a source of inspiration, but it cannot be applied as-is, because
22
important adaptations are required, which represents a promising and still
largely unexplored research strand.
There are many situations in which it would be important to know how to
handle the level of random information that agents possibly receive. For
instance, in learning situations, in social media, journalism, knowledge
diffusion, skill acquisition, experience dissemination, epidemics, and possibly
risk management. In all these situations, there could be the problem of an
excessive polarization (of interests, attention, analyses) and lack of erudition,
but the solution cannot be to simply change what individuals prefer or believe or
regard as important/interesting. Increasing information heterogeneity and
serendipity could be effective approaches for improving the controllability of
social contexts.
Furthermore, considering that in practical situations it could be impractical to
either recognize all theoretical driver nodes, accessing them with external
perturbations, or sustaining the cost to engage them, we have presented some
empirical solutions based on network metrics for selecting nodes that might
have practical usage. The results of our work look promising to us and
encourage more analyses, tests, and verifications with respect to real social
networks. Other future works will include a theoretical grounding to the results,
the definition of an analytical model and a statistical analysis of a larger test set
to better evaluate the performance of control strategies. Finally, a
socioeconomic study of the conditions leading to prefer a strategy based on
high-degree or on low-degree nodes would perhaps produce new insights with
respect to practical constraints for adaptive network controllability.
References
1. P. Adamopoulos and A. Tuzhilin. On unexpectedness in recommender
systems: Or how to better expect the unexpected. ACM Transactions on
Intelligent Systems and Technology (TIST), 5(4):54, 2015.
2. G. Adomavicius and Y. Kwon. Improving aggregate recommendation
diversity using ranking-based techniques. IEEE Transactions on
Knowledge and Data Engineering, 24(5):896–911, 2012.
3. L. Allodi, L. Chiodi, and M. Cremonini. Self-organizing techniques for
knowledge diffusion in dynamic social networks. In Proceedings of
Complex Networks Conference 2014 (CompleNet14). Bologna, Italy,
2014.
4. A. Barrat, M. Barthelemy, R. Pastor-Satorras, and A. Vespignani. The
architecture of complex weighted networks. Proceedings of the National
Academy of Sciences of the United States of America,
101(11):3747–3752, 2004.
23
5. E. Bozdag. Bias in algorithmic filtering and personalization. Ethics and
information technology, 15(3):209–227, 2013.
6. K. Bradley and B. Smyth. Improving recommendation diversity. In
Proceedings of the Twelfth Irish Conference on Artificial Intelligence and
Cognitive Science, Maynooth, Ireland, pages 85–94. Citeseer, 2001.
7. F. Casamassima and M. Cremonini. Use of random topics as practical
control signals in a social network model. In International Workshop on
Complex Networks and their Applications, pages 539–550. Springer,
2016.
8. D. Centola, J. C. Gonzalez-Avella, V. M. Eguiluz, and M. San Miguel.
Homophily, cultural drift, and the co-evolution of cultural groups.
Journal of Conflict Resolution, 51(6):905–929, 2007.
9. A. Ceselli and M. Cremonini. Models and methods for the analysis of the
diffusion of skills in social networks. In Proceedings of International
Conference in Operation Research (OR2015). Wien, Austria, 2015.
10. Y.-Z. Chen, L. Wang, W. Wang, and Y.-C. Lai. The paradox of
controlling complex networks: control inputs versus energy requirement.
arXiv preprint arXiv:1509.03196, 2015.
11. S. P. Cornelius, W. L. Kath, and A. E. Motter. Realistic control of
network dynamics. Nature communications, 4, 2013.
12. N. J. Cowan, E. J. Chastain, D. A. Vilhena, J. S. Freudenberg, and C. T.
Bergstrom. Nodal dynamics, not degree distributions, determine the
structural controllability of complex networks. PloS one, 7(6):e38398,
2012.
13. D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and S. Suri.
Feedback effects between similarity and social influence in online
communities. In Proceedings of the 14th ACM SIGKDD international
conference on Knowledge discovery and data mining, pages 160–168.
ACM, 2008.
14. M. Cremonini. Introducing serendipity in a social network model of
knowledge diffusion. Chaos, Solitons & Fractals, 90:64–71, 2016.
15. J. da Gama Batista, J.-P. Bouchaud, and D. Challet. Sudden trust collapse
in networked societies. The European Physical Journal B, 88(3):55,
2015.
16. P. DeLellis, A. DiMeglio, F. Garofalo, and F. Lo Iudice. The evolving
cobweb of relations among partially rational investors. PloS one,
12(2):e0171891, 2017.
24
17. D. Easley, J. Kleinberg, et al. Networks, crowds, and markets: Reasoning
about a highly connected world. Significance, 9:43–44, 2012.
18. G. C. Ehrhardt, M. Marsili, and F. Vega-Redondo. Phenomenological
models of socioeconomic network dynamics. Physical Review E,
74(3):036106, 2006.
19. J. Gao, Y.-Y. Liu, R. M. D'Souza, and A.-L. Barab´asi. Target control of
complex networks. Nature communications, 5, 2014.
20. R. L. Goldstone and T. M. Gureckis. Collective behavior. Topics in
Cognitive Science, 1(3):412–438, 2009.
21. B. Golub and M. O. Jackson. How homophily affects the speed of
learning and best response dynamics. 2012.
22. R. Grigoriev, M. Cross, and H. Schuster. Pinning control of
spatiotemporal chaos. Physical Review Letters, 79(15):2795, 1997.
23. T. Gross and B. Blasius. Adaptive coevolutionary networks: a review.
Journal of the Royal Society Interface, 5(20):259–271, 2008.
24. T. Gross, C. J. D. D'Lima, and B. Blasius. Epidemic dynamics on an
adaptive network. Physical review letters, 96(20):208701, 2006.
25. L. Iaquinta, M. De Gemmis, P. Lops, G. Semeraro, M. Filannino, and
P. Molino. Introducing serendipity in a content-based recommender
system. In Hybrid Intelligent Systems, 2008. HIS'08. Eighth
International Conference on, pages 168–173. IEEE, 2008.
26. G. Iniguez, J. Kert´esz, K. K. Kaski, and R. A. Barrio. Opinion and
community formation in coevolving networks. Physical Review E,
80(6):066119, 2009.
27. J. Kleinsman and S. Buckley. Facebook study: a little bit unethical but
worth it? Journal of Bioethical inquiry, 12(2):179–182, 2015.
28. G. Kossinets and D. J. Watts. Empirical analysis of an evolving social
network. science, 311(5757):88–90, 2006.
29. M. Li, S. Guan, C. Wu, X. Gong, K. Li, J. Wu, Z. Di, and C.-H. Lai.
From sparse to dense and from assortative to disassortative in online
social networks. Scientific reports, 4, 2014.
30. C.-T. Lin. Structural controllability. IEEE Transactions on Automatic
Control, 19(3):201–208, 1974.
25
31. Y.-Y. Liu and A.-L. Barab´asi. Control principles of complex networks.
arXiv preprint arXiv:1508.05384, 2015.
32. Y.-Y. Liu, J.-J. Slotine, and A.-L. Barab´asi. Controllability of complex
networks. Nature, 473(7346):167–173, 2011.
33. F. Lo Iudice, F. Garofalo, and F. Sorrentino. Structural permeability of
complex networks to control signals. Nature communications, 6, 2015.
34. Z.-M. Lu and X.-F. Li. Attack vulnerability of network controllability.
PloS one, 11(9):e0162289, 2016.
35. S. Maglajlic. Engineering social networks using the controllability
approach applied to e-learning. In Advanced Learning Technologies
(ICALT), 2012 IEEE 12th International Conference on, pages 276–280.
IEEE, 2012.
36. V. Marceau, P.-A. Noel, L. H´ebert-Dufresne, A. Allard, and L. J. Dub´e.
Adaptive networks: Coevolution of disease and topology. Physical
Review E, 82(3):036116, 2010.
37. M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather:
Homophily in social networks. Annual review of sociology, pages
415–444, 2001.
38. G. Menichetti, L. Dall'Asta, and G. Bianconi. Network controllability is
determined by the density of low in-degree and out-degree nodes.
Physical review letters, 113(7):078701, 2014.
39. A. E. Motter. Networkcontrology. Chaos: An Interdisciplinary Journal
of Nonlinear Science, 25(9):097621, 2015.
40. M. Newman. Networks: an introduction. Oxford university press, 2010.
41. M. E. Newman. Assortative mixing in networks. Physical review letters,
89(20):208701, 2002.
42. M. E. Newman. Mixing patterns in networks. Physical Review E,
67(2):026126, 2003.
43. M. E. Newman. The structure and function of complex networks. SIAM
Review, 45(2):167–256, 2003.
44. M. E. Newman and J. Park. Why social networks are different from other
types of networks. Physical Review E, 68(3):036122, 2003.
45. E. Pariser. The filter bubble: What the Internet is hiding from you.
Penguin UK, 2011.
26
46. D. Pennacchioli, G. Rossetti, L. Pappalardo, D. Pedreschi, F. Giannotti,
and M. Coscia. The three dimensions of social prominence. In
International Conference on Social Informatics, pages 319–332. Springer,
2013.
47. F. Sorrentino, M. di Bernardo, F. Garofalo, and G. Chen. Controllability
of complex networks via pinning. Physical Review E, 75(4):046103,
2007.
48. P. G. Sun. Controllability and modularity of complex networks.
Information Sciences, 325:20–32, 2015.
49. C. E. Tucker. Social networks, personalized advertising, and privacy
controls. Journal of Marketing Research, 51(5):546–562, 2014.
50. J. M. Vardaman, J. M. Amis, B. P. Dyson, P. M. Wright, and R. Van de
Graaff Randolph. Interpreting change as controllable: The role of
network centrality and self-efficacy. Human Relations, 65(7):835–859,
2012.
51. X. F. Wang and G. Chen. Pinning control of scale-free dynamical
networks. Physica A: Statistical Mechanics and its Applications,
310(3):521–531, 2002.
52. R. White. Beliefs and biases in web search. In Proceedings of the 36th
international ACM SIGIR conference on Research and development in
information retrieval, pages 3–12. ACM, 2013.
53. P. Yao, B.-Y. Hou, Y.-J. Pan, and X. Li. Structural controllability of
temporal networks with a single switching controller. PloS one,
12(1):e0170584, 2017.
54. J. Zhang, M. S. Ackerman, and L. Adamic. Expertise networks in online
communities: structure and algorithms. In Proceedings of the 16th
international conference on World Wide Web, pages 221–230. ACM,
2007.
27
|
1507.02103 | 3 | 1507 | 2017-04-12T13:35:33 | Measuring centrality by a generalization of degree | [
"cs.SI",
"physics.soc-ph"
] | Network analysis has emerged as a key technique in communication studies, economics, geography, history and sociology, among others. A fundamental issue is how to identify key nodes, for which purpose a number of centrality measures have been developed. This paper proposes a new parametric family of centrality measures called generalized degree. It is based on the idea that a relationship to a more interconnected node contributes to centrality in a greater extent than a connection to a less central one. Generalized degree improves on degree by redistributing its sum over the network with the consideration of the global structure. Application of the measure is supported by a set of basic properties. A sufficient condition is given for generalized degree to be rank monotonic, excluding counter-intuitive changes in the centrality ranking after certain modifications of the network. The measure has a graph interpretation and can be calculated iteratively. Generalized degree is recommended to apply besides degree since it preserves most favourable attributes of degree, but better reflects the role of the nodes in the network and has an increased ability to distinguish among their importance. | cs.SI | cs |
Measuring centrality by a generalization of degree∗
L´aszl´o Csat´o†
Department of Operations Research and Actuarial Sciences
Corvinus University of Budapest
MTA-BCE "Lendulet" Strategic Interactions Research Group
Budapest, Hungary
April 13, 2017
Abstract
Network analysis has emerged as a key technique in communication studies,
economics, geography, history and sociology, among others. A fundamental issue is
how to identify key nodes, for which purpose a number of centrality measures have
been developed. This paper proposes a new parametric family of centrality measures
called generalized degree.
It is based on the idea that a relationship to a more
interconnected node contributes to centrality in a greater extent than a connection
to a less central one. Generalized degree improves on degree by redistributing its
sum over the network with the consideration of the global structure. Application
of the measure is supported by a set of basic properties. A sufficient condition
is given for generalized degree to be rank monotonic, excluding counter-intuitive
changes in the centrality ranking after certain modifications of the network. The
measure has a graph interpretation and can be calculated iteratively. Generalized
degree is recommended to apply besides degree since it preserves most favourable
attributes of degree, but better reflects the role of the nodes in the network and has
an increased ability to distinguish among their importance.
JEL classification number: D85, Z13
AMS classification number: 15A06, 91D30
Keywords: Network; centrality measure; degree; axiomatic approach
1 Introduction
In recent years there has been a boom in network analysis. One fundamental concept that
researchers try to capture is centrality: a quantitative measure revealing the importance of
nodes in the network. The first efforts to formally define centrality were made by Bavelas
∗ We are grateful to Herbert Hamers for drawing our attention to centrality measures, and to Dezso
Bednay, Pavel Chebotarev and Tam´as Sebesty´en for useful advices.
The research was supported by OTKA grant K 111797 and MTA-SYLFF (The Ryoichi Sasakawa Young
Leaders Fellowship Fund) grant 'Mathematical analysis of centrality measures', awarded to the author in
2015.
† e-mail: [email protected]
1
(1948) and Leavitt (1951). Since then, a lot of centrality measures have been suggested
(for a survey, see Wasserman and Faust (1994); for a short historical account, see Boldi
and Vigna (2014); for some applications, see Jackson (2010)).
Despite the agreement that centrality is an important attribute of networks, there is
no consensus on its accurate meaning (Freeman, 1979). The central node of a star is
obviously more important than the others but its role can be captured in several ways: it
has the highest degree, it is the closest to other nodes (Bavelas, 1948), it acts as a bridge
along the most shortest paths (Freeman, 1977), it has the largest number of incoming
paths (Katz, 1953; Bonacich, 1987), or it maximizes the dominant eigenvector of a matrix
adequately representing the network (Seeley, 1949; Brin and Page, 1998).
An important question is the domain of centrality measures. We examine symmetric
and unweighted networks, i.e. links have no direction and they are equally important, but
non-connectedness is allowed.
The goal of current research is to introduce a centrality concept on the basis of degree
by taking into account the whole structure of the network. It is achieved through the
Laplacian matrix of the network.
This idea has been adopted earlier. For instance, Chebotarev and Shamis (1997)
introduce a connectivity index from which a number of centrality measures can be de-
rived. Klein (2010) defines an edge-centrality measure exhibiting several nice features.
Avrachenkov et al. (2015) propose a new concept of betweenness centrality for weighted
networks with the Laplacian matrix. Masuda et al. (2009), Masuda and Kori (2010) and
Ranjan and Zhang (2013) also use it in order to reveal the overall position of a node in a
network.
We will consider a less known paired comparison-based ranking method called gener-
alized row sum (Chebotarev, 1989, 1994) for the purpose.1 In fact, our centrality measure
redistributes the pool of aggregated degree (i.e.
sum of degrees over the network) by
considering all connections among the nodes, therefore it will be called generalized degree.
The impact of indirect connections is governed by a parameter such that one limit of
generalized degree results in degree, while the other leads to equal centrality for all nodes
(in a connected graph).
While there is a large literature in mathematical sociology on centrality measures,
their comparison and evaluation clearly requires further investigation. We have chosen
the axiomatic approach, a standard path in cooperative game and social choice theory,
in order to confirm the validity of generalized degree for measuring the importance of
nodes. This line is followed by the following authors, among others. Freeman (1979)
states that all centrality measures have an implicit starting point: the center of a star is
the most central possible position. Sabidussi (1966) defines five properties that should be
satisfied by a sensible centrality on an undirected graph. These axioms are also accepted
by Nieminen (1974). Landherr et al. (2010) analyse five common centrality measures on
the basis of three simple requirements concerning their behaviour. Boldi and Vigna (2014)
introduce three axioms for directed networks, namely size, density and score monotonicity,
and check whether they are satisfied by eleven standard centrality measures.
Though, characterizations of centrality measures are scarce. Kitti (2012) provides an
axiomatization of eigenvector centrality on weighted networks. Garg (2009) characterizes
some measures based on shortest paths and shows that degree, closeness and decay cen-
1 Chebotarev and Shamis (1997, p. 1511) note that 'there exists a certain relation between the
problem of centrality evaluation and the problem of estimating the strength of players from incomplete
tournaments'. The similarity between the two areas is mentioned by Monsuur and Storcken (2004), too.
2
trality belong to the same family, obtained by adding only one axiom to a set of four.
Dequiedt and Zenou (2015) present axiomatizations of Katz-Bonacich, degree and eigen-
vector centrality founded on the consistency axiom, which relates the properties of the
measure for a given network to its behaviour on a reduced network. Similarly to our paper,
Garg (2009) and Dequiedt and Zenou (2015) use the domain of symmetric, unweighted
networks.
Centrality measures are often used in order to identify the nodes with the highest
importance, i.e. the center of the network. Monsuur and Storcken (2004) present an
axiomatic characterization of three different center concepts for connected, symmetric
and unweighted networks.
However, a complete axiomatization of generalized degree will not be provided. While
it is not debated that such characterizations are a correct way to distinguish between
centrality measures, we think they have limited significance for applications. If one should
determine the centrality of the nodes in a given network, he/she is not much interested
in the properties of the measure on smaller networks. Characterizations can provide
some aspects of the choice but the consequences of the axioms on the actual network
often remain obscure. From this viewpoint, the normative approach of Sabidussi (1966),
Landherr et al. (2010), or Boldi and Vigna (2014) seems to be more advantageous.
Our axiomatic scrutiny is mainly based on a property from Sabidussi (1966) with
some modification (in fact, strengthening) to eliminate the possibility of counter-intuitive
changes in the centrality ranking of nodes. This requirement is well-known in paired
comparison-based ranking (see, for instance, Gonz´alez-D´ıaz et al. (2014)). In the case
of centrality measures, it has been discussed by Chien et al. (2004) (with a proof that
PageRank satisfies it) and proposed by Boldi and Vigna (2014) as an essential counterpoint
to score monotonicity. Landherr et al. (2010) analyse similar properties of centrality
measures, however, they mainly concentrate on the change of centrality scores (with the
exception of Property 3, not discussed here). Given the aim of most applications, i.e. to
distinguish the nodes with respect to their influence, it makes sense to take this relative
point of view.
This requirement is called adding rank monotonicity. A sufficient condition is given
for the proposed measure to satisfy them, which is an important contribution of us.
It will also be presented that in a star network, generalized degree associates the
highest value to its center, and it means a good tie-breaking rule of degree with an
appropriate parameter choice. On the basis of these results, the measure is recommended
to use besides degree since the measure preserves most favourable attributes of degree
but better reflects the role of the nodes in the network and has a much higher differential
level.
The axiomatic point of view is not exclusive. Borgatti and Everett (2006) criticize
Sabidussi (1966)'s approach because it does not 'actually attempt to explain what cen-
trality is'. Instead of this, Borgatti and Everett (2006) present a graph-theoretic review
of centrality measures that classifies them according to the features of their calculation.
Thus a clear interpretation of generalized degree on the network graph will also be given,
revealing that it is similar to degree-like walk-based measures: a node's centrality is a
function of the centrality of the nodes it is connected to, and a relationship to a more in-
terconnected node contributes to the own centrality to a greater extent than a connection
to a less central one.
The paper proceeds as follows. Section 2 defines the framework, introduces the cen-
trality measure and presents its properties. In Section 3, we discuss the parameter choice
3
by an axiomatic analysis, and highlight the differences to degree. Section 4 gives an inter-
pretation for generalized degree on the network graph through an iterative decomposition.
Finally, Section 5 summarizes the main results and draws the directions of future research.
Because of a new measure is presented, the paper contains more thoroughly investigated
examples than usual.
2 Generalized degree centrality
We consider a finite set of nodes N = {1, 2, . . . , n}. A network defined on N is an
unweighted, undirected graph (without loops or multiple edges) with the set of nodes N.
The adjacency matrix representation is adopted, the network is given by (N, A) such that
A ∈ Rn×n is a symmetric matrix, aij = 1 if nodes i and j are connected and aij = 0
otherwise. If it does not cause inconvenience, the underlying graph will also be referred
to as the network. Two nodes i, j ∈ N are called symmetric if a relabelling is possible
such that the positions of i and j are interchanged and the network still has the same
structure.
A path between two nodes i, j ∈ N is a sequence (i = k0, k1, . . . , km = j) of nodes
such that akℓkℓ+1 = 1 for all ℓ = 0, 1, . . . , m − 1. The network is called connected if there
exists a path between two arbitrary nodes. The network graph should not be connected.
A maximal connected subnetwork of (N, A) is a component of the network. Let N denote
the finite set of networks defined on N, and N n denote the class of all networks (N, A) ∈ N
with N = n.
Vectors are indicated by bold fonts and assumed to be column vectors. Let e ∈ Rn be
given by ei = 1 for all i = 1, 2, . . . , n and I ∈ Rn×n be the identity matrix, i.e., Iii = 1 for
all i = 1, 2, . . . , n and Iij = 0 for all i 6= j.
Definition 1. Centrality measure: Let (N, A) ∈ N n be a network. Centrality measure f
is a function that assigns an n-dimensional vector of nonnegative real numbers to (N, A)
with fi(N, A) being the centrality of node i.
A centrality measure will be denoted by f : N n → Rn. We focus on the centrality
ranking, so centrality measures are invariant under multiplication by positive scalars (nor-
malization): node i is said to be at least as central as node j in the network (N, A) if and
only if fi(N, A) ≥ fj(N, A).
Definition 2. Degree: Let (N, A) ∈ N n be a network. Degree centrality d : N n → Rn is
given by d = Ae.
A network is called regular if all nodes have the same degree.
Degree is probably the oldest measure of importance ever used. It is usually a good
baseline to approximate centrality. The major disadvantage of degree is that indirect
connections are not considered at all, it does not reflect whether a given node is connected
to central or peripheral nodes (Landherr et al., 2010). This attribute is captured by the
following property.
Definition 3. Independence of irrelevant connections (IIC): Let (N, A), (N, A′) ∈ N n
be two networks and k, ℓ ∈ N be two distinct nodes such that A and A′ are identical
but a′
ℓk = 1 − aℓk). Centrality measure f : N n → Rn is called
independent of irrelevant connections if fi(N, A) ≥ fj(N, A) ⇒ fi(N, A′) ≥ fj(N, A′) for
all i, j ∈ N \ {k, ℓ}.
kℓ = 1 − akℓ (and a′
4
Independence of irrelevant connections is an adaptation of the axiom independence
of irrelevant matches, defined for general tournaments (Rubinstein, 1980; Gonz´alez-D´ıaz
et al., 2014). It is used in a modified form for a characterization of the degree center
(i.e. nodes with the highest degree) under the name partial independence (Monsuur and
Storcken, 2004).
Lemma 1. Degree satisfies IIC.
Example 1 shows that independence of irrelevant connections is an axiom one would
rather not have.
Figure 1: Networks of Example 1
(a) Network (N, A)
3
(b) Network (N, A′)
3
2
2
4
4
1
1
5
5
Example 1. Consider the networks (N, A), (N, A′) ∈ N 5 on Figure 1. Note that nodes
1 and 4, and 2 and 3 are symmetric in (N, A), moreover, nodes 1 and 5, and 2 and 4 are
symmetric in (N, A′). d2 = d3 = 2 in both cases, but node 3 seems to be more central in
(N, A′) than node 2.
The following centrality measure will be able to eliminate this shortcoming of degree.
It uses the Laplacian matrix L = (ℓij) ∈ Rn×n of the network (N, A), given by ℓij = −aij
for all i 6= j and ℓii = di for all i = 1, 2, . . . , n.
Definition 4. Generalized degree: Let (N, A) ∈ N n be a network. Generalized degree
centrality x(ε) : N n → Rn is given by (I + εL)x(ε) = d, where ε > 0 is a parameter.
Parameter ε reflects the role of indirect connections, it is responsible for taking into
account the centrality of neighbours, hence for breaking IIC.
Remark 1. A straightforward formula for the generalized degree of node i is
di = xi(ε) + ε Xj∈N \{i}
aij [xi(ε) − xj(ε)] .
(1)
Example 2. Consider the networks (N, A), (N, A′) ∈ N 5 on Figure 1. Generalized degree
centrality is as follows:
x(ε)(N, A) = (cid:20) 1 + 3ε
1 + 2ε
,
2 + 3ε
1 + 2ε
,
2 + 3ε
1 + 2ε
,
1 + 3ε
1 + 2ε
, 0(cid:21)⊤
;
x(ε)(N, A′) =
1
1 + 8ε + 21ε2 + 20ε3 + 5ε4
Thus x2(ε)(N, A) = x3(ε)(N, A) but x2(ε)(N, A′) < x3(ε)(N, A′).
1 + 9ε + 27ε2 + 30ε3 + 8ε4
2 + 15ε + 37ε2 + 33ε3 + 8ε4
2 + 16ε + 40ε2 + 34ε3 + 8ε4
2 + 15ε + 37ε2 + 33ε3 + 8ε4
1 + 9ε + 27ε2 + 30ε3 + 8ε4
.
5
Remark 2. Generalized degree violates IIC for any ε > 0.
Some basic attributes of generalized degree are listed below.
Proposition 1. Generalized degree satisfies the following properties for any fixed param-
eter ε > 0:
1. Existence and uniqueness: a unique vector x(ε) exists for any network (N, A) ∈ N .
2. Anonymity (ANO): if the networks (N, A), (σN, σA) ∈ N are such that (σN, σA)
is given by a permutation of nodes σ : N → N from (N, A), then xi(ε)(N, A) =
xσi(ε)(σN, σA) for all i ∈ N.
3. Degree preservation: Pi∈N xi(ε) = Pi∈N di for any network (N, A) ∈ N .
4. Zero presumption (ZP ): xi(ε) = 0 if and only if di = 0, i is an isolated node.
5. Independence of disconnected parts (IDCP ): if the networks (N, A), (N, A′) ∈ N
ik = 0 for all i ∈ N 1,
ij for all i, j ∈ N 1, then xi(ε)(N, A) = xi(ε)(N, A′) for all
are such that N 1 ∪ N 2 = N, N 1 ∩ N 2 = ∅ and aik = 0, a′
k ∈ N 2 and aij = a′
i ∈ N 1 and Pi∈N 1 xi(ε)(N, A) = Pi∈N 1 xi(ε)(N, A′) = Pi∈N 1 di.2
6. Boundedness: min{di : i ∈ N} ≤ xj(ε) ≤ max{di : i ∈ N} for all j ∈ N and for
any network (N, A) ∈ N .
7. Agreement: limε→0 x(ε) = d and limε→∞ x(ε) = (Pi∈N di/n) e for any connected
network (N, A) ∈ N .
8. Flatness preservation (F P ): xi(ε) = xj(ε) for all i, j ∈ N if and only if the network
is regular.
Proof. The statements above will be proved in the corresponding order.
1. The Laplacian matrix of an undirected graph is positive semidefinite (Mohar, 1991,
Theorem 2.1), hence I + εL is positive definite.
2. Generalized degree is invariant under isomorphism, it depends just on the structure
of the graph and not on the particular labelling of the nodes.
3. Sum of columns of L is zero.
4. If di = 0, then xi(ε) = 0 since the corresponding row of L contains only zeros. If
xi(ε) = 0 then xj(ε) ≥ xi(ε) for any j ∈ N, so di = 0 due to formula (1).
5. Formula (1) gives the same equation for node i ∈ N 1 in the case of (N, A) and
(N, A′), and generalized degree is unique. Sum of equations concerning nodes in
N 1 gives Pi∈N 1 xi(ε)(N, A) = Pi∈N 1 xi(ε)(N, A′) = Pi∈N 1 di.
6. Let xj(ε) = min{xi(ε) : i ∈ N}. Equation (1) results in
ajk [xj(ε) − xk(ε)] = dj,
xj(ε) + ε Xk∈N
where the second term of the sum on the left-hand side is non-positive and dj ≥
min{di : i ∈ N}. The other inequality can be shown analogously.
2 Degrees in the component given by the set of nodes N 1 are the same in (N, A) and (N, A′) due to
the condition aij = a′
ij for all i, j ∈ N 1.
6
7. The first identity, limε→0 x(ε) = d, is obvious.
Let limε→∞ xj(ε) = max{limε→∞ xi(ε) : i ∈ N}. If limε→∞ xj(ε) > limε→∞ xh(ε)
for any h ∈ N, then exists k, m ∈ N such that limε→∞ xk(ε) = limε→∞ xj(ε) =
max{limε→∞ xi(ε) : i ∈ N} > limε→∞ xm(ε) and akm = 1 due to the connectedness
of (N, A).3 But dk = xk(ε) + εPℓ∈N akℓ [xk(ε) − xℓ(ε)] ≥ ε [xk(ε) − xm(ε)] from
formula (1), which is impossible when ε → ∞.
8. It can be verified that xi(ε) = di satisfies (I +εL)x(ε) = d if di = dj for all i, j ∈ N.
xi(ε) = xj(ε) for all i, j ∈ N implies Lx(ε) = 0, so x(ε) = d.
❏
ANO contains symmetry (Garg, 2009), namely, two symmetric nodes have equal cen-
trality. It provides that all nodes have the same centrality in a complete network, too.
The name of the measure comes from the property degree preservation, it can be
perceived as a centrality measure redistributing the sum of degree among the nodes.
ZP and INRP address the issue of disconnected networks. ZP is an extension of
the axiom isolation (Garg, 2009), demanding that an isolated node has zero centrality.
INRP shows that the centrality in a component of the network are independent from
other components.
Boundedness means that centrality is placed on an interval not broader than in the
case of degree. It is easy to prove that the stronger condition of min{di : i ∈ N} < xj(ε)
or xj(ε) < max{di : i ∈ N} is also satisfied if node j is at least indirectly connected to a
node with a greater or smaller degree, respectively.
According to agreement, the limits of generalized degree are degree and equal central-
ity on all connected components of a network (because of independence of disconnected
parts).
F P means that generalized degree results in a tied centrality between any nodes if and
only if degree also gives equal centrality for all nodes. Note that it is true for any fixed
ε, so it could not occur that generalized degrees are tied between any two nodes only for
certain parameter values. It also shows that two nodes may have the same generalized
degree for any ε > 0 not only if they are symmetric as there exists regular graphs with
non-symmetric pairs of nodes.
Degree also satisfies the properties listed in Proposition 1 (except for agreement).
Figure 2: Network of Example 3
2
1
3
5
4
6
3 There exists a path from node j to node h due to connectedness. Along this path one should find
such k, m ∈ N , for example, k = j and m = h if ajh = 1.
7
Example 3. Consider the network on Figure 2 where both normal and dashed lines
indicate connections. Generalized degrees with various values of ε are given on Figure 3.
Nodes 1 and 2, and 4 and 5 are symmetric thus the two pairs have the same centrality for
any parameter values. Degree gives the ranking 3 ≻ (4 ∼ 5) ≻ 6 ≻ (1 ∼ 2). Generalized
degrees of nodes 3, 4 and 5 monotonically decrease, while the generalized degree of nodes
1 and 2 increases. However, the centrality of node 6 is not monotonic, for certain ε-s it
becomes larger than its limit of 7/3 (see the property agreement in Proposition 1).
It results in two changes in the centrality ranking with the watersheds of ε1 = 1/2 and
ε2 = (cid:16)2 + √6(cid:17) /2. In the case of 0 < ε < ε1 the central node is 3, while for ε > ε1 the
suggestion is 4 and 5. If ε > ε2, then node 6 becomes more central than node 3.
Figure 3: Generalized degrees in Example 3
4
3.5
x3(ε)
3
x4(ε)
2.5
x6(ε)
2
1.5
x1(ε)
1
10−2
10−1
100
101
Value of ε (logarithmic scale)
x1(ε) = x2(ε)
x3(ε)
x4(ε) = x5(ε)
x6(ε)
Remark 3. According to Chebotarev and Shamis (1997), the diagonal entries qii of the
matrix Q = (I + αL)−1, α > 0 may serve as a measure of solitariness, that is, an 'inverse'
centrality index.
Despite its similar formula, this measure is not concordant with generalized degree.
Consider the network on Figure 4, which is a 3-regular graph with 8 vertices. According to
the property F P of Proposition 1, generalized degree gives the ranking (1 ∼ 2 ∼ · · · ∼ 8),
while 1 − qii results in (1 ∼ 3 ∼ 5) ≻ (2 ∼ 4) ≻ (6 ∼ 7 ∼ 8). The latter method
'punishes' nodes 2 and 4 because they have a difficulty in reaching 6, 7 and 8, and vice
versa. However, it is not clear whether this differentiation is desirable in a regular graph.
3 An axiomatic review of generalized degree
The interpretation of generalized degree on the network gives few information about the
appropriate value of parameter ε. Here we use the axiomatic approach in order to get an
8
Figure 4: Network of Remark 3
1
2
8
7
3
4
6
5
insight into it.
Freeman (1979) states that all centrality measures have an implicit starting point: the
central node of a star is the most central possible position.
Definition 5. Star center base (SCB): Let (N, A) ∈ N n be a star network with i ∈ N
at the center, that is, aij = 1 for all j 6= i and ajk = 0 for all j, k ∈ N \ {i}. Centrality
measure f : N n → Rn is star center based if fi(N, A) > fj(N, A) for all j ∈ N \ {i}.
The following requirement capture the essence of 'dynamic' monotonicity with respect
to the centrality ranking.
Definition 6. Adding rank monotonicity (ARM): Let (N, A), (N, A′) ∈ N n be two
networks and i, j ∈ N be two distinct nodes such that A and A′ are identical but aij = 0
and a′
ij = 1. Centrality measure f : N n → Rn is adding rank monotonic if fi(N, A) ≥
fk(N, A) ⇒ fi(N, A′) ≥ fk(N, A′) and fi(N, A) > fk(N, A) ⇒ fi(N, A′) > fk(N, A′) for
all k ∈ N \ {i, j}.
ARM implies that, other nodes cannot benefit more from adding an edge between i
and j than the nodes involved with respect to the centrality ranking. The supplementary
condition excludes the possibility that node i is more central than another node in the
network (N, A) but they are tied in (N, A′).
A version of ARM, focusing on the nodes with the highest centrality, appeared in
Sabidussi (1966) and Nieminen (1974). According to our knowledge, in this form ARM
was first introduced by Chien et al. (2004) for directed graphs. Boldi and Vigna (2014)
argue for the use of rank monotonicity in order to exclude pathological, counter-intuitive
changes in centrality. However, they leave the study of such an axiom for future work. A
review of other monotonicity axioms can be found in Landherr et al. (2010) and Boldi
and Vigna (2014).
Note that the centrality measure associating a constant value to every node of every
network satisfies ARM but does not meet SCB. Degree is star center based and adding
rank monotonic.
Proposition 2. Generalized degree satisfies SCB.
9
Proof. Let xℓ = xℓ(ε)(N, A) for all ℓ ∈ N. Due to anonymity (see Proposition 1), xj = xk
for any j, k ∈ N \ {i}. Formula (1) gives two conditions for the two variables:
[1 + ε(n − 1)] xi − ε(n − 1)xj = n − 1
(1 + ε) xi − εxj = 1.
It can be checked that the solution is
xi =
(n − 1)(1 + 2ε)
1 + εn
and
xj =
1 + ε(2n − 1) + 2ε2(n − 1)
(1 + ε)(1 + εn)
,
hence
xi − xj =
n − 2
1 + εn
> 0.4
❏
SCB means only a validity test, it is a 'natural' requirement for any centrality measure.
Now a sufficient condition is given for generalized degree to be adding rank monotonic.
Let d = max{di : i ∈ N} be the maximal and d = min{dk : k ∈ N} be the minimal
degree, respectively, in a network (N, A) ∈ N .
Theorem 1. Generalized degree satisfies ARM if
(d − d)h(2d + 4)ε3 + 2ε2 + εi ≤ 1.
The proof of this statement is not elegant, therefore one can see it in the Appendix.
In a certain sense, Theorem 1 is not surprising because degree satisfies ARM and x(ε)
is close to it when ε is small.5 Our main contribution is the calculation of a sufficient
condition. Note that it depends only on the minimal and maximal degree as well as on ε
but not on the the number of nodes. Nevertheless, since the network graph is unweighted,
d − d ≤ n − 1, therefore the condition (n − 1) [(2d + 4)ε3 + 2ε2 + ε] ≤ 1 provides ARM,
too.
Parameter ε is called reasonable if it satisfies (d − d) [(2d + 4)ε3 + 2ε2 + ε] ≤ 1 for
the network (N, A) ∈ N . It is always satisfied for a regular network where d = d. The
value of ε is decreasing in the maximal degree and, especially, in the difference of maximal
and minimal degree. However, it does not become extremely small for sparse networks,
where the difference of maximal and minimal degrees can be significantly smaller than
the number of nodes.
Note the analogy to the (dynamic) monotonicity of generalized row sum method (Cheb-
otarev, 1994, Property 13).
Similarly to Sabidussi (1966), strict inequalities can be demanded in ARM (i.e. adding
an edge between nodes i and j eliminates all ties – except for against j – with i in the
centrality ranking) but it does not affect our discussion, all results remain valid with a
corresponding modification of inequalities.
According to the following example, violation of ARM can be a problem in practice.
4 n ≥ 3 is necessary to get a meaningful start network.
5 There exists an appropriately small ε satisfying the condition of Theorem 1 for any d and d.
10
Example 4. Consider the networks (N, A), (N, A′) ∈ N 6 on Figure 2 such that (N, A) is
given by the normal edges and (N, A′) is obtained from (N, A) by adding the two dashed
edges between nodes 1 and 3, and nodes 2 and 3.
Axiom ARM demands that xi(ε)(N, A) ≥ xk(ε)(N, A) ⇒ xi(ε)(N, A′) ≥ xk(ε)(N, A′)
and xi(ε)(N, A) > xk(ε)(N, A) ⇒ xi(ε)(N, A′) > xk(ε)(N, A′) for all i = 1, 2, 3 and
j = 4, 5, 6. However, x3(ε = 3)(N, A) = x6(ε = 3)(N, A) since nodes 3 and 6 are
symmetric in (N, A) but x3(ε = 3)(N, A′) < x6(ε = 3)(N, A′) as can seen on Figure 3. It
is difficult to argue for this ranking since nodes 1 and 2 are only connected to node 3.6
The root of the problem is the excessive influence of neighbours' degrees: the low values
of d1 and d2 decrease generalized degree of node 3 despite its degree becomes greater. For
large ε-s this effect is responsible for breaking of the property ARM.
Theorem 1 gives the condition of reasonableness as
30ε3 + 6ε2 + 3ε ≤ 1,
because d = d3 = d4 = d5 = 3 and d = d1 = 0 before connecting nodes 1 and 3 (ARM
allows for adding only one edge). It is satisfied if
3s 266 + 15√334
4
−
ε ≤
1
15
13
3q532 + 30√334 − 1
≈ 0.1909.
This upper bound of ε is indicated by the vertical line on Figure 3. Note that ARM
is violated only if ε > (cid:16)2 + √6(cid:17) /2 according to Example 3, Theorem 1 does not give a
necessary condition for ARM.
It is worth to scrutinize the connection of degree and generalized degree further. Ex-
ample 3 verifies that generalized degree (with an appropriate value of ε) is not only a
tie-breaking rule of degree, there exists networks where a node with a smaller degree has
a larger centrality by x(ε).
A special type of networks is provided by a given degree sequence. Then degree of
nodes is fixed along with the reasonableness of ε (depending only on degrees), while
generalized degree may result in different rankings.
Example 5. Consider the degree sequence d = [4, 2, 2, 1, 1, 1, 1]⊤. There exist three
networks with this attribute up to isomorphism, depicted on Figure 5.7 It can be checked
that ε = 0.1 is reasonable. Generalized degrees with this value are presented on Figure 6.
Degree provides the centrality ranking 1 ≻ (2 ∼ 3) ≻ (4 ∼ 5 ∼ 6 ∼ 7) in all networks.
For (N, A) (Figure 5.a), generalized degree results in 1 ≻ 2 ≻ 3 ≻ (4 ∼ 5 ∼ 6) ≻ 7 as
nodes 4, 5 and 6 are symmetric, they are closer to the center 1 than 7, which is also the
case with nodes 2 and 3.
For (N, A′) (Figure 5.b), generalized degree gives the ranking 1 ≻ (2 ∼ 3) ≻ (5 ∼ 6) ≻
(4 ∼ 7) as nodes 2 and 3, 4 and 7, and 5 and 6 are symmetric, and the last pair is closer
to the center than the middle pair.
For (N, A′′) (Figure 5.c), generalized degree results in the ranking 1 ≻ (2 ∼ 3) ≻ (5 ∼
6 Nevertheless, the lower rank of node 3 may be explained. Landherr et al. (2010) mention cannibal-
ization and saturation effects, which sometimes arise when an actor can devote less time to maintaining
existing relationships as a result of adding new contacts. Similarly, the edges can represent not only
opportunities, but liabilities, too. For example, a service provider may have legal constraints to serve
unprofitable customers. Investigation of these models is leaved for future research.
7 See the proof at http://www.math.unm.edu/loring/links/graph_s09/degreeSeq.pdf.
11
Figure 5: Networks of Example 5
(a) Network (N, A)
(b) Network (N, A′)
4
6
1
5
4
3.5
3
2.5
2
1.5
1
0.5
0
6
1
5
3
7
2
3
7
4
2
(c) Network (N, A′′)
6
5
1
3
2
4
7
Figure 6: Centralities in Example 5
1
2
3
4
Node
5
6
7
Degree
x(0.1)(N, A)
x(0.1)(N, A′)
x(0.1)(N, A′′)
12
6) ≻ (4 ∼ 7) as nodes 2 and 3, 4 and 7, and 5 and 6 are symmetric, and the last pair is
connected to the center contrary to the middle pair.
Note that generalized degree is only a tie-breaking rule of degree but all changes can be
justified. Centrality values may also have a meaning: x1(0.1)(N, A′) > x1(0.1)(N, A) as
node 1 can more easily communicate with node 7 in the network (N, A′), for example. It is
also remarkable that x2(0.1)(N, A) > x2(0.1)(N, A′) and x5(0.1)(N, A) < x5(0.1)(N, A′) <
x5(0.1)(N, A′′) (nodes 5 and 6 are symmetric in all cases).
4 An interpretation of the measure
In this section we present the meaning of the proposed measure on the network. Let
C ∈ Rn×n be a matrix such that cij = aij for all i 6= j and cii = d − di for all i =
1, 2, . . . , n. C is a modified adjacency matrix with equal row sums, its diagonal elements
In other words, C = dI − L and
are nonnegative but at least one of them is zero.
x(ε) = [I + ε (dI − C)]−1 d. Let introduce the notation
β =
ε
.
1 + εd
It gives
x(ε) =
1
1 + εd
(I − βC)−1 d = (1 − βd) (I − βC)−1 d.
Matrix (I − βC)−1 can be written as a limit of an infinite sequence according to its
Neumann series (Neumann, 1877) if all eigenvalues of βC are in the interior of the unit
circle (Meyer, 2000, p. 618).
Proposition 3. Let (N, A) ∈ N n be a network. Then
x(ε) = (1 − βd)
∞
Xk=0
(βC)k d = (1 − βd)(cid:16)d + βCd + β2C 2d + β3C 3d + . . .(cid:17) .
Proof. According to the Gersgorin theorem (Gersgorin, 1931), all eigenvalues of L lie
within the closed interval [0, 2d], so eigenvalues of βC are within the unit circle if β < 1/d.
It is guaranteed due to β = ε/(1 + εd).
❏
Multiplier (1 − βd) > 0 in the decomposition of x(ε) is irrelevant for the centrality
ranking, it just provides that Pn
i=1 xi(ε) = Pn
i=1 di.
Lemma 2. Generalized degree centrality measure x(ε) = limk→∞ x(ε)(k) where
x(ε)(0) = (1 − βd) d,
x(ε)(k) = x(ε)(k−1) + (1 − βd) (βC)k d,
Proof. It is the immediate consequence of Proposition 3.
k = 1, 2, . . . .8
❏
Lemma 2 has an interpretation on the network.
In the following description the
multiplier (1 − βd) is disregarded for the sake of simplicity. Let G′ be a graph identical to
the network except that d − di loops are assigned for node i. In this way balancedness is
achieved with the minimal number of loops, at least one node (with the maximal degree)
8 Superscript (k) indicates the centrality vector obtained after the kth iteration step.
13
has no loops. Graph G′ is said to be the balanced network of G. It is the same procedure
as balancing a multigraph by loops in Chebotarev (2012, p. 1495) and in Csat´o (2015),
where G′ is called the balanced-graph and balanced comparison multigraph of the original
graph, respectively.
Initially all nodes are endowed with an own estimation of centrality by their degree.
In the first step, degree of nodes connected to the given one is taken into account: Cd
corresponds to the sum of degree of neighbours (including the nodes available on loops).
Adding d − di loops provides that the number of 1-long paths from node i is exactly d.9
Then this aggregated degree of objects connected to the given one is added to the original
estimation with a weight β, resulting in d + βCd.
In the kth step, the summarized degree of nodes available on all k-long paths (including
loops) C kd is added to the previous centrality, weighted by βk according to the length of
the paths. This iteration converges to the generalized degree ranking due to Lemma 2.
Example 6 illustrates the decomposition.
Figure 7: Network of Example 6
1
2
4
3
6
5
Example 6. Consider the network whose balanced network is shown on Figure 7, where
the number of loops are determined by the differences d− di. Nodes 3 and 4, and 5 and 6
are symmetric, the two pairs have the same centrality for any ε. Generalized degree gives
the rather natural ranking of (3 ∼ 4) ≻ (5 ∼ 6) ≻ 2 ≻ 1.
various k-s, that is, d(k) = [(1/d) C]k d. Their sum is equal to Pn
that, for instance, x(ε)(2) = (1 − βd)hd(0) + βdd(1) + β2d2d(2)i. It reveals that nodes 5
Figure 8 shows the average degree of neighbours available along a k-long path for
i=1 di. Lemma 2 means
and 6 are connected to more central nodes than 3 and 4. Another interesting fact is that
d(k) is monotonic only in its first coordinate. The elements of d(25) are almost equal, large
powers do not count much. Now x(ε)(1) immediately gives the final ranking of nodes.
Two observations can be taken on the basis of examples discussed. The first is that ties
in degree are usually eliminated after taking the network structure into account, which can
9 In the limit it corresponds to the average degree of neighbours in G′ since limε→∞ β = 1/d.
14
Figure 8: Iterated degrees d(k) in Example 6
4
3.5
3
2.5
2
1.5
1
0.5
0
0
1
2
3
10
25
Number of iterations (k)
Node 1
Node 2
Node 3 and 4
Node 5 and 6
be advantageous in practical applications: in the analysis of terrorist networks, a serious
problem can be that standard centrality measures struggle to identify a given number of
key thugs because of ties (Lindelauf et al., 2013). In other words, generalized degree has
a good level of differentiation.
The second is the possibly slow convergence.
In a sparse graph, long paths should
be considered in order to get the final centrality ranking of the nodes, however, it is not
clear why they still have some importance. Since the iteration depends on the network
structure, it will be challenging to give an estimate for how many steps are necessary to
approach the final centrality.
5 Conclusion
The paper has introduced a new centrality measure called generalized degree. It is based
on degree and uses the Laplacian matrix of the network graph. The method carries out a
redistribution of a pool filled with the sum of degrees. The effect of neighbours centrality
is controlled by a parameter, placing our method between degree and equal centrality for
Inspired by the idea of Sabidussi (1966), a rank
all nodes of a connected component.
monotonicity axiom has been defined, and a sufficient condition has been provided in
order to satisfy it. Besides PageRank (Chien et al., 2004), we do not know any other
centrality measure with this property. Furthermore, an iterative formula has been given
for the calculation of generalized degree along with an interpretation on the network.
The main advantage of our measure is its degree-based concept. It is recommended to
use with a low value of ε instead of degree, which preserves most favourable properties of
degree but has a much stronger ability to differentiate among the nodes and better reflect
15
their role in the network (see Example 6). It is especially suitable to be a tie-breaking
rule for degree, possible applications involve all fields where degree is used in order to
measure centrality.
It is also suggested to test various parameters and follow all changes in the centrality
ranking. The interval examined is not necessary to restrict to reasonable values, gen-
eralized degree may give an insight about the importance of nodes even if adding rank
monotonicity is not guaranteed as its other properties remain valid.
The research has opened some ways for future work. Generalized degree can be com-
pared with other centrality measures, for example, through the investigation of their
behaviour on randomly generated networks. Rank monotonicity is worth to consider in
an axiomatic comparison of centrality measures in the traces of Landherr et al. (2010)
and Boldi and Vigna (2014). The iterative formula and the graph interpretation may also
inspire a characterization of generalized degree.
Finally, some papers have used centrality measures just to describe the network by
a single value of centrality index. For instance, Sabidussi (1966) has suggested that
1/ max{fi(N, A) : i ∈ N} is a good centrality index if centrality measure f : N n → Rn sat-
isfies some axioms. Generalized degree improves on a failure of degree: 1/ max{di : i ∈ N}
is the same in a complete and a star network of the same order but 1/ max{xi(ε) : i ∈ N}
is larger in a complete one. We think this observation deserves more attention.
Appendix
ℓ = xℓ(ε)(N, A′) for all ℓ ∈ N. It can be
j − xj,
m−xm.
Assume to the contrary that t < u. The difference of equations from (1) for node k
Proof of Theorem 1. Let xℓ = xℓ(ε)(N, A) and x′
assumed without loss of generality that x′
u = max{x′
It will be verified that t ≥ u.
gives:
ℓ−xℓ : ℓ ∈ N \{i, j}} = x′
j − xj. Let s = x′
i − xi, t = x′
ℓ−xℓ : ℓ ∈ N \{i, j} = x′
k−xk and v = min{x′
i − xi ≥ x′
akℓ [(x′
(x′
k − xk) + ε Xℓ∈N \{i,j,k}
k − xk) − (x′
i − xi)] + εakjh(x′
k − xk) − (x′
k − xk) −(cid:16)x′
ℓ − xℓ)] +
j − xj(cid:17)i = d′
+εaki [(x′
k − dk = 0.
Since u = x′
k − xk ≥ x′
ℓ − xℓ for all ℓ ∈ N \ {i, j} and u ≥ t, we get
u ≤ εaki(s − u) ⇔ u ≤
εaki
1 + εaki
s.
(2)
Now take the difference of equations from (1) for node i:
s + ε Xℓ∈N \{i,j}
aiℓ [s − (x′
ℓ − xℓ)] + ε(cid:16)x′
i − x′
j(cid:17) = d′
i − di = 1.
Since u ≥ x′
ℓ − xℓ for all ℓ ∈ N \ {i, j}, we get
s + ε Xℓ∈N \{i,j}
aiℓ(s − u) + ε(cid:16)x′
i − x′
j(cid:17) = s + εdi(s − u) + ε(cid:16)x′
i − x′
j(cid:17) ≤ 1.
An upper bound for u is known from (2), thus
1 + ε(cid:16)x′
j − x′
i(cid:17) ≥ s + εdi(s − u) ≥ s + εdi(cid:18)1 −
εaki
1 + εaki(cid:19) s =
1 + εaki + εdi
1 + εaki
s.
(3)
16
By combining (2) and (3):
u ≤
εaki
1 + εaki
1 + εaki
1 + εaki + εdi h1 + ε(cid:16)x′
εaki
i − x′
j(cid:17)i =
1 + εaki + εdi h1 + ε(cid:16)x′
j − x′
i(cid:17)i .
(4)
Take the difference of equations from (1) for node m:
(x′
m − xm) + ε Xℓ∈N \{i,j}
amℓ [(x′
m − xm) − (x′
m − xm) −(cid:16)x′
ℓ − xℓ)] +
j − xj(cid:17)i = d′
m − dm = 0.
+εami [(x′
m − xm) − (x′
m − xm ≤ x′
Since v = x′
i − xi)] + εamjh(x′
ℓ − xℓ for all ℓ ∈ N \ {i, j} and s ≥ t, we get
v ≥ εami(s − v) + εamj(t − v) ⇒ v ≥
ε (ami + amj)
1 + ε (ami + amj)
t.
(5)
The difference of equations from (1) for node j results in:
t + ε Xℓ∈N \{i,j}
ajℓ [t − (x′
ℓ − xℓ)] + ε(cid:16)x′
j − x′
i(cid:17) = d′
j − dj = 1.
Since v ≤ x′
ℓ − xℓ for all ℓ ∈ N \ {i, j}, we get
t + ε Xℓ∈N \{i,j}
ajℓ(t − v) + ε(cid:16)x′
j − x′
i(cid:17) = t + εdj(t − v) + ε(cid:16)x′
j − x′
i(cid:17) ≥ 1.
A lower bound for v is known from (5), thus
1 + ε(cid:16)x′
i − x′
j(cid:17) ≤ t + εdj"1 −
ε (ami + amj)
1 + ε (ami + amj)# t =
1 + ε (ami + amj) + εdj
1 + ε (ami + amj)
t.
(6)
According to our assumption t < u, therefore from (4) and (6):
1 + ε (ami + amj)
1 + ε (ami + amj) + εdj h1 + ε(cid:16)x′
i − x′
j(cid:17)i <
εaki
1 + εaki + εdi h1 + ε(cid:16)x′
j − x′
i(cid:17)i .
Obviously, it does not hold if ε → 0. Now an upper bound is determined for the
parameter ε. After some calculations we get:
1 + ε (ami + amj + di) + ε2 [di (ami + amj) − akidj]
1 + ε (ami + amj + 2aki + di) + ε2 [(2aki + di) (ami + amj) + akidj]
< ε(cid:16)x′
i(cid:17) .
j − x′
Introduce the notation α = ε (ami + amj + di) + ε2 [di (ami + amj) − akidj] and y = 1 +
2εaki + ε2 [2aki (ami + amj + dj)] > 1. Then the fraction on the left-hand side can be
written as (1 + α)/(y + α). However, (1 + α)/(y + α) > 1/y because y + α > 0 and y > 1,
hence
1
1 + 2εaki + ε2 [2aki (ami + amj + dj)]
< ε(cid:16)x′
i(cid:17) .
j − x′
Here aki, ami, amj ≤ 1 and dj ≤ d. As x′
(Proposition 1):
j − x′
i ≤ xj − xi ≤ d − d from boundedness
which contradicts to the condition of Theorem 1.
1 < (d − d)h(2d + 4)ε3 + 2ε2 + εi ,
❏
17
References
Avrachenkov, K. E., Mazalov, V. V., and Tsynguev, B. T. (2015). Beta current flow
centrality for weighted networks. In Thai, M. T., Nguyen, N. P., and Shen, H., editors,
Computational Social Networks, volume 9197 of Lecture Notes in Computer Science.
Springer.
Bavelas, A. (1948). A mathematical model for group structures. Human Organization,
7(3):16–30.
Boldi, P. and Vigna, S. (2014). Axioms for centrality. Internet Mathematics, 10(3-4):222–
262.
Bonacich, P. (1987). Power and centrality: a family of measures. American Journal of
Sociology, 92(1):1170–1182.
Borgatti, S. P. and Everett, M. G. (2006). A graph-theoretic perspective on centrality.
Social Networks, 28(4):466–484.
Brin, S. and Page, L. (1998). The anatomy of a large-scale hypertextual web search engine.
Computer networks and ISDN systems, 30(1):107–117.
Chebotarev, P. (1989). Generalization of the row sum method for incomplete paired
comparisons. Automation and Remote Control, 50(8):1103–1113.
Chebotarev, P. (1994). Aggregation of preferences by the generalized row sum method.
Mathematical Social Sciences, 27(3):293–320.
Chebotarev, P. (2012). The walk distances in graphs. Discrete Applied Mathematics,
160(10):1484–1500.
Chebotarev, P. and Shamis, E. (1997). The matrix-forest theorem and measuring relations
in small social groups. Automation and Remote Control, 58(9):1505–1514.
Chien, S., Dwork, C., Kumar, R., Simon, D. R., and Sivakumar, D. (2004). Link evolution:
analysis and algorithms. Internet Mathematics, 1(3):277–304.
Csat´o, L. (2015). A graph interpretation of the least squares ranking method. Social
Choice and Welfare, 44(1):51–69.
Dequiedt, V. and Zenou, Y. (2015). Local and consistent centrality measures in networks.
Manuscript. https://www.gate.cnrs.fr/IMG/pdf/Dequiedt2015.pdf.
Freeman, L. C. (1977). A set of measures of centrality based on betweenness. Sociometry,
40(1):35–41.
Freeman, L. C. (1979). Centrality in social networks: conceptual clarification. Social
Networks, 1(3):215–239.
Garg, M. (2009). Axiomatic foundations of centrality in networks. Manuscript.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1372441.
18
Gersgorin, S. (1931). Uber die Abgrenzung der Eigenwerte einer Matrix. Bulletin de
l'Acad´emie des Sciences de l'URSS. Classe des sciences math´ematiques et naturelles,
6:749–754.
Gonz´alez-D´ıaz, J., Hendrickx, R., and Lohmann, E. (2014). Paired comparisons analysis:
an axiomatic approach to ranking methods. Social Choice and Welfare, 42(1):139–169.
Jackson, M. O. (2010). Social and economic networks. Princeton University Press.
Katz, L. (1953). A new status index derived from sociometric analysis. Psychometrika,
18(1):39–43.
Kitti, M. (2012). Axioms for centrality scoring with principal eigenvectors. Manuscript.
http://www.ace-economics.fi/kuvat/dp79.pdf.
Klein, D. J. (2010). Centrality measure in graphs. Journal of Mathematical Chemistry,
47(4):1209–1223.
Landherr, A., Friedl, B., and Heidemann, J. (2010). A critical review of centrality mea-
sures in social networks. Business & Information Systems Engineering, 2(6):371–385.
Leavitt, H. J. (1951). Some effects of certain communication patterns on group perfor-
mance. The Journal of Abnormal and Social Psychology, 46(1):38.
Lindelauf, R. H. A., Hamers, H. J. M., and Husslage, B. G. M. (2013). Cooperative game
theoretic centrality analysis of terrorist networks: the cases of Jemaah Islamiyah and
Al Qaeda. European Journal of Operational Research, 229(1):230–238.
Masuda, N., Kawamura, Y., and Kori, H. (2009). Analysis of relative influence of nodes
in directed networks. Physical Review E, 80(4):046114.
Masuda, N. and Kori, H. (2010). Dynamics-based centrality for directed networks. Phys-
ical Review E, 82(5):056107.
Meyer, C. D. (2000). Matrix analysis and applied linear algebra. Society for Industrial
and Applied Mathematics, Philadelphia.
Mohar, B. (1991). The Laplacian spectrum of graphs.
In Alavi, Y., Chartrand, G.,
Oellermann, O. R., and Schwenk, A. J., editors, Graph Theory, Combinatorics, and
Applications, volume 2, pages 871–898. Wiley, New York.
Monsuur, H. and Storcken, T. (2004). Centers in connected undirected graphs: an ax-
iomatic approach. Operations Research, 52(1):54–64.
Neumann, C. (1877). Untersuchungen uber das logarithmische und Newton'sche Potential.
B. G. Teubner, Leipzig.
Nieminen, J. (1974). On the centrality in a graph. Scandinavian Journal of Psychology,
15(1):332–336.
Ranjan, G. and Zhang, Z.-L. (2013). Geometry of complex networks and topological
centrality. Physica A: Statistical Mechanics and its Applications, 392(17):3833–3845.
19
Rubinstein, A. (1980). Ranking the participants in a tournament. SIAM Journal on
Applied Mathematics, 38(1):108–111.
Sabidussi, G. (1966). The centrality index of a graph. Psychometrika, 31(4):581–603.
Seeley, J. R. (1949). The net of reciprocal influence: a problem in treating sociometric
data. Canadian Journal of Psychology, 3(4):234–240.
Wasserman, S. and Faust, K. (1994). Social network analysis: methods and applications.
Cambridge University Press.
20
|
1906.06531 | 1 | 1906 | 2019-06-15T11:42:38 | Media Environment, Dual Process and Polarization: A Computational Approach | [
"cs.SI"
] | News articles of varying degrees of truthfulness and political alignment, and their influences on the political opinions of the media consumers are modeled as a Bayesian network incorporating a mixture of ideas from dual-reasoning models of Motivated Reasoning and Analytic/Intuitive Reasoning. The result shows that as the media environment moves towards the Post-Truth world, the problem of political polarization becomes exacerbated. | cs.SI | cs |
Media Environment, Dual Process and Polarization: A Computational
Approach
In-Ho Yi
New York University
News articles of varying degrees of truthfulness and political alignment, and their influences on
the political opinions of the media consumers are modeled as a Bayesian network incorporating
a mixture of ideas from dual-reasoning models of Motivated Reasoning and Analytic/Intuitive
Reasoning. The result shows that as the media environment moves towards the Post-Truth
world, the problem of political polarization becomes exacerbated.
Introduction
"Fake News" came to the spotlight in a recent surge of
the use of the term. It has been at least partially attributed
to for recent upsets in elections (Rose (2017)), Anti-Vaxxers
and other movements based on false medical information
(Waszak et al. (2018)), and global warming denial (van der
Linden et al. (2017)). Fake News is also blamed for the radi-
calization of fringe movements and the rise of racially and
religiously motivated hate-crimes (Townsend (2017); Her-
mansson (2018)).
In this introductory section, we first will set the scene by
characterizing the recent development of Fake News and the
new media environment. Then, we will cite studies that are
of particular interest to the present study. Finally, we will
give an overview of the plan to model and measure the effect
of the media.
The new media environment
Two features of the new development are of interest to us.
First is the relativization of the concept of Truth. In the post-
truth politics, the line between assertions and emotional fleas
and the truth is blurred. With the advent of the new media
environment, traditional journalists are no longer seen as the
gatekeepers of the fact-based public opinion, and the notion
of Truth has lost its privileged in the media landscape, and
we have seen an increase in media outlets that capitalizes
on various propaganda of questionable truthfulness. (Suiter
(2016), Gorrell et al. (2019)).
Second is the polarization effect.
It has long been ob-
served that the advent of the new media environment has
the effect of accelerating the polarization of public opinion
(Spohr (2017)). From the "One-Step flow" point of view that
the news readers exposure to the media directly shape the
news reader's own opinion (Bennett & Manheim (2006)), as
the political alignment of post-truth media approaches fringe
politics, readers of such news media become more polar-
ized. On top of that, various back-firing effects have been
observed, whereby readers of particular political mindset ex-
ercise Motivated Reasoning in discarding the opposite side
of the story and further reinforces the existing belief.
These two characteristics of the new media have pushed
the political landscape to an alarming level of radicalization,
as observed from various election upsets to the rise of hate
crime and other consequences of the fringe movements. In
this paper, we will model the different media environments
by allocating media consumption to premium centrist media,
premium partisan media and Fake News media. We will dis-
cuss the media environment model in detail in the Methods
section.
Recent studies on political information consump-
tion
We list recent studies to draw inspiration from, to model
the behavior of the media consumers.
Taber et al. (2009) show the effect of dis-confirmation bias
of Motivated Reasoning. The result suggests that, when pro-
cessing political news, readers tend not to exercise the same
level of scrutiny to determine the truthfulness of the news
item.
Pennycook & Rand (2018) found that the ability to tell
factually accurate news from Fake News is positively corre-
lated to the participants' performance in the Cognitive Re-
flection Test. This result suggests that Motivated Reasoning
alone is not sufficient to account for the discrepancies be-
tween individual media consumer's ability to single out Fake
News.
Rather than completely replacing the existing observa-
tions on Motivated Reasoning, we will use the result as a
complementary force in determining the probabilistic degree
to which the agent will allow factual inaccuracies, as we shall
see in the following section.
Bail et al. (2018) found evidence for the backfiring effect,
whereby participants who were regularly exposed to the op-
posing views were found to be even more polarized. In this
study, to account for such backfiring, we will count those
that the agent will deem as Fake News to have the opposite
effect. This Fake News backfiring effect, combined with the
Motivated Reasoning phenomena, should be able to account
for the backfiring effect in general. We won't introduce a
sub-module for backfiring in general, however, as we believe
that Motivated Reasoning + Fake News Backfiring should
2
IN-HO YI
suffice to account for the backfiring results in general, given
the current media environment.
Now that we have examined a couple of recent empirical
studies, we will turn to the theoretical underpinning of the
present study.
Polarization and Bayesian network
Jern et al. (2014) found that Bayesian networks that have
root nodes other than the hypothesis node can capture the po-
larization or convergence effect, where two agents of diverg-
ing effects will either be polarized or converge to the center
after examining the same data point. As we shall see later in
this paper, the topology of the Bayesian network presented in
this paper has the "truth judgment" intervening node that en-
compasses Motivated Reasoning and Fake News Backfiring.
Unlike Jern et al. (2014), however, we use explicit program-
ming constructs available to us in a probabilistic program-
ming language to model the backfiring effect, and we do so
on a continuous distribution. Nevertheless, the basic idea that
the intervening root node in a Bayesian network can account
for polarization remains intact.
Methods
In this section, we explain the design of the model and
give the rationale for design decisions. On the media side,
we will first examine the definition of a news item. Then we
will discuss the abstraction of a media outlet, and we will
finally discuss the media environment. On the agent side, we
will discuss a Bayesian network in which the truthfulness of
a news item is determined by an agent.
News item
A news item has two numerical properties: politics (pn)
and truth (tn).
pn value is centered at 0. The further away from the cen-
ter the politics value is, the more extreme the political align-
ment of the news item is. If the absolute value is close to 1
or above, the politics of the news item is considered pretty
extreme.
tn value is 0 or above. Truth value of 1 or above is con-
sidered factually accurate in every detail. Being true to the
concept of Post-Truth politics, nt is a continuous variable,
rather than a Boolean value.
Media outlet
Each type of media outlet emits a news item of probabilis-
tic politics and truth values. We define three different types
of media outlets and their pn and tn distributions.
Outlet
pn
tn
Premium Centrist
Premium Partisan
Fake News Partisan
N (0.8, 0.2)
N (0.8, 0.2)
N (0.4, 0.5)
For partisan media outlets, their pn is bi-modal with equal
N (0, 0.5)
N (±0.7, 0.3)
N (±0.9, 0.1)
weight on both sides i.e. for Premium Partisan media:
P (pn X = 1) ∼ N (0.7, 0.3)
P (pn X = 0) ∼ N (−0.7, 0.3)
1
P (X = 0) =P (X = 1) =
2
Similarly, Fake News Partisan media is also bi-modal,
with more extreme means.
Media environment
Media environment defines a mixture of media outlets. At
each observation, the media environment makes a weighted
random choice among its mixture of outlet, and let the chosen
outlet to generate a news item. Here are the media environ-
ments and their mixtures:
Media
Environment
Premium
Centrist
Premium
Partisan
Fake News
Partisan
ME1
ME2
ME3
70%
40%
30%
20%
50%
10%
10%
10%
60%
ME1 represents an ideal media environment, with a ma-
jority of centrist media, with a few partisan media outlets
and very few Fake News media. ME2 represents an environ-
ment where media outlets are more opinionated. ME3 rep-
resents a post-truth media environment with an alarmingly
large amount of Fake News circulation. Such shift of media
environments from ME1 to ME3 over time can be attributed
to the economic reality for news media to find an audience
in the increasingly crowded media industry (Bernhardt et al.
(2008); Posner (2005)).
Now we turn to explain how agent processes news items.
Agent model
An agent has two numerical properties: politics (pa) and
analytic (aa). Following Pennycook & Rand (2018), we as-
sign the aa value as an intrinsic property of an agent. While
pa gets updates as the agent processes news items, the ana-
lytic value stays the same throughout the process.
Like news item, the prior distribution of pa of an agent is
centered around 0. The prior distribution is pa ∼ N (0, 1). aa
value is sampled from aa ∼ Uniform (0.5, 1).
Truth and politics judgment by agent
Upon observing a news item, the agent makes a Boolean
decision of whether the news item is true or false. In order to
make the decision, the agent first calculates the motivational
discount dm:
dm = 0.2 · 0.2pn−pa
That is, the discount exponentially decays as the pn gets
further away from pa. This reflects the observations of Mo-
tivated Reasoning that agents are less likely to call out Fake
News that are more aligned to their own politics.
MEDIA ENVIRONMENT, DUAL PROCESS AND POLARIZATION: A COMPUTATIONAL APPROACH
3
Two variables are sampled:
truth judgment
is true iff xn > xa:
xn ∼ Uniform (0, min (0, tn))
xa ∼ Uniform (0, min (0, aa − dm))
(cid:16)
t j ∈ {true, false}(cid:17)
P(cid:16)
P(cid:16)
t j = true xn > xa
t j = true xn ≤ xa
(cid:16)
(cid:17)
(cid:17)
= 1
= 0
Politics judgment
reflects the agent's perception of
the political effect of the news item. When t j is false, p j is
the reverse of pn.
p j
(cid:17)
(cid:40)pn
p j =
−pn
t j is true
t j is false
This formulation reflects the backfiring effect of perceived
Fake News.
Updating pa
p j is the observation value with which pa is updated. The
formulation of the Bayesian update is as following:
P(cid:16)
(cid:17) ∝ P (pa) P(cid:16)
where the likelihood function P(cid:16)
pa p j
p j pa
(cid:17)
p j pa
(cid:17)
is the pdf of dis-
In summary, Figure 1 shows the model as a Bayesian net-
tribution P ∼ N (pa, 0.25)
work.
Implementation of the model
We used Anglican probabilistic programming language
(van de Meent et al. (2018)) to program the model.
In
order to obtain the resulting distribution, we have run the
model with Parallel Lighweight Metropolis-Hastings algo-
rithm with 5,000 particles, and obtained the first 200,000 it-
erations and drew the histograms of the results1.
Results
Figures 2 shows Pa distributions after 1, 10 and 100 ob-
servations of news item for given media environments.
ME1 shows a Gaussian distribution of pa after prolonged
exposure to the environment. The strong majority of opin-
ions are formed within a moderate range of the political spec-
trum (i.e. within ±0.5) This is hardly a surprising result given
the majority of the media outlet in ME1 falls under such po-
litical spectrum.
ME2 is a more interesting case. Early distributions af-
ter 1 and 10 observations show a clear bi-modality of the
distribution, which is not surprising given the large portion
of the partisan media. After 100 observations, however, the
Figure 1. Bayesian network depicting the model
distribution looks a lot like ME1 distribution, with a strong
majority opinion formed within a moderate range. From this
result, it stands to reason that media taking editorial stances
on issues are healthy phenomena given that they are factual,
and the overall distribution of the partisan media is equally
distributed on both sides of the argument.
ME3 results show a high degree of polarization in the ex-
treme range of the political spectrum. After 10 observations,
an alarming level of concentration of the opinion is found on
both extremes. This is different from ME1 and ME2 results
where you can still find a strong majority within the moderate
band. This shows the loss of common ground in the public
discourse in a Post-Truth politics. After 100 observations, a
moderate opinion does gain some of the shares back. How-
ever, the majority is opinions are still outside of the moderate
band, with a very high concentration found on each of the
extreme sides.
Overall, the result shows a detrimental effect that Fake
News has on public discourse according to our model. The
result can account for an unusually high level of opinion con-
centration on fringe opinion, and an upsetting result of the
public poll when the proposal is a rather extreme one.
Discussion and Conclusion
The biggest limitation of this study is the lack of any data
fitting in designing the model. Although we did consider em-
pirical results from other studies for inspiration, the model
1 Source code for the model is available at https://gitlab
.com/chajath/polarize-fakenews-model
Media EnvironmentMedia OutletNews item politicspnNew item truthtnAgent analyticaaAgent politicspaMotivational discountdmTruth judgmenttjPolitics judgmentpj4
IN-HO YI
itself is largely hand-wired with our subjective view and un-
derstanding of the matter. In order to tune our model to re-
flect the reality better, many of the magic numbers appearing
in our model need to be parameterized:
• prior distribution of pa and aa
• scale and decay rate in dm formulation
• standard deviation in likelihood function
To fit those values, in the future study, we shall gather statis-
tics from existing surveys of the media environment, and
design controlled experiment to determine the parameters
within the model. Finally, another experiment shall be con-
ducted to determine the accuracy of the model compared to
real-world experimental results.
Although the prescriptive analysis was not the main theme
of this study, the study can be further extended to account for
such analysis. The conclusion from studies with a prescrip-
tive focus such as van der Linden et al. (2017) and McClain
(2017) suggest that an antidote to Fake News is the effective
communication of scientific consensus. Given the recurrent
structure of our model, this can be translated to observing
moderate news items with high truth values prior to being
exposed to Fake News items.
In this study, we have essentially abstracted out news
items as two variables: politics and truthfulness. In the future
study, it will be interesting to give a more detailed account of
the semantics of news item. Given the recurrent structure of
the model, it will be natural to extend the model to interface
with other types of Bayesian recurrent neural network (For-
tunato et al. (2017)) that focuses on natural language process-
ing. Doing so will allow us to train the model from primary
sources of the data, namely the news items themselves.
What we have presented here is a way to model the behav-
ior of individual news-consuming agents. Given the advent
of personal media and the prevalence of social media, it will
be interesting to devise a multi-agent model (following Ay-
manns et al. (2017)) where the interaction between the agents
are modeled after social networks, with varying degrees of
reaches and influences from multiple individuals.
The present study showcases an interesting use of prob-
abilistic programming to model complex social phenomena
from the cognitive perspective of individual agents. Future
work ideas discussed in this section will further the use of
probabilistic programming and other computational cogni-
tive methods in the realms of computational social sciences.
References
Aymanns, C., Foerster, J., & Georg, C.-P.
(2017). Fake news
in social networks. SSRN Electronic Journal. doi: 10.2139/
ssrn.3023320
Political and Social Science, 608, 213 -- 232.
0002716206292266
doi: 10.1177/
Bernhardt, D., Krasa, S., & Polborn, M. (2008). Political polar-
ization and the electoral effects of media bias. Journal of Public
Economics, 92(5), 1092 - 1104. doi: 10.1016/j.jpubeco.2008.01
.006
Fortunato, M., Blundell, C., & Vinyals, O. (2017). Bayesian re-
current neural networks. Retrieved from https://arxiv.org/
abs/1704.02798
Gorrell, G., Bakir, M. E., Roberts, I., Greenwood, M. A., Iavarone,
B., & Bontcheva, K.
(2019). Partisanship, propaganda and
post-truth politics: Quantifying impact in online debate. CoRR,
abs/1902.01752. Retrieved from http://arxiv.org/abs/
1902.01752
Hermansson, P.
(2018).
muslim message on social media.
https://hopenothate.com/2018/11/16/bots-fake
-news-anti-muslim-message-social-media/
Bots,
fake news and the anti-
Retrieved from
Jern, A., K Chang, K.-M., & Kemp, C. (2014, 04). Belief polariza-
tion is not always irrational. Psychological review, 121, 206-24.
doi: 10.1037/a0035941
McClain, C. R. (2017, 06). Practices and promises of facebook for
science outreach: Becoming a "nerd of trust". PLOS Biology,
15(6), 1-9. doi: 10.1371/journal.pbio.2002020
Pennycook, G., & Rand, D. G. (2018). Lazy, not biased: Suscep-
tibility to partisan fake news is better explained by lack of rea-
soning than by motivated reasoning. Cognition. doi: 10.1016/
j.cognition.2018.06.011
Posner, R. A.
The New York
Times. Retrieved from https://www.nytimes.com/2005/
07/31/books/review/bad-news.html
Bad news.
(2005).
Rose, J. (2017). Brexit, trump, and post-truth politics. Public In-
tegrity, 19(6), 555-558. doi: 10.1080/10999922.2017.1285540
Spohr, D.
(2017). Fake news and ideological polarization: Fil-
Busi-
10.1177/
ter bubbles and selective exposure on social media.
ness Information Review, 34(3), 150-160.
0266382117722446
doi:
Suiter, J. (2016). Post-truth politics. Political Insight, 7(3), 25-27.
doi: 10.1177/2041905816680417
Taber, C. S., Cann, D., & Kucsova, S. (2009). The motivated pro-
cessing of political arguments. Political Behavior, 31(2), 137 --
155.
Townsend, M.
(2017).
by fake accounts.
https://www.theguardian.com/media/2017/nov/26/
anti-muslim-online-bots-fake-acounts
The Guardian.
Anti-muslim online surges driven
Retrieved from
Bail, C. A., Argyle, L. P., Brown, T. W., Bumpus, J. P., Chen, H.,
Hunzaker, M. B. F., . . . Volfovsky, A.
(2018). Exposure to
opposing views on social media can increase political polariza-
tion. Proceedings of the National Academy of Sciences, 115(37),
9216 -- 9221. doi: 10.1073/pnas.1804840115
Bennett, W. L., & Manheim, J. B.
(2006). The one-step flow
of communication. The Annals of the American Academy of
van de Meent, J.-W., Paige, B., Yang, H., & Wood, F.
(2018).
An introduction to probabilistic programming. Retrieved from
http://arxiv.org/abs/1809.10756
van der Linden, S., Leiserowitz, A., Rosenthal, S., & Maibach, E.
(2017). Inoculating the public against misinformation about cli-
mate change. Global Challenges, 1(2), 1600008. doi: 10.1002/
gch2.201600008
MEDIA ENVIRONMENT, DUAL PROCESS AND POLARIZATION: A COMPUTATIONAL APPROACH
5
Waszak, P. M., Kasprzycka-Waszak, W., & Kubanek, A. (2018).
The spread of medical fake news in social media - the pilot quan-
titative study. Health Policy and Technology, 7(2), 115 - 118. doi:
10.1016/j.hlpt.2018.03.002
6
IN-HO YI
Figure 2. Political Opinion after observations. From left: ME1, ME2 and ME3. From top to bottom: 1, 10 and 100 observations.
-3.0-2.5-2.0-1.5-1.0-0.50.00.51.01.52.02.53.005,00010,00015,00020,00025,000-4-3-2-1012305,00010,00015,00020,00025,00030,00035,00040,00045,00050,000-3.0-2.5-2.0-1.5-1.0-0.50.00.51.01.52.02.53.005,00010,00015,00020,00025,00030,00035,00040,00045,00050,000-3.0-2.5-2.0-1.5-1.0-0.50.00.51.01.52.02.53.005,00010,00015,00020,00025,00030,00035,00040,00045,00050,000-2.0-1.5-1.0-0.50.00.51.01.52.02.53.005,00010,00015,00020,00025,00030,00035,00040,000-2.0-1.5-1.0-0.50.00.51.01.52.0010,00020,00030,00040,00050,00060,00070,00080,00090,000-1.5-1.0-0.50.00.51.01.52.02.5010,00020,00030,00040,00050,00060,00070,000-1.5-1.0-0.50.00.51.01.52.02.505,00010,00015,00020,00025,00030,00035,00040,00045,00050,00055,00060,000-1.0-0.50.00.51.01.505,00010,00015,00020,00025,00030,00035,00040,00045,00050,000 |
1909.03543 | 2 | 1909 | 2019-09-10T02:48:33 | An Experimental Study of Structural Diversity in Social Networks | [
"cs.SI",
"physics.soc-ph"
] | Several recent studies of online social networking platforms have found that adoption rates and engagement levels are positively correlated with structural diversity, the degree of heterogeneity among an individual's contacts as measured by network ties. One common theory for this observation is that structural diversity increases utility, in part because there is value to interacting with people from different network components on the same platform. While compelling, evidence for this causal theory comes from observational studies, making it difficult to rule out non-causal explanations. We investigate the role of structural diversity on retention by conducting a large-scale randomized controlled study on the Twitter platform. We first show that structural diversity correlates with user retention on Twitter, corroborating results from past observational studies. We then exogenously vary structural diversity by altering the set of network recommendations new users see when joining the platform; we confirm that this design induces the desired changes to network topology. We find, however, that low, medium, and high structural diversity treatment groups in our experiment have comparable retention rates. Thus, at least in this case, the observed correlation between structural diversity and retention does not appear to result from a causal relationship, challenging theories based on past observational studies. | cs.SI | cs | An Experimental Study of Structural Diversity in Social Networks
Jessica Su
Facebook, Inc.∗
Krishna Kamath
Twitter, Inc.
Aneesh Sharma
Google, Inc.†
Johan Ugander
Stanford University
Sharad Goel
Stanford University
9
1
0
2
p
e
S
0
1
]
I
S
.
s
c
[
2
v
3
4
5
3
0
.
9
0
9
1
:
v
i
X
r
a
Abstract
Several recent studies of online social networking platforms
have found that adoption rates and engagement levels are pos-
itively correlated with structural diversity, the degree of het-
erogeneity among an individual's contacts as measured by
network ties. One common theory for this observation is that
structural diversity increases utility, in part because there is
value to interacting with people from different network com-
ponents on the same platform. While compelling, evidence
for this causal theory comes from observational studies, mak-
ing it difficult to rule out non-causal explanations. We investi-
gate the role of structural diversity on retention by conducting
a large-scale randomized controlled study on the Twitter plat-
form. We first show that structural diversity correlates with
user retention on Twitter, corroborating results from past ob-
servational studies. We then exogenously vary structural di-
versity by altering the set of network recommendations new
users see when joining the platform; we confirm that this de-
sign induces the desired changes to network topology. We
find, however, that low, medium, and high structural diversity
treatment groups in our experiment have comparable reten-
tion rates. Thus, at least in this case, the observed correlation
between structural diversity and retention does not appear to
result from a causal relationship, challenging theories based
on past observational studies.
From farmers adopting agricultural methods (Ryan and
Gross 1943) to runners deciding to exercise (Aral and Nico-
laides 2017), people often consider the actions of their
social contacts when making decisions (Coleman, Katz,
and Menzel 1957; Bass 1969; Schelling 1971; Granovetter
1978; Bikhchandani, Hirshleifer, and Welch 1992; Watts and
Dodds 2007; Bakshy et al. 2012). A basic theme in this lit-
erature is that an individual's likelihood to take an action
increases with the number of their contacts who have taken
that action. For example, those with more friends who exer-
cise are more likely to exercise themselves (Aral and Nico-
laides 2017).
The recently proposed theory of
structural diver-
sity (Ugander et al. 2012) enriches this core idea by sug-
gesting that individuals consider not merely the number
of contacts who have engaged in some action, but also
∗Work done when the author was at Stanford University.
†Work done when the author was at Twitter, Inc.
Copyright c(cid:13) 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
the network structure of those individuals (i.e., the so-
cial relationships between them). There are multiple ways
to quantify structural diversity, but the original and per-
haps simplest measure is the number of connected com-
ponents among one's contacts who have adopted. Accord-
ing to this theory, an individual is more likely to exer-
cise if two college friends and two work colleagues exer-
cise than if four college friends exercise but no work col-
leagues do. Several observational studies are consistent with
the structural diversity hypothesis, finding that one's propen-
sity to act is predicted by the structural diversity of one's
contacts who have acted (Spiliotopoulos and Oakley 2013;
Weng, Menczer, and Ahn 2013; Backstrom et al. 2013;
Aral and Nicolaides 2017).
There are compelling theoretical arguments for structural
diversity affecting behavior. For example, individuals might
prefer the diversity of opinions expressed on an online plat-
form that includes people across their social circles over the
narrowly tailored content on a service that caters to a sin-
gle group (Page 2008). Further, individuals may personally
benefit from mediating relationships between otherwise dis-
connected groups (Burt 2000). Finally, with high structural
diversity one might be more likely to encounter the single
individual or group whose actions are influential, with di-
versity thus acting as a hedging mechanism: if some indi-
viduals would join a service only if their family members
have joined, and others only if their friends have, we would
expect to see adoption increase with structural diversity.
These explanations all suggest that exogenously increas-
ing structural diversity would increase adoption, retention,
and engagement. There is, however, an alternative class of
purely correlational explanations for why adoption, reten-
tion, and engagement would be associated with increased
structural diversity. For example, if retention is exclusively
a function of age, and younger individuals have more struc-
turally diverse networks, structural diversity would correlate
with retention despite being incidentally related to it. A more
subtle example stems from the popular "strength of weak
ties" theory (Granovetter 1973; Aral and Walker 2014) of
information flow. Suppose individuals with structurally di-
verse contact networks are socially farther from the popula-
tion of existing adopters than those with structurally homo-
geneous networks. Then, if non-adopters in the core of the
network (with homogeneous networks) have actively cho-
sen to abstain, while those on the periphery (with diverse
networks) are still deciding whether to adopt, we would
expect structural diversity to correlate with adoption -- but
there would again be no causal connection.
Past studies of structural diversity have all been obser-
vational or quasi-experimental, and so it has been difficult
to disentangle causation from correlation. As we describe
below, experimental tests of structural diversity must ad-
dress serious theoretical challenges in defining the causal
estimand of interest, as well as difficult logistical hurdles in
carrying out a suitable experiment at scale -- two issues that
have received relatively little attention in the literature.
After discussing these high-level concerns, we detail our
general approach, and then describe the results of a random-
ized controlled experiment on the Twitter platform that di-
rectly tests for a causal link between structural diversity and
retention. In line with results from past observational stud-
ies, we first show that structural diversity indeed correlates
with user retention on Twitter. We then exogenously vary
structural diversity by altering the set of network recommen-
dations new users see when joining the platform. We show
that this randomization strategy induces the desired changes
to network topology. However -- and this is our key result --
low, medium, and high structural diversity treatment groups
in our experiment have comparable retention rates. Thus, at
least in this case, the correlation we observe between struc-
tural diversity and retention does not appear to result from a
causal relationship. Our results accordingly challenge causal
explanations of the link between structural diversity and be-
havior that stems from past observational studies, and high-
light the importance of randomized experiments in network
analysis.
Related Work
The role of network structure in social decision making is
at the foundation of the vast literature on the diffusion of
innovations, and many studies have examined this relation-
ship. (Coleman, Katz, and Menzel 1957; Rogers 1962). The
growth of the internet and online services over the last 20
years have provided a particularly well-instrumented and
fruitful research environment for studying decision mak-
ing on networks. The present work is motivated by the fact
that most prior studies leveraging the opportunities of online
data are observational, and thus can generally only provide
correlational -- not causal -- evidence for the role of network
structure in decision making.
Our focus in this work is on the role of structural diver-
sity in new user engagement, in line with the original pa-
per on structural diversity (Ugander et al. 2012). Beyond
user engagement, related work on prediction problems in-
volving network diversity have found evidence that more di-
verse networks among Twitter hashtag participants (Weng,
Menczer, and Ahn 2013; Romero, Tan, and Ugander 2013),
Sina Weibo message distribution networks (Bao et al. 2013),
and Facebook conversation thread participants (Backstrom
et al. 2013) all predict greater growth of the hashtag usage,
message distribution, and conversation, respectively.
A recent study of decisions to exercise through a running
application provides important causal evidence of social in-
fluence between friends (Aral and Nicolaides 2017). That
study examines the role of structural diversity as part of its
work, and finds that structural diversity is correlated with
more social influence. While the estimates of social influ-
ence are causal -- achieved through an instrumental variables
approach using weather as an instrument -- the evidence for
a relationship between the outcome and structural diversity
is only correlational.
Further, recent work examining cellular phone networks
in a south Asian country found that structural diversity, mea-
sured as the fraction of open triads in an ego-network, is
positively correlated with individual income (Jahani et al.
2017). This finding highlights the importance of understand-
ing demographic correlates of structural diversity that may
explain findings that previously have been understood as be-
ing caused by structural diversity.
Finally, we highlight an early examination of the role of
network structure in the adoption of online products that
studied users choosing to join groups within the blogging
service LiveJournal (Backstrom et al. 2006). This study
found that a high edge density within a user's friends
that were already in a group -- which could be interpreted
as a contact neighborhood with low structural diversity --
predicted that they would join that group. This predictive
finding is consistent with the idea of users valuing social
cohesion (Burt 1987) in choosing groups; but it is in op-
position to the role of structural diversity identified in the
work discussed above. A subsequent meta-analysis of on-
line social applications reported a mixture of positive and
negative predictive relationships between edge density and
adoption (Kloumann et al. 2015).
Two Challenges for Experimental Studies
of Structural Diversity
Any experimental study of structural diversity faces two key
challenges, one conceptual and the other operational. First,
it is conceptually unclear how even to define the causal ef-
fect of interest in this case. Typically one investigates the
causal effect of a specific treatment, like taking a particular
drug, and to make progress one must make assumptions that
exclude certain causal pathways, like assuming the temper-
ature outside does not affect a patient's response. These as-
sumptions may not hold exactly, but they are often relatively
weak and acceptably approximate reality. However, experi-
mental tests of complex social phenomena typically require
comparatively strong assumptions (Sobel 2006). We could,
for example, assume that adoption is affected only by the
degree of structural diversity in an individual's network --
and exclude the effect of all other network features. But this
assumption is unrealistic: a contact network comprised of
work colleagues and college friends is likely very different
than one comprised of family members and one's bowling
league, even if the two have comparable structural diversity.
In general, if one believes that network membership -- and
not just network structure -- matters, standard exclusion re-
strictions are hard to justify.
In light of this limitation, one might consider holding con-
stant the members in one's contact network, and then study
what happens as connections between those members vary.
While theoretically interesting, this formulation encapsu-
lates a somewhat narrow view of structural diversity -- and
also one that is particularly difficult to test.1 The common
causal explanations for the structural diversity phenomenon
are mediated by membership, and hence do not admit a nat-
ural separation of membership and structure.
The second, operational challenge is to exogenously in-
duce structural changes to an individual's network of social
contacts. Random team assignment has been used to alter
network membership (Hasan and Koning 2017), and random
roommate assignment to alter single dyads in student dor-
mitory populations (Lyle 2007). But studying structural di-
versity inherently involves much larger changes to network
structure, and studying the consequences of such changes
requires running experiments at scales that are typically in-
feasible with traditional designs.
Experiment Design
One cannot completely circumvent the conceptual and op-
erational obstacles identified above. In this work, however,
we were able to mitigate them by carrying out the following
randomized experiment on the Twitter social network.
Our study population consists of a sample of 4.2 million
new users who joined Twitter during a particular period in
2016. Users were selected into the sample at random from
among all new users who joined during the study period,
and so our study population is approximately representative
of new Twitter members during 2016.
Our outcome variable of interest is 3-month retention,
meaning that the user visited Twitter at least once in the 30-
day period 90 -- 120 days after joining. Our primary goal is
to understand the causal relationship between structural di-
versity and retention defined in this manner. This measure
of activity is a common benchmark -- both at Twitter and
elsewhere -- though we note that our results are qualitatively
similar if we look at related metrics (e.g., 6-month or 12-
month retention).
Defining structural diversity
In designing our experiment and evaluating the results, we
use a variant of average pairwise cosine similarity (Sharma,
Seshadhri, and Goel 2017) -- defined below -- as our mea-
sure of structural diversity. With this measure, lower sim-
ilarity corresponds to higher diversity. Though our defini-
tion of structural diversity differs somewhat from the orig-
inal component-based metric (Ugander et al. 2012), it fa-
cilitates finer-grained analysis, particularly in larger contact
networks where component counts can be overly coarse.
To start, we define the similarity sim(v, w) for any two
users v and w. Specifically, sim(v, w) is the cosine similarity
of the binary incidence vectors for v and w, where these
vectors indicate which users are following them. That is,
sim(v, w) =
A · B
A · B ,
(1)
1Arguably, changing an individual's network connections also
changes that individual's persona, so even this formulation cannot
completely escape the entanglement of structure and membership.
Figure 1: In a stylized example, a new user (gray node)
has 9 candidate recommendations connected by a similar-
ity graph consisting of three weakly connected components.
The goal is to recommend 3 users. (A) To choose a high-
similarity (low-diversity) set, we select three nodes (red)
from the same component. (B) To choose a low-similarity
(high-diversity) set, we select one node (red) from each
weakly connected component in the similarity graph.
where A and B are the incident vectors for v and w, re-
spectively. Thus, v and w are considered similar if they are
followed by a similar set of users.
In theory, to find the average pairwise similarity for a
set of users, we would compute and average the similarity
scores over all pairs of users in the set. However, due to lim-
itations in Twitter's production system, for any user v we are
only able to compute similarity scores for the 40 users most
similar to v. We thus set sim(v, w) = 0 for w outside this
set of 40 when computing the average.2
Randomizing structural diversity
We now describe how we exogenously varied structural di-
versity to test for a causal link between diversity and re-
tention. Users who create an account on Twitter are taken
through an onboarding process, and account recommenda-
tions for the user are a key part of this process. The on-
boarding process evolves continually, but at the time of run-
ning our experiment, new users were shown recommenda-
tions on two different pages. First, users were asked to se-
lect topics that they might be interested in (e.g., "Science &
Technology"), and were then shown recommendations re-
lated to those topics (e.g., the accounts of well-known scien-
tists). Users would bypass this screen if they did not select
any topics of interest. Then, the user was given the choice
to import their phone and email contacts. Whether a user
chose to import their contacts or not, they were taken to a
second screen where they were given another set of account
recommendations, this time focused on their social circle.
Our experiment only affected the recommendations on this
second screen, which we term the set of "contact recommen-
dations".
2In order to use similarity scores that reflect the current state of
the graph at the time that the user is signing up, we use the near-
real time similarity scores available through a caching service with
a limited capacity.
ABThe contact recommendations shown to a user were based
on a machine-learned ranking that took a base set of candi-
dates, and ranked them by probability of generating friend
(bi-directional follow) relationships. The set of candidates
was generated by taking the list of phone and email con-
tacts for the user, as well as a subset of their topical fol-
lows from the first screen3, and running a SALSA-like algo-
rithm on the friend graph of these users (Gupta et al. 2013;
Su, Sharma, and Goel 2016). In essence, contact recommen-
dations were a mix of a user's direct phone/email contacts
and friends of these contacts. Since these are arguably social
contacts, our diversity experiment focused on these in order
to stay close to the prior work on diversity, which is mostly
on social networks.
From among the dozens of personalized contact recom-
mendations C generated for each new user by Twitter's in-
ternal algorithm, we attempted to select three different sub-
sets of 20 users to promote: subsets with low, medium, and
high structural diversity, as operationalized by average pair-
wise similarity. Among these candidates, we first considered
the induced "similarity graph" GC on the candidates, where
we drew a directed edge from user u to user v if v was one
of the 40 most similar users (measured by cosine similarity,
as discussed above) to u at the time of the experiment.
Now, given the directed similarity graph GC, we then
found the three largest weakly connected components in
GC. In order to be deemed eligible for the experiment, we
required that a user have at least one component of size
≥ 20, two components of size ≥ 10, and three components
of size ≥ 7. (This restriction was enforced so that we could
induce the desired structural changes, as described below.) If
a user was deemed eligible for the experiment, we assigned
the user uniformly at random to one of four treatment con-
ditions: "control," "high similarity," "medium similarity," or
"low similarity".
In the "high similarity" condition, we recommended the
20 most relevant users from the largest component, where
relevance was based on Twitter's internal ranking. In the
"medium similarity" condition, we recommended the 10
most relevant users from the largest component and the 10
most relevant users from the second-largest component. In
the "low similarity" condition, we recommended the 7 most
relevant users from each of the two largest components, and
the 6 most relevant users from the third-largest component.
This design is based on the idea that recommendations cho-
sen from different connected components are likely to be
more diverse than those chosen from the same connected
component. Figure 1 shows a stylized visualization of this
strategy.
In the "control" condition, we displayed the users that
Twitter would have ordinarily shown (i.e., we did not al-
ter the standard recommendations). We note that users in
the "control" group were eligible users, and thus could have
been randomly assigned to any of the other three conditions.
As a result, we can compare "control" users to ineligible
users to understand differences between eligible and ineligi-
ble populations that all receive the standard, unaltered rec-
3Especially if they had no existing contacts on Twitter.
ommendations.
Approximately 500,000 users (12% of our study popu-
lation of 4.2 million) were ultimately deemed eligible for
the experiment. That is, we could construct low-, medium-,
and high-similarity recommendation sets for these 500,000
users. As an example of when this set construction failed,
we generally could not create low-similarity (i.e., high-
diversity) sets from the recommendations generated for
users with few known social contacts on Twitter, as most
recommended users in this case were in a single, large con-
nected component.
After constructing these recommendation sets, we ran-
domly assigned each eligible user to one of four treatment
arms (low, medium, high, or control), and then promoted
that arm's subset of 20 users to the top of the recommenda-
tion list; in the control condition we did not alter the standard
recommendations. Recommendations were shown to eligi-
ble users 20 at a time, and they were free to follow as many
or as few of the recommendations as they wished.
As our experiment involves human subjects, we sought
(and received) approval from Stanford University's Insti-
tutional Review Board. We note that our intervention con-
sisted only of altering the set of recommendations presented
to new Twitter users -- with these recommendations chosen
from Twitter's standard personalized set of candidates. Our
experiment protocol was deemed to pose minimal risk to
users, and was thus evaluated under expedited review.
Assessing the Assignment Mechanism
Induced structural changes
Our experimental design is not guaranteed to induce the
desired changes to network structure; even if we encour-
age new users to follow a structurally diverse set of people,
they might nevertheless elect to follow a low-diversity set.
Some users, however, opted to follow exactly the 20 users
we selected, in part because of a "follow all" option that ap-
peared on the recommendation page. Among these "follow
all" users, Figure 2 (left) shows that our treatment condi-
tions indeed induced significant changes to structural diver-
sity. (The peak at 40 is due to a similar effect, with users
accepting all suggestions on another page of recommenda-
tions. The number of users following 40 recommendations is
small -- less than 1% of eligible users -- and we do not con-
sider them as part of our population of "follow all" users.)
In contrast, among those who ultimately chose to follow 30
users, the structural diversity of their resulting networks did
not vary substantially across our three treatment conditions,
because they followed a combination of accounts we recom-
mended and those that we did not, hampering our ability to
measure the causal effect of structural diversity on retention.
the high-similarity (low-
diversity) group has mean pairwise similarity that is 64%
higher than the low-similarity (high-diversity) group (0.084
vs. 0.051), and Figure 2 (right) shows that the induced gap
in structural diversity persists over time.4 Figure 3 shows the
full distribution of pairwise similarity for follow-all users in
Among follow-all users,
4For follow-all users, the 95% confidence interval on mean
similarity for the high-similarity group is [0.075, 0.093]; for the
Figure 2: Left: Among those users who followed all our 20 recommendations (i.e., the "follow all" users), the treatments
induce significant changes to structural diversity, as measured by average pairwise similarity computed on a user's initial social
network. Right: Average pairwise similarity over time, by treatment condition, for the "follow all" users, where similarity is
based on the network at the point in time indicated on the horizontal axis.
the low-, medium-, and high-diversity treatment arms, in-
dicating that there is significant heterogeneity within each
treatment arm, as one would expect given the design of the
experiment.
The set of follow-all users likely differs in many ways
from the overall population of new Twitter users. Impor-
tantly, however, the correlational relationship between struc-
tural diversity and retention holds in this subset of users, as
we discuss below. Thus, though follow-all users are not rep-
resentative of new Twitter users, they exhibit the key associ-
ation between structural diversity and retention that we seek
to investigate, and are accordingly a suitable sub-population
for our study.
Post-treatment selection
Among those who followed our network recommenda-
tions, our treatment conditions induced sizable differences
in structural diversity. But one might worry that the type of
user who elected to follow our recommendations may have
differed across treatment arms. Those who followed our rec-
ommendations when assigned to the low-diversity condition
might not have done so if assigned to the high-diversity
condition. As a result, conditioning on the post-treatment
follow-all outcome could in theory bias our estimates of
causal effects (Imbens and Rubin 2015; Montgomery, Ny-
han, and Torres 2018).
There is no complete solution to this problem, but we note
three factors that mitigate such concerns in our study. First,
approximately the same proportion of eligible users in each
condition followed our 20 recommendations: 1.8% in the
medium-similarity group it is [0.055, 0.070]; and for the low-
similarity group it is [0.044, 0.058]. In particular, the three treat-
ment groups are generally well separated.
control and low-diversity conditions, 2.1% in the medium-
diversity condition, and 2.0% in the high-diversity condi-
tion. Second, as shown in Figure 4, the follow-all users
in each treatment group are nearly identical on several ob-
servable dimensions: client platform (e.g., Android or iOS),
country, email domain, and language.5 Finally, concerns of
selection bias are most salient when outcomes differ across
treatment arms, in which case differences may result from
selection on unobservables rather than any causal effect of
the treatment. However, as we describe below, we find that
outcomes are nearly identical across treatment arms, and so
if a true causal effect exists in our case it would require near-
perfect cancellation with the "follow-all" selection mecha-
nism to explain our results.
In sum, restricting to the subpopulation of follow-all users
likely introduces some selection bias, but the magnitude of
the effect appears small and unlikely to affect our qualita-
tive conclusions. We also note that two common approaches
for dealing with post-treatment selection, Heckman correc-
tion (Heckman 1977) and principal stratification (Frangakis
and Rubin 2002), cannot be easily applied in our setting be-
cause follow-all behavior is not strongly predicted by the
available covariates and we lack a suitable instrument to cir-
cumvent this issue.
Design summary
Though admittedly imperfect, our methodology helps over-
come the key design challenges described above, opera-
tionally inducing significant changes to structural diversity
5This covariate check is only meant to assess post-treatment
bias. As we have discussed above, the subset of follow-all users
that we consider is not representative of the broader population of
new Twitter users.
lllllllllllllll0.000.010.020.030.040.050.060.070.080.090.100.000.010.020.030.040.050.060.070.080.090.10010203040500306090120Network sizeDays since joiningAverage pairwise similarityTreatment grouplllHigh similarityMedium similarityLow similarityFigure 3: The distribution of average pairwise similarity (based on a user's initial social network) across users in each treatment
group, for users who followed exactly 20 people. The dashed lines mark the mean for each treatment group.
while conceptually satisfying a version of exclusion. Among
the follow-all users, we have considerable ability to exoge-
nously vary the structural diversity of their contact networks.
And because follow-all users have a fixed network size of
20, we eliminate network size as a potentially significant
factor. As discussed above, any change to network topol-
ogy necessarily alters more than structural diversity, but con-
trolling for network size is arguably the most important,
and is in line with the approach taken in past observational
studies (Ugander et al. 2012). Of course, our restriction to
follow-all users limits the generalizability of our results to
the full population of Twitter users, but we believe that de-
sign choice represents a suitable compromise.
Results
Replicating results of past observational studies
We begin by examining the relationship between structural
diversity and retention on a randomly selected sample of
Twitter users who signed up for the service while our ex-
periment was running but who were not themselves part of
the experiment. As a result, this population contains both eli-
gible and ineligible users, in representative proportions, and
all received recommendations from the standard algorithm
also used for our control condition. We throughout consider
structural diversity computed on a user's network immedi-
ately after joining Twitter, to facilitate direct comparisons to
the results from our experiment, in which this initial network
structure was randomized.
In Figure 5 (top), users are binned according to the struc-
tural diversity of their initial networks, where we use pair-
wise similarity to quantify diversity. For each point on the
horizontal axis, the vertical axis indicates the fraction of
users in that bin who were active on Twitter three months
after signing up. The top-left panel of Figure 5 is based on
all users with an initial network size of at least 10, where
this lower limit ensures pairwise similarity can be reliably
computed; the top-right panel is based on the subset of "fol-
low all" users, with an initial network size of exactly 20. In
both cases, the solid lines show that retention is positively
correlated with structural diversity (i.e., retention decreases
with pairwise similarity), corroborating past observational
results in other domains. In accordance with Twitter's re-
porting policies we show only relative retention rates, with
1.0 in both panels corresponding to the overall retention rate
among follow-all users.
Our study differs from past work in the population we
study (Twitter users, particularly those who followed our 20
recommendations); the outcome we measure (30-day reten-
tion); and our specific measure of structural diversity (av-
erage pairwise similarity). Nonetheless, the patterns we see
are consistent with the theory that engagement is positively
correlated with structural diversity. Importantly, this consis-
tency with past work indicates that both our setting and our
design choices are well-suited to examining structural diver-
sity. Had we not been able to replicate past findings, one
might reasonably worry that idiosyncrasies in the particular
setting we study were driving the results.
Restricting to eligible users
We next repeat our analysis for eligible users -- the 12% of
the population, as discussed above, for whom we could gen-
erate recommendations having low, medium, and high struc-
tural diversity. These eligible users come from our control
condition, and they see the standard recommendations Twit-
ter provides. The results are again shown in Figure 5 (top
panels, dashed lines). On this eligible subpopulation, we find
that the strength of the relationship between retention and
structural diversity is significantly attenuated. Thus, simply
controlling for the possibility of selecting into structurally
diverse or homogeneous networks, much of the apparent di-
versity effect on retention disappears.
TreatmentControl020040060000.050.100.150.200.250.3000.050.100.150.200.250.30Average pairwise similarityNumber of usersHigh similarityMedium similarityLow similarityFigure 4: Covariate distributions across treatment conditions for the subpopulation of users who followed all our 20 recommen-
dations. Treatment arms have nearly identical distributions, mitigating concerns of selection bias due to conditioning on the
post-treatment "follow all" behavior.
The contrast between all users (solid lines) and eligible
users (dashed lines) is indeed one of our key findings. Once
we restrict to a population for whom one can reasonably
talk about the causal effects of network structure (i.e., our
set of eligible users, who could plausibly enter into low or
high diversity contact networks), the relationship between
structural diversity and engagement is considerably smaller.
Thus, even without running a randomized trial, these prelim-
inary results indicate that the observed correlation between
structural diversity and retention in the full Twitter popula-
tion is driven in part by selection rather than causation.
Notably, eligible users have lower overall engagement
than the broader population. Though we cannot definitively
say what is driving that result, the pattern illustrates the
importance of considering only eligible users when testing
causal theories of structural diversity. The structural diver-
sity of ineligible users, by definition, cannot be easily varied,
and so the meaning of causation is ill-posed in that subpop-
ulation. Because ineligible users are qualitatively different
from those that are eligible -- for examle, having higher re-
tention rates -- it is important to filter out such users when
estimating causal effects.
The randomized trial
Finally, we present the results from our randomized trial.
The three colored points in Figure 5 (top right) indicate
that retention rates for follow-all users are comparable in
the low-, medium-, and high-diversity treatment groups.
The locations of these points on the horizontal axis in-
dicate the mean pairwise similarity of each condition, as
shown in Figure 3. The 95% confidence interval for the
difference between the high- and low-similarity treatment
groups is (−0.04, 0.07) -- indicating a lack of statistical
significance -- where we report these numbers in the units
of relative retention rates as in the figure.6 We similarly find
no statistically significant difference between treatment con-
ditions for the number of Tweets posted or the number of
Tweets "liked" by new users in their first 30 days on the
platform (Figure 5, bottom panels). Thus, at least for the
subpopulation we study, we do not find evidence of a causal
effect of structural diversity on adoption or engagement.
Conclusion
Our results corroborate the correlational relationship be-
tween structural diversity and behavior found in past obser-
vational studies. But, at least in the setting we consider, we
also find that this pattern is driven by selection rather than
causation. In particular, we find that the connection between
structural diversity and retention (and engagement) is signif-
icantly weaker in the subpopulation of eligible users, who
might reasonably form either homogeneous or diverse net-
works. In the randomized low-, medium- and high-diversity
experiment groups we find no significant difference in re-
tention or engagement rates. It thus appears that those who
organically form diverse networks differ systematically from
those who form homogeneous networks in ways that affect
behavior.
In establishing these results, we hope to have clarified
both the theoretical underpinnings and the practical chal-
lenges of testing for a causal link between network struc-
ture and behavior. Our work leaves unanswered several im-
portant questions, including the extent to which these find-
6Many papers aim to find statistically significant differences be-
tween treatment conditions. In this case, however, the null result is
our main finding. Past work has posited that structural diversity and
engagement are causally related (based on observational evidence),
but we find no evidence of that link in our randomized experiment,
as indicated by the lack of statistical significance.
CountryEmailLanguagePlatformllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0%20%40%60%United StatesIndiaBrazilJapanGermanyTurkeyAlgeriaOthergmail.comhotmail.comyahoo.comNo domainOtherEnglishSpanishRussianPortugueseFrenchArabicTurkishOtherWebAndroidMobile webiOSOtherProportionllllControl High similarity Medium similarity Low similarityFigure 5: Top Left: Among both the full population of Twitter users and the subpopulation of eligible users (from the control
condition), structural diversity is correlated with retention, though the effect is attenuated in the latter group. Top Right: Anal-
ogous results for "follow all" users, who have an initial network size of exactly 20. Despite the observed correlation between
structural diversity and retention, retention is comparable across all experiment conditions (colored points, with 95% confidence
intervals), suggesting that structural diversity does not causally affect retention in this case. Bottom: Alternative engagement
metrics (number of likes and number of Tweets by new users) as a function of pairwise similarity, again for the subpopulation of
users who follow exactly 20 people. We plot the geometric mean of the values after adding 1 to each user's activity measure to
account for zeros. In all cases, average pairwise similarity is computed based on a user's initial network. These plots corroborate
our primary finding that structural diversity does not appear to be causally connected to engagement.
ings generalize to other domains, populations, and strategies
for inducing structural changes. For example, our specific
methodological approach required us to focus on a small,
non-representative subset of new Twitter users who followed
our recommendations, and for whom we could thus exoge-
nously vary structural diversity. We hope future studies can
design experiments to investigate larger subsets of the pop-
ulation. Further, as implied by our discussion of exclusion,
there are multiple ways to exogenously vary structural di-
versity and other methods -- including those based on more
complete social network information -- might yield different
results. Looking forward, we hope our results and our ap-
proach spur further exploration of the often subtle causal
role that network structure may play in social behavior. We
also hope our results help demonstrate the value of random-
ized experiments in social network studies (Manski 1993;
Shalizi and Thomas 2011).
Acknowledgements
We thank Christopher Chang, Dean Eckles, Avi Feller and
Jennifer Pan for their comments. We also thank the Rec-
ommendations and Notifications team at Twitter, including
Bruce Deng, Jerry Jiang, Jinsong Lin, and Zhijun Yin, for
their help with implementing the experiment. Our study de-
sign was reviewed and approved by Stanford University's
Institutional Review Board (Protocol #: 36150).
AllEligiblelllAllEligibleAll new users"Follow all" users00.020.040.060.080.100.020.040.060.080.10.50.60.70.80.91.01.11.21.31.41.51.61.7Average pairwise similarityRetentionlllHigh similarityMedium similarityLow similaritylllAllEligiblelllAllEligibleLikesTweets00.020.040.060.080.100.020.040.060.080.10.02.55.07.510.0Average pairwise similarityEngagement (geometric mean)lllHigh similarityMedium similarityLow similarityReferences
[Aral and Nicolaides 2017] Aral, S., and Nicolaides, C.
2017. Exercise contagion in a global social network. Na-
ture Communications 8.
[Aral and Walker 2014] Aral, S., and Walker, D. 2014. Tie
strength, embeddedness, and social influence: A large-scale
networked experiment. Management Science 60(6):1352 --
1370.
[Backstrom et al. 2006] Backstrom, L.; Huttenlocher, D.;
Kleinberg, J.; and Lan, X. 2006. Group formation in large
social networks: membership, growth, and evolution.
In
Proceedings of the 12th ACM SIGKDD International Con-
ference on Knowledge Discovery and Data Mining, 44 -- 54.
ACM.
[Backstrom et al. 2013] Backstrom, L.; Kleinberg, J.; Lee,
L.; and Danescu-Niculescu-Mizil, C. 2013. Characteriz-
ing and curating conversation threads: expansion, focus, vol-
ume, re-entry. In Proceedings of the sixth ACM international
conference on Web search and data mining, 13 -- 22. ACM.
[Bakshy et al. 2012] Bakshy, E.; Eckles, D.; Yan, R.; and
Rosenn, I. 2012. Social influence in social advertising: ev-
idence from field experiments. In Proceedings of the 13th
ACM Conference on Electronic Commerce, 146 -- 161. ACM.
[Bao et al. 2013] Bao, P.; Shen, H.-W.; Huang, J.; and
Cheng, X.-Q. 2013. Popularity prediction in microblog-
ging network: a case study on sina weibo. In Proceedings
of the 22nd International Conference on World Wide Web,
177 -- 178. ACM.
[Bass 1969] Bass, F. M. 1969. A new product growth for
model consumer durables. Management science 15(5):215 --
227.
[Bikhchandani, Hirshleifer, and Welch 1992] Bikhchandani,
S.; Hirshleifer, D.; and Welch, I. 1992. A theory of fads,
fashion, custom, and cultural change as informational
cascades. Journal of political Economy 100(5):992 -- 1026.
[Burt 1987] Burt, R. S. 1987. Social contagion and inno-
vation: Cohesion versus structural equivalence. American
journal of Sociology 92(6):1287 -- 1335.
[Burt 2000] Burt, R. S. 2000. The network structure of social
capital. Research in organizational behavior 22:345 -- 423.
[Coleman, Katz, and Menzel 1957] Coleman, J.; Katz, E.;
and Menzel, H. 1957. The diffusion of an innovation among
physicians. Sociometry 20(4):253 -- 270.
[Frangakis and Rubin 2002] Frangakis, C. E., and Rubin,
D. B. 2002. Principal stratification in causal inference. Bio-
metrics 58(1):21 -- 29.
[Granovetter 1973] Granovetter, M. S. 1973. The strength of
weak ties. American Journal of Sociology 78(6):1360 -- 1380.
[Granovetter 1978] Granovetter, M. 1978. Threshold mod-
els of collective behavior. American journal of sociology
83(6):1420 -- 1443.
[Gupta et al. 2013] Gupta, P.; Goel, A.; Lin, J.; Sharma, A.;
Wang, D.; and Zadeh, R. 2013. WTF: The who to follow
service at Twitter. In Proceedings of the 22nd international
conference on World Wide Web, 505 -- 514. ACM.
[Hasan and Koning 2017] Hasan, S., and Koning, R. 2017.
Conversational peers and idea generation: Evidence from a
field experiment. Harvard Business School Working Paper
17-101.
[Heckman 1977] Heckman, J. J. 1977. Sample selection bias
as a specification error (with an application to the estimation
of labor supply functions).
[Imbens and Rubin 2015] Imbens, G. W., and Rubin, D. B.
2015. Causal inference in statistics, social, and biomedical
sciences. Cambridge University Press.
[Jahani et al. 2017] Jahani, E.; Saint-Jacques, G.; Sundsøy,
P.; Bjelland, J.; Moro, E.; et al. 2017. Differential net-
work effects on economic outcomes: A structural perspec-
tive. In International Conference on Social Informatics, 41 --
50. Springer.
[Kloumann et al. 2015] Kloumann, I.; Adamic, L.; Klein-
berg, J.; and Wu, S. 2015. The lifecycles of apps in a social
ecosystem. In Proceedings of the 24th International Con-
ference on World Wide Web, 581 -- 591. International World
Wide Web Conferences Steering Committee.
[Lyle 2007] Lyle, D. S. 2007. Estimating and interpreting
peer and role model effects from randomly assigned social
groups at west point. The Review of Economics and Statis-
tics 89(2):289 -- 299.
[Manski 1993] Manski, C. F. 1993. Identification of endoge-
nous social effects: The reflection problem. The review of
economic studies 60(3):531 -- 542.
[Montgomery, Nyhan, and Torres 2018] Montgomery, J. M.;
Nyhan, B.; and Torres, M. 2018. How conditioning on post-
treatment variables can ruin your experiment and what to do
about it. American Journal of Political Science 62(3):760 --
775.
[Page 2008] Page, S. E. 2008. The difference: How the power
of diversity creates better groups, firms, schools, and soci-
eties. Princeton University Press.
[Rogers 1962] Rogers, E. M. 1962. Diffusion of innovations.
Free Press of Glencoe.
[Romero, Tan, and Ugander 2013] Romero, D. M.; Tan, C.;
and Ugander, J. 2013. On the interplay between social and
topical structure. In ICWSM.
[Ryan and Gross 1943] Ryan, B., and Gross, N. C. 1943.
The diffusion of hybrid seed corn in two iowa communities.
Rural Sociology 8(1):15.
[Schelling 1971] Schelling, T. C. 1971. Dynamic models of
segregation. Journal of mathematical sociology 1(2):143 --
186.
[Shalizi and Thomas 2011] Shalizi, C. R., and Thomas, A. C.
2011. Homophily and contagion are generically confounded
in observational social network studies. Sociological meth-
ods & research 40(2):211 -- 239.
[Sharma, Seshadhri, and Goel 2017] Sharma, A.; Seshadhri,
C.; and Goel, A. 2017. When hashes met wedges.
In
Proceedings of the 26th International Conference on World
Wide Web. ACM Press.
[Sobel 2006] Sobel, M. E. 2006. What do randomized stud-
ies of housing mobility demonstrate? causal inference in the
face of interference. Journal of the American Statistical As-
sociation 101(476):1398 -- 1407.
[Spiliotopoulos and Oakley 2013] Spiliotopoulos, T.,
and
Oakley, I. 2013. Understanding motivations for facebook
use: Usage metrics, network structure, and privacy.
In
Proceedings of the SIGCHI Conference on Human Factors
in Computing Systems, 3287 -- 3296. ACM.
[Su, Sharma, and Goel 2016] Su, J.; Sharma, A.; and Goel,
S. 2016. The effect of recommendations on network struc-
ture. In Proceedings of the 25th International Conference
on World Wide Web, 1157 -- 1167.
[Ugander et al. 2012] Ugander, J.; Backstrom, L.; Marlow,
C.; and Kleinberg, J. 2012. Structural diversity in social
contagion. Proceedings of the National Academy of Sciences
109(16):5962 -- 5966.
[Watts and Dodds 2007] Watts, D. J., and Dodds, P. S. 2007.
Influentials, networks, and public opinion formation. Jour-
nal of Consumer Research 34:441 -- 458.
[Weng, Menczer, and Ahn 2013] Weng, L.; Menczer, F.; and
Ahn, Y.-Y. 2013. Virality prediction and community struc-
ture in social networks. Scientific Reports 3:2522.
|
1805.02411 | 2 | 1805 | 2018-05-28T18:36:42 | Prioritizing network communities | [
"cs.SI",
"cs.LG",
"q-bio.MN",
"stat.AP"
] | Uncovering modular structure in networks is fundamental for systems in biology, physics, and engineering. Community detection identifies candidate modules as hypotheses, which then need to be validated through experiments, such as mutagenesis in a biological laboratory. Only a few communities can typically be validated, and it is thus important to prioritize which communities to select for downstream experimentation. Here we develop CRank, a mathematically principled approach for prioritizing network communities. CRank efficiently evaluates robustness and magnitude of structural features of each community and then combines these features into the community prioritization. CRank can be used with any community detection method. It needs only information provided by the network structure and does not require any additional metadata or labels. However, when available, CRank can incorporate domain-specific information to further boost performance. Experiments on many large networks show that CRank effectively prioritizes communities, yielding a nearly 50-fold improvement in community prioritization. | cs.SI | cs |
Prioritizing network communities
Marinka Zitnik,1 Rok Sosic,1 and Jure Leskovec1,2,⇤
1 Computer Science Department, Stanford University, Stanford, CA, USA
2 Chan Zuckerberg Biohub, San Francisco, CA, USA
⇤ To whom correspondence should be addressed; E-mail: [email protected]
Uncovering modular structure in networks is fundamental for systems in biology, physics,
and engineering. Community detection identifies candidate modules as hypotheses, which
then need to be validated through experiments, such as mutagenesis in a biological labora-
tory. Only a few communities can typically be validated, and it is thus important to prioritize
which communities to select for downstream experimentation. Here we develop CRANK,
a mathematically principled approach for prioritizing network communities. CRANK ef-
ficiently evaluates robustness and magnitude of structural features of each community and
then combines these features into the community prioritization. CRANK can be used with any
community detection method. It needs only information provided by the network structure
and does not require any additional metadata or labels. However, when available, CRANK
can incorporate domain-specific information to further boost performance. Experiments on
many large networks show that CRANK effectively prioritizes communities, yielding a nearly
50-fold improvement in community prioritization.
1
Networks exhibit modular structure1 and uncovering it is fundamental for advancing the un-
derstanding of complex systems across sciences2, 3. Methods for community detection4, also called
node clustering or graph partitioning, allow for computational detection of modular structure by
identifying a division of network's nodes into groups, also called communities5–10. Such com-
munities provide predictions/hypotheses about potential modules of the network, which then need
to be experimentally validated and confirmed. However, in large networks, community detection
methods typically identify many thousands of communities6, 7 and only a small fraction can be
rigorously tested and validated by follow-up experiments. For example, gene communities de-
tected in a gene interaction network11 provide predictions/hypotheses about disease pathways2, 3,
but to confirm these predictions scientists have to test every detected community by performing
experiments in a wet laboratory3, 8. Because experimental validation of detected communities is
resource-intensive and generally only a small number of communities can be investigated, one
must prioritize the communities in order to choose which ones to investigate experimentally.
In the context of biological networks, several methods for community or cluster analysis
have been developed2, 3, 12–15. However, these methods crucially rely and depend on knowledge
in external databases, such as Gene Ontology (GO) annotations16, protein domain databases, gene
expression data, patient clinical profiles, and sequence information, in order to calculate the quality
of communities derived from networks. Furthermore, they require this information to be available
for all communities. This means that if genes in a given community are not present in a gene
knowledge database then it is not possible for existing methods to even consider that community.
This issue is exacerbated because knowledge databases are incomplete and biased toward better-
studied genes11. Furthermore, these methods do not apply in domains at the frontier of science
where domain-specific knowledge is scarce or non-existent, such as in the case of cell-cell similar-
ity networks17, microbiome networks18, 19, and chemical interaction networks20. Thus, there is a
need for a general solution to prioritize communities based on network information only.
Here, we present CRANK, a general approach that takes a network and detected communities
as its input and produces a ranked list of communities, where high-ranking communities represent
promising candidates for downstream experiments. CRANK can be applied in conjunction with any
community detection method (Supplementary Notes 2 and 5) and needs only the network struc-
ture, requiring no domain-specific meta or label information about the network. However, when
2
domain-specific supervised information is available, CRANK can integrate this extra information
to boost performance (Supplementary Notes 9 and 10). CRANK can thus prioritize communities
that are well characterized in knowledge bases, such as GO annotations, as well as poorly char-
acterized communities with limited or no annotations. Furthermore, CRANK is based on rigorous
statistical methods to provide an overall rank for each detected community.
Results
Overview of CRANK community prioritization approach
CRANK community prioritization approach consists of the following steps (Figure 1). First,
CRANK finds communities using an existing, preferred community detection method (Figure 1a).
It then computes for each community four CRANK defined community prioritization metrics,
which capture key structural features of the community (Figure 1b), and then it combines the
community metrics via a aggregation method into a single overall score for each community (Fig-
ure 1c). Finally, CRANK prioritizes communities by ranking them by their decreasing overall score
(Figure 1d).
CRANK uses four different metrics to characterize network connectivity features for each
detected community (see Methods). These metrics evaluate the magnitude of structural features
as well as their robustness against noise in the network structure. The rationale here is that high
priority communities have high values of metrics and are also stable with respect to network pertur-
bations. If a small change in the network structure-an edge added here, another deleted there-
significantly changes the value of a prioritization metric then the community will not be considered
high priority. We derive analytical expressions for calculating these metrics, which make CRANK
computationally efficient and applicable to large networks (Supplementary Note 2). Because indi-
vidual metrics may have different importance in different networks, a key element of CRANK is a
rank aggregation method. This method combines the values of the four metrics into a single score
for each community, which then determines the community's rank (see Methods and Supplemen-
tary Note 4). CRANK's aggregation method adjusts the impact of each metric on the ranking in
a principled manner across different networks and also across different communities within a net-
work, leading to robust rankings and a high-quality prioritization of communities (Supplementary
Note 5).
3
Synthetic networks
We first demonstrate CRANK by applying it to synthetic networks with planted community struc-
ture (Figure 2a). The goal of community prioritization is to identify communities that are most
promising candidates for follow-up investigations. Since communities provide predictions about
the modular structure of the network, promising candidates are communities that best correspond to
the underlying modules. Thus, in this synthetic example, the aim of community prioritization can
be seen as to rank communities based on how well they represent the underlying planted communi-
ties, while only utilizing information about network structure and without any additional informa-
tion about the planted communities. We quantify prioritization quality by measuring the agreement
between a ranked list of communities produced by CRANK and the gold standard ranking. In the
gold standard ranking, communities are ordered in the decreasing order of how accurately each
community reconstructs its corresponding planted community.
We experiment with random synthetic networks with planted community structure (Fig-
ure 2a), where we use a generic community detection method7 to identify communities and then
prioritize them using CRANK. We observe that CRANK produces correct prioritization-using
only the unlabeled network structure, CRANK places communities that better correspond to planted
communities towards the top of the ranking (Figure 2b), which indicates that CRANK can identify
accurately detected communities by using the network structure alone and having no other data
about planted community structure. Comparing the performance of CRANK to alternative rank-
ing techniques, such as modularity5 and conductance21, we observe that CRANK performs 149%
and 37% better than modularity and conductance, respectively, in terms of the Spearman's rank
correlation between the generated ranking and the gold standard community ranking (Figure 2c).
Moreover, we observed no correlation with the gold standard ranking when randomly ordering the
detected communities. Although zero correlation is expected, poor performance of random order-
ing is especially illuminating because prioritization of communities is typically ignored in current
network community studies.
Networks of medical drugs with shared target proteins
Community rankings obtained by CRANK provide a rich source of testable hypotheses. For exam-
ple, we consider a network of medical drugs where two drugs are connected if they share at least
one target protein (Figure 3a). Because drugs that are used to treat closely related diseases tend
4
to share target proteins22, we expect that drugs belonging to the same community in the network
will be rich in chemicals with similar therapeutic effects. Identification of these drug communi-
ties hence provides an attractive opportunity for finding new uses of drugs as well as for studying
drugs' adverse effects22.
After detecting drug communities using a standard community detection method7, CRANK
relies only on the network structure to prioritize the communities. We evaluate ranking perfor-
mance by comparing it to metadata captured in external chemical databases and not used by
the ranking method. We find that CRANK assigns higher priority to communities whose drugs
are pharmacogenomically more similar (Figure 3b), indicating that higher-ranked communities
contain drugs with more abundant drug-drug interactions, more similar chemical structure, and
stronger textual associations. In contrast, ranking communities by modularity score gives a poor
correspondence with information in the external chemical databases (Figure 3c).
We observe that the top ranked communities are composed from an unusual set of drugs
(Figure 3a and Supplementary Table), yet drugs with unforeseen community assignment may rep-
resent novel candidates for drug repurposing22. Examining the highest ranked communities, we do
not expect mifepristone, an abortifacient used in the first months of pregnancy, to appear together
with a group of drugs used to treat inflammatory diseases. Another drug with unanticipated com-
munity assignment is minaprine, a psychotropic drug that is effective in the treatment of various
depressive states23. Minaprine is an antidepressant that antagonizes behavioral despair; however,
it shares target proteins with several cholinesterase inhibitors. Two examples of such inhibitors are
physostigmine, used to treat glaucoma, and galantamine, a drug investigated for the treatment of
moderate Alzheimer's disease24. In the case of minaprine, an antidepressant, it was just recently
shown that this drug is also a cognitive enhancer that may halt the progression of Alzheimer's
disease25. It is thus attractive that CRANK identified minaprine as a member of a community of
primarily cholinesterase inhibitors, which suggests minaprine's potential for drug repurposing for
Alzheimer's disease.
The analysis here was restricted to drugs approved for medical use by the U.S. Food and
Drug Administration, because these drugs are accompanied by rich metadata that was used for
evaluating community prioritization. We find that when CRANK integrates drug metadata into
its prioritization model, CRANK can generate up to 55% better community rankings, even when
5
the amount of additional information about drugs is small (Supplementary Note 10). However,
approved medical drugs represent less than one percent of all small molecules with recorded in-
teractions. Many of the remaining 99% of these molecules might be candidates for medical usage
or drug repurposing but currently have little or no metadata in the chemical databases. This fact
further emphasizes the need for methods such as CRANK that can prioritize communities based on
network structure alone while not relying on any metadata in external chemical databases.
Gene and protein interaction networks
CRANK can also prioritize communities in molecular biology networks, covering a spectrum of
physical, genetic, and regulatory gene interactions11. In such networks, community detection is
widely used because gene communities tend to correlate with cellular functions and thus provide
hypotheses about biological pathways and protein complexes2, 3.
CRANK takes a network and communities detected in that network, and produces a rank-
ordered list of communities. As before, while CRANK ranks the communities purely based on
network structure, the external metadata about molecular functions, cellular components, and bio-
logical processes is used to assess the quality of the community ranking.
Considering highest ranked gene communities, CRANK's ranking contains on average 5
times more communities whose genes are significantly enriched for cellular functions, compo-
nents, and processes16 than random prioritization, and 13% more significantly enriched commu-
nities than modularity- or conductance-based ranking (Supplementary Note 11). For example, in
the human protein-protein interaction network, the highest ranked community by CRANK is com-
posed of 20 genes, including PORCN, AQP5, FZD6, WNT1, WNT2, WNT3, and other members of
the Wnt signaling protein family26 (Supplementary Note 11). Genes in that community form a bi-
ologically meaningful group that is functionally enriched in the Wnt signaling pathway processes
(p-value = 6.4⇥ 10 23), neuron differentiation (p-value = 1.6⇥ 10 15), cellular response to retinoic
acid (p-value = 2.9 ⇥ 10 14), and in developmental processes (p-value = 9.2 ⇥ 10 10).
Functional annotation of molecular networks is largely unavailable and incomplete, espe-
cially when studied objects are not genes but rather other entities, e.g., miRNAs, mutations, single
nucleotide variants, or genomic regions outside protein-coding loci27. Thus it is often not possible
to simply rank the communities by their functional enrichment scores. In such scenarios, CRANK
can prioritize communities reliably and accurately using only network structure without necessitat-
6
ing any external databases. Gene communities that rank at the top according to CRANK represent
predictions that could guide scientists to prioritize resource-intensive laboratory experiments.
Megascale cell-cell similarity networks
Single-cell RNA sequencing has transformed our understanding of complex cell populations28.
While many types of questions can be answered using single-cell RNA-sequencing, a central fo-
cus is the ability to survey the diversity of cell types and composition of tissues within a sample of
cells.
To demonstrate that CRANK scales to large networks, we used the single-cell RNA-seq
dataset containing 1,306,127 embryonic mouse brain cells29 for which no cell types are known.
The dataset was preprocessed using standard procedures to select and filter the cells based on
quality-control metrics, normalize and scale the data, detect highly variable genes, and remove un-
wanted sources of variation9. The dataset was represented as a weighted graph of nearest neighbor
relations (edges) among cells (nodes), where relations indicated cells with similar gene expression
patterns calculated using diffusion pseudotime analysis30. To partition this graph into highly in-
terconnected communities we apply a community detection method proposed for single-cell data8.
The method separates the cells into 141 fine-grained communities, the largest containing 18,788
(1.8% of) and the smallest only 203 (0.02% of) cells. After detecting the communities, CRANK
takes the cell-cell similarity network and the detected communities, and generates a rank-ordered
list of communities, assigning a priority to each community. CRANK's prioritization of communi-
ties derived from the cell-cell similarity network takes less than 2 minutes on a personal computer.
In the cell-cell similarity network, one could assume that top-ranked communities contain
highly distinct marker genes31, while low-ranked communities contain marker genes whose ex-
pression levels are spread out beyond cells in the community. To test this hypothesis, we identify
marker genes for each detected community. In particular, for each community we find genes that
are differentially expressed in the cells within the community9 relative to all cells that are not in
the community.
We find that high-ranked communities in CRANK contain cells with distinct marker genes,
confirming the above hypothesis (average z-score of marker genes with respect to the bulk mean
gene expression was above 200 and never smaller than 150) (Figure 4a-b). In contrast, cells in
low-ranked communities show a weak expression activity diffused across the entire network and
7
no community-specific expression activity (Figure 4c-d). Examining cells assigned to the highest-
ranked community (rank 1 community) in CRANK, we find that most differentially expressed
genes are TYROBP, C1QB, C1QC, FCER1G, and C1QA (at least a 200-fold difference in normal-
ized expression with respect to the bulk mean expression9). It is known that these are immuno-
regulatory genes and that they play important roles in signal transduction in dendritic cells, osteo-
clasts, macrophages, and microglia32. In contrast, low-ranked communities (Figure 4 visualizes
rank 139, rank 140, and rank 141 communities) contain predominantly cells in which genes show
no community-specific expression. Genes in communities ranked lower by CRANK hence do not
have localized mRNA expression levels, suggesting there are no good marker genes that define
those communities28. Since the expression levels of mRNA are linked to cellular function and
can be used to define cell types28, the analysis here points to the potential of using highest-ranked
communities in CRANK as candidates to characterize cells at the molecular level, even in datasets
where no cells are yet classified into cell types.
Analysis of CRANK prioritization approach
The CRANK approach can be applied with any community detection method and can operate on
directed, undirected, and weighted networks. Furthermore, CRANK can also use external domain-
specific information to further boost prioritization performance (Supplementary Note 10). Results
on diverse biological, information, and technological networks and on different community detec-
tion methods show that the second best performing approach changes considerably across net-
works, while CRANK always produces the best result, suggesting that it can effectively harness the
network structure for community prioritization (Supplementary Note 8). CRANK automatically
adjusts weights of the community metrics in the prioritization, resulting in each metric participat-
ing with different intensity across different networks (Supplementary Figure 6). This is in sharp
contrast with deterministic approaches, which are negatively impacted by heterogeneity of network
structures and network community models employed by different community detection methods.
The four CRANK community prioritization metrics are essential and complementary. CRANK met-
rics considered together perform on average 45% better than the best single CRANK metric, and
26% better than any subset of three CRANK metrics (Supplementary Note 8). CRANK performs on
average 38% better than approaches that combine alternative community metrics (Supplementary
Note 8). Furthermore, CRANK can easily integrate any number of additional and domain-specific
8
community metrics2, 12–15, and performs well in the presence of low-signal and noisy metrics (Sup-
plementary Note 9). Furthermore, CRANK outperforms alternative approaches that combine the
metrics by approximating NP-hard rank aggregation objectives (Supplementary Note 8).
Discussion
The task of community prioritization is to rank-order communities detected by a community detec-
tion method such that communities with best prospects in downstream analysis are ranked towards
the top. We demonstrated that prioritizing communities in biological, information, and technologi-
cal networks is important for maximizing the yield of downstream analyses and experiments. Prior
efforts crucially depend on external meta information to calculate the quality of communities with
an additional constraint that this information has to be available for all communities. We devised
a principled approach for the task of community prioritization. Although the approach does not
need any meta information, it can utilize such information if it is available. Furthermore, CRANK
is applicable even when the meta information is noisy, incomplete, or available only for a subset
of communities.
The CRANK community ranking is based on the premise that high priority communities
produce high values of community prioritization metrics and that these metrics are stable with
respect to small perturbations of the network structure. Our findings support this premise and sug-
gest that both the magnitude of the metrics and the robustness of underlying structural features
have an important role in the performance of CRANK across a wide range of networks (Supple-
mentary Note 8). CRANK can easily be extended using existing network metrics and can also
consider new domain-specific scoring metrics (Supplementary Notes 9 and 10). Thus, it would be
especially interesting to apply it to networks, where rich meta information exists and interesting
domain-specific scoring metrics can be developed, such as protein interaction networks with dis-
ease pathway meta information33, and molecular networks with genome-wide associations34. We
believe that the CRANK approach opens the door to principled methods for prioritizing commu-
nities in large networks and, when coupled with experimental validation, can help us to speed-up
scientific discovery process.
9
Methods
Community prioritization model
CRANK prioritizes communities based on the robustness and magnitude of multiple structural
features of each community. For each feature f, we specify a corresponding prioritization metric
rf, which captures the magnitude and the robustness of f. Robustness of f is defined as the change
in the value of f between the original network and its randomly perturbed version. The intent here
is that high quality communities will have high values of f and will also be robust to perturbations
of the network structure. We define and discuss specific prioritization metrics later. Here, we first
present the overall prioritization model.
Random perturbations of the network are based on rewiring of ↵ fraction of the edges in a
degree preserving manner35 (Supplementary Note 2). Parameter ↵ measures perturbation intensity;
a value close to zero indicates that the network has only a few edges rewired whereas a value close
to one corresponds to a maximally perturbed network, which is a random graph with the same
degree distribution as the original network.
Even though the prioritization model is framed conceptually in terms of perturbing the net-
work by rewiring its edges, CRANK never actually rewires the network when calculating the pri-
oritization metrics. Network rewiring is a computationally expensive operation. Instead, we derive
analytical expressions that evaluate the metrics in a closed form without physically perturbing the
network (Supplementary Note 2), which leads to a substantial increase in scalability of CRANK.
Given structural feature f, we define prioritization metric rf to quantify the change in the
value of f between the original and the perturbed network. We want rf to capture the magnitude
of feature f in the original network as well as the change in the value of f between the network
and its perturbed version.
We define prioritization metric rf for community C as:
rf (C; ↵) =
f (C)
1 + df (C, ↵)
,
(1)
where f (C) is the feature value of community C in the original network, ↵ measures perturbation
intensity, df (C, ↵) = f (C) f (C↵) is the change of the feature value for community C between
the network and its ↵-perturbed version, and f (C↵) is the value of feature f in the ↵-perturbed
version of the network.
10
Generally, higher priority communities will have higher values of rf.
In particular, as f
can take values between zero and one, then rf also takes values between zero and one. rf at-
tains value of zero for community C whose value of f (C) is zero. When f (C) is nonzero, then
rf (C; ↵) down-weights it according to the sensitivity of community C to network rewiring. f (C)
is down-weighted by the largest amount when it changes as much as possible under the network
perturbation (i.e., df (C, ↵) = 1). And, f (C) remains unchanged when community C is maximally
robust to network perturbation (i.e., df (C, ↵) = 0).
Community prioritization metrics
Prioritization metric rf (C) captures the magnitude as well as the robustness of structural feature f
of community C. We define four different community prioritization metrics rf. Through empirical
analysis we show that these metrics holistically and non-redundantly quantify different features of
network community structure (Supplementary Note 8). Each metric is necessary and contributes
positively to the performance of CRANK. We combine these metrics into a global ranking of
communities using a rank aggregation method that we describe later.
Given a network G(V,E,C) with nodes V, edges E, and detected communities C, CRANK
can be applied in conjunction with any statistical community detection method that allows for com-
puting the following three quantities: (1) the probability of node u belonging to a given community
C, pC(u) = p(u 2 C), (2) the probability of an edge p(u, v) = p((u, v) 2E ), and (3) a contribu-
tion of community C towards the existence of an edge (u, v), pC(u, v) = p((u, v) 2E u, v 2 C).
Many commonly used community detection methods allow for computing the above three quanti-
ties (Supplementary Note 5).
Our rationale in defining the prioritization metrics is to measure properties that determine
a high quality community, which is also robust and stable with respect to small perturbations of
the network. For example, a genuine high quality community should provide good support for
the existence of edges between its members in the original network as well as in the perturbed
version. If a small change in the network structure-an edge added here, another deleted there-
can completely change the value of the prioritization metric then the community should not be
considered high quality. Analogously, a high quality community should have low confidence for
edges pointing outside of the community both in the original as well as in the perturbed network.
11
Community likelihood
The community likelihood metric quantifies the overall connectivity of a given community.
It
measures the likelihood of the network structure induced by the nodes in the community. Note
that the metric does not simply count the edges but considers them in a probabilistic way. As such
it quantifies how well the observed edges can be explained by the community C. The intuition is
that high quality community will contribute a large amount of likelihood to explain the observed
edges.
We formalize the community likelihood for a given community C as follows:
pC(u)Yv2C
sC(u, v↵),
(2)
where sC(u, v↵) is defined as follows:
fl(C↵) =Yu2C
sC(u, v↵) =8<:
pC(v)pC(u, v↵) if (u, v) 2E
pC(v)(1 pC(u, v↵)) if (u, v) /2E .
Here, pC(u, v↵) is a contribution of community C towards the creation of edge (u, v) under net-
work perturbation intensity ↵. We derive analytical expressions for pC(u, v↵) which allows us to
compute their values without ever actually perturbing the network (Supplementary Note 2).
Here (and for the other three prioritization metrics) we evaluate the feature in the origi-
nal network (fl(C) = fl(C↵ = 0)) as well as in the slightly perturbed version of the network
(fl(C↵ = 0.15)). We then combine the two scores using the prioritization metric formula in
Eq. (1).
Community density
In contrast to community likelihood, which quantifies the contribution of a community to the over-
all edge likelihood, community density simply measures the overall strength of connections within
the community. By considering edge probabilities that are not conditioned on the community
C, density implicitly takes into consideration potentially hierarchical and overlapping community
structures. When a community is nested inside other communities, these enclosing communities
contribute to the increased density of community's internal edges.
Formally, we define the density of a community as the joint probability of the edges between
community members. Assuming network perturbation intensity ↵, density of community C is
12
defined as:
fd(C↵) = Y(u,v)2E
u2C,v2C
p(u, v↵),
(3)
where p(u, v↵) is the probability of edge (u, v) under network perturbation intensity ↵. We derive
analytical expression for p(u, v↵) which allows us to compute their values without ever actually
perturbing the network (Supplementary Note 2).
Community boundary
To complement the internal connectivity measured by community density, community boundary
considers the strength of edges leaving the community. A structural feature of a high quality
community is its good separation from the surrounding parts of the network. In other words, a high
quality community should have sharp edge boundary, i.e. BC = {(u, v) 2E ; u 2 C, v /2 C}4.
This intuition is captured by accumulating the likelihood against edges connecting the community
with the rest of the network:
fb(C↵) = Yu2C
v2V\C
(1 p(u, v↵)).
(4)
The evaluation of Eq. (4) takes computational time linear in the size of the network, which is
impractical for large networks with many detected communities. To speed up the calculations, we
use negative sampling (Supplementary Note 2) to calculate the value of Eq. (4), and thereby reduce
the computational complexity of the boundary metric to time that depends linearly on the number
of edges leaving the community.
Community allegiance
Last we introduce community allegiance. We define community allegiance as the preference for
nodes to attach to other nodes that belong to the same community. Allegiance measures the fraction
of nodes in a community for which the total probability of edges pointing inside the community is
larger than probability of edges that point to the outside of the community. For a given community
C and network perturbation intensity ↵, community allegiance is defined as:
fa(C↵) =
1
CXu2C
(Xv2Nu\C
p(u, v↵) Xv2Nu\C
p(u, v↵)),
(5)
where Nu is a set of network neighbors of u and is the indicator function, (x) = 1 if x is true,
and (x) = 0, otherwise.
13
Community has high allegiance if nodes in the community tend to be more strongly con-
nected to other members of the community than to the rest of the network. In a community with
no significant allegiance this metric takes a value that is close to zero or changes substantially
when the network is only slightly perturbed. However, in the presence of substantial community
allegiance, the metric takes large values and is not sensitive to edge perturbation.
Combining community prioritization metrics
We just defined four community prioritization metrics: likelihood, density, boundary, and alle-
giance. Each metric on its own provides a useful signal for prioritizing communities (Supplemen-
tary Note 8). However, scores of each metric might be biased, have high variance, and behave
differently across different networks (Supplementary Figure 6). It is thus essential to combine the
values of individual metrics into a single aggregated score.
We develop an iterative unsupervised rank aggregation method that, without requiring an
external gold standard, combines the prioritization metrics into a single aggregated prioritization
of communities. The method is outlined in Figure 5. It naturally takes into consideration the fact
that importance of individual prioritization metrics varies across networks and across community
detection methods. The aggregation method starts by representing the values of each prioritization
metric with a ranked list. In each ranked list, communities are ordered by the decreasing value
of the metric. The method then determines the contribution of each ranked list to the aggregate
prioritization by calculating importance weights. The calculation is based on Bayes factors36–38,
an established tool in statistics. Each ranked list has associated a set of importance weights. Im-
portance weights can vary with rank in the list. The method then calculates the aggregated prior-
itization of communities in an iterative manner by taking into account uncertainty that is present
across different ranked lists and within each ranked list.
To calculate the weights without requiring gold standard, the method uses a two-stage itera-
tive procedure. After initializing the aggregated prioritization, the method alternates between the
following two stages until no changes in the aggregated prioritization are observed: (1) use the ag-
gregated prioritization to calculate the importance weights for each ranked list, and (2) re-aggregate
the ranked lists based on the importance weights calculated in the previous stage.
The model for aggregating community prioritization metrics, the algorithm, and the analysis
of its computational time complexity are detailed in Supplementary Notes 4 and 5. The complete
14
algorithm of CRANK approach is provided in Supplementary Note 5.
Code and data availability. All relevant data are public and available from the authors of orig-
inal publications. The project website is at: http://snap.stanford.edu/crank. The
website contains preprocessed data used in the paper and additional examples of CRANK's use.
Source code of the CRANK method is available for download from the project website.
15
Figure 1: Prioritizing network communities. (a) Community detection methods take as input
a network and output a grouping of nodes into communities. Highlighted are five communities,
(Ca, . . . , Ce), that are detected in the illustrative network. (b) After communities are detected,
the goal of community prioritization is to identify communities that are most promising targets
for follow-up investigations. Promising targets are communities that are most associated with
external network functions, such as cellular functions in protein-protein interaction networks, or
cell types in cell-cell similarity networks. CRANK is a community prioritization approach that
ranks the detected communities using only information captured by the network structure and does
not require any external data about the nodes or edges of the network. However, when external
information about communities is available, CRANK can make advantage of it to further improve
performance (Supplementary Notes 9 and 10). CRANK starts by evaluating four different structural
features of each community: the overall likelihood of the edges in the community (Likelihood),
internal connectivity (Density), external connectivity (Boundary), and relationship with the rest of
the network (Allegiance). CRANK can also integrate any number of additional user-defined metrics
into the prioritization without any further changes to the method. (c) CRANK then applies a rank
aggregation method to combine the metrics and (d) produce the final ranking of communities.
16
d
n
e
o
t
a
i
t
g
a
e
z
r
i
g
t
i
r
g
o
A
i
r
p
4 2 3 1
5
Rank aggregation
y Allegiance
Prioritization
metrics
r
a
d
n
u
o
B
45
3
2
3
1
4
2
3
2
1 1
4 5 5
d Density
o
o
h
i
l
e
k
i
L
4
1
3
2
5
Communities
1
5
Community
rank
a
b
c
d
a
b
c
Random
Conductance
Modularity
CRank
Figure 2: Synthetic networks with planted community structure.
(a)-(c) In networks with
known modular structure we can evaluate community prioritization by quantifying the correspon-
(a) Benchmark networks
dence between detected communities and the planted communities.
on N = 300 nodes are created using a stochastic block model with 10 planted communities10.
Each planted community has 30 nodes, which are colored by their planted community assign-
ment. Planted communities use different values for within-community edge probability pin, five use
pin = 0.6 and five use pin = 0.2. As a result, planted communities with smaller within-community
probability pin are harder to detect. For each benchmark network we apply a community detec-
tion method6 to detect communities and then use CRANK to prioritize them. CRANK produces
a ranked list of detected communities. The gold standard rank of each community is determined
by how accurately it corresponds to its planted counterpart. (b) Each bar represents one detected
community and the bars are ordered by CRANK's ranking with the highest ranked community
located at the top and the lowest ranked community located at the bottom. As a form of valida-
tion, the width of each bar corresponds to the fraction of nodes in a community that are correctly
classified into a corresponding planted community, with error bars showing the 95% confidence in-
tervals over 500 benchmark networks. A perfect prioritization ranks the bars by decreasing width.
Notice that CRANK perfectly prioritizes the communities even though it only uses information
about the network structure, and has no access to information about the planted communities. (c)
Prioritization performance is measured using Spearman's rank correlation ⇢ between the gener-
ated ranking and the gold standard ranking of communities. A larger value of ⇢ indicates a better
performance. Across all benchmark networks, CRANK achieved average Spearman's rank corre-
lation of ⇢ = 0.82. Alternative approaches resulted in poorer average performance: ranking based
on modularity and conductance achieved ⇢ = 0.33 and ⇢ = 0.60, respectively, whereas random
prioritization obtained ⇢ = 0.00.
17
Community rank in CRank prioritization
Fraction of correctly assigned nodes
Spearman's rank correlation ρ
1
2
3
4
5
6
7
8
9
10
0.2
0.4
0.6
0.8
0.0
a
b
c
Figure 3: Prioritizing network communities in the network of medical drugs. (a) The network
of medical drugs connects two drugs if they share at least one target protein. Communities were
detected by a community detection method7, and then prioritized by CRANK. Highlighted are five
highest ranked communities as determined by CRANK. Nodes of the highlighted communities are
sized by their score of the Likelihood prioritization metric (Supplementary Note 3). Investigation
reveals that these communities contain drugs used to: treat asthma and allergies (e.g., prednisone,
ciclesonide; yellow nodes), induce anaesthesia or sedation (e.g., clobazam, etomidate, sevoflurane,
acamprosate; magenta nodes), block neurotransmitters in central and peripheral nervous systems
(e.g., physostigmine, minaprine, gallamine triethiodide; red nodes), block the activity of mus-
carinic receptors (e.g., acidinium; green nodes), and activate dopamine receptors (e.g., ropinirole;
blue nodes). (b-c) We evaluate community prioritization against three external chemical databases
(Supplementary Note 6) that were not used during community detection or prioritization. For each
community we measure: (1) drug-drug interactions between the drugs ("Epistasis"), (2) chemical
structure similarity of the drugs ("Chemistry"), and (3) associations between drugs derived from
text data ("Text"). We expect that a true high-priority community will have more drug-drug in-
teractions, higher similarity of chemical structure, and stronger textual associations between the
drugs it contains. Taking this into consideration, the external chemical databases define three gold
standard rankings of communities against which CRANK is evaluated. Bars represent communi-
ties; bar height denotes similarity of drugs in a community with regard to the gold standard based
on external chemical databases. In a perfect prioritization, bars would be ordered such that the
heights would decrease from left to right. (b) CRANK ranking of drug communities outperforms
ranking by modularity (c) across all three chemical databases (as measured by Spearman's rank
correlation ⇢ with the gold standard ranking). CRANK ranking achieves ⇢ = 0.38, 0.31, 0.53, while
modularity obtains ⇢ = 0.03, 0.06, 0.35. 18
Gallamine Triethiodide
Mifepristone
Acamprosate
Etomidate
Ciclesonide
Prednisone
Sevoflurane
Clobazam
Minaprine
Physostigmine
Aclidinium
Ropinirole
Epistasis
Chemistry
Text
Drug communities ranked by Modularity
Drug communities ranked by CRank
ρ=0.38 p-value=3.3 x 10-4
ρ=0.31 p-value=9.1 x 10-4
ρ=0.53 p-value=4.3 x 10-8
ρ=-0.03 p-value=8.1 x 10-1
ρ=-0.35 p-value=1.5 x 10-3
Epistasis
Chemistry
Text
ρ=-0.06 p-value=5.9 x 10-1
Figure 4: Prioritizing network communities in the megascale cell-cell similarity network. The
network of embryonic mouse brain has 1,306,127 nodes representing brain cells29. Communities
are detected using a community detection method developed for single-cell RNA-seq data8 and
prioritized using CRANK, generating a rank-ordered list of detected communities. (a-c) Shown
are three communities that are ranked high by CRANK; (a) rank 1, (b) rank 2, and (c) rank 3
community. t-SNE projections39 show cells assigned to each community. t-SNE is a dimensional-
ity reduction technique that is particularly well suited for visualization of high-dimensional data.
Cells assigned to each community are distinguished by color, and all other cells are shown in grey.
We investigate the quality of community ranking by examining gene markers for cells in each
community28. We use the single-cell RNA-seq dataset to obtain a gene expression profile for each
cell, indicating the activity of genes in the cell. For each community we then identify marker genes,
i.e., genes with the strongest differential expression between cells assigned to the community and
all other cells9. In the t-SNE projection we then color the cells by how active the marker genes are.
This investigation reveals that communities ranked high by CRANK are represented by clusters
of cells whose marker genes have a highly localized expression. For example, marker genes for
rank 1 community in (a) (the highest community in CRANK ranking) are TYROBP, C1QB, C1QC,
FCER1G and C1QA. Expression of these genes is concentrated in cells that belong to the rank 1
community. Similarly, marker genes for rank 2 and rank 3 communities are specifically active in
cell populations that match well the boundary of each community. (d-f) t-SNE projections show
cells assigned to 3 low-ranked communities; (d) rank 139, (e) rank 140, and (f) rank 141 com-
munity. t-SNE projections are produced using the same differential analysis as in (a-c). Although
these communities correspond to clusters of cells in the t-SNE projections, their marker genes have
diluted gene expression that is spread out over the entire network, indicating that CRANK has cor-
rectly considered these communities to be low priority. For example, marker genes for rank 141
community in (f) are OPCML, TMSB4X, NYM, CCK, and CNTN2, which show a weak expression
pattern that is diffused across the entire network.
19
Figure 5: Combining community prioritization metrics without an external gold standard. (a)
The rank aggregation algorithm starts with four ranked lists of communities, Rr, each one arising
from the values of a different community prioritization metric r (where r is one of "l" – likelihood,
"d" – density, "b" – boundary, "a" – allegiance). Communities are ordered by the decreasing
value of the metric. We use C to indicate the rank of an illustrative community by the community
prioritization metrics and at different stages of the algorithm. (b) Each ranked list is partitioned
into equally sized groups, called bags. Each bag i in ranked list Rr has attached importance weight
r whose initial values are all equal (represented by black bars all of same width). CRANK
K i
uses the importance weights K i
r to initialize aggregate prioritization R as a weighted average of
community ranks Rl, Rd, Rb, Ra. (c) The top ranked communities (denoted as dotted cells) in the
aggregated prioritization R serve as a temporary gold standard, which is then used to iteratively
r. (d) In each iteration, CRANK updates importance weights
update the importance weights K i
using the Bayes factor calculation36 (Supplementary Note 4). Given bag i and ranked list Rr,
CRANK updates importance weight K i
r, based on how many communities from the temporary gold
standard appear in bag i. Updated importance weights then revise the aggregated prioritization in
r Rr(C), where
K ir(C)
indicates the importance weight of bag ir(C) of community C for metric r, and Rr(C) is
the rank of C according to r. By using an iterative approach, CRANK allows for the importance of
a metric not to be predetermined and to vary across communities.
which the new rank R(C) of community C is expressed as: R(C) =Pr log K ir(C)
r
20
Acknowledgements. M.Z., R.S., and J.L. were supported by NSF, NIH BD2K, DARPA SIM-
PLEX, Stanford Data Science Initiative, and Chan Zuckerberg Biohub.
Author contribution. M.Z., R.S. and J.L. designed and performed research, contributed new
analytic tools, analyzed data, and wrote the paper.
Author information. The authors declare no conflict of interest. Correspondence should be
addressed to J.L. ([email protected]).
Additional information. Supplementary Notes contain a detailed description of the community
prioritization approach, descriptions of datasets, experimental setup, and additional experiments.
Supplementary Table 1 contains detailed community prioritization results for the medical drug
network. Code to run CRANK and examples are at: http://snap.stanford.edu/crank.
1. Benson, A. R., Gleich, D. F. & Leskovec, J. Higher-order organization of complex networks.
Science 353, 163–166 (2016).
2. Menche, J. et al. Uncovering disease-disease relationships through the incomplete interac-
tome. Science 347, 1257601 (2015).
3. Costanzo, M. et al. A global genetic interaction network maps a wiring diagram of cellular
function. Science 353, 1381 (2016).
4. Fortunato, S. Community detection in graphs. Physics Reports 486, 75–174 (2010).
5. Newman, M. E. Modularity and community structure in networks. Proceedings of the National
Academy of Sciences 103, 8577–8582 (2006).
6. Gopalan, P. K. & Blei, D. M. Efficient discovery of overlapping communities in massive
networks. Proceedings of the National Academy of Sciences 110, 14534–14539 (2013).
7. Yang, J., McAuley, J. & Leskovec, J. Detecting cohesive and 2-mode communities indirected
and undirected networks. In Proceedings of the 7th ACM International Conference on Web
Search and Data Mining, 323–332 (2014).
8. Levine, J. H. et al. Data-driven phenotypic dissection of aml reveals progenitor-like cells that
correlate with prognosis. Cell 162, 184–197 (2015).
9. Satija, R., Farrell, J. A., Gennert, D., Schier, A. F. & Regev, A. Spatial reconstruction of
single-cell gene expression data. Nature Biotechnology 33, 495–502 (2015).
10. Newman, M. & Clauset, A. Structure and inference in annotated networks. Nature Communi-
cations 7, 11863 (2016).
11. Rolland, T. et al. A proteome-scale map of the human interactome network. Cell 159, 1212–
1226 (2014).
21
12. Subramanian, A. et al. Gene set enrichment analysis: a knowledge-based approach for inter-
preting genome-wide expression profiles. Proceedings of the National Academy of Sciences
102, 15545–15550 (2005).
13. Glaab, E., Baudot, A., Krasnogor, N., Schneider, R. & Valencia, A. EnrichNet: network-based
gene set enrichment analysis. Bioinformatics 28, 451–457 (2012).
14. Baryshnikova, A. Systematic functional annotation and visualization of biological networks.
Cell Systems 2, 412–421 (2016).
15. Hofree, M. et al. Network-based stratification of tumor mutations. Nature Methods 10, 1108–
1115 (2013).
16. Ashburner, M. et al. Gene Ontology: tool for the unification of biology. Nature Genetics 25,
25–29 (2000).
17. Regev, A. et al. The Human Cell Atlas. bioRxiv 121202 (2017).
18. da Silva, R. R., Dorrestein, P. C. & Quinn, R. A. Illuminating the dark matter in metabolomics.
Proceedings of the National Academy of Sciences 112, 12549–12550 (2015).
19. Layeghifard, M., Hwang, D. M. & Guttman, D. S. Disentangling interactions in the micro-
biome: a network perspective. Trends in Microbiology 25, 217–228 (2017).
20. Aksenov, A. A., da Silva, R., Knight, R., Lopes, N. P. & Dorrestein, P. C. Global chemical
analysis of biology by mass spectrometry. Nature Reviews Chemistry 1, s41570–017 (2017).
21. Schaeffer, S. E. Graph clustering. Computer Science Review 1, 27–64 (2007).
22. Guney, E., Menche, J., Vidal, M. & Bar´abasi, A.-L. Network-based in silico drug efficacy
screening. Nature Communications 7 (2016).
23. Law, V. et al. DrugBank 4.0: shedding new light on drug metabolism. Nucleic Acids Research
42, 1091–1097 (2014).
24. Erkinjuntti, T. et al. Efficacy of Galantamine in probable vascular dementia and Alzheimer's
disease combined with cerebrovascular disease: a randomised trial. The Lancet 359, 1283–
1290 (2002).
25. Cecilia Rodrigues Simoes, M. et al. Donepezil: an important prototype to the design of new
drug candidates for Alzheimer's disease. Mini Reviews in Medicinal Chemistry 14, 2–19
(2014).
26. Kessenbrock, K. et al. Diverse regulation of mammary epithelial growth and branching mor-
phogenesis through noncanonical Wnt signaling. Proceedings of the National Academy of
Sciences 114, 3121–3126 (2017).
27. Kellis, M. et al. Defining functional DNA elements in the human genome. Proceedings of the
National Academy of Sciences 111, 6131–6138 (2014).
28. Trapnell, C. Defining cell types and states with single-cell genomics. Genome Research 25,
1491–1498 (2015).
22
29. Zheng, G. X. et al. Massively parallel digital transcriptional profiling of single cells. Nature
Communications 8, 14049 (2017).
30. Haghverdi, L., Buettner, M., Wolf, F. A., Buettner, F. & Theis, F. J. Diffusion pseudotime
robustly reconstructs lineage branching. Nature Methods 13, 845–848 (2016).
31. Zeisel, A. et al. Cell types in the mouse cortex and hippocampus revealed by single-cell
RNA-seq. Science 347, 1138–1142 (2015).
32. Ma, J., Jiang, T., Tan, L. & Yu, J.-T. TYROBP in Alzheimer's disease. Molecular Neurobiol-
ogy 51, 820–826 (2015).
33. Agrawal, M., Zitnik, M. & Leskovec, J. Large-scale analysis of disease pathways in the human
interactome. In Pacific Symposium on Biocomputing, vol. 23, 111 (World Scientific, 2018).
34. Choobdar, S. et al. Open community challenge reveals molecular network modules with key
roles in diseases. bioRxiv 265553 (2018).
35. Karrer, B., Levina, E. & Newman, M. E. Robustness of community structure in networks.
Physical Review E 77, 046119 (2008).
36. Kass, R. E. & Raftery, A. E. Bayes factors. Journal of the American Statistical Association
90, 773–795 (1995).
37. Berger, J. O. & Pericchi, L. R. The intrinsic bayes factor for model selection and prediction.
Journal of the American Statistical Association 91, 109–122 (1996).
38. Casella, G. & Moreno, E. Assessing robustness of intrinsic tests of independence in two-way
contingency tables. Journal of the American Statistical Association 104, 1261–1271 (2012).
39. Maaten, L. v. d. & Hinton, G. Visualizing data using t-SNE. Journal of Machine Learning
Research 9, 2579–2605 (2008).
23
Supplementary materials for
Prioritizing network communities
Marinka Zitnik,1 Rok Sosic,1 Jure Leskovec1,2,⇤
1Computer Science Department, Stanford University
2Chan Zuckerberg Biohub, San Francisco, CA
⇤Corresponding author. E-mail: [email protected]
This PDF file includes:
Supplementary Notes 1 to 11
Supplementary Figures 1 to 8
Supplementary Tables 1 to 9
References
Other supporting material for this manuscript includes the following:
Supplementary Table with prioritization results for the medical drug network
Supplementary Note 1 Document outline
In this document, we present a detailed description of the community prioritization approach, dis-
cussion of the datasets used and their analysis. First, we describe a network perturbation model
used by CRANK and then derive expressions for edge probabilities in this model (Supplementary
Note 2). The derived expressions enable us to estimate edge probabilities in a perturbed network
in a closed form manner. These estimates are essential components of CRANK community priori-
tization metrics. We then provide details on computing the metrics, beyond those presented in the
main text (Supplementary Note 3). We proceed by describing CRANK rank aggregation method
(Supplementary Note 4). Its role is to combine the metric scores and form an aggregated prior-
itization of communities. We then provide a detailed description of complete CRANK approach
(Supplementary Note 5).
We describe network data used in experiments (Supplementary Note 6). We outline experi-
mental setup, overview community detection methods considered in the paper, and describe alter-
native techniques for community prioritization and for rank aggregation (Supplementary Note 7).
Finally, we present further results of empirical evaluations. In Supplementary Note 8 we
report additional experiments on real-world networks, and we further investigate CRANK's prop-
erties. In Supplementary Note 9 we show how to integrate any number of additional user-defined
metrics into CRANK without requiring further technical changes to the CRANK model. In Sup-
plementary Note 10 we show how CRANK can use domain-specific or other meta and label infor-
mation to supervise community prioritization. In Supplementary Note 11 we describe additional
experiments on medical, social, and information networks, beyond those presented in the main
text.
Supplementary Note 2 Network perturbation model
Our goal in this note is to find closed form expressions that will enable us to analytically quantify
how stable are communities if the network is perturbed. These expressions are important because
they allow us to avoid instantiating any of the perturbed networks when computing community
prioritization metrics. Consequently, CRANK easily scales to large networks.
Notice that our ability to analytically compute perturbation effects offers significant improve-
ment over established methods, such as, for example, methods for evaluating the quality of network
community structure1–6. Methods of this kind explicitly perturb the network many times. They
evaluate the quality of community structure by partitioning an entire network, applying the net-
work rewiring model many times, materializing hundreds of perturbed networks and then running
S2
community detection repeatedly on all perturbed network versions. Such methods, however, can
suffer from expensive computation and are computationally prohibitive for large networks. Details
are provided next.
Supplementary Note 2.1 Network perturbation
We start by describing a network perturbation model that can perturb an arbitrary network by an
arbitrary amount based on network's node degree distribution. To formulate the probabilities of
edges potentially arising when perturbing an arbitrary network by an arbitrary amount we consider
a network rewiring model. We restrict our perturbed networks to have the same number of nodes
and edges as the original unperturbed network, only edges are randomly rewired. We measure
perturbation intensity by a parameter ↵, where a value of ↵ close to zero indicates that a network
is perturbed by only a small amount and has only a few edges rewired. Perturbation intensity close
to one corresponds to a perturbed network, which is almost completely random and uncorrelated
with the original network.
Given a network G(V,E), whose nodes are given by V and edges by E, we denote the net-
work resulting from ↵-perturbing edges in G as: G(↵) = G(V,E(↵)), 0 ↵ 1. ↵ denotes
perturbation intensity. This means that G(0) (i.e., ↵ = 0) is identical to the original network,
G(0) = G, since no edge has changed its position in the network, whereas G(1) (i.e., ↵ = 1) is a
maximally perturbed network obtained by rewiring all edges in G such that node degree distribu-
tion of G is preserved in G(1).
Given ↵, we specify the network G(↵) by perturbing the network G as follows2. We consider
each edge (u, v) 2E in network G in turn and either:
• with probability ↵ we add an edge (u0, v0) to G(↵) such that the probability of edge falling
between nodes u0 and v0 is eu0v0/m, or
• with probability 1 ↵ we add an edge (u, v) to G(↵).
Here, eu0v0 = ku0kv0/(2m), where ku0 is the degree of node u0 in G, denoted also as ku0 = Nu0,
and m is the number of edges in network G, m = E. This network rewiring model generates
networks G(↵) that not only have the same number of edges as the original network G, but in
which the expected degrees of nodes are the same as the original degrees2.
Supplementary Note 2.2 Statistical community detection model
Let us suppose we are given a network G(V,E), and a community detection model M that detects
communities C, C = {C; C ✓V} , in network G. Here, every community C is given by a set of its
member nodes.
S3
We assume that M is a statistical community detection model (e.g.,7–19). In that case, M
allows us to evaluate: (1) the probability of node u belonging to a community C, pC(u) = p(u 2
C), (2) the probability of an edge, p(u, v) = p((u, v) 2E ), and (3) the probability of an edge from
node u to node v conditioned on nodes' joint affiliation with a community C. We denote the latter
probability as pC(u, v) = p((u, v) 2E u 2 C, v 2 C) and view it as a contribution of community
C towards the creation of edge (u, v).
Commonly used community detection methods, like the Stochastic Block Model7, 10, 16, 20, 21,
Affiliation Graph Model8, 9, Latent Feature Graph Model11–15, and Attributed Graph Model17–19 all
allow for computing the above three quantities.
Next, we use the quantities (1)–(3) to specify edge probabilities and node-community affili-
ation probabilities arising under the network perturbation model from Supplementary Note 2.1.
Supplementary Note 2.3 Edge probabilities in perturbed network
We express the probability of an edge (u, v) appearing in a perturbed network G(↵) as a function
of the probability of edge (u, v) appearing in the original network G and of perturbation intensity
↵. The expressed probability is denoted as p(u, v↵).
There are two ways by which nodes u and v can be connected with an edge (u, v) in the
perturbed network G(↵). If an edge (u, v) exists in G, then with probability 1 ↵ the edge is
retained during perturbation. Otherwise, nodes u and v can connect in G(↵) as a result of network
rewiring as described in Supplementary Note 2.1. In the latter case, edge (u, v) appears in G(↵) if
it is a replacement for any of the expected ↵m edges that change their original positions in network
G. This reasoning gives us the probability of edge (u, v) emerging in perturbed network G(↵) as:
p(u, v↵) = p(u, v)(1 ↵) + (1 p(u, v))(1 (1
euv
m
)↵m),
(1)
where euv is equal to euv = kukv/(2m). Notice that expression in Eq. (1) approximates probability
of an edge in a perturbed network. This is because it considers the expected fraction of rewired
edges in a perturbed network, but it ignores variance and skewness of rewiring distribution. We
empirically validated the expression by comparing it with results obtained by explicitly perturbing
the network many times. We observed that analytical expression for the edge probability in Eq. (1)
led to an accurate estimation of empirical results for most considered real-world networks.
An approach, analogous to the derivation of probability p(u, v↵), also gives us the proba-
bility that a community C detected in the original network G generates a particular edge in the
perturbed network G(↵). Probability pC(u, v↵) that an edge (u, v) whose both endpoints belong
S4
to community C is included in the perturbed network can be written as:
pC(u, v↵) = pC(u, v)(1 ↵) + (1 pC(u, v))(1 (1
euv
m
)↵m).
(2)
We use expressions in Eq. (1) and Eq. (2) to specify the probability of an edge (u, v) whose
endpoints belong to community C as:
s(1)
C (u, v↵) = p((u, v) 2E (↵), u 2 C, v 2 C) = pC(u)pC(v)pC(u, v↵).
(3)
Likewise, the probability of a non-edge between nodes u and v that are both assigned to a commu-
nity C is equal to:
s(2)
C (u, v↵) = p((u, v) 62 E(↵), u 2 C, v 2 C) = pC(u)pC(v)(1 pC(u, v↵)).
(4)
Recall that ↵ measures the intensity of network perturbation. By varying the value for ↵, the
intensity of network perturbation is interpolated between two extreme cases:
• ↵ = 1 corresponds to a perturbation that generates a network G(1), whose edge probabilities as
returned by Eq. (1–2) are completely determined by the perturbation model.
• ↵ = 0 corresponds to a perturbation the regenerates the original network, G(0) = G, meaning
that edge probabilities as returned by Eq. (1–2) are exactly the same as in the original network,
e.g., p(u, v↵ = 0) = p(u, v).
Supplementary Note 3 Structural features of network communities
CRANK prioritizes communities based on the robustness and magnitude of multiple structural
features of each community. CRANK defines community prioritization metrics, which capture
key structural features and characterize network connectivity for each community. In this note we
provide further details on two metrics, beyond those presented in the main text.
Supplementary Note 3.1 Further details on computing community likelihood
The main text defines community likelihood that is calculated for each community. We also define
likelihood score of every node in a given community. Likelihood score of a node u in a community
C is the product of community-dependent probabilities of both edges and non-edges adjacent to
node u:
sC(u, v↵)
(5)
nl(uC, ↵) = pC(u)Yv2C
S5
where sC(u, v↵) is defined as follows:
sC(u, v↵) =( s(1)
C (u, v↵)/pC(u) if (u, v) 2E
s(2)
C (u, v↵)/pC(u) if (u, v) /2E ,
C and s(2)
where s(1)
C are defined in Eq. (3) and Eq. (4), respectively. The node likelihood formula nl
gives us an alternative way to express community likelihood. That is, likelihood of community C,
fl(C↵), can be seen as a product of likelihood scores for all the nodes that are affiliated with C:
fl(C↵) =Qu2C nl(uC, ↵).
Supplementary Note 3.2 Further details on computing community boundary
The evaluation of formula for community boundary fb(C↵) takes computational time linear in the
size of the network, which is impractical for large networks with many detected communities. To
speed up the calculations, we use negative sampling to calculate the value of fb(C↵), and thereby
reduce the computational complexity of the boundary metric to time that depends linearly on the
number of edges leaving the community.
We use negative sampling22–24 to obtain a computationally efficient approximation of com-
munity boundary. In general, negative sampling can be used to approximate a function whose
evaluation takes into consideration the entire universe of objects in a domain, such as all nodes in
a large network. We calculate community boundary fb using the negative sampling as:
fb(C↵) = Yu2C
v2V\C,(u,v)2E
(1 p(u, v↵))
k
Y
u2C
i=1
(1 p(u, vi↵)),
(6)
where PC is a noise distribution from which k nodes vi are drawn, vi ⇠ PC. Formula Eq. (6) is
used to replace community boundary formula given in the main text. Noise distribution PC is a
uniform distribution defined over the non-edge boundary TC = {v; v 2V \ C, @u 2 C : (u, v) 2
E}. Formula fb considers k non-edges for each node in community C. Our experiments indicate
that values of k in the range 5–20 are useful for small networks, while for large networks the
value of k can be as small as 2–5. This observation is aligned with the previous work in negative
sampling22–24.
In other words, Eq. (6) says that when computing community boundary fb, for a given node
u 2 C, we consider all nodes that lie outside of C but are connected with node u (i.e., first product
term in Eq. (6)), and also randomly selected nodes that are neither assigned to C nor linked with u
(i.e., second product term in Eq. (6)). The latter nodes are selected uniformly at random from the
set TC. This formulation posits that a high quality community should have sharp edge boundary25.
S6
Importantly, the formula in Eq. (6) allows us to reduce computational time complexity of
community boundary for a given node u from being proportional to the number of nodes in the
network (i.e., V) to being proportional to the size of community C plus the number of random
non-edges (i.e., C+k). Since communities in real-world settings are much smaller than the entire
network, negative sampling allows us to scale community boundary to large networks.
Supplementary Note 4 Rank aggregation model
Prioritization of communities involves measuring different network structural features of commu-
nities. The features are measured by four prioritization metrics: community likelihood, community
density, community boundary and community allegiance. Next, we describe how to combine the
scores of different metrics into an aggregated prioritization of communities.
The simplest approach to combining the metrics is to treat all the metrics equally and av-
erage their scores. While such an approach does not need any external gold standard ranking of
communities it can be unacceptably sensitive to noise and outliers (Supplementary Note 8.4). One
alternative is to evaluate individual metrics against an external gold standard ranking. However,
we need to examine all the communities and rank them in order to obtain the gold standard, which
is precisely the task we try to avoid.
We adopt a statistical approach and propose a rank aggregation method that combines the
scores of different metrics. Furthermore, our proposed rank aggregation method operates without
requiring a gold standard ranking of communities. Details are provided next.
Supplementary Note 4.1 Ranked lists of communities
The rank aggregation method starts with four ranked lists, one from each of the four prioritization
metrics, where communities are ordered by their scores such that communities with the highest
score are at the beginning of each list. The rank of a community is its position in the list. Given
the scores rf for a network structural feature f, the ranked list Rr is:
Rr(C) = 1 +XD6=C
I(rf (C; ↵) rf (D; ↵))
for C 2C ,
(7)
signifying that Rr(C) is the rank of community C according to the scores of metric r. The function
I is the indicator function, such that I(X) = 1 if X is true and I(X) = 0 otherwise, and C is the set
of all communities found in a given network by a given community detection method. To assign
ranks to communities with tied scores, we consider the average of the ranks that would have been
assigned to all the tied communities and assign this average to each community.
Given the ranked lists Rl, Rd, Rb and Ra, we wish to combine the ranked lists into a single
S7
ranked list R. The ranked list R is CRANK's final result representing the aggregated prioritization
of communities.
Supplementary Note 4.2 Background on Bayes factors
We proceed by describing the Bayes factors, a tool in statistics26–30, that is the centerpiece of our
method for combining prioritization metrics. We use Bayes factors to estimate the weights to be
attached to the ranked lists of communities so that we can obtain the aggregated prioritization of
communities that takes account of uncertainty present in the ranked lists arising from different
prioritization metrics.
Supplementary Note 4.2.1 The Bayes factor of one ranked list
We begin with a single ranked list Rr, assumed to have arisen under one of the two hypotheses H 1
r
and H 2
r ), respectively. Using the Bayesian
formulation30, the two hypotheses are:
r according to probability density p(RrH 1
r ) and p(RrH 2
H 1
r
H 2
r
– Scores of metric r match the gold standard R⇤,
– Scores of metric r do not match the gold standard R⇤.
(8)
(9)
Here, R⇤ is a ranked list representing the gold standard ranking of communities. For now, we
assume that the gold standard R⇤ is given, we will later in Supplementary Note 4.4 discuss how to
r ) when the gold standard R⇤ is not avail-
determine probability densities p(RrH 1
able.
r ) and p(RrH 2
Given prior probabilities p(H 1
r ) and p(H 2
rRr) and p(H 2
probabilities p(H 1
rRr) = 1 p(H 1
the prior probability using the Bayes' theorem as:
p(RrH i
r )p(H 1
rRr) =
p(H i
r)p(H i
r)
r ) = 1 p(H 1
r ), the ranked list Rr produces posterior
rRr). The posterior probability can be related to
p(RrH 1
r ) + p(RrH 2
r )p(H 2
r )
.
(i = 1, 2)
(10)
In the odds scale30 (odds = probability / (1 - probability)), the relation of posterior probability to
prior probability takes the following form:
p(H 1
p(H 2
rRr)
rRr)
=
p(RrH 1
r )
p(RrH 2
r )
p(H 1
r )
p(H 2
r )
.
(11)
This means that transformation of the prior odds to the posterior odds involves multiplication by a
factor:
Kr =
,
(12)
p(RrH 1
r )
p(RrH 2
r )
S8
which is known as the Bayes factor26, 28, 31, 32 for comparing hypotheses H 1
Eq. (11) is equal to:
r and H 2
r . Thus, in words,
posterior odds = Bayes factor ⇥ prior odds,
(13)
which means that the Bayes factor Kr can also be written as the ratio of the posterior odds to the
prior odds:
Kr =
p(H 1
p(H 2
rRr)
rRr)
p(H 2
r )
p(H 1
r )
,
(14)
and can be used to quantify the evidence26 provided by ranked list Rr in favor of hypothesis H 1
r .
We use the Bayes factor Kr to measure the relative success of H 1
r at predicting the gold
standard ranking R⇤: a Bayes factor greater than 1 means that the ranked list Rr provides greater
evidence for H 1
r , whereas a Bayes factor less than 1 means that the ranked list Rr provides greater
evidence for H 2
r .
r and H 2
Supplementary Note 4.3 Aggregating ranked lists
We adopt a statistical approach to combine the ranked lists arising from different prioritization
metrics. The approach specifies the Bayes factor for each ranked list following the exposition in
Supplementary Note 4.2.1.
a, H 2
When several metrics are considered, the Bayes factors are obtained as follows. Given ranked
b ), and
lists Rl, Rd, Rb and Ra, we consider pairs of hypotheses (H 1
a). The meaning of a hypothesis pair for metric r is described in Eq. (8) and Eq. (9). We
(H 1
a as
compare each of H 1
described in Supplementary Note 4.2.1. Using the formula in Eq. (12), this procedure yields the
Bayes factors Kl, Kd, Kb and Ka. Following Eq. (10), we then calculate the posterior probability
of H 1
r , i.e., the posterior probability that ranked list Rr matches the gold standard R⇤, as:
a in turn with the corresponding hypothesis H 2
d ), (H 1
l ), (H 1
b , H 2
l , H 2
d, H 2
b , H 2
b , H 1
l , H 1
d , H 1
l , H 2
d , H 2
p(H 1
rRl, Rd, Rb, Ra) =
,
(15)
↵rKrPr0 ↵r0Kr0
r )/p(H 2
r ) is the prior odds for H 1
where ↵r = p(H 1
r , and r0 goes over all considered
metrics, r0 2{ l, d, b, a}. In this paper, we take all the prior odds ↵r equal to 1. Although this is a
natural choice, we note that other values of ↵r may be used to reflect prior information about the
relative plausibility of different ranked lists.
r against H 2
The probabilities given by Eq. (15) lead directly to the prediction that takes account of uncer-
tainty in the metrics26, 30. Recall that we want to aggregate ranked lists Rl, Rd, Rb, Ra into a single
ranked list R representing the aggregated prioritization of communities, i.e., the final prediction of
S9
CRANK. This means we would like to calculate the probability of the aggregated prioritization R
conditioned on the information provided by the ranked lists. This probability can be written as:
p(RRl, Rd, Rb, Ra) =Xr0
p(RRl, Rd, Rb, Ra, H 1
r0)p(H 1
r0Rl, Rd, Rb, Ra),
(16)
where we account for uncertainty by weighting each ranked list by how well it matches the gold
standard R⇤. We specify the posterior probability p(H 1
r0Rl, Rd, Rb, Ra) using the Bayes factor
from Eq. (15). Finally, combining Eq. (15) and Eq. (16), we can write the probability for aggre-
gated prioritization R as:
R = Pr0 Kr0Rr0
Pr0 Kr0
p(RRl, Rd, Rb, Ra) = Pr0 Kr0 p(RRl, Rd, Rb, Ra, H 1
r0)
Pr0 Kr0
The posterior probabilities expressed through Bayes factors favor those ranked lists that better
match the gold standard R⇤.
Examining Eq. (17), we see that ranked lists are aggregated as a weighted average with
weights being equal to the Bayes factors of the ranked lists, i.e., weight for ranked list Rr is equal
to Kr/(Pr0 Kr0). This means that the aggregated prioritization R is a weighted average of the
ranked lists Rl, Rd, Rb, and Ra:
.
(17)
.
(18)
In the next section, we describe how to determine the aggregated prioritization when the gold
standard R⇤ is not available, and how to learn the weights for each ranked list that vary with rank
(i.e., position) in the list.
Supplementary Note 4.4 Estimating importance weights
We proceed by explaining how to estimate in practice the Bayes factors needed to calculate the
aggregated prioritization. For that, we introduce importance weights, which follow directly from
the Bayes factors described above.
Supplementary Note 4.4.1 Lack of gold standard community ranking
In order to aggregate the ranked lists of communities we need to calculate the Bayes factors that
appear in the aggregated prioritization formula in Eq. (17) and Eq. (18). The evaluation of the
Bayes factors entails computing the posterior probability for each ranked list. As we explain
next, the calculation of the posterior probability requires a priori knowledge, which is practically
impossible to obtain.
The Bayes factor Kr of ranked list Rr is defined as the evidence provided by the ranked list
Rr in favor of the gold standard R⇤ (see Supplementary Note 4.2). Here, the gold standard R⇤ is a
S10
ranked list that orders communities found in a network in the decreasing order of their importance
for further investigation in the follow-up studies. Intuitively, community that ranks higher in R⇤
should be better at representing a structure that carries a meaning in a given network (e.g., a disease
causing pathway of proteins in a protein-protein interaction network, or, a group of functionally
similar products in the Amazon product co-purchasing network) than community that ranks lower
in R⇤.
However, it is practically impossible to a priori know which detected communities rank at
the top of the gold standard R⇤. In order to obtain such a gold standard ranking of communities,
we need to examine all the communities by performing potentially costly and time consuming
experiments. These experiments would allow us to determine for each community whether it
corresponds to a meaningful network structure. Afterwards, we would construct the gold standard
R⇤ by ranking the communities based on the outcomes of the experiments. These experiments may
render construction of the gold standard R⇤ difficult or even impossible in practice. Furthermore,
as the aim of community prioritization is to avoid the need to perform all the experiments, the
ability to prioritize communities should not depend on the availability of R⇤. We therefore resort
to a different approach.
Supplementary Note 4.4.2 Bootstrapping the importance weights
We describe an approach that resolves the problem of aggregating ranked lists when the gold
standard community ranking is not available. The approach takes as its input the ranked lists and
it estimates the weights (i.e., Bayes factors Kr) for each ranked list, which vary with rank in the
list, in an unsupervised manner. This means the approach does not require communities with top
aggregated ranks to be known a priori.
The approach uses a two-stage bootstrapping process to estimate the weights for each ranked
list. This is achieved based on the ranked list decomposition rather than based on a gold standard
community ranking. Details are provided next.
Decomposing ranked lists into bags. Each ranked list is partitioned into equally sized groups of
communities that we call bags. Formally, bags correspond to sets of communities. The ranked list
Rr is partitioned into B bags. The j-th bag contains a subset of communities:
Bj
r = {C 2C ;dRr(C) · b/Ce = j/C}
for j = 1, 2, . . . , B,
(19)
where d·e is the ceiling operator. It is possible that the last bag BB
r contains more than C/B
communities. Within a bag, the ordering of communities is not important. Additionally, each
community in bag Bj
r has the same value of the importance weight K j
r, which we explain next.
S11
Two-stage bootstrapping process. The approach consists of two stages:
1. Compute the importance weights for each ranked list using the current aggregated prioritization,
2. Re-aggregate the ranked lists based on the importance weights computed in the previous stage.
After initializing the aggregated prioritization, the approach alternates between the two stages until
no changes in the aggregated prioritization are observed.
Stage 1: Estimating importance weights of bags. In each iteration, the bootstrapping approach
uses the current aggregated prioritization to re-compute the importance weight for each bag. This is
done as follows. First, a temporary gold standard is constructed based on top ranked communities
in the current aggregated prioritization. A temporary gold standard T is a set containing ⇡C
communities that rank at the top in the current aggregated prioritization R:
T = {C 2C ; R(C) ⇡C},
where R(C) is the rank of community C in the current aggregated prioritization R. Here, ⇡, 0 <
⇡< 1, is a parameter representing the fraction of highest ranked communities used to construct
the temporary gold standard T .
We formulate the importance weight for each bag following the Bayes factor formulation
r for ranked list Rr and bag j compares
r,j. The hypotheses
given in Supplementary Note 4.2. The importance weight K j
the hypotheses H 1
H 1
r,j are defined as in Supplementary Note 4.2 and have the following meaning:
r,j by evaluating the evidence in favor of hypothesis H 1
r,j and H 2
r,j and H 2
H 1
r,j
H 2
r,j
– Bag Bj
– Bag Bj
r matches the temporary gold standard T ,
r does not match the temporary gold standard T .
The importance weight K j
r is the ratio of the posterior odds of hypothesis H 1
r,j to its prior odds:
K j
r =
p(H 1
p(H 2
r,jRr)
r,jRr)
p(H 2
p(H 1
r,j)
r,j)
.
(20)
r = T \ Bj
r. This means that, in each iteration, N j
r the overlap between communities assigned to bag Bj
Let us denote by N j
r and communities in the
temporary gold standard T , that is, N j
r contains
all the temporarily gold standard communities that rank as the j-th bag in ranked list Rr. Following
Eq. (20), we calculate the importance weight K j
r for ranked list Rr and bag j as:
N j
r + 1
r N j
S12
r + 1 ·
1 ⇡
⇡
Bj
K j
r =
.
(21)
Comparing the formula for the Bayes factor in Eq. (20) with the formula in Eq. (21), we can
r,jRr) by the fraction of com-
r,jRr) = (N j
r + 1).
r,jRr) by the fraction of communities in
r+1). Additionally,
r N j
see the following. Equation (21) approximates the probability p(H 1
munities in bag Bj
r that are in the temporary gold standard T , p(H 1
Similarly, Equation (21) approximates the probability p(H 2
bag Bj
r,jRr) = (Bj
a smoothing value of one is added to prevent a division by zero.
r that are not in the gold standard T , p(H 2
r + 1)/(Bj
r+1)/(Bj
It can also be seen from Eq. (21) that ⇡, defined above as the relative size of temporary gold
standard T , ⇡ = T/C, actually corresponds to the prior probability of hypothesis H 1
r,j.
Stage 2: Aggregating ranked lists. In the second stage of the bootstrapping process, the approach
aggregates the ranked lists based on the calculated importance weights. Following the rank aggre-
gation model presented in Supplementary Note 4.3, the ranked lists are aggregated according to
Eq. (17). More concretely, ranked lists are combined into the aggregated prioritization R using the
formula:
log K ir(C)
r Rr(C),
(22)
R(C) =Xr
r
where K ir(C)
is the importance weight of the bag ir(C) to which community C is assigned in
ranked list Rr. Here, R(C) represents the aggregated rank of community C. Note that the ag-
gregation formula uses the log importance weights, which correspond to predictive scores26, 28 that
favor those bags in the ranked lists that better match the temporary gold standard.
Upon convergence of the two-stage bootstrapping procedure, the normalized value R(C)
gives the final aggregated rank of community C.
Supplementary Note 5 CRANK approach
Following the presentation of the formal aspects of our approach for prioritizing network commu-
nities, we proceed by describing the complete CRANK algorithm.
Supplementary Note 5.1 Overview of CRANK
The CRANK method consists of four steps. (1) First, a community detection algorithm is run on
the network to identify communities. (2) In the second step, four community prioritization metrics
are computed for each of the detected communities. This step yields four lists, each list containing
scores of all communities for one prioritization metric. Scores in each list are then converted into
ranks, producing ranked lists of communities.
(3) In the third step, ranked list are aggregated
resulting in the aggregated prioritization of communities. (4) Finally, in the fourth step, CRANK
prioritizes the communities by ranking them by their decreasing aggregated score.
S13
Supplementary Figure 1: Community prioritization metrics and their combination. Outlined
are the second and the third step of CRANK (see Supplementary Note 5.1). (a) CRANK computes
a score rf (C) for each detected community C and each community prioritization metric rf (where
f is one of network structural features: "l" – likelihood, "d" – density, "b" – boundary, "a" –
allegiance). (b) Scores r are then sorted in a decreasing order into ranked list Rr. (c) Each ranked
list is decomposed into equally sized bags. An importance weight K i
r (black vertical strip) is
associated with each bag i and each ranked list Rr. The weights are initially equal, denoting the
aggregated prioritization R as an equally weighted average of community ranks Rl, Rd, Rb and Ra
at this point. (d) The highest ranked communities in R form a temporary gold standard T (dotted
cells), which is used to update importance weights in the follow up steps. (e) For each bag i and
each ranked list Rr, a new importance weight K i
r is calculated according to the current aggregated
prioritization R using Eq. (21). CRANK proceeds by updating the aggregated prioritization R
according to the revised importance weights using Eq. (22). Calculations in (d) and (e) are repeated
until aggregated prioritization R converges.
We proceed by explaining the aggregation phase (i.e., the third step) in more detail (Supple-
mentary Figure 1). At the start, CRANK sorts scores from each metric r (Supplementary Figure 1a)
into a list Rr of community ranks (Supplementary Figure 1b), and it then partitions these lists into
bags, which are equally sized sets of communities described in Supplementary Note 4.4.2 (Sup-
plementary Figure 1c). Next, an initial aggregated prioritization of communities is generated as
an equally weighted average of community ranks Rl, Rd, Rb and Ra (Supplementary Figure 1d).
The algorithm then iterates until the aggregated prioritization converges (i.e., community ranks do
not change between two consecutive iterations) or the maximum number of iterations is reached
(Supplementary Figure 1d-e).
In each iteration, a set of the highest ranked communities (i.e., a "temporary gold standard"
S14
a
Score prioritization
metrics
b
Construct ranked
lists
c
Decompose ranked
lists
d
Aggregate ranked
lists
e
Update importance
weights
Temporary
gold
standard
bag
Importance
weight
Repeat until converges
described in Supplementary Note 4.4.2) is formed based on the current aggregated prioritization R
(Supplementary Figure 1d). The approach then calculates the importance weight K i
r for each bag i
and each ranked list Rr using Eq. (21) by considering communities in the temporary gold standard
as a point of reference (Supplementary Figure 1e). CRANK determines the importance weight of a
bag based on the number of communities in the bag that are also contained in the temporary gold
standard. CRANK applies Tukey's running median smoothing procedure33 to make the importance
weights robust. Finally, CRANK uses Eq. (22) to update the current aggregated prioritization R.
This is done by combining community ranks Rl, Rd, Rb and Ra into the aggregated prioritization R
according to the importance weights. Repeating this procedure to iteratively refine the aggregated
prioritization R underlies CRANK.
Supplementary Note 5.2 CRANK algorithm
A complete description of the CRANK algorithm follows.
• Input: Network G(V,E), community detection algorithm A
• Parameters: Network perturbation intensity ↵, number of bags B, relative size of temporary
gold standard ⇡
• Output: Aggregated prioritization R
1. Step: Community detection
• Apply community detection algorithm A on network G to detect communities C:
2. Step: Community prioritization metrics
M (V,E,C) A(G)
2, 3, 4))
• Compute edge probabilities under ↵-perturbation of network G using M (V,E,C) (Eqs. (1,
• For each detected community C 2C , compute the scores:
– likelihood rl(C; ↵)
– density rd(C; ↵)
– boundary rb(C; ↵)
– allegiance ra(C; ↵)
• For each metric r 2{ rl, rd, rb, ra}, form a ranked list Rr such that Rr(C) is the rank (i.e.,
position) of community C in Rr:
Rr(C) = 1 +XD6=C
I(r(C; ↵) r(D; ↵))
S15
(23)
3. Step: Combining community prioritization metrics
• Decompose each ranked list Rr into B equally sized bags such that j-th bag contains a set of
communities:
Bj
r = {C 2C ;dRr(C) · B/Ce = j/C}
for j = 1, 2, . . . , B
• Initialize the importance weights K j
• Repeat until the aggregated prioritization R does not change between two consecutive itera-
r for each ranked list Rr and each bag j as K j
tions or a maximum number of iterations is reached:
– Construct the aggregated prioritization R by combining the ranked lists as:
r = 1
4
R(C) =Xr
log K ir(C)
r Rr(C),
(24)
where K ir(C)
in ranked list Rr
r
is the importance weight of the bag ir(C) to which community C is assigned
– Convert the aggregated prioritization R into rank order as:
R(C) 1 +XD6=C
I(R(C) R(D))
(25)
To deal with ties, the average of the ranks that would have been assigned to all the tied
communities is assigned to each community
– Form a temporary gold standard T consisting of ⇡C highest ranked communities in R:
T = {C 2C ; R(C) ⇡C},
where R(C) is the rank of community C in the aggregated prioritization R
– Update the importance weight K j
r for each metric r and each bag j using the formula:
K j
r =
N j
r + 1
r N j
r + 1 ·
Bj
1 ⇡
⇡
(26)
where N j
r = T \ Bj
r
– Smooth the importance weights of each ranked list Rr and bag Bj
r using the Tukey's run-
ning median procedure33 with window size three:
K j
r =8<:
median(K 1
r, K b 1
r
median(K b
median(K j 1
r
, K j
r , K j+1
r
r , 3K 2
r , K 2
r 2K 3
, 3K b 1
r 2K b 2
r
) if j 6= 1, B
r ) if j = 1
) if j = B
Continue to apply the median smoothing to the importance weights of metric r until no
more changes are observed
S16
4. Step: Generating community ranking
• Return the rank-ordered aggregated prioritization R
Community detection algorithms. CRANK can be applied to communities detected with a num-
ber of statistical community detection methods. Examples include community detection methods
based on Affiliation Graph Model8, 9, Stochastic Block Model7, Latent Feature Graph Model10–16, 34
and Attributed Graph Model17–19. Additionally, CRANK works with non-statistical methods like
modularity optimization and spectral methods, where edge probabilities are given by an auxiliary
network model.
Other parameters of CRANK. The CRANK algorithm has three parameters: network perturbation
intensity ↵, number of bags B, and relative size of temporary gold standard ⇡.
We find empirically that CRANK rank aggregation method always converges in less than
20 iterations of the algorithm and it takes on average less than 10 iterations for the aggregated
ranking to converge.
In the algorithm we track the change of the aggregated ranking between
two consecutive iterations and stop the algorithm when no change in the ranking is observed. At
that point the ranking has completely stabilized, it will not change in future iterations, and thus
the aggregation is said to converge. Although we use the most strict stopping criterion in our
experiments, we note that we have not observed any convergence issues, even when aggregating
large ranked lists with more than ten thousand communities.
We find that for rank-based aggregation of CRANK metrics, a choice for bag size of around
50 is appropriate. That means that the number of bags is set to B = C/50, where C denotes
the number of communities detected in a network, and that all bags are of equal size. We use
that value for the number of bags in all experiments reported in the paper, unless the experiment
involves prioritizing fewer than 50 communities. In the latter case, we require at least three bins.
We have evaluated the sensitivity of CRANK to different perturbation intensities ↵ of a net-
work. All results reported in this paper are obtained by assuming a small perturbation of the
network structure, ↵ = 0.15. This means that CRANK metrics capture the magnitude and the
robustness of network structural features, which is important for good prioritization performance.
We have investigated a number of values for the relative size ⇡ of temporary gold standard.
We observe that setting the relative size to ⇡ = 0.05 performs well across different datasets and
community detection algorithms and we use that value in all our experiments.
S17
Supplementary Note 5.3 Computational time complexity of CRANK
We separately analyze computational complexity of each of the fours CRANK steps.
The runtime of the first step is the time needed to detect communities in the network G. We
denote this time as O(A) . In the second step, CRANK calculates community prioritization metrics
for all detected communities. This step takes time O(C · E + C · maxi Ci2 + C · E), where
the first term is due to computation of edge probabilities based on CRANK network perturbation
model, the second term is due to computation of likelihood metric scores and the third term is due
to computations of community density, boundary, and allegiance metric scores. This means that
computing metric scores in the second step requires time, which is linear in the size of network
G. The third step is computationally straightforward and requires O(niter · C · log C) time,
where niter is the maximum number of iterations needed for aggregation of community metric
scores. We note that niter < 20 was sufficient for convergence of the aggregated prioritization
in all our studies. The fourth step of CRANK is similarly straightforward:
it involves sorting
the communities based on their overall score in the aggregated prioritization R. Altogether, the
time complexity of CRANK is the sum of the times needed to complete all four steps of CRANK
algorithm, O(A + C · E + C · maxi Ci2 + niter · C · log C).
Notice that, in the second step, a traditional, explicit approach to computing edge prob-
abilities in the perturbed network would first perform many physical perturbations of the input
network and would then run a community detection algorithm on each of the perturbed networks.
This procedure would take time O(npert · (E + O(A))), where npert counts network perturbations,
typically2 npert 100. However, by computing edge probabilities in the perturbed network analyt-
ically rather than empirically, CRANK only needs time O(C · E), which substantially increases
CRANK's scalability for large networks.
CRANK naturally allows for parallelization, which further increases its scalability. Calcula-
tions of prioritization metric scores are independent for each metric and each community and thus
can be computed in parallel.
Supplementary Note 6 Details about datasets
Next, we describe datasets considered in this study.
Supplementary Note 6.1 Network datasets
We consider twelve networks from biological, social, and information realms (Supplementary Ta-
ble 1).
S18
Supplementary Table 1: Statistics of network datasets. N: number of nodes, E: number of
edges, C: number of ground-truth communities, S: average ground-truth community size, A:
average ground-truth community memberships per node. The Medical drugs network has three
types of ground-truth information: Text35, Chemistry35, Epistasis36, given in the form of drug-
drug relationships (C: number of drug-drug relationships, A: average relationships per node). The
HSDN network has three types of ground-truth information: Pathway37, Genes37, Chemistry37, also
given in the form of disease-disease relationships (C: number of disease-disease relationships, A:
average relationships per node).
Dataset
Google+38
Facebook38
Twitter38
DBLP38
Amazon38
N
E
C
S
143.5
0.11 m 27.3 m 437
28.8
4.04 k 0.18 m 193
81.31 k 3.5 m 3.1 k
15.5
0.32 m 1.0 m 13.5 k 429.8
0.33 m 0.9 m 151 k
99.9
Human Net39
16.24 k 0.48 m 4.1 k
Human IntAct40
23.68 k 0.11 m 4.3 k
Yeast GI41
4.46 k 0.17 m 1.2 k
Human BioGRID42 19.56 k 0.17 m 3.9 k
Human STRING43
815
5.42 k
50.8 k
Medical drugs36
1.32 k
16.7 k
HSDN44
1.23 k
6.5 k
28.6 k
1.4 k
21.8 k
164.9 k
172.5 k
145.1 k
16.9
14.7
9.8
15.9
59.9
/
/
/
/
/
/
A
0.3
1.4
0.4
2.6
14.8
8.4
9.0
8.9
9.5
9.0
43.5
2.1
33.1
268.8
281.1
236.6
We consider five gene networks: Human Net, Human Int Act, Yeast GI, Human BioGRID,
and Human STRING. Human STRING is a protein-protein interaction network of experimentally
determined interactions between human proteins from STRING v9.1 database43. The nodes are
limited to proteins associated with biological pathways in the Reactome database45. Human Net39
is a human-specific gene network that combines gene co-citation, gene co-expression, curated
physical protein interactions, genetic interactions, and co-occurrence of protein domains from four
species. We also consider human genetic and physical interaction network (Human IntAct)40,
S19
experimentally derived genetic interaction network in yeast S. cerevisiae (Yeast GI)41, and human
protein-protein interaction network (Human BioGRID)42. All networks are provided as part of
relevant publications.
We consider two non-gene/non-protein networks: Medical drugs and HSDN. Medical drug
network contains drugs approved by the U.S. Food and Drug Administration (FDA), which are
listed in the DrugBank database36. Two drugs are linked in the network if they have at least one
target protein in common. The HSDN network contains human diseases, where two diseases are
linked if their clinical symptoms are significantly similar44. Both networks are provided as part of
relevant publications.
We consider five social and information networks representing standard benchmark datasets
in network science. We consider a collaboration network from the DBLP computer science bibli-
ography46, the Amazon product co-purchasing network46, and a collection of ego-networks from
online social networks of Google+, Twitter and Facebook13. All networks are downloaded from the
SNAP database38 and are publicly available at: http://snap.stanford.edu/data.
Supplementary Note 6.2 Ground-truth community datasets
For all considered networks, we have explicit ground-truth membership of nodes to communities
(Supplementary Table 1). This means that in all networks ground-truth community memberships
of nodes have been externally validated and verified.
Ground-truth communities for the Human STRING protein-protein interaction network is
given by curated biological pathways from the Reactome database45. For other gene/protein net-
works we obtain ground-truth communities from the Gene Ontology47 in the form of gene groups
that correspond to biological processes, cellular components and molecular functions (see Sup-
plementary Note 7.4). For the HSDN network we have three types of ground-truth information
from the Comparative Toxicogenomics Database: information about molecular pathways that are
common to disease pairs37, knowledge about disease genes that are common to disease pairs37,
and chemical associations that are common to disease pairs37. For the medical drug network we
also obtain three types of ground-truth information:
text associations between chemicals from
the STITCH database35, drug-drug relationships from the STITCH35 based on similarity of drug's
chemical structure, and drug-drug interactions from the DrugBank36.
In the Amazon product co-purchasing network, ground-truth communities are defined by
product categories on the Amazon website13, 46. In the DBLP network, ground-truth communities
are defined by publication venue,e.g., journal or conference, meaning that authors who published
S20
to a certain journal or conference form a ground-truth community46. In the online social networks,
ground-truth communities are defined by users' social circles13.
Supplementary Note 7 Details about experimental setup
We describe community detection approaches that are used to find network communities, which
we then prioritize. We then describe the experimental design and the metrics used for performance
evaluation.
Supplementary Note 7.1 Community detection methods
We use the following community detection methods: CoDA (Communities through Directed Aff-
iliations)9, BigCLAM8 and MMSB (Mixed Membership Stochastic Blockmodels)16, 34. These
methods implement different statistical models of community detection and are hence appropriate
for use with CRANK. We use publicly available implementations of the methods. Implementations
of CoDA and BigCLAM are provided as part of the SNAP library48. MMSB is implemented in
Chang et al.49 Values for model parameters of the methods were selected based on method's au-
thors recommendation. Estimates of edge and node-community membership probabilities, which
are needed by CRANK, were obtained with tools for examining posterior distributions, which are
included in the SNAP48 and in Chang et al.49.
Supplementary Note 7.2 Baseline community metrics
For comparison we consider Conductance50 and Modularity51 community scoring functions. In or-
der to make a higher value better, we reverse Conductance as (1 Conductance). We also consider
two simple baselines: random prioritization of communities, and prioritization by the increasing
size of communities.
Conductance of a community C is defined as Conductance(C) = BC/(2EC + BC),
where EC are edges within community C, EC = {(u, v) 2E ; u 2 C, v 2 C}, and BC are edges
leaving community C (i.e., community's edge boundary), BC = {(u, v) 2E ; u 2 C, v 62 C}. If
Conductance is used for community ranking then the highest ranked communities are those with
the smallest fraction of total edge volume pointing outside them. Modularity of a community C is
defined as Modularity(C) = 1/4(EC E[EC]). It measures the difference between the number
of edges in a community and the expected number of such edges in a random graph with identical
degree distribution. In prioritization, modularity prefers communities that are denser (i.e., with
many internal edges) than what is expected under the configuration random network model2, 51.
We also considered several other community scoring functions46: Flake-ODF (Out-Degree
S21
Fraction), Cut Ratio, TPR (Triangle Participation Ratio) and FOMD (Fraction Over Median De-
gree). We reversed metrics Cut Ratio and Flake-ODF as (1 Cut Ratio) and (1 Flake-ODF),
respectively, to make a higher value indicate higher priority.
In our experiments these scoring
functions were typically outperformed by either Conductance or Modularity or both. When this
was the case, their results are not reported.
We also evaluate CRANK against its several simplified variants:
• We compare different subsets of CRANK's prioritization metrics to each other. For example, we
use CRANK's rank aggregation method to aggregate the scores of community likelihood, com-
munity density and community boundary, but we leave out the scores of community allegiance.
• We compare CRANK's rank aggregation method to methods that aggregate metric scores via
simple quadratic mean, Borda method52, Footrule approach53, and Pick-a-Perm54.
• We compare CRANK's prioritization metrics to different combinations of the baseline scoring
functions. For example, we use CRANK's rank aggregation method to combine Cut Ratio,
Conductance, TPR and FOMD scoring functions.
Supplementary Note 7.3 Prioritization performance evaluation
Next we describe gold standard rankings that are used to evaluate prioritization performance.
The intuition behind our experiments is the following: We want communities with higher pri-
oritization scores (i.e., communities that rank closer to the top of a ranked list) to provide a more
accurate reconstruction of the ground-truth communities. More precisely, given only a network,
we first detect communities and then prioritize them with the goal to establish which detected
communities are the most accurate without actually knowing the ground-truth community labels.
A perfect prioritization would order communities by decreasing accuracy, such that detected com-
munities, which best match the ground-truth communities, are ranked at the top.
We would like to note that community detection methods detect communities using only net-
work structure and community prioritization methods prioritize communities using only informa-
tion about community structure. This means that community detection and prioritization methods
do not consider any external metadata or labels. We can thus quantitatively evaluate performance
of a prioritization method by comparing community rankings generated by the method with gold
standard community rankings determined by the ground-truth information.
We evaluate prioritization of communities by quantifying its correspondence with the gold
standard ranking of communities. We determine the gold standard ranking by computing the ac-
curacy of every detected community by matching it to ground-truth communities. We adopt the
S22
following evaluation procedure previously used in Yang et al.46: Every detected community C is
matched with its most similar ground-truth community C⇤. Given C⇤, the set of all ground-truth
communities that is explicitly provided by an external data resource, such as the SNAP38, C⇤ is de-
fined as: C⇤ = arg maxD⇤2C⇤ (D⇤, C), where (D⇤, C) measures the Jaccard similarity between
ground-truth community D⇤ and detected community C. C⇤ is thus the ground-truth community
that is the best match for a given detected community C. The accuracy of community C is sim-
ply the Jaccard similarity, (C⇤, C), between C and its corresponding ground-truth community C⇤.
The gold standard ranking is then defined as the ranking of the detected communities by decreasing
accuracy.
A perfect prioritization matches the gold standard ranking exactly and ranks communities
in decreasing order of accuracy. In this case, the Spearman's rank correlation ⇢ between the gold
standard ranking and the estimated prioritization is one. The Spearman's rank correlation ⇢ is close
to zero when the prioritization of communities does not carry any signal, and negative when the
predicted prioritization tends to order the detected communities by the increasing accuracy rather
than by the decreasing accuracy.
Supplementary Note 7.4 Functional enrichment analysis
Functional enrichment analysis55 is an established computational procedure in biology for the rig-
orous assessment of statistical significance of gene sets. The input to functional enrichment anal-
ysis consists of (1) a gene set, i.e., a community detected in a gene network given by its member
genes, and (2) known gene functional annotation data. The output is statistical significance of their
association.
We obtain known sets of functionally related genes from the Gene Ontology (GO)47. GO
terms are organized hierarchically such that higher level terms, e.g., "regulation of biological pro-
cess", are assigned to more genes and more specific descendant terms, e.g. "positive regulation
of eye development", are related to parent by "is a" or "part of" relationships. We consider high
confidence experimentally validated GO annotations (i.e., annotations associated with the evidence
codes: EXP, IDA, IMP, IGI, IEP, ISS, ISA, ISM or ISO) that cover all three aspects in the GO:
biological processes, molecular functions and cellular components. Since the obtained GO data
only contain the most specific annotations explicitly, we retrieve the relevant GO annotations and
propagate them upwards through the GO hierarchy, i.e., any gene annotated to a certain GO term
is also explicitly included in all parental terms56, 57.
We evaluate the significance of the association between each detected community and the GO
S23
using PANTHER tool58 in February 2015 (i.e., "PANTHER Over-representation Analysis" using
Fisher's exact test). The Bonferroni correction was used to account for multiple testing. Given
a detected community, the over-representation analysis tests which GO terms are most associated
with the community and evaluates if their association is significantly different (p-value < 0.05,
Bonferroni correction for multiple testing) from what is expected by chance. The basic question
answered by this test is: when sampling X genes (a detected community) out of N genes (all nodes
in the network), what is the probability that x or more of these genes belong to a particular GO
term shared by n of the N genes in the network? The Fisher's exact test answers this question in
the form of a p-value. We say that a community is functionally enriched in a given GO term if
it is significantly associated with that GO term. Intuitively, this means that a community contains
surprisingly large number of genes that perform the same cellular function, are located in the same
cellular component, or act together in the same biological process, as defined by a given GO term.
We say that a community is functionally enriched if it is functionally enriched in at least k GO
terms, where k is pre-selected value (i.e., kC = C for a community C).
To evaluate the quality of community prioritization we report how many communities that
rank among the top 5% of all communities are functionally enriched. A larger number of func-
tionally enriched communities at the top of a community ranking indicates better prioritization
performance.
Supplementary Note 8 Experiments on CRANK and its properties
In this note, we investigate CRANK's properties. We study CRANK metrics and CRANK rank ag-
gregation method, two major components of CRANK approach. We start by applying CRANK in
conjunction with different community detection methods (Supplementary Note 8.1) and evaluating
CRANK's sensitivity to network perturbation intensity (Supplementary Note 8.2). We then evalu-
ate the contribution of each CRANK metric towards the performance of CRANK (Supplementary
Note 8.3). We then compare CRANK against combinations of baseline community metrics in order
to better understand the impact of CRANK metrics on performance (Supplementary Note 8.4). Fi-
nally, we evaluate how the proposed rank aggregation method performs in comparison to existing
rank aggregation methods (Supplementary Note 8.5).
All experiments reported in this note are done on social and information networks (Supple-
mentary Note 6.1) because of available high-quality (i.e., complete) ground-truth information that
is used to evaluate prioritization performance.
S24
Supplementary Note 8.1 CRANK in conjunction with different community detection meth-
ods
We consider five social and information networks. For each network, we used a community de-
tection method to detect communities, and then we prioritized the detected communities using
CRANK. To demonstrate that CRANK can be used with any community detection method, we
here use CRANK in conjunction with three state-of-the-art community detection methods (i.e.,
CoDA9, BigCLAM8, and MMSB16, see Supplementary Note 7.1).
For the purpose of evaluation we consider networks with ground-truth information on com-
munities46. Notice that this information is not available to methods during community detection or
community prioritization. However, it enables us to compile a gold standard ranking of commu-
nities, which ranks communities based on how well they reconstruct ground-truth, i.e., externally
validated, communities. Spearman's rank correlation ⇢ is used to measure how well a generated
ranking approximates the gold standard ranking (see Supplementary Note 7.3). We compare per-
formance of CRANK to alternative metrics potentially useful for prioritization: modularity, con-
ductance, and random prioritization.
Tables Supplementary Table 2-Supplementary Table 4 show the performance of CRANK
and other baseline community metrics on five networks under the BigCLAM, MMSB, and CoDA
community detection methods. Overall, we find that across all datasets and community detec-
tion methods, CRANK is always the best performing method to prioritize communities. CRANK
outperforms Modularity by up to 128% and generates on average 57% more accurate community
rankings as measured by the Spearman's rank correlation between a generated ranking and the
gold standard ranking. Similarly, CRANK outperforms Conductance by up to 107% and generates
on average 38% more accurate community rankings. Furthermore, CRANK performs on average
32% better than the second best community metric. The second best performing community metric
changes considerably across the datasets, while CRANK always performs best, suggesting that it
can effectively exploit the network structural features to become aware of a particular configuration
of a dataset and a community detection model. CRANK outperforms other community metrics, and
we hypothesize that the scoring functions of those metrics are unable to model heterogeneity of
datasets and community detection algorithms.
Importantly, results in Tables Supplementary Table 2-Supplementary Table 4 show that CRANK
performs substantially better than the approach, which is nowadays typically employed when no
other domain-specific meta or label information besides the network structure is available (i.e.,
Random). On average, CRANK improves the random ordering of the detected communities by
S25
more than 10 folds as measured by the Spearman's rank correlation. These results suggest that
the notion of community priority employed by CRANK agrees well with a gold standard ranking
that is measured via ground-truth community information; in fact, CRANK does so in a completely
unsupervised manner.
Supplementary Table 2: Prioritization of communities detected by the BigCLAM method.
We measure Spearman's rank correlation between the generated ranking of communities and the
gold standard ranking of communities. Higher values indicate better performance. Communities
were detected by the BigCLAM algorithm8 and prioritized using one of four different approaches.
Higher value indicates better performance.
Method
Facebook Amazon Google+ Twitter DBLP
Random
Modularity
Conductance
CRANK
0.003
0.225
0.287
0.342
-0.019
0.158
0.216
0.089
0.307
0.293
0.031
0.277
0.319
0.025
0.252
0.333
0.278
0.325
0.442
0.358
Supplementary Table 3: Prioritization of communities detected by the MMSB method. We
measure Spearman's rank correlation between the generated ranking of communities and the gold
standard ranking of communities. Higher values indicate better performance. Communities were
detected by the MMSB algorithm16 and prioritized using one of four different approaches. Higher
value indicates better performance.
Method
Facebook Amazon Google+ Twitter DBLP
Random
Modularity
Conductance
CRANK
0.087
0.281
0.329
0.356
0.013
0.183
0.218
0.295
-0.016
0.295
0.329
-0.010
0.302
0.417
0.008
0.251
0.281
0.384
0.439
0.371
Based on these results we conclude that CRANK consistently achieves good performance
measured in terms of Spearman's rank correlation on the ground-truth community information.
Furthermore, the results indicate that CRANK can be successfully applied to popular and state-of-
the-art community detection methods.
S26
Supplementary Table 4: Prioritization of communities detected by the CoDA method. We
measure Spearman's rank correlation between the generated ranking of communities and the gold
standard ranking of communities. Higher values indicate better performance. Communities were
detected by the CoDA algorithm9 and prioritized using one of four different approaches. Higher
value indicates better performance.
Method
Facebook Amazon Google+ Twitter DBLP
Random
Modularity
Conductance
CRANK
-0.016
0.149
0.257
0.340
0.012
0.195
0.161
0.267
0.005
0.166
0.187
0.312
-0.013
0.213
0.226
0.009
0.301
0.212
0.465
0.411
Supplementary Note 8.2 Network perturbation intensity in CRANK
We evaluate the sensitivity of CRANK to different perturbation intensities ↵ of a network. Recall
that CRANK defines prioritization metrics as follows. Given a structural feature f, CRANK defines
prioritization metric rf such that it captures the magnitude of feature f in the network as well
as the change in the value of f between the network and its ↵-perturbed version: rf (C; ↵) =
f (C)/(1 + df (C, ↵)) (Supplementary Note 3). It can thus be expected that perturbation intensity
↵ might influence CRANK's prioritization performance. We here vary the value for ↵ and study its
impact on CRANK's performance.
Supplementary Figure 2 shows the performance achieved on the Amazon, DBLP, and STRING
networks for different values of perturbation intensity ↵ varying from ↵ = 0.05 to ↵ = 0.95 with
an increasing step of 0.05. We observe that varying ↵ influences the overall performance across
different networks and community detection algorithms.
Results in Supplementary Figure 2 are consistent with the accepted definition of stability and
robustness of community structure in networks4, 59–62. It is generally posited2, 5 that, at the network
level, significant community structure should be robust to small perturbations of the network (i.e.,
for low values of ↵). This notion corresponds to the robustness of community structure against
noise and data incompleteness6. In other words, if a small change in the network can completely
change the outcome of community detection algorithm, then the communities found should not be
considered significant.
However, when perturbation intensity is beyond a certain threshold, i.e., when the network
is perturbed to such extent that it resembles a random network (i.e., for large values of ↵), then
S27
Supplementary Figure 2: Prioritization performance of CRank when varying the value of
network perturbation intensity. Network communities are found using the CoDA community
detection algorithm9. Perturbation intensity ↵ affects the estimates of edge probabilities that are
computed by CRank and used to analytically determine community structure in the perturbed net-
work based on communities detected in the original network. All results of CRank reported in this
paper are obtained by assuming a small perturbation of the network structure2, ↵ = 0.15 (black
vertical line).
a good metric should assign community structure detected in the perturbed network a low score
even if community structure in the original network is significant2. This notion corresponds to
the specificity of the community structure that should be captured by a good community metric.
Therefore, in CRANK, the adjusted prioritization metrics should be most informative for small
values of perturbation intensity ↵. This indeed holds for CRANK, as can be seen in Supplementary
Figure 2. For values of perturbation intensity beyond a reasonably small threshold (e.g., ↵ = 0.3),
prioritization performance typically slowly deteriorates.
An especially interesting case is to investigate CRANK's performance when ↵ = 0. When
↵ = 0, the formula for prioritization metric rf becomes rf (C; 0) = f (C). In other words, when
↵ = 0, prioritization metric rf only captures the magnitude of feature f in the network. This
means that the metric rf ignores any information, which comes from the change in the value of f
between the original network and its perturbed version.
On average, on Amazon, DBLP, and STRING networks we observe that setting ↵ to ↵ = 0
results in 27% lower Spearman's rank correlation with the gold standard ranking as compared to
Spearman's rank correlation when ↵ = 0.15. These findings suggest that both the magnitude and
the robustness of network structural features have an important role in CRANK's performance.
S28
0.05
0.15
0.25
0.35
0.45
0.55
0.65
0.75
0.85
0.95
Network perturbation intensity
Amazon
DBLP
STRING
0.5
0.4
0.3
0.2
0.1
0.0
gold standard ranking
Rank correlation with the
Supplementary Table 5: Complementarity of CRANK community prioritization metrics. We
leave out one of the four CRANK community prioritization metrics at a time and evaluate per-
formance of the reduced CRANK by measuring Spearman's rank correlation between predicted
prioritization of communities and the gold standard ranking of communities. We also report the
accuracy of individual community metrics. Communities were detected by the CoDA algorithm9.
The "\" sign denotes prioritization metric that was left out in the experiment. Higher value indi-
cates better performance.
Ranking method Facebook Amazon Google+ Twitter DBLP Average
rl
rd
rb
ra
CRANK \ rl
CRANK \ rd
CRANK \ rb
CRANK \ ra
CRANK
0.277
0.301
0.245
0.289
0.303
0.267
0.278
0.311
0.340
0.187
0.209
0.178
0.189
0.203
0.189
0.193
0.245
0.267
0.247
0.199
0.188
0.245
0.262
0.241
0.283
0.271
0.312
0.211
0.255
0.288
0.188
0.423
0.367
0.316
0.474
0.309
0.276
0.213
0.311
0.312
0.353
0.347
0.323
0.465
0.411
0.246
0.248
0.222
0.244
0.300
0.274
0.283
0.283
0.359
In other words, high priority communities have high values of community prioritization metrics,
which are also stable with respect to small perturbations of the network structure.
Supplementary Note 8.3
Incremental contribution of CRANK metrics
We examine the degree of contribution of each of the four CRANK metrics to the final performance
of CRANK. Recall that CRANK metrics are: (1) Community likelihood rl, which scores each com-
munity based on the overall likelihood of edges and non-edges in the community; (2) Community
density rd, which scores each community based on the probability of community's internal network
connectivity; (3) Community boundary rb, which scores each community based on the sharpness
of its edge boundary; and (4) Community allegiance ra, which scores each community based on
the difference between internal and external network connectivity of each community member.
We want to test whether the four CRANK metrics are truly necessary or would CRANK
perform just as well with only a subset of them. To answer this question, we consider in turn
different subsets of CRANK metrics and apply CRANK with each of the subsets.
Supplementary Table 5 shows that considering all CRANK metrics improved average Spear-
S29
man's rank correlation obtained by considering only one metric by 50%. It improved Spearman's
rank correlation of the best single CRANK metric considered in isolation by 45%. Additionally,
all four CRANK metrics performed on average 26% better than any subset of three metrics. These
observations suggest that each prioritization metric by itself carries a substantial predictive signal,
and that combining all the metrics results in superior performance. We hence conclude that the
proposed metrics are complementary, and that good performance of CRANK depends on consider-
ation of all of them.
Supplementary Note 8.4 Combinations of baseline community metrics
To better understand the impact of CRANK aggregation method and CRANK metrics on perfor-
mance, we compare CRANK against standard and commonly used community metrics. We evalu-
ate the accuracy of community rankings obtained by combining six baseline community metrics as
well as all combinations of five out of the six the metrics (i.e., Cut Ratio46, Conductance50, TPR46,
FOMD46, Flake-ODF46, Modularity51; see Supplementary Note 7.2). Baseline community metrics
in each combination are aggregated by averaging the metrics' scores.
Results are reported in Supplementary Table 6. We can learn two things by examining results
of this experiment. First, comparing performance of the aggregated metric scores in Supplemen-
tary Table 6 with performance of the non-aggregated metric scores reveals that the aggregated
metric scores consistently performed better than any one metric by itself. For example, aggrega-
tion of Conductance with FOMD, TPR, Cut Ratio and Modularity metrics improved performance
of Conductance considered by itself by 83% on Twitter network (⇢ = 0.413 vs. ⇢ = 0.226) and
by more than 54% on DBLP network (⇢ = 0.327 vs. ⇢ = 0.212) (cf. Supplementary Table 6 and
Supplementary Table 4). This observation suggests that different metrics considered together can
more accurately predict community ranks than any one metric by itself.
Second, while performance of baseline community metrics was improved by aggregation,
CRANK achieved better performance than aggregated baseline community metrics on all five
datasets. CRANK performed up to 80% better than combinations of baseline metrics and generated
on average 38% better community rankings. This result is also interesting because the baselines
aggregate five or even six community metrics but CRANK aggregates only four CRANK metrics
(Supplementary Table 6). With these results, we conclude that improvement of CRANK's perfor-
mance does not come solely from the aggregation itself, but rather also from CRANK metrics.
S30
Supplementary Table 6: Performance of CRANK vs. combinations of baseline community
metrics. Each experiment combined baseline community metrics by averaging their scores. We
measure Spearman's rank correlation between the generated prioritization of communities and
the gold standard ranking of communities. Communities were detected by the CoDA algorithm9.
Cnd: Conductance50, Mod: Modularity51, FOMD: Fraction over median degree46, TPR: Triangle
participation ratio46, Flake-ODF: Out degree fraction46. Higher value indicates better performance.
Baseline community metrics
{FOMD, TPR, Cut Ratio, Cnd, Mod}
{FOMD, TPR, Cut Ratio, Flake-ODF, Mod}
{FOMD, TPR, Flake-ODF, Cnd, Mod}
{FOMD, Flake-ODF, Cut Ratio, Cnd, Mod}
{Flake-ODF, TPR, Cut Ratio, Cnd, Mod}
{FOMD, Flake-ODF, TPR, Cut Ratio, Cnd}
{FOMD, Flake-ODF, TPR, Cut Ratio, Cnd, Mod}
CRANK
Facebook Amazon Google+ Twitter DBLP Average
0.253
0.144
0.225
0.228
0.204
0.211
0.249
0.202
0.152
0.178
0.211
0.207
0.217
0.213
0.219
0.173
0.202
0.211
0.226
0.231
0.233
0.413 0.327 0.283
0.208 0.317 0.199
0.298 0.367 0.254
0.408 0.379 0.287
0.351 0.333 0.264
0.372 0.342 0.275
0.364 0.381 0.288
0.340
0.267
0.312
0.465 0.411 0.359
Supplementary Note 8.5 Comparison with other rank aggregation approaches
So far, we learned that CRANK metrics are complementary and that each of them contributes to
the performance of CRANK. We would also like to understand the role of another component of
CRANK, that is, CRANK rank aggregation method.
To assess the contribution of CRANK rank aggregation method to the overall performance
of CRANK, we compare CRANK to its simplified version. Simple CRANK considers exactly
the same prioritization metrics but aggregates the metrics using a simple quadratic mean. Given
a community C, simple CRANK computes the aggregated score R(C) for community C as:
R(C) = qPf rf (C)2/4. We observe that CRANK rank aggregation method consistently out-
performs quadratic mean by 20-46% on various datasets (Supplementary Table 7).
Next, we test how CRANK rank aggregation method compares against established rank ag-
gregation approaches53, 63. Recall that rank aggregation is concerned with how to combine several
independently constructed rankings into one final ranking that represents the collective opinion
of all the rankings53. The classical consideration for specifying the final ranking is to maxi-
mize the number of pairwise agreements between the final ranking and each input ranking. Un-
fortunately, this objective, known as the Kemeny consensus, is NP-hard to compute53, 64, which
has motivated the development of methods that either use heuristics or aim to approximate the
S31
Supplementary Table 7: Performance of CRANK aggregation method and other rank aggre-
gation methods. Simple CRANK considers exactly the same prioritization metrics as CRANK but
aggregates the scores using the quadratic mean. We measure Spearman's rank correlation between
the generated prioritization and the gold standard ranking of communities. Communities were
detected by the CoDA algorithm9. Higher value indicates better performance.
Rank aggregation Facebook Amazon Google+ Twitter DBLP Average
Borda
Footrule
Pick-a-Perm
Simple CRANK
CRANK
0.291
0.289
0.245
0.250
0.340
0.242
0.187
0.209
0.190
0.267
0.234
0.226
0.247
0.213
0.312
0.417
0.426
0.288
0.341
0.387
0.405
0.276
0.340
0.465
0.411
0.314
0.301
0.253
0.267
0.359
NP-hard objective52–54, 65. We compare CRANK rank aggregation method with three other rank
aggregation methods that offer guarantees on approximating the Kemeny consensus. We con-
sider a 5-approximation algorithm of the Kemeny optimal ranking called Borda's method52, a
2-approximation Footrule aggregation53 and a 2-approximation Pick-a-Perm algorithm54.
Results in Supplementary Table 7 show that rank aggregation in CRANK is effective as it ei-
ther matched or outperformed alternative rank aggregation approaches although CRANK does not
approximate the Kemeny consensus. CRANK outperformed Borda's method, the best performing
alternative approach, by at least 6%. Across all datasets, CRANK achieved 14% higher average
Spearman's rank correlation than Borda's method. This observation is interesting, since Borda's
method is the most natural and usual choice for rank aggregation53. Pick-a-Perm generally per-
formed the worst among the considered methods. Pick-a-Perm operates by returning one of the
input rankings selected at random. Although it is a 2-approximation algorithm to the Kemeny op-
timal ranking52, it may be of limited practical value when the goal is to maximize coherence of the
final ranking with all the input rankings (which is the case in our study). We note that since finding
the optimal Kemeny solution is NP-hard, none of the algorithms, including CRANK, guarantees to
provide the optimal solution, and different algorithms typically find different solutions. However,
CRANK achieved on average 27% higher Spearman's rank correlation than alternative approaches
that combine metric scores by approximating the NP-hard objective.
In addition to consistently producing better results, CRANK rank aggregation method has
two important advantages over alternative rank aggregation methods. First, CRANK handles in-
consistencies between the ranked lists (i.e., input rankings) by estimating the importance weights
S32
for each ranked list. It combines different metrics such that the weight of each metric varies with
community rank. As such, CRANK allows a practitioner to explore, for each community, the
weight of each metric in the aggregated community ranking. The importance weights also take ac-
count of uncertainty in a ranked list. When combining the ranked lists into a final ranking, CRANK
uses the weights to down-weight uninformative parts of each ranked list and up-weight informa-
tive parts of each ranked list (Supplementary Note 4). Experiments suggest that the importance
weight-based approach plays a role in good performance of CRANK.
Second, CRANK rank aggregation method can consider meta or other label information
when combining the metrics. This capability is important because meta information can guide
the method toward producing more useful results (Supplementary Note 10). This is in sharp con-
trast with other rank aggregation methods, which are unsupervised methods.
Inclusion of additional community metrics into CRANK
Supplementary Note 9
So far, we showed that CRANK represents a flexible and general community prioritization plat-
form whose model and metrics capture conceptually distinct network structural features. The met-
rics non-redundantly quantify different features of network community structure (Supplementary
Note 8.3). We also showed that each CRANK metric is necessary and contributes positively to the
performance of CRANK (Supplementary Note 8.3). Unlike alternative network metrics, such as
conductance, CRANK metrics capture both the magnitude and the robustness of network structural
features (Supplementary Note 8.4).
However, it is not possible to theoretically guarantee that any finite set of metrics will be
sufficient for prioritizing communities in all real-world networks. We address this challenge by
showing how to integrate any number of additional user-defined metrics into CRANK model with-
out requiring further technical changes to the model. This way, CRANK can build on any existing
body of network metrics and can consider domain-specific community/cluster metrics.
Supplementary Note 9.1 Sensitivity of CRANK to adding low-signal community metrics
We performed additional analyses investigating how inclusion of potentially noisy metrics affects
CRANK performance.
We created synthetic networks with planted community structure using a stochastic block
model. For a given synthetic network we applied a community detection method9 to detect com-
munities and then used CRANK to prioritize them. We measured prioritization performance using
Spearmans rank correlation between CRANK ranking and the gold standard ranking of communi-
ties, as described in the manuscript. We repeated the experiment many times, each time adding a
S33
different number of noisy metrics to CRANK. Each added metric was a noisy version of the gold
standard ranking of communities containing a different amount of useful signal.
We report results in Supplementary Figure 3. We find that CRANK's performance degrades
gracefully when low-signal metrics or even adversarial metrics (i.e., metrics that correlate nega-
tively with the gold standard community ranking) are added to the set of metrics aggregated by
CRANK (Supplementary Figure 3). For example, adding 6 additional noisy metrics to CRANK,
each correlating 0.10 with the gold standard community ranking, improves CRANK performance
by 11%.
We also find that CRANK's performance improves substantially when only a relatively few
metrics are added to the set of metrics aggregated by CRANK, if the added metrics are positively
correlated with the gold standard ranking. For example, adding 3 additional metrics to CRANK,
each correlating 0.50 with the gold standard community ranking, improves CRANK's performance
by 67% (Spearman's rank correlation ⇢> 0.90, Supplementary Figure 3).
These analyses show that CRANK can handle a large number of metrics and that its aggre-
gation method is robust to adding low-signal metrics.
Integration of domain-specific information into CRANK
Supplementary Note 10
Next, we turn our attention to studying how CRANK can incorporate domain-specific (supervised)
information in community prioritization. For domains at the frontier of science supervised data
is often scarce and thus unsupervised approaches, like CRANK, are extremely important. In do-
mains where domain-specific or other meta and supervised data is available, our method can easily
consider such information, potentially leading to improved community prioritization.
In this note, we demonstrate that CRANK has a unique ability to operate in unsupervised as
well as supervised environments, and thus can identify high-quality communities when domain-
specific information is available and even when it is not.
Supplementary Note 10.1
Integration of domain-specific information into CRANK
When domain-specific or other meta and label information is available it can prove to be useful to
improve prioritization performance. In the context of biological networks, domain-specific infor-
mation is often given in the form of pathways or gene sets that are over-represented among genes
belonging to a cluster/community66–73. CRANK can easily use such domain-specific or other meta
and label information to supervise community prioritization. When external information about
communities is available, CRANK can make advantage of it to boost prioritization performance.
CRANK can leverage available meta information at two different stags of analysis as follows.
S34
Supplementary Figure 3: Connections between the number of additional community prioriti-
zation metrics in CRANK, the signal rate of each added metric, and CRANK s performance.
CRANK is based on aggregation of four metrics, i.e., Likelihood, Density, Boundary, and Alle-
giance, that each characterizes a different aspect of community structure. CRANK can include
additional metrics to the set of aggregated metrics. We create a synthetic network with planted
community structure using a stochastic block model with 100 planted modules/communities. We
apply a community detection method9 to detect communities and then use CRANK to prioritize
them. CRANK produces a ranked list of communities. The gold standard rank of each community
is determined by how accurately it corresponds to its planted counterpart. We measure prioritiza-
tion performance using Spearmans rank correlation between CRANK ranking and the gold standard
ranking of communities. We obtain ⇢ = 0.54 based on CRANK metrics (in green). We repeat the
experiment many times, each time based on a different number of metrics added to CRANK (y-axis
in the heat map), where each added metric is a noisy version of the gold standard community rank-
ing with a specific amount of signal (x-axis in the heat map). The heat map shows that adding only
a relatively few metrics to the set of metrics aggregated by CRANK can lead to an almost perfect
prioritization (⇢> 0.90) if the added metrics are positively correlated with the gold standard rank-
ing. For example, adding 3 noisy metrics to CRANK, each correlating 0.50 with the gold standard
community ranking, improves CRANK s performance by 67% (⇢ = 0.90, highlighted cell in the
heat map). We observe that CRANK's performance degrades gracefully when low-signal metrics
or even adversarial metrics (i.e., metrics that correlate negatively with the gold standard commu-
nity ranking) are added to CRANK. For example, adding 6 additional noisy metrics to CRANK,
each correlating 0.10 with the gold standard community ranking, improves CRANK s performance
by 11% (⇢ = 0.60, highlighted cell in the heat map).
S35
Spearman's ρ
Domain-specific information at network community prioritization stage. Given side infor-
mation about a small number of high-quality communities, CRANK can use these high-quality
communities to guide the prioritization. We only slightly modify the original algorithm where we
use supervised information for CRANK to determine importance weights for each prioritization
metric and each bag (Eq. (26) in CRANK algorithm). Importance weights are thus determined in
a supervised manner based on the given high-quality communities, such that larger weights are
assigned to metrics and bags that contain a larger number of communities with high-quality labels.
Domain-specific information at network community detection stage. A complementary ap-
proach to integrating meta-information at community prioritization stage is to integrate it at com-
munity detection stage. Recent community detection methods17, 19, 74 can incorporate metadata into
a community detection method itself, which helps guide the method to detect more useful com-
munities. These methods combine network and meta-information about nodes, such as the age
of individuals in a social network or mutation effects of genes in a gene network, to improve the
quality of detected communities. CRANK can be used in conjunction with those methods.
Supplementary Note 10.2 Effective use of domain-specific information by CRANK
We have conducted additional analyses on synthetic and real-world networks showing how CRANK
can integrate domain-specific information into its prioritization model to boost performance.
Synthetic networks with planted community structure. In experiments on synthetic networks
with planted community structure, we observe that CRANK can use label information about high-
quality communities when calculating importance weights for prioritization metrics. We observe
that label information improves CRANK's performance by up to 14–117%, depending on the
amount of provided information used for supervision (Supplementary Figure 4).
Network of medical drugs. In experiments on the medical drug network, we evaluate CRANK's
ability to incorporate information about medical drugs into prioritization of drug communities
(Supplementary Figure 5). We find that including drug-specific information significantly improves
CRANK's performance, even when the amount of drug-specific information used for supervision is
small. Supervised CRANK produces up to 55% better community rankings than can be produced
by unsupervised version of CRANK (⇢ = 0.48 vs. ⇢ = 0.31, left panel; ⇢ = 0.47 vs. ⇢ = 0.38,
middle panel; ⇢ = 0.61 vs. ⇢ = 0.53, right panel in Supplementary Figure 5).
These results show that CRANK can identify high-quality communities when meta or other
label information is available and even when it is not. Thus, CRANK can operate in supervised
S36
Supplementary Figure 4: Integrating meta information into CRANK at network community
prioritization stage. CRANK can easily incorporate supervised information or external knowl-
edge as prior or even as supervised labels. On synthetic networks with planted community struc-
ture we test how useful supervised information can be for CRANK. We generate a benchmark net-
work on N = 6000 nodes using a stochastic block model with 200 planted modules/communities.
(The same stochastic block network model is used in experiments reported in Figure 2 in the
manuscript.) Each planted community has 30 nodes. Planted communities use different values
for within-community edge probability, one hundred use p = 0.6 and one hundred use p = 0.2.
Between-community edge probability is p = 0.02. Given a benchmark network, we apply a com-
munity detection method to detect communities9 and then use CRANK to prioritize them. CRANK
produces a ranked list of communities that we evaluate against a gold standard community ranking
using Spearman's rank correlation, as described in the manuscript. Each bar indicates performance
of CRANK in an experiment with a different amount of supervised information. Unsupervised ex-
periment is indicated in green (⇢ = 0.35). In every other experiment (indicated in increasing shades
of blue), CRANK is given supervised information about a set of K high-quality communities and it
can use this meta-information for supervised community prioritization. High-quality communities
are communities with the highest fraction of nodes correctly classified into their corresponding
planted communities. CRANK uses these communities to determine importance weights for each
prioritization metric and each bag (Eq. (26) in CRANK algorithm) in a supervised manner, such
that larger weights are assigned to metrics and bags that contain a larger number of high-quality
communities. Integration of meta-information in CRANK improves its performance by 14-117%,
depending on the amount of additional information specified by the size of set K.
and unsupervised environments and effectively prioritize communities. These analyses increase
our confidence that CRANK will be of broad practical utility in both domains with abundant and
scarce domain-specific knowledge.
S37
Supervised CRank
Spearman's ρ
Supplementary Figure 5: Integration of supervised information about medical drug into
CRANK. We use the network of medical drugs (Figure 3 in the manuscript) to study how use-
ful supervised information about drugs can be for CRANK. Recall that we have three types of
external meta-information for each drug community: (1) chemical structure similarity of the drugs
("Chemistry"), (2) associations between drugs derived from text data ("Text"), and (3) drug-drug
interactions between the drugs ("Epistasis"). Given the medical drug network, we apply a com-
munity detection method to detect communities9 and then use CRANK to prioritize them. CRANK
produces a ranked list of communities that we evaluate against a gold standard community rank-
ing using Spearman's rank correlation, as described in the manuscript. However, in contrast to
experiments reported in the manuscript (Figure 3 in the manuscript), we here use the supervised
version of CRANK to prioritize communities. Each bar indicates performance of CRANK in an
experiment with a different type of supervised information. Unsupervised experiments are indi-
cated in green (⇢ = 0.31 for Chemistry, ⇢ = 0.38 for Text, and ⇢ = 0.53 for Epistasis, as in
Figure 3 in the manuscript). In every other experiment (indicated in grey), CRank is given a set of
K = 10 high-quality communities determined using an external chemical database (i.e., drug-drug
interactions from the Drugbank36 database). CRANK uses high-quality communities to determine
importance weights for each prioritization metric and each bag (Eq. (26) in CRANK algorithm)
in a supervised manner, such that larger weights are assigned to metrics and bags that contain a
larger number of high-quality communities. Inclusion of drug-specific information significantly
improves CRANK's performance, although the amount of supervised information is small. Al-
though in each experiment CRANK has access to only 10 high-quality communities, supervised
CRANK produces up to 55% better community rankings than can be produced by unsupervised
version of CRANK (⇢ = 0.48 vs. ⇢ = 0.31, left panel; ⇢ = 0.47 vs. ⇢ = 0.38, middle panel;
⇢ = 0.61 vs. ⇢ = 0.53, right panel).
Supplementary Note 11 Further case studies
In this note we describe case studies on medical, social, and information networks, beyond those
presented in the main text.
S38
Spearman's ρ
Supplementary Note 11.1 Amazon product co-purchasing network
The CRANK approach also provides new insights into high-quality communities beyond commu-
nity rankings in biomedical networks. Results on a large network of frequently co-purchased prod-
ucts at the online retailer further underpin the need for automatic community prioritization. We
detect communities in the Amazon product network and rank them using CRANK (Supplementary
Figure 6). We find that communities ranked high by CRANK mostly contain products that belong
to the same product category (Supplementary Figure 6a). For example, the rank 2 community (2nd
highest community in the ranking) contains books belonging to a children's literary franchise "The
Boxcar Children" about orphaned children who create a home in an abandoned boxcar. Another
high-ranked (rank 3) community is about progressive country, a subgenre of country music. In
contrast, communities ranked lower by CRANK carry much broader semantic meaning and their
products become increasingly more heterogeneous (Supplementary Figure 6a).
Supplementary Note 11.2 Human symptoms disease network
We consider a symptom-based human disease network44, where a link between two diseases indi-
cates that they have significantly similar clinical symptoms. Promising disease communities in this
network are communities with similar molecular, genetic, and chemical properties because such
communities hold promise for development of new therapeutic strategies75–77. We apply CRANK
to the disease network and examine whether it ranks higher communities that are considered more
promising.
The disease network was constructed based on more than seven million PubMed biblio-
graphic records44. From these records, the symptom-disease relationships were extracted and the
symptom similarities for all disease pairs were quantified resulting in the network with 133,106
connections with positive similarity between 1,596 diseases44. The network is visualized in Sup-
plementary Figure 7a. The disease network covers a spectrum of disease categories, from broad
categories such as cancer to specific conditions such as hyperhomocysteinemia.
After detecting disease communities using a community detection method9, we prioritize the
communities using CRANK. We then evaluate the degree of correspondence between the CRANK
ranking of disease communities and the gold standard ranking. We consider three external medi-
cal databases37 with molecular, genetic, and chemical information about diseases (Supplementary
Note 6.2). This way, we obtain three possible gold standard rankings. The gold standard rankings
are: (1) the ordering of communities by the overlap in disease-associated molecular pathways, (2)
the ordering of communities by the similarity of genes associated with diseases in each commu-
S39
Supplementary Figure 6: Prioritizing network communities in the Amazon product co-
purchasing network and the community prioritization metrics.
(a) The network has more
than 300,000 nodes and nearly one million edges. Communities are detected using a statistical
community detection method9 (more than 10,000 communities are detected) and prioritized using
CRANK. Product categories are provided by Amazon and products (nodes) are colored by their
category. Manual inspection reveals top ranked communities correspond to the coherent groups of
highly related products, such as antique jewelry (rank 1), children's books (rank 2), and country
music (rank 3), whereas lower ranked communities contain diverse sets of products from differ-
ent categories. For example, the rank 200 community contains song albums by bands within the
broader rock musical style, such as music by English new wave rock bands and English pop bands,
but also pop albums, such as "They Called Him Tintin." The rank 500 community is even less
coherent. It contains Broadway musicals, including "House of Flowers" and "Bells Are Ring-
ing," as well as several albums with wedding music, such as "Great Wedding Songs" and "A Song
For My Son On His Wedding Day." The rank 1000 community consists predominantly of classic
silent films from a wide range of genres, including drama, action, romance, and comedies. (b)
The importance of prioritization metrics in CRANK varies across different networks and across
communities within each network. CRANK aggregates the values of different metrics such that
the weight of a metric varies with community. In the Amazon network, allegiance and boundary
metrics are most important for the high-ranked communities, indicating that nodes in the high-
ranked communities preferentially attach to other nodes belonging to the same community, and
edges connecting each community with the rest of the network are weak. In contrast, density and
likelihood metrics contribute less to the prioritization, which means that likelihood and density of
a community are less indicative of its quality in the Amazon network.
S40
a
Rank 1 community
Rank 2 community
Rank 3 community
b
Amazon network
Antiques & collectibles,
jewelry
Children's books, mystery &
detective, The Boxcar Children
Outlaw & progressive
country
Rank 200 community
Rank 500 community
Rank 1000 community
DBLP network
Disease network
Alternative rock,
new-wave & post-punk
Dance & DJ, dance pop
Pop rock, adult contemporary
Traditional vocal pop
Wedding music
Broadway vocalists, musicals
Silent films, drama,
love & romance
Classic comedies,
silent films, 1920-1929
Medical drug network
Human PPI network
nity, and (3) the ordering of communities by the structure similarity of chemicals associated with
diseases within each community.
We evaluate CRANK performance by measuring how well its ranking corresponds to avail-
able disease-chemical, disease-gene, and disease-pathway gold standard rankings. We quantify
the results using Spearman's rank correlation ⇢ between the CRANK ranking and the gold stan-
dard ranking. The results in Supplementary Figure 7b show that CRANK successfully ordered the
communities based on how well they match data in the external medical databases. We observed
that CRANK ranking agreed well with the gold standard ranking based on molecular pathways
(⇢ = 0.45, p-value = 1.7 ⇥ 10 7), genetic associations (⇢ = 0.47, p-value = 2.7 ⇥ 10 8), and
chemical associations (⇢ = 0.51, p-value = 2.0 ⇥ 10 9).
We contrast the ranking provided by CRANK with the ordering of disease communities by
Modularity51. Modularity-based ranking (Supplementary Figure 7c) achieved Spearman's rank
correlation of ⇢ = 0.01 on molecular pathway data, ⇢ = 0.16 on genetic association data, and
⇢ = 0.12 when evaluated against external database with chemical associations. When comparing
CRANK with Modularity we see that CRANK ranking is 3- to near 50-fold better than the ranking
by Modularity as quantified by Spearman's rank correlation. The result that CRANK's high-ranked
communities coincide with groups of diseases with similar genetics is interesting for understanding
etiology of diseases, which can help with drug repurposing77.
An alternative to prioritizing communities based on network structure alone might be to
prioritize communities using data in an external medical database. The main obstacle to using ex-
ternal data for community prioritization is that comprehensive and unbiased external data are rarely
available in real world. Our analysis of the human disease network involved known diseases for
which molecular, genetic or chemical information is available in the medical databases. However,
the network of all medical diagnoses contains over one hundred million diagnoses78 assigned to
patients in hospitals, the vast majority of which have yet unknown molecular, genetic or chemical
origins. CRANK offers itself as an interesting approach for prioritizing diseases communities in
such cases, because CRANK uses only information provided by the network structure.
Supplementary Note 11.3
Further details on prioritizing drug communities
Beyond results described in the main text, we here report prioritization performance of conduc-
tance and test how conductance compares to CRANK on the network of medical drugs. Recall
that the network of medical drugs connects two drugs if they share at least one target protein.
Supplementary Figure 8 shows that CRANK ranking of drug communities outperforms ranking by
S41
a
b
c
Supplementary Figure 7: Prioritizing network communities found in the human symptoms
disease network. (a) Human symptoms disease network44 links diseases that have significantly
similar clinical manifestation. Highlighted are top five disease communities as determined by
CRANK. Nodes of the highlighted communities are sized by their likelihood score (Eq. (5)). (b-
c) We evaluate community prioritization against three external medical databases that were not
used during community detection or prioritization: disease-pathway associations37 ("Pathways"),
disease-gene associations37 ("Gene"), and disease-chemical associations37 ("Chemistry"). Bars in
barplots represent disease communities; bar height denotes similarity of diseases in a community
with regard to an external medical database. In perfect prioritization, the heights of the bars would
be decreasing from left to right. (b) CRANK ranking exhibits 3- to near 50-fold better correspon-
dence (quantified by Spearman's rank correlation coefficient ⇢ = 0.45, 0.47, 0.51) with the three
external medical databases than (c) ranking of communities by Modularity (⇢ = 0.01, 0.16, 0.12).
S42
Disease communities ranked by CRank
Myositis
Muscle weakness
Glaucoma
Retinal vein occlusion
Neovascularization
Glomerulonephritis
Multiple myeloma
Atrial heart
septal defect
Atrial
fibrillation
Obstructive
lung diseases
Brugada syndrome
Megaloblastic
anemia
Optic nerve
disease
Brain ischemia
Limb-girdle
muscular dystrophies
Optic atrophy
Pathways
Genes
Chemistry
ρ=0.45 p-value=1.7 x 10-7
ρ=0.47 p-value=2.7 x 10-8
ρ=0.51 p-value=2.0 x 10-9
ρ=0.16 p-value=8.9 x 10-2
ρ=0.12 p-value=1.8 x 10-1
Pathways
Genes
Chemistry
Disease communities ranked by Modularity
ρ=0.01 p-value=7.7 x 10-1
Supplementary Figure 8: Performance of conductance in the network of medical drugs. The
network of medical drugs connects two drugs if they share at least one target protein. Commu-
nities were detected by a community detection method9, and then prioritized by CRANK or an
alternative method, such as conductance. We evaluate community prioritization against three ex-
ternal chemical databases (Supplementary Note 6) that were not used during community detection
or prioritization. For each community we measure: (1) drug-drug interactions between the drugs
("Epistasis"), (2) chemical structure similarity of the drugs ("Chemistry"), and (3) associations
between drugs derived from text data ("Text"). We expect that a true high-priority community will
have more drug-drug interactions, higher similarity of chemical structure, and stronger textual as-
sociations between the drugs it contains. Bars represent communities; bar height denotes similarity
of drugs in a community with regard to the gold standard based on external chemical databases.
In a perfect prioritization, bars would be ordered such that the heights would decrease from left to
right. CRANK ranking of drug communities outperforms ranking by conductance across all three
chemical databases (as measured by Spearman's rank correlation ⇢ with the gold standard rank-
ing). CRANK ranking achieves ⇢ = 0.38, 0.31, 0.53 (see main text), while conductance obtains
⇢ = 0.34, 0.23, 0.14.
conductance on all three types of ground-truth information about chemicals.
Supplementary Note 11.4
Further details on prioritizing gene communities
We apply CRANK to five molecular biology networks describing physical, genetic, and regulatory
interactions between genes and proteins (Supplementary Note 6.1). Community detection in such
networks is useful because the detected communities tend to correlate with cellular functions,
protein complexes and disease pathways41, 79, 80, and thus they provide a large pool of candidates
out of which relevant communities need to be identified for further biological experimentation.
CRANK takes each network and communities detected in that network9, and generates a
rank-ordered list of communities. Since CRANK ranks the communities purely based on robust-
S43
Drug communities ranked by Conductance
ρ=0.34 p-value=1.9 x 10-3
ρ=0.23 p-value=4.3 x 10-2
ρ=0.14 p-value=2.2 x 10-1
Epistasis
Chemistry
Text
ness and strength of network connectivity, we use the external metadata information about molec-
ular functions, cellular components, and biological processes to assess the quality of community
ranking. To this end, we apply statistical enrichment analysis, an established tool in computational
biology, to quantify the functional enrichment of each community in molecular functions, com-
ponents, and processes as captured in the Gene Ontology database47 (Supplementary Note 7.4).
Given a community, the enrichment analysis determines which, if any, of the Gene Ontology terms
annotating the genes of the community are statistically over-represented.
Supplementary Table 8: Prioritization performance in molecular networks. The fraction of
communities that rank among the top 5% and are statistically enriched in molecular functions,
biological processes, and cellular components in the Gene Ontology47 (Supplementary Note 7.4).
Higher values are better because they indicate that a higher fraction of top-ranked communities
achieve significant correspondence with external knowledge in the Gene Ontology. Communities
were detected using a statistical community detection method9 and prioritized using one of four
different approaches.
Method
Human Net Human IntAct Yeast GI Human BioGRID Human STRING
Random
Modularity
Conductance
CRANK
0.104
0.632
0.658
0.811
0.216
0.587
0.644
0.707
0.227
0.598
0.688
0.747
0.128
0.597
0.523
0.689
0.125
0.624
0.518
0.691
We measure if the highest ranked communities in each network are more enriched in the GO
terms than what would be expected by chance. Supplementary Table 8 shows how many commu-
nities that rank among the top 5% of all communities in each network are functionally enriched.
CRANK ranking contains on average 5 times more communities significantly enriched for cellu-
lar functions, components, and processes than random prioritization, and 13% more significantly
enriched communities than modularity or conductance-based ranking.
For example, a community detection method9 detected 1,500 communities in the human
protein-protein interaction (PPI) network. CRANK prioritized the communities by producing a
rank-ordered list of all detected communities in the network. Supplementary Table 9 shows ten
highest ranked communities by CRANK. The highest ranked community is composed of 20 genes,
including PORCN, AQP5, FZD6, WNT1, WNT2, WNT3, and other members of the Wnt signaling
protein family81. Genes in that community are enriched in the Wnt signaling pathway processes
(p-value = 6.4⇥ 10 23), neuron differentiation (p-value = 1.6⇥ 10 15), cellular response to retinoic
S44
acid (p-value = 2.9⇥10 14), and in developmental processes (p-value = 9.2⇥10 10), among others.
These results highlight the potential of CRANK to aid in the identification of relevant com-
munities from a large pool of communities detected in molecular networks.
Supplementary Table 9: Highest ranked gene communities in the human PPI network. A
human PPI network was compiled using interaction data from the STRING database43. A statis-
tical community detection method9 was used to detect communities in the network, followed by
CRANK to prioritize the communities. Listed are ten highest ranked communities. Functional
enrichment of each community was determined by performing gene set enrichment analysis (Sup-
plementary Note 7.4) based on the Gene Ontology term-associated gene sets47.
CRANK
Community
Rank 1
WNT2B, PORCN,
AQP5, FZD6, WNT3,
WNT10A, WNT1,
WNT6, WNT7A, WNT4,
FZD8, WNT2, WNT5B,
WNT16, WNT5A,
ENSP00000345785,
WNT3A, WNT10B,
WNT11, WNT7B
Rank 2
NMUR2, NMUR1,
NMU,
ENSP00000409127,
HCRTR1, NPFFR2,
NTSR1,
ENSP00000358511,
CD200, HCRT,
HCRTR2
Statistically over-represented Gene Ontology terms
Wnt signaling pathway (p=6.37E-23), Neuron differentiation (p=1.60E-15),
Cellular response to retinoic acid (p=2.91E-14), Response to retinoic acid
(p=7.73E-13), Canonical Wnt signaling pathway (p=1.84E-12), Cellular response
to acid chemical (p=5.43E-11), Single-organism developmental process
(p=4.05E-10), Developmental process (p=9.21E-10), Response to acid chemical
(p=1.41E-09), Cell surface receptor signaling pathway (p=4.36E-09), Cell
differentiation (p=4.54E-09), Anatomical structure morphogenesis (p=9.65E-09),
Cellular developmental process (p=3.04E-08), Anatomical structure development
(p=4.61E-08), Cellular response to lipid (p=7.58E-08), Cellular response to organic
substance (p=1.13E-06), Cell proliferation (p=1.80E-06), Regulation of canonical
Wnt signaling pathway (p=2.26E-06), Cellular response to transforming growth
factor beta stimulus (p=7.70E-06), Cellular response to stimulus (p=8.87E-06),
Response to transforming growth factor beta (p=1.25E-05), Cellular response to
chemical stimulus (p=1.34E-05), Mammary gland epithelium development
(p=1.46E-05), Regulation of Wnt signaling pathway (p=1.65E-05), Response to
lipid (p=1.79E-05), Signal transduction (p=3.82E-05), Response to organic
substance (p=1.37E-04), Cellular response to oxygen-containing compound
(p=1.73E-04), Chondrocyte differentiation (p=2.03E-04), Epithelium development
(p=7.54E-04), Lens fiber cell development (p=8.16E-04), Positive regulation of
dermatome development (p=8.16E-04), Regulation of dermatome development
(p=8.16E-04), Response to chemical (p=1.58E-03), Stem cell proliferation
(p=2.86E-03), Lens development in camera-type eye (p=3.26E-03), Palate
development (p=3.89E-03), Response to stimulus (p=4.94E-03), Positive regulation
of canonical Wnt signaling pathway (p=5.17E-03), Response to oxygen-containing
compound (p=5.73E-03), Animal organ development (p=7.57E-03), Hematopoietic
stem cell proliferation (p=8.12E-03), Cellular response to growth factor stimulus
(p=2.27E-02), Tissue development (p=2.75E-02), Positive regulation of Wnt
signaling pathway (p=3.51E-02), Positive regulation of signal transduction
(p=3.66E-02), Neural precursor cell proliferation (p=4.51E-02), Negative
regulation of canonical Wnt signaling pathway (p=4.84E-02), Receptor agonist
activity (p=1.02E-04), Receptor activator activity (p=9.51E-04), Receptor regulator
activity (p=2.05E-03)
Neuropeptide receptor activity (p=8.48E-03), Neuromedin U receptor activity
(p=4.51E-02)
S45
Rank 3
GHRHR, GHRH,
GHRL, CCL19, LEP,
CCR9, CCL21, ACE2,
GHSR, MLNR, CCL25,
CXCL13,
ENSP00000266003
Rank 4
HLA-DPB1, TRH,
ROBO2, CPE, CA12,
TRHR, POLD4, RDH11,
SLIT1, SLIT3, SLIT2
Rank 5
ENSP00000380280,
ENSP00000264498,
STAT3, FGF17,
ENSP00000260795, KL,
FGF19, FGF18, FGF9,
FGF8, FGF7, FGF6,
FGF5, FGF4, FGF3,
FGFR4, FGF1
Rank 6
KCNH1,
ENSP00000222812,
KCNG1, KCNG2,
KCNG3, KCNG4,
KCNV1, KCNS3,
KCNB1, KCNV2,
ENSP00000254976
Feeding behavior (p=4.73E-05), Adult feeding behavior (p=7.44E-04), Response to
hormone (p=2.81E-03), G-protein coupled receptor signaling pathway
(p=3.61E-03), Positive regulation of multicellular organism growth (p=3.71E-03),
Regulation of response to food (p=3.71E-03), Positive regulation of developmental
growth (p=5.48E-03), Regulation of appetite (p=6.48E-03), Positive regulation of
response to external stimulus (p=1.15E-02), Positive regulation of cell adhesion
(p=4.53E-02), Behavior (p=4.84E-02), Regulation of developmental growth
(p=4.84E-02), Ccr chemokine receptor binding (p=1.32E-05), G-protein coupled
receptor binding (p=1.56E-04), Ccr10 chemokine receptor binding (p=1.86E-04),
Chemokine activity (p=5.08E-04), Chemokine receptor binding (p=1.13E-03),
Cytokine activity (p=8.66E-03), Cytokine receptor binding (p=1.48E-02), Receptor
binding (p=2.36E-02)
Apoptotic process involved in luteolysis (p=1.85E-04), Axon guidance
(p=3.70E-04), Neuron projection guidance (p=6.71E-04), Apoptotic process
involved in development (p=1.85E-03), Neuron projection extension involved in
neuron projection guidance (p=6.45E-03), Axon extension involved in axon
guidance (p=6.45E-03), Axon extension (p=1.03E-02), Negative chemotaxis
(p=1.03E-02), Neuron projection extension (p=1.54E-02), Developmental cell
growth (p=3.02E-02), Ovulation cycle process (p=4.02E-02)
Fibroblast growth factor receptor signaling pathway (p=1.21E-19), Transmembrane
receptor protein tyrosine kinase signaling pathway (p=1.84E-13), Enzyme linked
receptor protein signaling pathway (p=1.49E-11), Positive regulation of cell
proliferation (p=2.63E-07), Cell surface receptor signaling pathway (p=5.05E-07),
Regulation of cell proliferation (p=2.87E-05), Signal transduction (p=6.69E-04),
Regulation of endothelial cell chemotaxis to fibroblast growth factor (p=1.23E-03),
Regulation of cell chemotaxis to fibroblast growth factor (p=1.23E-03), Positive
regulation of biological process (p=1.10E-02), Regulation of steroid biosynthetic
process (p=3.65E-02), Regulation of endothelial cell chemotaxis (p=3.65E-02),
Fibroblast growth factor receptor binding (p=1.03E-08), Growth factor receptor
binding (p=1.05E-05), Type 1 fibroblast growth factor receptor binding
(p=3.08E-04), Type 2 fibroblast growth factor receptor binding (p=3.08E-04)
Cellular potassium ion transport (p=1.05E-05), Potassium ion transmembrane
transport (p=1.05E-05), Potassium ion transport (p=1.52E-05), Monovalent
inorganic cation transport (p=3.99E-04), Inorganic cation transmembrane transport
(p=1.66E-03), Cation transmembrane transport (p=1.66E-03), Inorganic ion
transmembrane transport (p=3.15E-03), Ion transmembrane transport
(p=4.23E-03), Transmembrane transport (p=1.12E-02), Metal ion transport
(p=1.17E-02), Cation transport (p=2.61E-02), Delayed rectifier potassium channel
activity (p=2.72E-08), Voltage-gated potassium channel activity (p=1.66E-06),
Potassium channel activity (p=1.05E-05), Voltage-gated cation channel activity
(p=2.14E-05), Potassium ion transmembrane transporter activity (p=2.52E-05),
Voltage-gated channel activity (p=6.09E-05), Voltage-gated ion channel activity
(p=6.09E-05), Monovalent inorganic cation transmembrane transporter activity
(p=5.21E-04), Cation channel activity (p=1.08E-03), Gated channel activity
(p=1.55E-03), Metal ion transmembrane transporter activity (p=3.55E-03), Ion
channel activity (p=5.27E-03), Inorganic cation transmembrane transporter activity
(p=5.57E-03), Substrate-specific channel activity (p=7.23E-03), Channel activity
(p=8.82E-03), Passive transmembrane transporter activity (p=8.82E-03), Cation
transmembrane transporter activity (p=1.23E-02)
S46
Monovalent inorganic cation transport (p=6.90E-07), Inorganic cation
transmembrane transport (p=5.24E-06), Cation transmembrane transport
(p=5.24E-06), Inorganic ion transmembrane transport (p=1.30E-05), Ion
transmembrane transport (p=1.97E-05), Transmembrane transport (p=7.80E-05),
Metal ion transport (p=8.32E-05), Cation transport (p=2.58E-04), Regulation of
sodium ion transport (p=3.18E-03), Sodium ion transmembrane transport
(p=3.18E-03), Ion transport (p=4.97E-03), Sodium ion transport (p=5.62E-03),
Establishment of localization (p=3.12E-02), Cation channel complex (p=2.59E-06),
Sodium channel complex (p=8.17E-06), Ion channel complex (p=2.03E-05), Node
of ranvier (p=3.80E-05), Transmembrane transporter complex (p=6.77E-05),
Transporter complex (p=7.54E-05), Cell-cell contact zone (p=1.27E-03), Axon part
(p=2.58E-03), Plasma membrane part (p=3.02E-03), T-tubule (p=2.01E-02),
Membrane protein complex (p=2.62E-02), Voltage-gated channel activity
(p=6.24E-06), Voltage-gated ion channel activity (p=6.24E-06), Monovalent
inorganic cation transmembrane transporter activity (p=8.38E-05), Cation channel
activity (p=2.01E-04), Gated channel activity (p=3.11E-04), Metal ion
transmembrane transporter activity (p=8.43E-04), Ion channel activity
(p=1.35E-03), Inorganic cation transmembrane transporter activity (p=1.44E-03),
Substrate-specific channel activity (p=1.97E-03), Channel activity (p=2.50E-03),
Passive transmembrane transporter activity (p=2.50E-03), Cation transmembrane
transporter activity (p=3.71E-03), Voltage-gated sodium channel activity
(p=2.01E-02), Voltage-gated ion channel activity involved in regulation of
postsynaptic membrane potential (p=2.01E-02), Ion transmembrane transporter
activity (p=2.74E-02), Delayed rectifier potassium channel activity (p=2.87E-02),
Sodium channel activity (p=3.94E-02), Substrate-specific transmembrane
transporter activity (p=4.89E-02)
Negative regulation of adaptive immune response based on somatic recombination
of immune receptors built from immunoglobulin superfamily domains
(p=2.26E-04), Negative regulation of adaptive immune response (p=2.26E-04),
Cytokine-mediated signaling pathway (p=2.36E-04), Type I interferon signaling
pathway (p=5.76E-04), Negative regulation of leukocyte mediated immunity
(p=1.27E-03), Negative regulation of T cell mediated immunity (p=5.73E-03),
Regulation of T cell differentiation (p=1.84E-02), Regulation of lymphocyte
differentiation (p=3.02E-02), Negative regulation of immune response
(p=4.69E-02), Negative regulation of immune effector process (p=4.69E-02),
Negative regulation of lymphocyte differentiation (p=4.77E-02), Negative
regulation of T cell differentiation (p=4.77E-02)
Complement activation (p=2.01E-03), Protein activation cascade (p=1.20E-02),
Complement binding (p=2.01E-03)
Glyceraldehyde-3-phosphate metabolic process (p=1.39E-03)
Rank 7
ENSP00000347979,
SPTBN4, KCNH1,
KCNC1, KCNG3,
ENSP00000345751,
ANK3, TIAM1, SCN2A,
CNTN1, SCN1B, FADD,
ENSP00000376966,
SCN5A, KCNV2
Rank 8
Rank 9
Rank 10
AP2M1, FBXW11,
STAT2, CRKL,
ENSP00000329418,
IFNA2, IFNA1, IFNB1,
IFNAR2,
ENSP00000337825,
IFNAR1, PTPRC,
ZAP70, JAK1, TYK2,
IFNA8, IRF9, JAK3
ENSP00000372815,
CR1, C3AR1,
ENSP00000396688,
CST3, MASP2, C5AR2,
C4B, KDM6B, C3,
HCK, APOA2
HSPB1P1, G6PD,
TALDO1, MRE11,
SLC25A1, HUWE1,
MPI,
ENSP00000344818,
TKT, RPE, DTYMK,
KYAT1, KYAT3, NPPA
S47
Supplementary references
1. Wu, F. & Huberman, B. A. Finding communities in linear time: a physics approach. The
European Physical Journal B-Condensed Matter and Complex Systems (2004).
2. Karrer, B., Levina, E. & Newman, M. E. Robustness of community structure in networks.
Physical Review E 77, 046119 (2008).
3. Bianconi, G., Pin, P. & Marsili, M. Assessing the relevance of node features for network
structure. Proceedings of the National Academy of Sciences 106, 11433–11438 (2009).
4. Seifi, M. et al. Stable community cores in complex networks. In Complex Networks, 87–98
(Springer, 2013).
5. Chakraborty, T., Srinivasan, S., Ganguly, N., Mukherjee, A. & Bhowmick, S. On the perma-
nence of vertices in network communities. In SIGKDD (2014).
6. Zhang, P. & Moore, C. Scalable detection of statistically significant communities and hierar-
chies, using message passing for modularity. Proceedings of the National Academy of Sciences
111, 18144–18149 (2014).
7. Karrer, B. & Newman, M. E. Stochastic blockmodels and community structure in networks.
Physical Review E 83, 016107 (2011).
8. Yang, J. & Leskovec, J. Overlapping community detection at scale: a nonnegative matrix
factorization approach. In WSDM (2013).
9. Yang, J., McAuley, J. & Leskovec, J. Detecting cohesive and 2-mode communities indirected
and undirected networks. In WSDM (2014).
10. Airoldi, E. M., Blei, D. M., Fienberg, S. E. & Xing, E. P. Mixed membership stochastic
blockmodels. Journal of Machine Learning Research (2008).
11. Ball, B., Karrer, B. & Newman, M. Efficient and principled method for detecting communities
in networks. Physical Review E 84, 036103 (2011).
12. Ho, Q., Parikh, A. P. & Xing, E. P. A multiscale community blockmodel for network explo-
ration. Journal of the American Statistical Association 107, 916–934 (2012).
13. Mcauley, J. J. & Leskovec, J. Learning to discover social circles in ego networks. In NIPS
(2012).
14. DuBois, C. & Smyth, P. Modeling relational events via latent classes.
In KDD, 803–812
(2010).
15. Morup, M., Schmidt, M. N. & Hansen, L. K. Infinite multiple membership relational modeling
for complex networks. In IEEE MLSP (2011).
S48
16. Gopalan, P. K. & Blei, D. M. Efficient discovery of overlapping communities in massive
networks. Proceedings of the National Academy of Sciences 110, 14534–14539 (2013).
17. Yang, J., McAuley, J. & Leskovec, J. Community detection in networks with node attributes.
In ICDM (2013).
18. Bothorel, C., Cruz, J. D., Magnani, M. & Micenkova, B. Clustering attributed graphs: models,
measures and methods. Network Science 3, 408–444 (2015).
19. Newman, M. & Clauset, A. Structure and inference in annotated networks. Nature Communi-
cations 7, 11863 (2016).
20. Fu, W., Song, L. & Xing, E. P. Dynamic mixed membership blockmodel for evolving net-
works. In ICML, 329–336 (ACM, 2009).
21. Anandkumar, A., Ge, R., Hsu, D. & Kakade, S. M. A tensor approach to learning mixed mem-
bership community models. Journal of Machine Learning Research 15, 2239–2312 (2014).
22. Mikolov, T., Sutskever, I., Chen, K., Corrado, G. S. & Dean, J. Distributed representations of
words and phrases and their compositionality. In NIPS, 3111–3119 (2013).
23. Levy, O. & Goldberg, Y. Neural word embedding as implicit matrix factorization. In NIPS,
2177–2185 (2014).
24. Huang, W., Wu, Z., Chen, L., Mitra, P. & Giles, C. L. A neural probabilistic model for context
based citation recommendation. In AAAI, 2404–2410 (2015).
25. Fortunato, S. Community detection in graphs. Physics Reports 486, 75–174 (2010).
26. Kass, R. E. & Raftery, A. E. Bayes factors. Journal of the American Statistical Association
90, 773–795 (1995).
27. Casella, G. & Moreno, E. Assessing robustness of intrinsic tests of independence in two-way
contingency tables. Journal of the American Statistical Association 104, 1261–1271 (2012).
28. Liang, F., Paulo, R., Molina, G., Clyde, M. A. & Berger, J. O. Mixtures of g priors for Bayesian
variable selection. Journal of the American Statistical Association (2012).
29. Berger, J. O. & Pericchi, L. R. The intrinsic bayes factor for model selection and prediction.
Journal of the American Statistical Association 91, 109–122 (1996).
30. Gelman, A., Carlin, J. B., Stern, H. S. & Rubin, D. B. Bayesian data analysis, vol. 2 (Chapman
& Hall/CRC Boca Raton, FL, USA, 2014).
31. Bernardo, J. M. & Smith, A. F. Bayesian theory (John Wiley, 2001).
32. Heck, D. W., Wagenmakers, E.-J. & Morey, R. D. Testing order constraints: Qualitative dif-
ferences between bayes factors and normalized maximum likelihood. Statistics & Probability
Letters 105, 157–162 (2015).
S49
33. Hardle, W. & Steiger, W. Optimal median smoothing. Applied Statistics 258–264 (1995).
34. Gopalan, P. et al. Scalable inference of overlapping communities. In NIPS (2012).
35. Kuhn, M. et al. STITCH 4: integration of protein–chemical interactions with user data. Nu-
cleic Acids Research gkt1207 (2013).
36. Law, V. et al. DrugBank 4.0: shedding new light on drug metabolism. Nucleic Acids Research
42, D1091–D1097 (2014).
37. Davis, A. P. et al. The comparative toxicogenomics database's 10th year anniversary: update
2015. Nucleic Acids Research gku935 (2014).
38. Leskovec, J. & Krevl, A. SNAP Datasets: Stanford large network dataset collection. http:
//snap.stanford.edu/data (2014).
39. Lee, I. et al. Prioritizing candidate disease genes by network-based boosting of genome-wide
association data. Genome Research 21, 1109–1121 (2011).
40. Orchard, S. et al. The MIntAct project-IntAct as a common curation platform for 11 molecular
interaction databases. Nucleic Acids Research gkt1115 (2013).
41. Costanzo, M. et al. The genetic landscape of a cell. Science 327, 425–431 (2010).
42. Chatr-Aryamontri, A. et al. The BioGRID interaction database: 2015 update. Nucleic Acids
Research 43, D470–D478 (2015).
43. Franceschini, A. et al. STRING v9.1: protein-protein interaction networks, with increased
coverage and integration. Nucleic Acids Research 41, D808–D815 (2013).
44. Zhou, X., Menche, J., Barab´asi, A.-L. & Sharma, A. Human symptoms–disease network.
Nature Communications 5 (2014).
45. Fabregat, A. et al. The Reactome pathway knowledgebase. Nucleic Acids Research 44, D481–
D487 (2016).
46. Yang, J. & Leskovec, J. Defining and evaluating network communities based on ground-truth.
Knowledge and Information Systems 42, 181–213 (2015).
47. Ashburner, M. et al. Gene Ontology: tool for the unification of biology. Nature Genetics 25,
25–29 (2000).
48. Leskovec, J. & Sosic, R. SNAP: A general purpose network analysis and graph mining library
in C++. http://snap.stanford.edu/snap (2014).
49. Chang, J.
lda: Collapsed Gibbs sampling methods for topic models. http://cran.
r-project.org/web/packages/lda (2011).
S50
50. Schaeffer, S. E. Graph clustering. Computer Science Review 1, 27–64 (2007).
51. Newman, M. E. Modularity and community structure in networks. Proceedings of the National
Academy of Sciences 103, 8577–8582 (2006).
52. Coppersmith, D., Fleischer, L. & Rudra, A. Ordering by weighted number of wins gives a
good ranking for weighted tournaments. In SODA, 776–782 (2006).
53. Dwork, C., Kumar, R., Naor, M. & Sivakumar, D. Rank aggregation methods for the web. In
WWW (2001).
54. Ailon, N., Charikar, M. & Newman, A. Aggregating inconsistent information: ranking and
clustering. Journal of the ACM 55, 23 (2008).
55. Khatri, P., Sirota, M. & Butte, A. J. Ten years of pathway analysis: current approaches and
outstanding challenges. PLoS Computation Biology 8, e1002375 (2012).
56. Rhee, S. Y., Wood, V., Dolinski, K. & Draghici, S. Use and misuse of the gene ontology
annotations. Nature Reviews Genetics 9, 509–515 (2008).
57. Menche, J. et al.
Integrating personalized gene expression profiles into predictive disease-
associated gene pools. NPJ Systems Biology and Applications 3, 1 (2017).
58. Mi, H., Poudel, S., Muruganujan, A., Casagrande, J. T. & Thomas, P. D. PANTHER version
10: expanded protein families and functions, and analysis tools. Nucleic Acids Research 44,
D336–D342 (2016).
59. Gfeller, D., Chappelier, J.-C. & De Los Rios, P. Finding instabilities in the community struc-
ture of complex networks. Physical Review E 72, 056135 (2005).
60. Reichardt, J. & Bornholdt, S. Statistical mechanics of community detection. Physical Review
E (2006).
61. Reichardt, J. & Bornholdt, S. Partitioning and modularity of graphs with arbitrary degree
distribution. Physical Review E (2007).
62. Hu, Y. et al. Measuring the significance of community structure in complex networks. Physical
Review E 82, 066106 (2010).
63. Fagin, R., Kumar, R. & Sivakumar, D. Efficient similarity search and classification via rank
aggregation. In SIGMOD, 301–312 (ACM, 2003).
64. Bartholdi III, J., Tovey, C. A. & Trick, M. A. Voting schemes for which it can be difficult to
tell who won the election. Social Choice and Welfare 6, 157–165 (1989).
65. Schalekamp, F. & van Zuylen, A. Rank aggregation: Together we're strong. In ALENEX,
38–51 (SIAM, 2009).
S51
66. Subramanian, A. et al. Gene set enrichment analysis: a knowledge-based approach for inter-
preting genome-wide expression profiles. Proceedings of the National Academy of Sciences
102, 15545–15550 (2005).
67. Wang, J. et al. Noa: a novel network ontology analysis method. Nucleic Acids Research 39,
e87–e87 (2011).
68. Draghici, S. et al. A systems biology approach for pathway level analysis. Genome Research
17, 1537–1545 (2007).
69. Glaab, E., Baudot, A., Krasnogor, N., Schneider, R. & Valencia, A. Enrichnet: network-based
gene set enrichment analysis. Bioinformatics 28, i451–i457 (2012).
70. Alexeyenko, A. et al. Network enrichment analysis: extension of gene-set enrichment analysis
to gene networks. BMC Bioinformatics 13, 226 (2012).
71. Zuberi, K. et al. GeneMANIA prediction server 2013 update. Nucleic Acids Research 41,
W115–W122 (2013).
72. Wang, K., Li, M. & Hakonarson, H. Analysing biological pathways in genome-wide associa-
tion studies. Nature Reviews Genetics 11, 843 (2010).
73. Hofree, M. et al. Network-based stratification of tumor mutations. Nature Methods 10, 1108–
1115 (2013).
74. Peel, L., Larremore, D. B. & Clauset, A. The ground truth about metadata and community
detection in networks. Science Advances 3, e1602548 (2017).
75. Moreau, Y. & Tranchevent, L.-C. Computational tools for prioritizing candidate genes: boost-
ing disease gene discovery. Nature Reviews Genetics 13, 523–536 (2012).
76. Greene, C. S. et al. Understanding multicellular function and disease with human tissue-
specific networks. Nature Genetics 47, 569–576 (2015).
77. Hu, J. X., Thomas, C. E. & Brunak, S. Network biology concepts in complex disease comor-
bidities. Nature Reviews Genetics (2016).
78. Jensen, A. B. et al. Temporal disease trajectories condensed from population-wide registry
data covering 6.2 million patients. Nature Communications 5 (2014).
79. Barab´asi, A.-L., Gulbahce, N. & Loscalzo, J. Network medicine: a network-based approach
to human disease. Nature Reviews Genetics 12, 56–68 (2011).
80. Tas¸an, M. et al. Selecting causal genes from genome-wide association studies via functionally
coherent subnetworks. Nature Methods 12, 154–159 (2015).
81. Kessenbrock, K. et al. Diverse regulation of mammary epithelial growth and branching mor-
phogenesis through noncanonical Wnt signaling. Proceedings of the National Academy of
Sciences 114, 3121–3126 (2017).
S52
|
1303.6138 | 1 | 1303 | 2013-03-25T14:28:46 | About the survey of propagandistic messages in contemporary social media | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | This paper presents the research results that have identified a set of characteristic parameters of propagandistic messages. Later these parameters can be used in the algorithm creating special user-oriented propagandistic messages to improve distribution and assimilation of information by users. | cs.SI | cs | ABOUT THE SURVEY OF PROPAGANDISTIC MESSAGES IN
CONTEMPORARY SOCIAL MEDIA
Yuri Monakhov1, Natalia Kost ina1, Maria Medvednikova1, Makarov Oleg1, Irina Semenova1
1Department of Informatics and Information security, Vladimir State University, Vladimir 600000, Russia
This paper presents the research results that have ident ified a set of characterist ic parameters of
propagandist ic messages. Later these parameters can be used in the algorithm creat ing specia l
user-oriented propagandist ic messages to improve distribut ion and assimilat ion o f informat ion
by users.
INTRODUCTION
Current ly social networks are very
popular, rapidly developing and becoming
an integral part of the Internet users’ lives.
The purpose of this research is to define
the parameters of
such promotiona l
messages that influence the perception o f
informat ion.
is
research
The object of
networking services on the Internet.
the
is
The subject under research
process of promoting social networking and
promotional communicat ions options.
socia l
FORMAL PARAMETERS OF
PROPAGANDISTIC MESSAGES
During
the research a number o f
propagandist ic messages have been studied
to identify the properties and parameters of
those messages. Psycho logical experiments
have been carried out, revealing the degree
of significance of various parameters.
Messages for analysis were taken from
the social networking service VKontakte, as
the most advanced and popular in Russia.
As a result of the study the fo llowing
options were designed.
1) The vo lume of messages. Measured by
the number of symbo ls.
2) Message
the
format. Calculated as
confidence to a specific format – text,
video, image, sound.
3) The author. Determined by the degree o f
confidence in the author.
4) Relevance.
Interval
between
the
publicat ions of o fficial propaganda and
messages related to a topic.
5) Targeting. Expresses the overlap o f
propagandist ic message with
the
informat ion of a user profile.
6) Transparency. Calculated as a percentage
of common words in the message.
7) Identity. Percentage of words matches
propagandist ic messages with words
from the user’s messages.
8) Emotional co lor. Percentage of emotive
words in the message (excluding stop-
words).
9) “Nausea”. The indicator of keywords
repetit ion in the message. Somet imes it
is called synonymous by density.
10) “Water”. Percentage of insignificant
words and stop-words in the message.
The psycho logical test to determine the
impact of message formats on the perception
of informat ion was conducted. A message
was represented in the form o f video, audio,
text and photo. Have been measured such
parameters as
the assimilat ion o f
the
message content and emotional impact.
The experiment results showed that
audio format is assimilated better than any
other format.
Assessment of parameters was held by
specific so ftware. Were used such programs
as Textus Pro, Advego, ZnakoSchitalka,
Mira Tools.
The results of measurements in the
programs were analyzed. Some patterns and
matches
the parameters
in different
programs were revealed.
In addit ion, there were proposed two
the
the description of
to
approaches
)
dTr
ij
disseminat ion
propagandist ic
of
The first approach assumes that the user
can send propaganda both
in private
messages and on the “wall” of another user.
It is possible to perform 2n act ions, where n
is less than the number of user 's friends. An
important factor is whether the user will
send messages that have been posted to his
“wall”. To assess this factor, a survey was
conducted. 70% of respondents gave the
negat ive answer.
The second approach assumes that the
user places a propagandist ic message to the
news line. In that case, he would not take
any action to disseminate informat ion. But
then the message can be displayed in the
news not all the friends of the site with
probability
1
ijTrP
(
ijTr
,
the number of percent
where γ -
selected by the user.
Further study o f the factors influencing
the efficiency o f distribut ion, has resulted in
appearance of two categories o f factors:
technical and behavioral.
The technical factors include:
1) Variability o f the message (different
descript ions to the link in the message).
2) Recipient status (online / offline).
3) The age o f the target audience (young
people fo llow
the new
links more
often.)
The behavioral factors include:
1) Friendly relat ions with a source - a
message sent by a friend is more likely
to be noticed than a message sent by a
stranger.
Interest in the group - sending that uses
targeting (the target audience of interest,
university and so on) is more effect ive.
3) Filling the profile and attractiveness of a
source and a group – filled profile o f a
source and complete informat ion of a
group inspires more confidence to the
recipient.
2)
messages: classical and non-classical.
4) Newsmaker - relevance of the message
in a lucrat ive destination for the time
interval
increases
the efficiency o f
distribut ion.
5) Age and sex o f a source – for example,
the messages, sent by the girls, aged 18
to 24, are more popular.
6) Act ivity in the group – the group should
not be "dead": the more actual the
informat ion, the more effective delivery.
7) Geographical location of a source –
some users have more confidence in
groups and sources, located in the own
country/region/city.
To quantify all o f the parameters there
were held the series of experiments with
mass mailing messages users of the socia l
the
networking service. After changing
parameters
the
results of
review,
the
perception and response to messages have
been changed as well.
CONCLUSION
The
result o f
this work can be
considered as the development of a number
of
parameters
that
influence
the
effect iveness of advert ising and propaganda
services. This
in
networking
social
informat ion may be used
to
increase
resistance to propaganda, or, vice versa, to
increase the digest ibility o f such messages.
REFERENCES
[1] Robert R. Bush and Frederick Mosteller
A Stochast ic Model with Applicat ions to
Learning// Ann. Math. Statist.,Vol. 24, N 4
(1953), P. 559-585/ Harvard University
[2] Analyt ical model o f mis informat ion of a
social network node/ Yuri Monakhov, Maria
Medvednikova, Konstantin
Abramov,
Natalia Kostina, Roman Malyshev, Makarov
Oleg, Irina Semenova.– Project arXiv by the
Cornell
University
Library.–
URL: http://arxiv.org/abs/1212.0336
|
1705.10453 | 1 | 1705 | 2017-05-30T04:28:28 | Twitter Hashtag Recommendation using Matrix Factorization | [
"cs.SI",
"cs.IR"
] | Twitter, one of the biggest and most popular microblogging Websites, has evolved into a powerful communication platform which allows millions of active users to generate huge volume of microposts and queries on a daily basis. To accommodate effective categorization and easy search, users are allowed to make use of hashtags, keywords or phrases prefixed by hash character, to categorize and summarize their posts. However, valid hashtags are not restricted and thus are created in a free and heterogeneous style, increasing difficulty of the task of tweet categorization. In this paper, we propose a low-rank weighted matrix factorization based method to recommend hashtags to the users solely based on their hashtag usage history and independent from their tweets' contents. We confirm using two-sample t-test that users are more likely to adopt new hashtags similar to the ones they have previously adopted. In particular, we formulate the problem of hashtag recommendation into an optimization problem and incorporate hashtag correlation weight matrix into it to account for the similarity between different hashtags. We finally leverage widely used matrix factorization from recommender systems to solve the optimization problem by capturing the latent factors of users and hashtags. Empirical experiments demonstrate that our method is capable to properly recommend hashtags. | cs.SI | cs | Twitter Hashtag Recommendation using Matrix
Factorization
Department of EECS, University of Central Florida, Orlando, FL, USA
Hamidreza Alvari
[email protected]
7
1
0
2
y
a
M
0
3
]
I
S
.
s
c
[
1
v
3
5
4
0
1
.
5
0
7
1
:
v
i
X
r
a
ABSTRACT
Twitter, one of the biggest and most popular microblogging
Websites, has evolved into a powerful communication plat-
form which allows millions of active users to generate huge
volume of microposts and queries on a daily basis. To ac-
commodate effective categorization and easy search, users
are allowed to make use of hashtags, keywords or phrases
prefixed by hash character, to categorize and summarize
their posts. However, valid hashtags are not restricted and
thus are created in a free and heterogeneous style, increas-
ing difficulty of the task of tweet categorization.
In this
paper, we propose a low-rank weighted matrix factorization
based method to recommend hashtags to the users solely
based on their hashtag usage history and independent from
their tweets' contents. We confirm using two-sample t-test
that users are more likely to adopt new hashtags similar to
the ones they have previously adopted.
In particular, we
formulate the problem of hashtag recommendation into an
optimization problem and incorporate hashtag correlation
weight matrix into it to account for the similarity between
different hashtags. We finally leverage widely used matrix
factorization from recommender systems to solve the opti-
mization problem by capturing the latent factors of users
and hashtags. Empirical experiments demonstrate that our
method is capable to properly recommend hashtags.
Categories and Subject Descriptors
H.4 [Information Systems Applications]: Miscellaneous;
D.2.8 [Software Engineering]: Metrics-complexity mea-
sures, performance measures
General Terms
Theory
Keywords
Hashtag recommendation, Hahstag Correlation, Matrix Fac-
torization, Twitter
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
Copyright 200X ACM X-XXXXX-XX-X/XX/XX ...$5.00.
1.
INTRODUCTION
Twitter1 is one of the prevalent and well-known microblog-
ging Websites with millions of active users interacting with
each other and posting tweets, a message up to 140 char-
acters, per day on either computers or mobile devices.
It
is popular for massive spreading of tweets and the nature
of freedom. Daily bursts of news, gossips, rumors, discus-
sions and many others are all exchanged and shared by users
all over the world, no matter where they come from, civi-
lized or uneducated, or even what religion they hold. Con-
sequently, users on Twitter are easily overwhelmed by the
tremendous volume of data. The proliferation of such an un-
structured user-generated data as opposed to the traditional
structured data, has enabled researchers to study and ana-
lyze human behavior and develop complex systems such as
hashtag recommendation systems that has recently drawn
few researchers attention.
On Twitter, users are freely allowed to assign valid hash-
tags to their tweets, i.e. strings prepended with the hash "#"
character, to categorize their posts and represent a coarse-
grained topic of the content. Hashtags are indeed a community-
driven convention for adding additional context to tweets.
This mechanism helps tweet search and quickly propaga-
tion of the topic among millions of users by allowing them
to join the discussion. Although facilitating the task, the
heterogeneity and arbitrariness of the hashtags, due to the
fact that users do not face any restrictions while creating
them, can immediately make mess and hence make subse-
quent searches for tweets difficult.
To tackle the problem, few approaches has been proposed
in the literature [14, 18, 19, 26, 28], most of them rely on
either tweet similarity, i.e. content similarity or focus on
adopting Latent Drichlet Allocation (LDA) [9] and Latent
Semantic Indexing (LSI) [12] to capture the abstracted top-
ics of tweets. The problem with these approaches is that not
all the time, the contents of tweets are available due to the
fact that many users do not usually have public timelines.
Even if all users' timelines were public, these methods suf-
fer from computation overloads and lack of strong natural
language processing techniques. As opposed to the existing
methods, in this paper, we rather take another simple yet
effective approach and propose a new hashtag recommenda-
tion method which works only based on the users' interests
and their hashtag usage history without incorporating the
network structure and using tweet/user similarity or LDA.
In more details, we treat the problem of hashtag rec-
ommendation as an optimization problem and solve it via
1https://twitter.com
widely employed matrix factorization borrowed from rec-
ommendation systems. Moreover, we envision that users
are more likely to adopt similar hashtags while posting on
Twitter and to verify that, we use two-sample t-test. Our
contributions are thus summarized as follows:
• We perform two-sample t-test to verify that users keep
adopting related and similar hashtags and hence pos-
sess consistent hashtag usage history.
• We address the hashtag recommendation problem with
an optimization problem and propose a weighted ma-
trix factorization based method hW M F to recommend
hashtags to the users. To ease the process of optimiza-
tion, we use alternating least square scheme for updat-
ing the corresponding matrices as finding the optimal
values for them is tedious.
• We integrate the concept of correlation between the re-
lated hashtags into the matrix factorization equation.
We quantify the correlation between hashtags based
on the times they have been used together and incor-
porate these values into the optimization problem to
weigh the contribution of training samples over test
samples.
• We collect and build a dataset of tweets which con-
tains at least five hashtags very close to a predefined
list of 25 trending hashtags (hereafter called seeds list)
selected from different categorizes. We evaluate the
model on this dataset and demonstrate its ability to
recommend hashtags that best aligns with the users'
hashtag usage history.
The remainder of the paper is organized as follows.
In
Section 2, we first define the problem of interest and then
detail our proposed matrix factorization method to solve the
problem. We explain the experimental settings and discuss
the results in Section 3. Then, we discuss the related work
in Section 4 and conclude the paper in Section 5.
2. PROPOSED FRAMEWORK
In this section, prior to describing the proposed method,
we first provide the formal definition of the problem and the
notations used throughout the paper. Then we detail the
proposed model hW M F for Twitter hashtag recommenda-
tion and explain the time complexity of the method. We
finally describe two sample t-test to verify our initial as-
sumption about users' hashtag usage.
2.1 Problem Statement
Given a set of N users and a set of M hashtags adopted
by them, we aim to recommend the most related hashtags
to the users based on their interests and the hashtag us-
age history. Suppose we have a very sparse and low-rank
user-hashtag matrix X = [xij] ∈ RN×M
. We denote by
xij, 1 ≤ i ≤ N, 1 ≤ j ≤ M the ith row and jth column
of X, which represents if user i has adopted hashtag j, if
xij = 1, but has nothing to say otherwise. The zeros in
the matrix demonstrate unknown or missing values; a user
might have adopted a hashtag in the past but we could not
figure it out since our data collection method does not al-
ways return all data. The reason that X is sparse is because
in Twitter, users do not usually adopt hashtags while tweet-
ing and despite the availability of this feature, only 8% of
+
the tweets contain hash "#" character [18] Also, suppose
we have a hashtag-hashtag matrix Y = [yij] ∈ RM×M
with
yij, 1 ≤ i ≤ M, 1 ≤ j ≤ M equals to the number of times
hashtags i and j are used together.
+
We treat the problem of hashtag recommendation as a col-
laborative filtering based one and formulate it into an opti-
mization problem and employ low-rank matrix factorization
to solve it as this method has been widely and successfully
employed in various applications such as collective filtering
[17] and document clustering [29]. In its basic form and in
the context of recommendar systems, matrix factorization,
one of the realizations of latent factor models, captures both
items and users by vectors of factors inferred from the rat-
ings. Here, instead we characterize users and hashtags by
inferring vectors of factors from user's hashtag usage history.
2.2 Matrix factorization model
Based on matrix factorization scheme, we seek two low-
and V ∈ RM×d
rank and non-negative matrices U ∈ RN×d
with dimensionality of the latent space d (cid:28) M, N via solving
the following optimization problem:
+
+
F
(cid:80)
F + γ1U2
F + γ2V2
(cid:113)(cid:80)
minU,VW (cid:12) (X − UVT )2
(1)
where (cid:12) is Hadamard product (element-wise product)
where (X(cid:12) Y)ij = Xij × Yij for any two matrices X and Y
with the same size, .F is the Frobenius norm of a matrix,
, 1 ≤ i ≤
AF =
N, 1 ≤ j ≤ M is an indicator matrix (i.e. weight matrix)
to control the learning process. Also, γ1 > 0 and γ2 > 0
are non-negative regularization parameters and U2
F and
V2
F are two smoothness regularization terms to avoid
overfitting. The row vectors ui., 1 ≤ i ≤ N and vj., 1 ≤
j ≤ M denote the low-dimensional representations of users
and hashtags respectively.
ij and W = [wij] ∈ RN×M
+
j A2
i
We integrate W into the optimization equation to avoid
impacts of unknown elements of X, i.e. increase the contri-
bution of the elements with known values in the optimiza-
tion process over the elements with the missing information.
Therefore, for those hashtags that we have information for,
i.e. whether a user has adopted them before, we use wij = 1
and for those with missing information we use the average of
their correlation with other hashtags with information. In
other words, the indicator matrix is formally defined as:
wij =
j ,k corr (hj ,hk )
A
xij = 1
, xij = 0, xik = 1, yjk ≥ 1
(2)
where A = {j ∀j, xij = 1} and corr(hj, hk), i.e. correla-
tion between hashtags hj and hk, is calculated by:
(cid:40)
(cid:80)
1,
corr(hk, hj) =
(3)
yjk(cid:80)
t(cid:54)=k yjt
Optimization. The coupling between U and V in the
optimization problem, makes it difficult to find the optimal
solutions for both matrices. Therefore, in this work, we
adopt the alternating least squares method[13] to solve the
optimization problem, where the objective function is itera-
tively optimized with respect to one of the variables U and
V while fixing the other one until convergence. Optimizing
the equation 1 with respect to U and V corresponds to the
computation of their derivatives via the following equations.
Given the following objective function:
L = W (cid:12) (X − UVT )2
the update equations for U and V are computed according
F + γ1U2
F + γ2V2
(4)
F
to the following equations:
U = U − λ
V = V − λ
∂L
∂U
∂L
∂V
(5)
(6)
where λ > 0 is the learning step and the partial derivatives
of L with respect to U and V are then obtained using:
= −2(W (cid:12) X)V + 2(W (cid:12) (UVT ))V + γ1U (7)
∂L
∂U
= −2(W (cid:12) X)T U + 2(W (cid:12) (UVT ))T U + γ2V (8)
∂L
∂V
Upon the convergence, we approximate X by multiplying
the low-rank matrices U and V:
(cid:101)X = UVT
(9)
Algorithm. The detailed algorithm for the proposed ma-
trix factorization framework is shown in Algorithm 1. Af-
ter randomly initializing matrices U and V and construct-
ing the indicator matrix W in lines 3-5, in lines 7-10, we
alternatingly update U and V based on the equations 5
to 8, until we reach convergence. Practically, convergence
is achieved whenever predefined maximum number of iter-
ations has been reached or there is little change in the ob-
jective function value. Finally, (cid:101)X = UVT is the low-rank
representation of user-hashtag matrix X and also is non-
negative as U and V are both non-negative matrices.
Algorithm 1 The proposed framework hWMF
1: Input: User-hashtag matrix X, hashtag-hashtag matrix
2: Output: Modeled matrix (cid:101)X
Y, d, γ1, γ2, λ
3: Initialize U randomly
4: Initialize V randomly
5: Construct the indicator matrix W according to eq. 2
6: while Not convergent do
∂U = −2(W (cid:12) X)V + 2(W (cid:12) (UVT ))V + γ1U
7:
Update U ← U − λ ∂L
8:
∂V = −2(W (cid:12) X)T U + 2(W (cid:12) (UVT ))T U + γ2V
9:
Update V ← V − λ ∂L
10:
11: end while
∂U
∂V
12: Set (cid:101)X = UVT
∂L
∂L
2.3 Time Complexity
We discuss the time complexity of the proposed method,
hWMF, here. Obviously, the complexity burden of hWMF
depends mostly on the computation of the derivatives in
Equations 7 and 8. In each iteration in our algorithm 1, the
time complexities of the computation of the derivatives in
lines 7 and 9 are calculated as follows: first note that W(cid:12)X,
UVT and (W(cid:12)(UVT )) need to be calculated once for both
equations. The time complexity of W (cid:12) X is O(Nx) where
Nx is the number of non-zero elements of the sparse matrix
X. Also, the time complexity of UVT is O(N dM ). For
(W(cid:12) X)V, we need O(Nxd). For the second term in Eq. 7,
i.e. (W (cid:12) (UVT ))V, we need O(N M + N M d). Thus in
∂U takes O(Nxd + N M d).
each iteration, the calculation of ∂L
With the similar computations, the calculation of ∂L
∂V has
the time complexity of O(Nxd + N M d) in each iteration.
In the next section, we provide statistical evidence that
users are indeed more willing to adopt hashtags that have
correlations with each other and consequently maintain con-
sistent hashtag usage history. This confirms the correct-
ness of our intuition on both incorporating the indicator
matrix W into the optimization equation and solving the
equation via matrix factorization model as collaborative-
filtering based models captures well the relations between
items (here, hashtags).
2.4 t-test
We perform two-sample t-test and verify the existence of
hashtag usage consistency. In particular, we seek to answer
the question: Do users in Twitter possess consistent hashtag
usage history?
We construct two vectors hcu and hcr with the equal num-
ber of elements where each element in hcu is obtained by
calculating the correlation between hashtags hi and hj used
by user u using Eq. 3 and similarly each element in hcr is
the calculated correlation score between hashtags hi used by
user u and hj used by a random user r.
We perform a t-test on vectors hcu and hcr. The null
hypothesis here is that the correlation of hashtags used by
a given user does not differ from those of different users,
i.e. these two vectors are the same, H0 : hcu = hcr, while
the other hypothesis is that the hashtags used by the same
user are more correlated than those used by different users,
H1 : hcu > hcr. Therefore we have the following two-sample
t-test:
H0 : hcu = hcr, H1 : hcu > hcr
(10)
The t-test result suggests a strong evidence with the sig-
nificance level α = 0.001 to reject the null hypothesis and
as a result, confirms that users tend to use a consistent set
of hashtags while posting tweets on Twitter. Therefore the
answer to the above question is positive. This aligns well
with our findings and equations in our matrix factorization
model in the previous section.
3. EXPERIMENTS
We first collect and build our dataset by making use of the
Twitter streaming API2 which provides 1% random tweets
from the total volume of tweets at a particular moment. We
then conduct experiments to compare the performance of
our proposed method with the baselines. In this section, we
begin by introducing our dataset and the evaluation metric
and then we design experiments and discuss the results.
3.1 Dataset
In general, the evaluation of hashtag recommendation ap-
proach is challenging due to difficulty of collecting the appro-
priate and standard dataset, while also human annotation
is almost impossible and unreliable because of the tedious
2https://dev.twitter.com/streaming/overview
Table 1: Description of the dataset
# of users
# of tweets
Max # of paired hashtags adopted by users
Min # of paired hashtags adopted by users
Max # of times given paired hashtag used
Min # of times given paired hashtag used
# of seeds
# of hashtags
2,976
6,503
108
5
313
0
25
6,814
workload for evaluating data. Therefore we need a more
systematic way of generating the dataset.
We rather collect the data in the following way: we first
picked a set of 25 trending hashtags of different categories as
our initial seeds list including: News, Obama, Iran, Yemen,
Gaza, Islam, Terrorism, Shooting, BlackLivesMatters, Youtube,
Apple, Google, Microsoft, iPad, Android, Internet, FIFA,
JohnNash, LadyGaga, Movie, Weekend, MemorialDay, Love,
Hate, Care. We then expanded this list to the 6,814 related
hashtags by collecting a set of tweets containing at least five
related hashtags to the hashtags in the seeds list (see Table 2
for some examples). This way, we obtain a coarse-grained
dataset of very close related hashtags which ease the task of
evaluation of the proposed method. The description of the
resulting dataset with %0.99 spareness is shown in Table 1.
The power-law [11] like distributions of the paired hash-
tags used by users and seen together are depicted in Fig-
ures 1 and 2 respectively. For the sake of clarity, we remove
from Fig. 2, pairs of hashtags which have never appeared
together. As we observe from Fig. 1, very few users have
used more than 20 paired hashtags while the peak in this
plot shows that most of the users have only used less than
20 paired hashtags. This is somehow demonstrated in Fig. 2
as well; roughly 5,424 paired hashtags are used together only
once while we observe the decrease in the number of adopted
paired hashtags as we move further in the plot. These figures
together show the severe sparsity in our dataset; not all the
hashtags have paired together at all; most paired hashtags
are adopted together rarely.
We further plot the distribution of hashtag correlation
scores in Fig. 3 (based on the Eq. 2). Since the number
of uncorrelated hashtags are much higher than those with
correlation, once again, for clarity we remove uncorrelated
hashtags. This figure demonstrates that many hashtag cor-
relation scores fall in (0,0.1] which shows most of the hash-
tags do not have strong correlation with each other, sug-
gesting a power-law like distribution of hashtag correlation
scores in our dataset.
3.2 Evaluation Metric
Similar to the most recommendation systems, we are un-
able to use popular metrics such as precision as they require
to know the values of all entries in the ground truth matrix
to correctly evaluate the returned values against them. Re-
member we had zero elements in the matrix representation
of our dataset which do not necessarily show users did not
adopt the hashtags, i.e. they demonstrate unknown or miss-
ing values; a user might have adopted a hashtag in the past
but we could not figure it out as our data collection method
does not always return all data from Twitter. Instead, we
use widely used metric for evaluating collaborative filtering
Figure 1: Distribution of paired hashtags used by
users
Figure 2: Distribution of paired hashtags used to-
gether
results, root mean square error (RMSE), which is defined
as:
(cid:115)(cid:80)n
i,j((cid:101)xij − xij)2
n
RM SE =
(11)
where n is the number of test instances used for the eval-
uation and (cid:101)xij and xij are corresponding test set elements
of (cid:101)X and X selected for the evaluation respectively.
3.3 Discussion
As discussed before, only few works have addressed the
problem of hashtag recommendation and none of them ap-
pear to be comparable to our method since they all recom-
mend hashtags based on the tweets contents while we do
that based on the hashtag usage history. Consequently, we
build two baselines and compare the results as follows,
MF: this is a variant of our matrix factorization model
Table 2: Examples of seed hashtags and their related hashtags
Related hashtags
Seed
#Obama Democrats, Whitehouse, tlot, tcot, Congress
#Iran
#iPad
#Google
IranTalks, IranDeal, Nuclear, Iraq, Syria
Android, iOS, iPhone, freeaps, Apple
io15, Chrome, YouTube, Googleplay, Wearable
Table 3: RMSE Comparison for our method with
different dimensions of latent space and when per-
centage of test set is fixed to %30
5
10
15
20
25
0.1697
0.1378
0.1645
0.1709
0.1865
tent space d is set to 10. To demonstrate the effect of
d on the results in Table 3, we fix the percentage of
test set to %30 and vary d as {5, 10, 15, 20, 25}. The
observation suggests that d = 10 is the best dimension
among others.
• The performance comparison for different methods in
terms of RMSE is shown in Table 4. We observe the
best results for all percentages of test set are achieved
by our proposed method. The next best method is
M F which is a variant of the proposed framework
with a different indicator matrix. One observation is
that defining the indicator matrix based on the corre-
lation between hashtags perform better than the one
solely defined similar to the matrix X. Furthermore,
the reason our method recommend hashtags more ac-
curately than kNN - Correlation is because we incorpo-
rate the correlation between hashtags into widely used
matrix factorizastion while kNN - Correlation recom-
mends hashtags merely based on the correlation of the
hashtags.
• Table 5 shows two potential practical examples of our
method for two anonymized Twitter users. As we ob-
serve, both of them have been offered one hashtag (to
be concise, we do not show other recommended hash-
tags) and they actually adopt them in their future
tweets. Obviously, these predicted hashtags are just
those from the ground truth set that we use as test in-
stances, i.e. those that we know users have previously
used. This means we have not applied our method in
the real world yet.
4. RELATED WORK
As opposed to the large body of works that has been de-
voted to the study of various social networks based appli-
cations [2, 6, 4, 16, 3, 15, 7, 8, 5] and in particular recom-
mendation systems in social networks [24, 10, 1, 27, 21, 20],
very few works have addressed the problem of hashtag rec-
ommendation for easy categorization and retrieval of tweets.
The previous works on hashtag recommendation mostly
rely on the similarity between tweets and none of them have
exploited the correlation between the topics of the hashtags
nor the users' history of hashtags usage. In particular, they
focused on two main directions: majority of them recom-
mend hashtags based on content similarity having storage
problems, fewer adopt LDA, which fails in short texts and is
Figure 3: Distribution of hashtag correlation scores.
with the indicator matrix W defined as follows:
(cid:40)
wij =
1, xij = 1
0, xij = 0
(12)
which is basically the same as the user-hashtag matrix X.
k-Nearest Neighbors with correlation (kNN - Cor-
relation): given the whole set of potential hashtags for each
user, this method recommends k most correlated hashtags
with those each user has used before. In details, we rank
hashtags according to the Eq. 3 in descending order and
recommend top k hashtags to the user.
Random: as the name suggests, this method recom-
mends hashtags on a random basis to the users.
For our proposed method, we try various parameters and
report the best performance, while other methods do not
have parameters. In particular, we set both regularization
parameters γ1 and γ2 to 0.2 and set the learning step λ to
0.001. Also, we apply different dimensions of latent space
d and observe the best performance is achieved when d =
10. For brevity, we only demonstrate this in Table 3, when
percentage of test set is fixed to %30.
With the parameters chosen as above, our experimental
setting is as follows: Suppose we have (cid:96) = {(ui, hj) xij =
1} is the set of pairs of users and hashtags that we know they
have adopted. We choose %x of (cid:96) as new relations 0 between
users and hashtags to predict. We remove these relations by
setting xij = 0,∀(ui, hj) ∈ 0 and then apply the hashtag
recommendation approaches on the new representation of
X. We vary x as {10, 20, 30, 40, 50}.
We make the following observations:
• As stated before, for brevity, we only report the best
performance of our method when the dimension of la-
Table 4: Performance Comparison for different approaches in terms of RMSE with d = 10 and different
testbed sizes
%10
%20
%30
%40
%50
hWMF
MF
kNN-Correlation
Random
0.0913
0.1756
0.2827
0.6821
0.1156
0.1904
0.3996
0.6901
0.1378
0.2023
0.4018
0.7045
0.1512
0.2278
0.4377
0.7121
0.1693
0.2502
0.6229
0.7187
Table 5: Example hashtag usage history and suggested hashtags
User Hashtags adopted in past Suggested hashtags Tweets posted with suggested hashtags
1
Obama, News, Democrates
HillaryClinton
2
Weekend, Party, Club
MemorialDay
unsupervised and hence requires efforts to associate tweets
with hashtags, and use abstracted topics of tweets. Another
problem with these approaches is the contents of tweets are
not always available since many users do not usually make
their timelines publicly available due to the privacy con-
cerns. Moreover, these methods suffer from computation
overloads and lack of strong natural language processing
techniques which are required to analyze the contents of
tweets.
[19] employs WordNet similarity information and Euclidean
distance to suggest hashtags from similar tweets. Given
a tweet from a user, [28], first discover similar tweets in
their dataset based on the TF-IDF[25] representation of
tweets. Then they recommend hashtags by three different
approaches, relying on ranking the hashtags based on the
overall popularity of tweets, the popularity within the most
similar tweets, and third one, the most similar tweets, re-
ported to perform the best among the others. As opposed
to their method which is solely based on the tweets similar-
ities, [23] considers terms in tweets and their relevance to
candidate hashtags. In more details, they propose a ranking
scheme, a variant of TF-IDF that takes into account the rele-
vance of hashtags and data sparsity. Similar to their method,
[14], proposes an approach focusing on detection of hidden
topics for the tweets and recommending the use of those gen-
eral topics as hashtags based on LDA model. In details, an
unsupervised and content based hashtag recommendation
based on LDA is proposed in this study. They first design
and develop a binary language classifier for tweets based on
the Naive Bayes and Expectation-Maximization and then
apply LDA in the context of tweet hashtag recommendation
in a fully unsupervised manner.
Different from the other studies, [26] proposes a super-
vised topic modeling based approach for recommendation of
hashtags by treating hashtags as labels of topics and lever-
aging topic model to discover relationship between words,
hashtags and topics of tweets. with the assumption that
each tweet is about one local topic and there is a global
background topic for the corpus. They finally recommend k
most probable hashtags based on the probability that a new
tweet would contain a hashtag.
[22], uses probability dis-
tributions for hashtag recommendation. In particular, they
uses Bayes rule to compute the maximum a posteriori prob-
ability of each hashtag class given the words of the tweet.
#HillaryClinton how explain ALL BUSH FAULT?
How still #rap 1993-2001 #BillClinton 100% INNO-
CENT?
Military Hero Joey Jones Is Honored with The Real Deal
Award https://... #MemorialDay
In an different attempt, [18] proposes a method that rec-
ommends hashtags based on similar users and tweets by cal-
culating the preference weight of a user towards a certain
hashtag based on the TF-IDF and then selecting the top
users with high cosine similarities with other users. Also,
they use the same approach for calculating the top similar
tweets. Since many tweets do not contain hashtags, the rec-
ommended hashtags may be from similar tweets instead of
similar users. They claim that their method is able to rec-
ommend more personalized hashtags compared to the other
methods and their method suits both user preferences and
the tweet content.
In contrast, this study seeks to recommend hashtags by
incorporating hashtag usage history of each user into the
hashtag recommendation problem and address the problem
with an optimization problem while using matrix factoriza-
tion model to solve it.
In particular, we do not rely on
the network structure or similarity between tweets/users;
instead we exploit the correlation between hashtags by fo-
cusing on the probability of their adoption together.
5. CONCLUSION AND FUTURE WORK
In this study, we presented an approach to recommend
hashtags to the users solely based on their interests and
hashtags usage history, which in contrast to the approaches
in the literature, does not require the contents of tweets as
they are not always available since many users do not usu-
ally make their timelines publicly available due to the pri-
vacy concerns. In addition to that, all other methods suffer
from severe computation burden and lack of strong natu-
ral language processing techniques to analyze the contents
of tweets. We formulated the problem into an optimization
problem and integrated correlation between different hash-
tags into the equation and used widely used matrix factor-
ization technique to solve the problem via alternating least
squares scheme. Experiments demonstrate that our method
outperforms other baselines in recommending more accurate
hashtags to the users.
In future, we plan to replicate the study by investigating
the correlation between hashtags based on first discovering
their topics from the content of their corresponding tweets
through using topic modeling techniques such as LDA, and
then computing their topic similarity based on the existing
popular similarity measures. That way, we can integrate
more accurate correlation values between hashtags into our
matrix factorization model.
We are investigating other interesting research directions
such as time series analysis of the adoption of hashtags by
different users and extend the model to work well in pres-
ence of time slots in order to design seasonal hashtag recom-
mendation systems as well as incorporating demographics of
users specially gender of the users to recommend personal-
ized hashtags to them.
6. REFERENCES
[1] G. Adomavicius and A. Tuzhilin. Toward the next
generation of recommender systems: a survey of the
state-of-the-art and possible extensions. Knowledge
and Data Engineering, IEEE Transactions on,
17(6):734–749, June 2005.
[2] H. Alvari, A. Hajibagheri, G. Sukthankar, and
K. Lakkaraju. Identifying community structures in
dynamic networks. Social Network Analysis and
Mining (SNAM), 2016.
[3] H. Alvari, S. Hashemi, and A. Hamzeh. Detecting
overlapping communities in social networks by game
theory and structural equivalence concept. In
International Conference on Artificial Intelligence and
Computational Intelligence, pages 620–630. Springer
Berlin Heidelberg, 2011.
[4] H. Alvari, S. Hashemi, and A. Hamzeh. Discovering
overlapping communities in social networks: A novel
game-theoretic approach. AI Communications,
26(2):161–177, 2013.
[5] G. Beigi, X. Hu, R. Maciejewski, and H. Liu. An
overview of sentiment analysis in social media and its
applications in disaster relief. In Sentiment Analysis
and Ontology Engineering: An Environment of
Computational Intelligence, volume 639, pages
313–340. Springer International Publishing, 2016.
[6] G. Beigi, M. Jalili, H. Alvari, and G. Sukthankar.
Leveraging community detection for accurate trust
prediction. 2014.
[7] G. Beigi, J. Tang, and H. Liu. Signed link analysis in
social media networks. In International AAAI
Conference on Web and Social Media (ICWSM), 2016.
[8] G. Beigi, J. Tang, S. Wang, and H. Liu. Exploiting
emotional information for trust/distrust prediction. In
SIAM International Conference on Data Mining
(SDM), 2016.
[9] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent
dirichlet allocation. J. Mach. Learn. Res., 3:993–1022,
Mar. 2003.
[10] J. Bobadilla, F. Ortega, A. Hernando, and
A. Guti´eRrez. Recommender systems survey.
Know.-Based Syst., 46:109–132, July 2013.
[11] A. Clauset, C. R. Shalizi, and M. E. J. Newman.
Power-law distributions in empirical data. SIAM Rev.,
51(4):661–703, Nov. 2009.
[12] S. Deerwester, S. T. Dumais, G. W. Furnas, T. K.
Landauer, and R. Harshman. Indexing by latent
semantic analysis. Journal of the American society for
information science, 41(6):391–407, 1990.
[13] C. H. Q. Ding, T. Li, and M. I. Jordan. Nonnegative
matrix factorization for combinatorial optimization:
Spectral clustering, graph matching, and clique
finding. In ICDM, pages 183–192. IEEE Computer
Society, 2008.
[14] F. Godin, V. Slavkovikj, W. D. Neve, B. Schrauwen,
and R. V. de Walle. Using topic models for twitter
hashtag recommendation. In WWW (Companion
Volume), pages 593–596. International World Wide
Web Conferences Steering Committee / ACM, 2013.
[15] A. Hajibagheri, H. Alvari, A. Hamzeh, and
S. Hashemi. Community detection in social networks
using information diffusion. In Proceedings of the 2012
International Conference on Advances in Social
Networks Analysis and Mining (ASONAM 2012),
pages 702–703. IEEE Computer Society, 2012.
[16] A. Hajibagheri, H. Alvari, A. Hamzeh, and
S. Hashemi. Social networks community detection
using the shapley value. In Artificial Intelligence and
Signal Processing (AISP), 2012 16th CSI International
Symposium on, pages 222–227. IEEE, 2012.
[17] Y. Koren. Factorization meets the neighborhood: a
multifaceted collaborative filtering model. In
Proceeding of the 14th ACM SIGKDD international
conference on Knowledge discovery and data mining,
pages 426–434. ACM, 2008.
[18] S. M. Kywe, T.-A. Hoang, E.-P. Lim, and F. Zhu. On
recommending hashtags in twitter networks. In
SocInfo, volume 7710 of Lecture Notes in Computer
Science, pages 337–350. Springer, 2012.
[19] T. Li, Y. Wu, and Y. Zhang. Twitter hash tag
prediction algorithm. In ICOMP'11-The 2011
International Conference on Internet Computing,
2011.
[20] P. Massa and P. Avesani. Trust-aware collaborative
filtering for recommender systems. In R. Meersman
and Z. Tari, editors, On the Move to Meaningful
Internet Systems 2004: CoopIS, DOA, and ODBASE,
volume 3290 of Lecture Notes in Computer Science,
pages 492–508. Springer Berlin Heidelberg, 2004.
[21] P. Massa and P. Avesani. Trust-aware recommender
systems. In Proceedings of the 2007 ACM Conference
on Recommender Systems, RecSys '07, pages 17–24,
New York, NY, USA, 2007. ACM.
[22] A. Mazzia and J. Juett. Suggesting hashtags on
twitter. In EECS 545 Project, Winter Term, 2011.
URL http://www-
personal.umich.edu/ amazzia/pubs/545-final.pdf.
[23] E. Otsuka, S. A. Wallace, and D. Chiu. Design and
evaluation of a twitter hashtag recommendation
system. In IDEAS, pages 330–333. ACM, 2014.
[24] A. Rajaraman and J. D. Ullman. Mining of massive
datasets. Cambridge University Press, Cambridge,
2012.
[25] G. Salton and M. J. McGill. Introduction to modern
information retrieval. 1986.
[26] J. She and L. Chen. Tomoha: Topic model-based
hashtag recommendation on twitter. In WWW
(Companion Volume), pages 371–372. ACM, 2014.
[27] X. Su and T. M. Khoshgoftaar. A survey of
collaborative filtering techniques. Adv. in Artif. Intell.,
2009:4:2–4:2, Jan. 2009.
[28] E. Zangerle, W. Gassler, and G. Specht.
Recommending #-tags in twitter. In Proceedings of
the Workshop on Semantic Adaptive Social Web
(SASWeb 2011). CEUR Workshop Proceedings,
volume 730, pages 67–78, 2011.
[29] S. Zhu, K. Yu, Y. Chi, and Y. Gong. Combining
content and link for classification using matrix
factorization. In SIGIR '07: Proceedings of the 30th
annual international ACM SIGIR conference on
Research and development in information retrieval,
pages 487–494, New York, NY, USA, 2007. ACM.
|
1801.07004 | 1 | 1801 | 2018-01-22T09:16:35 | Public Sentiment and Demand for Used Cars after A Large-Scale Disaster: Social Media Sentiment Analysis with Facebook Pages | [
"cs.SI"
] | There have been various studies analyzing public sentiment after a large-scale disaster. However, few studies have focused on the relationship between public sentiment on social media and its results on people's activities in the real world. In this paper, we conduct a long-term sentiment analysis after the Great East Japan Earthquake and Tsunami of 2011 using Facebook Pages with the aim of investigating the correlation between public sentiment and people's actual needs in areas damaged by water disasters. In addition, we try to analyze whether different types of disaster-related communication created different kinds of relationships on people's activities in the physical world. Our analysis reveals that sentiment of geo-info-related communication, which might be affected by sentiment inside a damaged area, had a positive correlation with the prices of used cars in the damaged area. On the other hand, the sentiment of disaster-interest-based-communication, which might be affected more by people who were interested in the disaster, but were outside the damaged area, had a negative correlation with the prices of used cars. The result could be interpreted to mean that when people begin to recover, used-car prices rise because they become more positive in their sentiment. This study suggests that, for long-term disaster-recovery analysis, we need to consider the different characteristics of online communication posted by locals directly affected by the disaster and non-locals not directly affected by the disaster. | cs.SI | cs | Public Sentiment and Demand for Used Cars after A Large-Scale
Disaster: Social Media Sentiment Analysis with Facebook Pages
Graduate School of Interdisciplinary Information Studies,
Graduate School of Interdisciplinary Information Studies,
Yuya Shibuya
The University of Tokyo,
Japan,
[email protected]
Hideyuki Tanaka
The University of Tokyo,
Japan,
[email protected]
ABSTRACT
There have been various studies analyzing public sentiment after a
large-scale disaster. However, few studies have focused on the
relationship between public sentiment on social media and its
results on people's activities in the real world. In this paper, we
conduct a long-term sentiment analysis after the Great East Japan
Earthquake and Tsunami of 2011 using Facebook Pages with the
aim of investigating the correlation between public sentiment and
people's actual needs in areas damaged by water disasters. In
addition, we try to analyze whether different types of disaster-
related communication created different kinds of relationships on
people's activities in the physical world. Our analysis reveals that
sentiment of geo-info-related communication, which might be
affected by sentiment inside a damaged area, had a positive
correlation with the prices of used cars in the damaged area. On
the other hand,
the sentiment of disaster-interest-based-
communication, which might be affected more by people who were
interested in the disaster, but were outside the damaged area, had
a negative correlation with the prices of used cars. The result could
be interpreted to mean that when people begin to recover, used-car
prices rise because they become more positive in their sentiment.
This study suggests that, for long-term disaster-recovery analysis,
we need to consider the different characteristics of online
communication posted by locals directly affected by the disaster
and non-locals not directly affected by the disaster.
CCS CONCEPTS
Information systems → Data mining
KEYWORDS
Sentiment Analysis; Social Media; Facebook Pages; Used car
1 INTRODUCTION
Social data mining in the context of disasters has been widely
addressed because of the increasing popularity of social media.
However, most studies focus on short-term restoration from
disasters and fewer studies analyze social data mining for long-term
recovery [25]. In addition, there is a need to study more about the
relationships between social media communication and people's
actual activities in the real world. With this in mind, this paper
Social Web in Emergency and Disaster Management 2018.
analyzes long-term public sentiment after a large-scale disaster and
investigates the relationships between public sentiment and people's
needs in the disaster-stricken area. More specifically, we compare
sentiment in Facebook Page posts and comments related to
sentiments about disaster-stricken areas and people as well as used-
car price data in the damaged areas of the Great East Japan
Earthquake and Tsunami of 2011. The reason we focused on used-
car price is that when a water-related large-scale disaster occurs,
used cars tend to be increasingly in demand in the damaged areas as
shown in subsection 2.1. Our previous study reveals that, after the
Great East Japan Earthquake and Tsunami, people in the damaged
area needed to buy less expensive cars that required less paperwork
for purchase when they began to actively rebuild their daily lives
and community, such as when they would go to work, check on their
family's safety, and work on recovery efforts [1].
The rest of this paper is constructed as follows. Section 2
provides a literature review and our research questions. In Section
3, we explain the two types of data for our analysis. In Section 4, a
sentiment analysis method and its results are described. In Section
5, the model for investigating the relationships between social media
sentiment and used-car market data is explained. The result of our
analysis is provided in Section 6. Based on this result, we discuss
the main findings of our study in Section 7. Lastly, we conclude our
study in Section 8.
2 RELATED WORK
In this section, we briefly overview related works from two
viewpoints: Used-car analysis and social media data analysis
focusing on sentiment analysis during disasters.
2.1 Used-car demand after the disaster
When a large-scale water-related disaster (e.g., hurricane, typhoon,
tsunami) hits a community, used-car demand tends to increase in the
community. For example, after Hurricane Harvey and Irma in 2017,
the media reported increased demand for used cars around the
flooded areas [3, 5, 14]. Likewise, after the Great East Japan
Earthquake and Tsunami, newspapers reported a rise in the demand
for used cars in the disaster-stricken area to replace water-damaged
vehicles and to aid in the rebuilding of the community [20]. [26]
statistically shows that there was an increased demand for used cars,
particularly for Light Motor Vehicles1 in the disaster-stricken area
compared to less demand in non-damaged areas. Also, [1] suggests
that communication on Facebook related to the Great East Japan
Earthquake and Tsunami, such as topics of people's activities for
recovery and emotional support may have correlated to used-car
demand in water-damaged areas. This paper attempts to deepen the
understanding of the relationships between online communication
and damaged people's needs by applying the Hedonic regression
model, which is widely used to assess used-car prices in related
studies [1, 10, 22, 26]. The Hedonic Regression Model is a simple
economic model that estimates the demand value of a product as
reflected in a bundle of embodied characteristics and obtains
estimates of the contributory value of each characteristic [22]. By
controlling used-car characteristics, the Hedonic model allows us to
assess the correlation between used-car prices, which reflect used-
car demand [26], and sentiment expressed on Facebook Pages.
2.2 Social Media Data Analysis and Sentiment
Analysis for Disaster Management
Leveraging social media data before, during and after disasters for
disaster management has become popular recently. In particular,
social media contents shared by local citizens in a disaster-stricken
area can provide unique and critical information for emergency
responders, event planners, damaged people, journalists, and digital
volunteers [27]. Existing studies have recognized different
communication patterns between local and non-locals during
disasters [13]. [28] found that twitter users in general were more
likely to re-tweet the accounts of people local to emergency events.
Moreover, [2] investigated an imaginary representation of a disaster
via images shared on Twitter, and found that locals focus more on
the business details of the response and the damage in their cities
while a non-local population focused more on the images of people
suffering.
Another research direction in the context of disasters, which
this study also considers, is sentiment analysis. Public mood and
emotion after a large-scale disaster have been analyzed broadly [8,
9, 11, 15, 21, 29]. For example, [18] analyzes the tweets during
Hurricane Sandy and describes how people's sentiment changed
based on their distance from the hurricane. However, analyzing how
cyber-world sentiment correlates with physical world data is still in
its infancy compared to other fields. In marketing research,
correlations between social media sentiment and sales [24],
consumer choice [16], and stock prices [23] have been quantitatively
analyzed. In public health, the correlations between a pandemic and
social media data have been studied with the aim of detecting
epidemic outbreaks as soon as possible [4, 6, 7]. There is a need to
study more about what cyber-world data during disasters means in
a real-world situation. In disaster management research, to the
authors' best knowledge, most studies have focused on a relatively
short period (e.g., [9, 11, 19]), and no study has revealed the
relationships between sentiment expression in the cyber world and
people's activities in the real world for long-term recovery.
However, the authors assume that monitoring and assessing a
1 A Japanese category of light motor vehicles whose engine volumes are 660cc or less.
community's long-term recovery status by leveraging social media
data will aid effective and efficient implementation of recovery
efforts because traditional socio-economic recovery indicators (e.g.,
changes in population, consumption and gross domestic production)
are not published in a real-time way. Social media data has the
possibility of filling the gap in recovery situational awareness by its
timeliness. Therefore, this study investigates public sentiment on
social media for recovery phases from a socio-economic
perspective, with different groups in mind because local and non-
local people tend to express and share information differently.
2.3 Research Question
Based on the related works described above we have developed the
following research questions;
RQ1: How does public
sentiment of disaster-related
communication on Facebook relate to the demand for used cars in
the damaged area?
RQ2: Do different types of disaster-related communication have
different types of relationships to the demand for used cars in the
damaged area?
3 DATA
To examine the two research questions in 2.3 above, we collected
two types of datasets; Facebook Page data and Japanese used-car
market data from the damaged area.
3.1 Facebook Page dataset
3.1.1 Facebook Pages Data. Facebook Pages are places to connect
people with the same interests, and they are widely used by
businesses, organizations, and individuals. Operators of Facebook
Pages can share themed content, information, and activities with
users, who can also react, comment, and share these posts with their
friends.
Before collecting Facebook Pages' content data, we first selected
Facebook Pages located in Japan2. As of February 2017, there were
109,046 Facebook Pages in Japan. From these pages, we crawled
every post and comment between March 11th and September 11th
in 2011 through Facebook Graph API. Through acquiring this data,
we found that 16,540 out of 109,046 pages published posts during
the period. In total, 873,005 posts and comments were gathered.
Some of these posts and comments also have attachment files, such
as notes, photos, videos, and links to other websites. In this study,
we analyzed every text data including attachment descriptions.
3.1.2 Disaster-related posts. To examine whether different types
of disaster-related communication have different types of effects on
the demand for used cars, we created the following four datasets.
Dataset1) Geo-information based dataset. First, we selected
posts, comments, and descriptions which contained any of the
tsunami-stricken areas' names, including cities, towns, villages, and
2 The initial list of the Facebook Pages was provided by Professor Shyhtsun Felix Wu,
the University of California, Davis.
small district's names (totally 2,092 areas' names)3. In this method,
we found 67,330 posts and comments.
Dataset2) Disaster-interests-based dataset. Second, we tested
word appearance proportions between 2010 (before the disaster) and
2011 (after the disaster). In doing so, we further collected Facebook
Pages in Japan between March 11th and September 11th in 2010 and
found 220,871 posts and comments. By conducting a chi-square test
of nouns, adjectives, and verbs whose letter lengths are more than
one (in Japanese), we identified 3,385 words whose appearance
ratios were significantly larger than those in 2010 (p < .05). Because
we found several non-disaster-related words among the 3,385
words, for the purpose of this study, the authors manually picked
623 words from the 3,385 words if a word related to the Great East
Japan Earthquake and Tsunami and automobile demand. In total,
264,441 posts and comments were found.
Dataset3) In addition, we created an intersection of Dataset1 and
Dataset2 as Dataset3 (56,017 posts/comments).
Dataset4) contains data which consists of only interest-based
disaster-related posts and comments (subtracting Dataset3 from
Dataset2). Figure 1 shows the number of posts and comments in
each dataset and the relationships between them.
Figure 1: Four types of disaster-related Facebook Page
datasets and number of posts and comments of each dataset
3.2 Used-car market data
The second data we used for the analysis was Japanese used-car
market data. We used used-car data sourced from advertisements
which were posted on one of the most dominant used-car magazines
in Japan, 'Goo.' 'Goo' is published half-monthly. We used the data
posted by dealers in the water-damaged areas (Miyagi and Iwate
prefectures), between the second half of April in 2011 and the first
half of October in 2011. After the disaster, 'Goo' suspended
publication of the issue for the first half of April in the damaged
area. In total, we analyzed data from 12 issues covering half of the
year after the disaster. For the analysis, we selected four types of
Light Motor Vehicle used cars because the demand for Light Motor
Vehicles notably increased in the damaged area after the disaster
[26]. Table 1 describes real prices and the numbers of these body
types4.
3 This study used areas' name based on 2015 Population Census (https://www.e-
stat.go.jp/). If a city, town, or village is listed in the 'Area of inundated area' published
by
Japan
(http://www.gsi.go.jp/kikaku/kikaku60004.html) and located in Miyagi and Iwate
prefectures, we regard the area as tsunami-stricken.
Information
Geospatial
Authority
the
of
Table 1: Real prices and numbers in the damaged area
between the second half of April and the first half of October
in 2011
Real Price (yen)
Min Max
Number
of cars
Mean
S.D.
Body type
Light Motor Vehicle
RV (LR)
Light Motor Vehicle
Cab Van (LC)
Light Motor Vehicle
Truck (LT)
Light Motor Vehicle
Others (LO)
16,333 49,281 2,975,359 626,484 314,974
1,314 59,609 1,469,681 538,981 258,629
1,280 71,942 1,565,262 482,745 246,275
3,567 39,014 1,745,118 520,550 280,973
4. Facebook Page Sentiment Analysis
To analyze the sentiment of each Facebook Page's posts and
comments, we have also used Japanese sentiment porality
dictionaries designed to use for sentiment analysis, which are openly
provided by Inui-Okazaki Laboratory, Tohoku University [12, 17].
The dictionaries contain about 5,000 verbs, adjectives, and
adjectival verbs, and about 8,500 nouns. Every word in the
dictionaries is tagged as positive, negative, or neutral. For the sake
of this study, we removed ten disaster-related words from the
dictionaries; namely, 'disaster-stricken,' 'disaster,' 'Tsunami,'
'evacuation,' 'earthquake,' 'catastrophe,' 'flooded,' 'disaster-stricken
area,' and 'big disaster.' With the dictionaries, we enumerated the
numbers of positive, negative, and neutral words in each post and
comment. Then, the sentiment score of the i th post or comment is
calculated as Si;
𝑁"#$%"&"'( – 𝑁"+(,-&"'(
𝑁"#$%"&"'(+𝑁"+(,-&"'(+𝑁"+(/&0-1
𝑤ℎ𝑒𝑟𝑒 𝑁"#$%"&"'(,𝑁"+(,-&"'( and 𝑁"+(/&0-1 denote the number
of positive, negative and neutral words of the i th comment or post5.
If the i th post or comment had any attachment description and the
attachment description was different from the i th text, the
attachment description's score was added to Si.
To analyze these scores with used-car prices, the means of
sentiment score in every half month was calculated. Figure 2 shows
the chronological change of the sentiment scores means for
Dataset1, Dataset2, Dataset3, and Dataset4, respectively. The trends
of Dataset 1 and 3 and those of Dataset 2 and 4 are different and
sometimes go in opposite directions as the figure shows.
4 Real prices of the used cars were calculated based on the monthly 'automobile'
deflator of the fiscal 2015 Consumer Price index (CPI).
5 When polar words appear with denial words in one phrase (e.g., I was not happy,
where 'happy' is a positive word and 'not' is a denial.), the word (e.g., happy) is counted
as an opposite polar word (e.g., happy as negative).
For the analysis, we set a one-month time lag between Facebook
Pages' data and used-car data because Facebook data is real-time
information, but used-car data is paper-based and takes about one
month to be published after data was collected from town used-car
shops. For example, Facebook Page data of the second half of April
2011 corresponds to the used-car data of the second half of May
2011 in this study. Our target time range was from the second half
of April to the second half of September in 2011.
X5j = Other fuels dummy (LPG, CNG or FC = 1, others = 0)
Age:
X6j = Age (in years)
Kilometers driven:
X7j = 100,000km dummy (over 100k km driven = 1, others = 0)
We apply equation (1) to four types of datasets respectively. The
statistical summary and correlation tables of our model are shown in
the Appendix.
Table 2. The result of our models
X1
S
**
**
X4
X5
X6
1
t
e
s
a
t
a
D
X2
X3
C
L
2
t
e
s
a
t
a
D
C
L
O
L
std err 0.0
std err 0.0
O
L
R
L
.636
T
L
R
L
.636
T
L
X7 D_72 D_82 D_91
Inter
Adjr2
cept
0.0 * 0.0 * -0.129 ** -0.296 ** -0.019 -0.002 -0.048 * 1.651 *
.666 coef 0.0
-0.043 ** 0.0 * 0.0 *
0.0 0.0 0.002 0.019 0.024 0.022 0.023 0.663
0.014 0.0 0.0
std err 0.0
.700 coef 0.0 ** 0.048 ** 0.0 0.0
0.0 0.102 -0.082 ** -0.357 ** -0.033 -0.020 -0.048 0.801
0.018 0.0 0.0
std err 0.0
0.0 0.144 0.002 0.018 0.032 0.031 0.028 0.857
0.092 ** 0.318 * 0.267 -0.071 0.309 ** -0.10 ** -0.321 ** -0.006 0.013 -0.015 0.942 **
.660 coef 0.0
0.005 0.157 0.182 0.182 0.087 0.001 0.007 0.010 0.009 0.009 0.255
std err 0.0
coef 0.0 ** 0.229 ** 0.0 0.0
0.0 0.0 -0.078 ** -0.343 ** -0.007 -0.017 -0.016 -0.095
0.038 0.0 0.0 0.0 0.0 0.002 0.027 0.035 0.035 0.033 1.009
std err 0.0
0.0 0.0 -0.129 ** -0.295 ** 0.011 -0.010 -0.016 -1.964
.665 coef 0.0 ** -0.042 ** 0.0 0.0
0.0 0.0 0.002 0.019 0.021 0.022 0.024 1.347
0.014 0.0 0.0
0.0 ** 0.139 -0.082 ** -0.359 ** -0.008 -0.003 0.011 -6.240 **
.703 coef 0.0 ** 0.043 * 0.0 ** 0.0 **
0.018 0.0 0.0
0.0 0.144 0.002 0.018 0.029 0.030 0.030 1.689
.660 coef 0.0 ** 0.092 ** 0.325 * 0.266 -0.078 0.310 ** -0.10 ** -0.321 ** 0.011 0.009 0.005 -1.465 **
0.005 0.158 0.182 0.182 0.087 0.001 0.007 0.009 0.009 0.009 0.557
std err 0.0
0.0 0.0 -0.078 ** -0.343 ** -0.012 -0.023 -0.032 1.761
coef 0.0 ** 0.228 ** 0.0 0.0
0.038 0.0 0.0 0.0 0.0 0.002 0.027 0.031 0.035 0.036 2.10
std err 0.0
0.0 ** 0.0 ** -0.129 ** -0.296 ** -0.037 -0.010 -0.057 * 1.595 *
.666 coef 0.0 ** -0.042 ** 0.0 * 0.0 *
0.0 0.0 0.002 0.019 0.027 0.022 0.024 0.621
0.014 0.0 0.0
.700 coef 0.0 ** 0.048 ** 0.0 0.0
0.0 0.104 -0.082 ** -0.357 ** -0.022 -0.027 -0.041 0.079
0.018 0.0 0.0
0.0 0.145 0.002 0.018 0.036 0.030 0.030 0.787
.684 **
.660 coef 0.0 ** 0.092 ** 0.320 * 0.268 -0.073 0.310 ** -0.10 ** -0.321 ** -0.010 0.008 -0.017
0.005 0.158 0.182 0.182 0.087 0.001 0.007 0.011 0.008 0.009 0.245
std err 0.0
0.0 0.0 -0.078 ** -0.343 ** -0.016 -0.015 -0.022 0.265
coef 0.0 ** 0.230 ** 0.0 0.0
0.038 0.0 0.0 0.0 0.0 0.002 0.027 0.040 0.034 0.035 0.926
std err 0.0
0.0 -0.003 -0.014 -2.896 **
0.0 ** 0.0 ** -0.129 ** -0.294 **
.666 coef 0.0 ** -0.043 ** 0.0 ** 0.0 **
0.0 0.0 0.002 0.019 0.021 0.022 0.023 1.093
0.014 0.0 0.0
0.0 -0.009 -5.007 **
.703 coef 0.0 ** 0.043 * 0.0 ** 0.0
0.0 ** 0.136 -0.082 ** -0.359 ** -0.030
0.0 0.144 0.002 0.018 0.029 0.030 0.028 1.369
0.018 0.0 0.0
.660 coef 0.0 ** 0.092 ** 0.324 * 0.261 -0.082 0.310 ** -0.10 ** -0.321 ** 0.004 0.013 0.004 -1.743 **
0.005 0.157 0.182 0.182 0.087 0.001 0.007 0.009 0.009 0.009 0.447
0.0 0.0 -0.078 ** -0.343 ** -0.006 -0.023 -0.026 1.316
0.038
0.0 0.0 0.0 0.002 0.027 0.031 0.035 0.033 1.641
Note1: Note: D_72, D_82, D_91 represent dummies of the first half of July, the second half of August, and
the first half of September, respectively. This applies to the tables below.
Note2: P value *: < .05, **: < .01
std err 0.0
coef 0.0 ** 0.228 ** 0.0 0.0
std err 0.0
R
L
.636
T
L
R
L
.660
T
L
std err 0.0
std err 0.0
std err 0.0
std err 0.0
0.0
O
L
C
L
C
L
O
L
4
t
e
s
a
t
a
D
3
t
e
s
a
t
a
D
6. RESULT
By applying equation (1) to four types of datasets, this study
observes how public sentiment toward the disaster correlates with
used-car price, and whether different types of communication about
the disaster have a different correlation with the used-car prices.
Table 2 shows the result of our analysis. The estimated coefficients
of S are bolded if they have a statistically significant effect (p < .05).
there were significant positive
correlations of S with the price of LR and LO. Similarly, in Dataset3
(Geo-info and disaster-related interests), there was a significant
positive effect of S on the price of LR and LO. On the other hand, in
Dataset2 (Only Disaster-related interests), there were significant
negative correlations of S for the price of LR and LC. In addition,
for Dataset4 (Disaster-related interests), there were significant
negative correlations of S for LR, LC, and LO.
For Dataset1 (Geo-info),
7 Related research uses engine volume as another control variable, but the current study
does not because all target light motor vehicles' engine volumes are the same (660cc).
Note: 1 and 2 in the x-axis label represent the first half or second half of the month. Because the disaster
happened on the 11th of March 2011, the first half of March in 2011 is divided into two: the first half before
the disaster (March 1st to March 10th), and the first half after the disaster (March 11th to 31st ).
Figure 2: Sentiment Score mean of Dataset1-4
5. MODEL
To assess how S correlates with used-car prices, we developed our
model, based on the Hedonic Model used in our previous work [10]:
𝑙𝑛𝑃==𝛽@+𝛽A𝑋=+𝛽C𝑆=+𝛽E𝐷=+𝜀= (1)
Where lnPj is the natural logarithm of the real price of the j th
product, Xj is a vector of observable characteristics of the used cars.
Sj is Facebook Pages' sentiment scores. Dj is a dummy vector of
periods. We chose three periods in order to control chronological
effect on prices6. εj is the error term. By focusing on Sj, we can assess
the correlation between the sentiment scores on disaster-related
posts and comments on Facebook Pages and the price of used cars
in the damaged area by controlling the observable characteristics of
the used cars and the chronological effect based on the hedonic
approach. For the control variables Xj,
this paper uses the following7:
Transmission:
X1j = Transmission dummy (Automatic = 1, others = 0)
Fuel:
X2j = Diesel dummy (Diesel = 1, others =0)
X3j = Gas Hybrid dummy (Gas Hybrid = 1, others = 0)
X4j = EV dummy (EV = 1, others = 0)
6 The first half of July, the second half of August, and the first half of September are
chosen as control periods. We assessed all the periods as a dummy variables based on
equation (1) by using all-type-pooling data. Those of the three periods are statistically
significantly positive.
7. DISCUSSION
In this section, we discuss the results presented in the previous
section. First our analysis reveals that there was a statistically
significant positive correlation between Facebook sentiment scores
and the price of LR and LC in geo-info based datasets – Dataset1
and Dataset3. Therefore, when geo-info-based disaster-related
communication was more positive, there might have been excess
demand for LR and LO in the damaged area. On the other hand, our
analysis also shows that there were significant negative correlations
between Facebook sentiment scores and the prices of several used-
car types in disaster-related interests-based datasets – Dataset2 and
Dataset4. These negative correlations between sentiment scores and
used-car prices might be affected by the different trends of sentiment
scores between geo-info-based and disaster-interested-based
communication. There are two interpretations of this result. One
interpretation is that when people's sentiments in the damaged area
became positive, they started to purchase used cars. The other
interpretation is that when people are just beginning to recover as
indicated in rising car prices, they become more positive in their
sentiment. The latter supports the idea that people do not remain
helpless victims of disaster response, and instead participate in
recovery in ways that are helpful.
For further discussion, we focus on a comparison of Dataset3 and
Dataset4 because both are equally related to disaster-interests
(Figure 1). Facebook Pages users whose post or comment
categorized in Dataset3 might be familiar with damaged areas
because they know the names of damaged-areas while those of
Dataset4 might not be familiar with these areas. Moreover, the
trends of sentiment scores are different. In particular, those of
Dataset3 and Dataset4 after the first half of April are negatively
correlated (coefficient = -0.28). This difference might imply that the
sentiment of those who are familiar with damaged areas such as
local residents might change in the opposite direction to the
sentiment of those who are not familiar with them such as non-local
residents. This means, for instance, that even when people's
activities in the damaged area aimed at restoring their daily-lives
were intense and their sentiment positively improved, people
outside the damaged area might express their anxiety or concern due
to reading comments about people's continuous struggles for
recovery in the damaged area. These results are consistent with other
research that indicates that local citizens more likely share images
related to response, recovery and the damage, while the non-local
population focused more on the images of people suffering [2]. In
long-term recovery, local residents might have had more positive
sentiments regarding disaster than those on the outside. This is
because they need to be strong to return back to normal routines
while onlookers from the outside might continue to express
sentiments of worry as part of their collective gaze on others'
suffering [2]. Our results imply that, for long-term recovery
analysis, we need to distinguish the sentiment differences between
those who familiar with the damaged areas and those who are not
familiar with the areas even if both are interested in the disaster
recovery.
8. CONCLUSION
The purpose of this study was to analyze the following two
questions; (1) how the public sentiment of disaster-related
communication on Facebook related to the demand for used cars in
the damaged area, and (2) whether different types of disaster-related
communication related differently to the demand for used cars.
For the first question, our analysis reveals that there were
correlations between social media sentiment and the price of used
cars in the damaged area. For the latter question, this study shows
that a correlation between disaster-related communication and used-
car demand might depend on whether the people communicating are
local or non-local. When those who are familiar with the disaster
areas, such as local residents, communicate about the disaster, their
sentiment on Facebook Pages might have positively correlated with
the price of used cars. One interpretation of this result is that when
people are beginning to recover as indicated in rising car prices, they
become more positive in their sentiment.
On the other hand, the sentiment of those who are not familiar
with the disaster areas, i.e. non-local people might negatively
correlate to the used-car demand. This results suggest that we need
to distinguish sentiment between those who are familiar with the
damaged area and those who are not familiar even if both are
equally interested in the disaster itself and disaster relief.
Our study was able to contribute academically to disaster
management with the following two points. First, this study showed
the potential usefulness of social media data for assessing long-term
disaster recovery status in disaster-stricken areas. Secondly, we
were able to shed light on a new point of discussion; namely,
whether for long-term recovery different types of disaster-related
communication on social media have different types of effects in the
real world.
On the other hand, we only investigate one disaster. There is
a need to investigate other water-related large-scale disasters, such
as hurricanes. In addition, future studies should investigate whether
sentiment, in general, helps determine other types of public demands
other than those of used cars.
APPENDIX
Table A1 Statistical summary of the models
Data
set1
Data
set4
S
Data
set3
S
Data
set2
S
LnP X1 X2 X3 X4 X5 X6 X7 D_72 D_82 D_91 S
mean 12.99 0.72 0.00 0.00 0.00 0.00 7.61 0.14 0.10 0.10 0.09 0.19 0.19 0.20 0.19
std
0.65 0.45 0.00 0.00 0.00 0.00 3.81 0.34 0.30 0.29 0.29 0.01 0.01 0.01 0.01
min 10.57 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.17 0.17 0.18 0.17
max 14.37 1.00 0.00 0.00 0.00 0.00 20.00 1.00 1.00 1.00 1.00 0.21 0.20 0.23 0.20
mean 13.07 0.29 0.00 0.00 0.00 0.00 7.37 0.31 0.09 0.08 0.10 0.19 0.19 0.20 0.19
std
0.53 0.45 0.00 0.00 0.00 0.06 4.25 0.46 0.28 0.27 0.30 0.01 0.01 0.01 0.01
min 11.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.17 0.17 0.18 0.17
max 14.20 1.00 0.00 0.00 0.00 1.00 21.00 1.00 1.00 1.00 1.00 0.21 0.20 0.23 0.20
mean 13.21 0.58 0.00 0.00 0.00 0.00 7.40 0.16 0.09 0.10 0.10 0.19 0.19 0.20 0.19
std
0.54 0.49 0.02 0.01 0.01 0.03 3.73 0.37 0.29 0.30 0.30 0.01 0.00 0.01 0.01
min 10.81 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.17 0.17 0.18 0.17
max 14.91 1.00 1.00 1.00 1.00 1.00 21.00 1.00 1.00 1.00 1.00 0.21 0.20 0.23 0.20
mean 12.95 0.06 0.00 0.00 0.00 0.00 10.00 0.14 0.10 0.08 0.10 0.19 0.19 0.20 0.19
std
0.54 0.24 0.00 0.00 0.00 0.00 5.27 0.35 0.30 0.27 0.30 0.01 0.01 0.01 0.01
min 11.18 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.17 0.17 0.18 0.17
max 14.26 1.00 0.00 0.00 0.00 0.00 22.00 1.00 1.00 1.00 1.00 0.21 0.20 0.23 0.20
LA N=
3,567
LC N=
1,314
LR N=
16,333
LT N=
1,280
Table A2 Correlation table of the model for Each Dataset
LnP
X1
X2
X3
X4
X5
X6
X7
D_72
D_82
D_91
S
1
t
e
s
a
t
a
D
3
t
e
s
a
t
a
D
Dataset2
.137
.217
.053 -.024
.216
1 -.080
.003 -.497 -.261
1 -.024 -.002 -.005
1
.137
.216 -.080
.127
1
-.007 -.002 -.002 -.001
.0
.003 -.017 -.005 -.002
.217 -.085
-.497 -.166
.004
.210 -.019 -.005
-.261 -.067
LnP X1 X2 X3 X4 X5 X6 X7 D_72 D_82 D_91 S
.022
.009
.002
.031
-.003 -.022
.004
.012
-.003 -.009
-.001
.0
-.012 -.053
-.002 -.009
.013
-.103
.130
-.106
1
.413
.252 -
.127 -.007
.0
.053 -.002 -.017 -.166 -.067 -.002
.210 -.003
1 -.001 -.002 -.085 -.019 -.004
.004 -.005 -.003
.004 -.004
.002
.297 -.003
1
1 -.006
.297
1
.005
.002 -.004 -.020 -.006 -.102
.004 -.003 -.001 -.012 -.002 -.103
.40
.016
.009
-.008 -.010 -.003 -.011 -.002
.016
.008
-.003
.005
.002
-.004
-.020
-.006
-.102
1
-.106
-.289
.0 -.002 -.003 -.004 -.003 -.004 -.003 -.006
.008 -.003
.002 -.003
.0
1
.002
.004
.011 -.004
.003
Dataset4
1
1
.217
.003
-.024
.137
1
-.080
.053
.216
-.080
-.497 -.261
.127
.053
-.024 -.002 -.005
1
.137
.216
.127
1
-.007 -.002 -.002 -.001
.0
-.017 -.005 -.002
.003
-.085
-.497 -.166
.004
-.019 -.005
-.261 -.067
S
LnP X1 X2 X3 X4 X5 X6 X7 D_72 D_82 D_91
.025
.009
.002
.035
-.003 -.017
.004
.016
-.003 -.007
-.001
.0
-.012 -.054
-.002 -.006
-.103 -.181
.205
-.106
.253
-.007
.0
-.002 -.017 -.166 -.067 -.002
-.003
-.001 -.002 -.085 -.019 -.004
-.005 -.003
-.004
.004
-.003
.297
1
-.006
-.002 -.003 -.004 -.003 -.004 -.003 -.006
.008
.002
.016
.008
-.003
.005
.002
-.004
-.020
-.006
-.102
.0
.016
.009
-.002 -.008 -.007 -.007 -.003
.002
-.004 -.020 -.006 -.102
-.003 -.001 -.012 -.002 -.103
.561
.004
.002
1
.297
.0
1
.002
.004
-.106
-.190
-.003
-.003
.217
.210
.005
.004
1
.30
.210
1
1
LnP
X1
X2
X3
X4
X5
X6
X7
D_72
D_82
D_91
-
S
.0
-.005
.0
ACKNOWLEDGEMENTS
We thank the reviewers of this paper for their constructive feedback
including insightful suggestion of an interpretation of our results.
Any errors are the responsibility of the authors. This study was
partially supported by the research grant 'Proto Award,' which the
first author received. We would like to show our gratitude to Proto
Corporation who provided used-car market data and financial
support. This study is also partially supported by the Graduate
Program for Social ICT Global Creative Leaders. The authors also
would like to thank Professor Shyhtsun Felix Wu from the
University of California, Davis, for providing us with the initial data
of the Japanese Facebook Pages' profiles. This study received ethical
approval (No.17-2) from the Graduate School of Interdisciplinary
Information Studies, The University of Tokyo.
REFERENCES
[1] Shibuya Y. and Tanaka H. 2017. A Demand Side Analysis of the Car Market after
The Great East Japan Earthquake and Tsunami of 2011: A content analysis of
Facebook Pages. In Proceedings of the 16th International Conference of the
Japanese Economic Policy Association, (Nov. 2017). Naha, Japan.
[2] Bica, M. et al. 2017. Visual Representations of Disaster. In Proceedings of the
2017 ACM Conference on Computer Supported Cooperative Work and Social
Computing - CSCW '17. (Feb. 2017), Portland, OR, 1262–1276.
DOI:https://doi.org/10.1145/2998181.2998212.
[3] Breuninger, K. 2017. Hurricane Harvey could cause a price surge for used cars.
CNBC.
[4] Charles-Smith, L.E. et al. 2015. Using social media for actionable disease
surveillance and outbreak management: A systematic literature review. PLoS
ONE. 10(10), 1–20. DOI:https://doi.org/10.1371/journal.pone.0139701.
[5] Chee, B. 2017. Hurricanes cause used car prices to increase. Daily News.
[6] Chew, C. and Eysenbah, G. 2006. Pandemics in the Age of Twitter: Content
Analysis of Tweets during the 2009 H1N1 Outbreak. Annals of the Academy of
Medicine Singapore. 35(5), 361–367.
DOI:https://doi.org/10.1371/journal.pone.0014118.
[7] Chunara, R. et al. 2012. Social and news media enable estimation of
epidemiological patterns early in the 2010 Haitian cholera outbreak. American
Journal of Tropical Medicine and Hygiene. 86(1), 39–45.
DOI:https://doi.org/10.4269/ajtmh.2012.11-0597.
[8] Gruebner, O. et al. 2017. A novel surveillance approach for disaster mental health.
PLoS One. 12(7), 1–15.
DOI:https://doi.org/http://dx.doi.org/10.1371/journal.pone.0181233.
[9] Guan, X.Y. and Chen, C. 2014. Using social media data to understand and assess
disasters. Natural Hazards. 74, 2 (2014), 837–850.
DOI:https://doi.org/10.1007/s11069-014-1217-1.
[10] Haan, M.A. and de Boer, H.W. 2010. Has the Internet Eliminated Regional Price
Differences? Evidence from the Used Car Market. De Economist. 158, 4 (2010),
373–386. DOI:https://doi.org/10.1007/s10645-010-9151-4.
[11] Kelly, S. and Ahmad, K. 2014. Determining levels of urgency and anxiety during
a natural disaster: Noise, affect, and news in social media. In DIMPLE: DIsaster
Management and Principled Large-Scale information Extraction Workshop
Programme. 70.
[12] Kobayashi, N. et al. 2005. Collecting Evaluative Expressions for Opinion
Extraction. Journal of Natural Language Processing. 12, 3 (2005), 203–22.
DOI:https://doi.org/10.5715/jnlp.12.3_203.
[13] Kogan, M. et al. 2015. Think Local, Retweet Global. In Proceedings of the 18th
ACM Conference on Computer Supported Cooperative Work & Social
Computing - CSCW '15, 981–993.
DOI:https://doi.org/10.1145/2675133.2675218.
[14] Lang, S. 2017. Expect Used-Car Prices to Skyrocket in the Southeast Post-
Hurricane. Car and Driver.
[15] Li, X.H. et al. 2017. Reasoning human emotional responses from large-scale
social and public media. Applied Mathematics and Computation. 310, 182–193.
DOI:https://doi.org/10.1016/j.amc.2017.03.031.
[16] Liu, Y. and Lopez, R.A. 2016. The impact of social media conversations on
consumer brand choices. Marketing Letters. 27(1), 1–13.
DOI:https://doi.org/10.1007/s11002-014-9321-2.
[17] Masahiko, H. et al. 2008. Learning sentiment of nouns from selectional
preferences of verbs and adjectives. In Proceedings of the 14th Annual Meeting
of the Association for Natural Language Processing, (Mar. 2008), Tokyo, 584–
587.
[18] Neppalli, V.K. et al. 2017. Sentiment analysis during Hurricane Sandy in
emergency response. International Journal of Disaster Risk Reduction. 21
(2017), 213–222. DOI:https://doi.org/10.1016/j.ijdrr.2016.12.011.
[19] Nguyen, D.A. et al. 2014. On critical event observability using social networks:
A disaster monitoring perspective. In Proceedings IEEE Military
Communications Conference MILCOM. (Oct. 2014), Baltimore, MD, 1633–
1638. DOI:https://doi.org/10.1109/MILCOM.2014.268.
[20] Nikkei Sangyo Shinbun. 2011. Register of used cars increased in the disaster-
striken area. Nikkei Sangyo Shinbun.
[21] Onorati, T. and Diaz, P. 2015. Semantic Visualization of Twitter Usage in
Emergency and Crisis Situations. Information Systems for Crisis Response and
Management in Mediterranean Countries, Iscram-Med. N.B. BenSaoud et al.,
eds. 3–14. Springer, Cham.
[22] Prieto, M. et al. 2015. Using a hedonic price model to test prospect theory
assertions: The asymmetrical and nonlinear effect of reliability on used car
prices. Journal of Retailing and Consumer Services. 22(2015), 206–212.
DOI:https://doi.org/10.1016/j.jretconser.2014.08.013.
[23] Rao, T. et al. 2012. Twitter Sentiment Analysis: How to Hedge Your Bets In The
Stock Markets. State of the Art Applications of Social Network Analysis, 227-
247, Springer International Publishing.
[24] Rui, H. et al. 2013. Whose and what chatter matters ? The effect of tweets on
movie sales. Decision Support Systems. 55(4), 863–870.
DOI:https://doi.org/10.1016/j.dss.2012.12.022.
[25] Shibuya, Y. 2017. Mining Social Media for Disaster Management : In
Proceedings of IEEE International Conference on Big Data (Dec. 2017),
Boston, MA, 3029–3036.
[26] Shibuya, Y. and Tanaka, H. 2017. How Does a Large-scale Disaster Impact on
the Used-car Market. In Proceedings of the 74th Conference of Japan Economic
Policy Association (May. 2017), Tokyo.
[27] Starbird, K. et al. 2012. Learning from the crowd: Collaborative filtering
techniques for identifying on-the-gGround Twitterers during mass disruptions. In
Proceedings of 9th International Conference on Information Systems for Crisis
Response and Management, ISCRAM. (Apr. 2012), Vancouver, Canada, ID 148,
1–10.
[28] Starbird, K. and Palen, L. 2010. Pass it on?: Retweeting in mass emergency. In
Proceedings of the 7th International ISCRAM Conference, (Dec. 2010), Seattle,
Wahington, 1–10. DOI:https://doi.org/10.1111/j.1556-4029.2009.01231.x.
[29] Woo, H. et al. 2015. Public Trauma after the Sewol Ferry Disaster: The Role of
Social Media in Understanding the Public Mood. International Journal of
Environmental Research and Public Health. 12(9), 10974–10983.
DOI:https://doi.org/10.3390/ijerph120910974.
|
1605.06167 | 1 | 1605 | 2016-05-19T22:24:26 | Combining Density and Overlap (CoDO): A New Method for Assessing the Significance of Overlap Among Subgraphs | [
"cs.SI",
"physics.soc-ph"
] | Algorithms for detecting clusters (including overlapping clusters) in graphs have received significant attention in the research community. A closely related important aspect of the problem -- quantification of statistical significance of overlap of clusters, remains relatively unexplored. This paper presents the first theoretical and practical results on quantifying statistically significant interactions between clusters in networks. Such problems commonly arise in diverse applications, ranging from social network analysis to systems biology. The paper addresses the problem of quantifying the statistical significance of the observed overlap of the two clusters in an Erd\H{o}s-R\'enyi graph model. The analytical framework presented in the paper assigns a $p$-value to overlapping subgraphs by combining information about both the sizes of the subgraphs and their edge densities in comparison to the corresponding values for their overlapping component. This $p$-value is demonstrated to have excellent discrimination properties in real applications and is shown to be robust across broad parameter ranges.
Our results are comprehensively validated on synthetic, social, and biological networks. We show that our framework: (i) derives insight from both the density and the size of overlap among communities (circles/pathways), (ii) consistently outperforms state-of-the-art methods over all tested datasets, and (iii) when compared to other measures, has much broader application scope. In the context of social networks, we identify highly interdependent (social) circles and show that our predictions are highly co-enriched with known user features. In networks of biomolecular interactions, we show that our method identifies novel cross-talk between pathways, sheds light on their mechanisms of interaction, and provides new opportunities for investigations of biomolecular interactions. | cs.SI | cs |
Combining Density and Overlap (CoDO): A New
Method for Assessing the Significance of Overlap
Among Subgraphs
Coordinated Science Lab, UIUC
Dept. of Computer Science, Purdue University
Shahin Mohammadi †
West Lafayette, IN 47907
[email protected]
Abram Magner∗†
Champaign, IL 61820
[email protected]
Ananth Grama
Dept. of Computer Science, Purdue University
West Lafayette, IN 47907
[email protected]
Abstract
Algorithms for detecting clusters (including overlapping clusters) in graphs have
received significant attention in the research community. A closely related impor-
tant aspect of the problem – quantification of statistical significance of overlap of
clusters, remains relatively unexplored. This paper presents the first theoretical and
practical results on quantifying statistically significant interactions between clusters
in networks. Such problems commonly arise in diverse applications, ranging from
social network analysis to systems biology. The paper addresses the problem of
quantifying the statistical significance of the observed overlap of the two clusters
in an Erdos-Rényi graph model. The analytical framework presented in the paper
assigns a p-value to overlapping subgraphs by combining information about both
the sizes of the subgraphs and their edge densities in comparison to the correspond-
ing values for their overlapping component. This p-value is demonstrated to have
excellent discrimination properties in real applications and is shown to be robust
across broad parameter ranges.
Our results are comprehensively validated on synthetic, social, and biological
networks. We show that our framework: (i) derives insight from both the density
and the size of overlap among communities (circles/pathways), (ii) consistently
outperforms state-of-the-art methods over all tested datasets, and (iii) when com-
pared to other measures, has much broader application scope. In the context of
social networks, we identify highly interdependent (social) circles, and show that
our predictions are highly co-enriched with known user features. In networks of
biomolecular interactions, we show that our method identifies novel cross-talk
between pathways, sheds light on their mechanisms of interaction, and provides
new opportinities for investigations of biomolecular interactions.
1
Introduction
Quantification of statistical significance of an observed artifact in data is a critical aspect of data
analytics applications, particularly at scale. The statistical significance of an artifact is often quantified
∗Corresponding authors: [email protected]
†Authors contributed equally.
in terms of its p-value – the probability that a random event caused the observed artifact. Clearly,
the lower this probability, the higher the statistical significance. Statistical significance, in terms of
its p-value is defined with respect to a prior, which models the background (random) distribution.
Selecting a prior that is distant from the data renders all observations significant (i.e., they have
very low p values). Conversely, selecting a prior that is identical to the data renders all observations
insignificant (i.e., their p values approach 1). A suitable combination of a statistical prior along with
an appropriate p value formulation provides discrimination of significant artifacts from those that are
not.
p-values of observed artifacts may be estimated using analytic or sampling techniques. Sampling
techniques for artifacts in graphs often require large numbers of samples for convergence. Analytic
techniques, on the other hand, pose significant challenges for derivation of tight bounds, particularly
for complex graph models. Analytic techniques have been successfully demonstrated in the context
of characterizing the significance of dense subgraphs [1], distributions of subgraph diameters, and
frequencies of network motifs such as triangles. Sampling based techniques have been demonstrated
in conjunction with non-parametric graph priors to characterize the alignment of networks [2].
In this paper, we focus on the important and challenging problem of characterizing the statistical
significance, in terms of its p-value, of the observed overlap between two dense subgraphs. This
problem arises in a number of applications – for instance: (i) in understanding when an overlap
between two communities in a social network suggests a social tie; (ii) in assessing whether overlap
among two groups of like-minded movie viewers suggests a shared interest; and (iii) in determining
whether crosstalk between two sets of interacting biomolecules corresponds to a functional property.
The problem of analytically characterizing a suitable p-value for the overlap of two subgraphs, even
for simple graph models such as Erdos-Rényi, is a hard one. One can use simpler abstractions to
characterize observed overlap using Hypergeometric Tails (HGT) or by characterizing the significance
of the overlapping subgraph independently (i.e., ignoring the existence of the two sub-graphs).
However, these simpler abstractions lack the discriminating power necessary for most applications.
The Hypergeometric Tail does not consider network structure, therefore its applicability is limited.
Characterizing the significance of the overlapping subgraph does not consider cluster sizes, relying,
instead on high density within the overlapping subgraph. Our method, on the other hand, allows
for cases in which densities of each component subgraph and their overlap are not significant by
themselves with respect to the ambient graph, but the edges inside the two subgraphs are unusually
concentrated inside the overlap. This aspect of our method gives it excellent robustness across wide
parameter ranges, as well as diverse applications. We present a detailed theoretical foundation for
quantifying the p-value of the overlap of two subgraphs in an Erdos-Rényi graph. Our formulation
considers the sizes of the two sub-graphs, their densities, as well as the size and density of the overlap
set. In doing so, it provides excellent discrimination across the parameter space.
We comprehensively validate the suitability of our selected prior and our framework for quantifying
statistical significance of overlaps on synthetic as well as real networks. Using an Erdos-Rényi
random graph with implanted clusters of different size, density, and overlap, we experimentally
evaluate the behavior of our framework with respect to different parameters. Having established the
baseline behavior, we apply our method to the ego networks for Facebook, Google+, and Twitter
networks [3]. We identify social circles with significant overlap and show that these circles are highly
enriched in common features. Finally, using a well curated network of interacting human proteins
and a given set of functional pathways, we identify statistically significant crosstalk between these
pathways. We show that the crosstalk identified correlates very well with known biological insights,
while also providing a number of novel observations for future investigation. We also demonstrate
that our measure significantly outperforms other characterizations of statistical significance.
2 Background and Related Work
Evaluating the significance of overlap among a pair of given subgraphs is a challenging problem that
can be addressed from different viewpoints, depending on how significance is quantified. The most
common method for assessing overlap is to ignore the underlying interactions and focus on the size
of the overlap (number of vertices), compared to the sizes of subgraph pairs. In this approach, one
often uses Fisher's exact test, also known as the hypergeometric test [4]. This method is described in
more detail in Section 3.1. Another way to define significance of overlap is in terms of density. Here,
2
an overlap is defined to be significant if there are "many" edges in the overlap set, compared to a null
model. In this class of methods the size of overlap set is assumed to be fixed and density of overlap is
assessed, conditioned on the fixed size. The key aspect of this measure is the the density of overlap.
There has been extensive research focused on the algorithmic task of identifying dense components
in graphs (see, e.g., [5] for a survey). Regarding the study of dense subgraphs in random graphs, the
papers by Arratia in 1990 and Koyutürk et al. in 2007 [1, 6] are perhaps the most relevant. Both study
the typical sizes of subgraphs of a given density in Erdos-Rényi graphs, motivated by the study of
protein interaction networks. The former also gives a result on overlaps between dense subgraphs,
but only in the context of dense graphs, unlike social or biological networks that are sparse and the
number of edges and nodes are typically of the same order. The distributions of the maximum sizes
of cliques and independent sets in random graphs have also been studied, essentially completely [7].
The typical behavior of the overlaps between independent sets in the case of sparse random graphs
(equivalently, cliques in extremely dense random graphs) has recently been studied [8]. However, the
range of parameters for which the results are derived differs significantly from ours, rendering these
results less relevant to our applications of interest. While these contributions are fundamental to our
understanding of statistics regarding the distribution of dense components in a graph, none of them
directly address the problem of assessing the overlap among subgraphs. Here, we combine the two
approaches based on sizes of the overlapping subgraphs and the density of the overlap compared to
the constituent subgraphs to analytically derive a p-value for the overlap that considers both its size
and density.
From an applications point of view, this problem has important implications in social networks,
systems biology, financial transactions, and network security. In systems biology, as pathways
associated with specific biological functions are fully resolved, there is increasing need to assess
the extent of overlap/ cross-talk among these pathways. Pathway interactions have been shown to
play a key role in development and progression of cancers [9, 10]. Different groups have focused
on identifying the cross-talk map among pathways [11, 12]. However, to the best of our knowledge,
none of these methods directly use the overlap subgraph to infer pathway interactions. Another
important application of our method in life sciences is in geneset enrichment analysis. While the
hypergeometric test remains the most widely used method for identifying functional enrichment of a
set of differentially expressed genes, most recent methods do not focus only on the geneset overlap
but also try to incorporate network context to evaluate functional importance of genesets [13, 14].
However, a majority of these methods rely on computing empirical p-values instead of providing a
closed-form solution. Our method is the first method that quantifies statistical significance within
a network context, and in doing so, provides significantly higher discriminating power than prior
methods, while using significantly fewer computing resources.
3 Statistical significance of subgraph overlaps
Given a pair of overlapping dense subgraphs in a graph, our goal is to derive a measure of the extent
to which we should be surprised by their overlap. The appropriate framework for this is that of
statistical significance. In the most general setting, we have a random variable X on a probability
space and an observed value X for X, and we want a measure of the surprise in observing X. To
the observed value X, we associate a p-value, which is given by the probability that X takes a value
as extreme or more extreme than X (the notion of extremity depends on the range of the random
variable). If the p-value is less than some fixed threshold, the observed value is said to be statistically
significant with respect to the distribution of X (the prior); that is, the observation X is unlikely to
have occurred by chance.
For a given random variable (which need not even take values in a partially ordered set), there
may be many non-equivalent notions of p-value that take into account various pieces of observable
information about X. In general, a notion of statistical significance is preferable to another if it has
more discriminating power, in the sense that the p-value decays smoothly as observations become
more extreme (this allows for statistically significant observations to be detected and to be ranked by
relative significance).
In what follows, we will describe three formulations of statistical significance for subgraph overlaps.
The first two, which are already present in literature, take into account only partial information: the
first takes into account only the sizes of the subgraphs and their intersection; the second takes into
3
account only the size and density of the intersection of the overlapping subgraphs. The third, which
we call CoDO and which is the main topic of this paper, combines subgraph sizes and densities
of individual subgraphs along with their their overlaps, to yield a test with significantly greater
discriminating power.
The basic setup in all three tests is as follows: we have a graph G∼G(n, p) (where G(n, p) denotes
the Erdos-Rényi distribution on graphs of size n, with edge probability p) and subgraphs A and
B with X = A \ B, Y = B \ A, and Z = A∩B. We also have the following definitions and
notation relating to density: For any subgraph S ⊆ G, we denote by E(S) the set of edges in S, and
e(S) = E(S). For a pair of subgraphs S1, S2, we denote the set of edges between nodes in S1 and
nodes in S2 by E(S1, S2), and e(S1, S2) = E(S1, S2). We denote by δ(S) the density of S:
(cid:0)S
(cid:1) .
e(S)
Similarly, for S1, S2,
δ(S) =
2
δ(S1, S2) =
e(S1, S2)
S1S2 .
We now describe several p-value formulations.
3.1 Hypergeometric Tail (HGT)
The hypergeometric tail p-value takes into account only the size of the overlap Z of A and B. It is
defined by considering the following probabilistic experiment (note that this hypothetical experiment
is introduced for the purpose of defining a particular probability distribution as the outcome of some
random process; it is not meant to be implemented by a user of our methods): we fix a subset
B ⊆ V (G) of size B = B, and we draw, uniformly at random from V (G), a subset A of nodes
of size A = A. The size A∩ B of the overlap is then hypergeometrically distributed, so the
hypergeometric p-value is given by the probability that the overlap in this experiment has size at least
that of the observed overlap Z. That is,
Pr[ A∩ B ≥ Z] = 1 − F (Z − 1, n, B, A),
where F (x, y, z, w), for arbitrary x ∈ N∪{0}, denotes the probability that a hypergeometrically
distributed random variable with population size y, number of successes z, and number of trials w,
takes a value at least x.
3.2 Erdos-Rényi Density Model (ERD)
A second approach to scoring of p-values of overlaps takes into account only the size and density of
the overlap set Z . It is defined as the probability that there exists in G a subgraph of density δ(Z )
and size at least Z. This is given by
Pr[∃H ⊆ G,H ≥ Z : δ(H ) = δ(Z )].
Upper bounds on this probability have been worked out by, e.g., Arratia in 1990 and Koyutürk et
al. in 2007 [1, 6]. The main tool for this is the first moment method [15]: the event that there exists
a subgraph with a given property is precisely equal to the event that the number of subgraphs with
the given property is at least 1. The first moment method consists of an application of Markov's
inequality to conclude that
Pr[#{H : H ≥ Z, δ(H ) = δ(Z )} ≥ 1] ≤ E[#{H : H ≥ Z, δ(H ) = δ(Z )}]
The expected value is then easily calculated using linearity of expectation. For a fixed value of δ(Z),
the threshold value of Z below which the expected value tends to ∞ as n → ∞ and above which it
tends to 0 turns out to be 2 log(n)
κ(δ(Z),p), where κ(a, b) is given by
κ(a, b) = a log(a/b) + (1 − a) log((1 − a)/(1 − b)),
(1)
the relative entropy between Bernoulli random variables with parameter a and b, respectively. The
first moment method shows that overlaps with density δ(Z) and size at least (1 + )Z, for any
4
fixed positive , are unlikely to occur randomly. The second moment method, which takes into
account the dependence between events defined on overlapping subgraphs, can be used to give a
matching probabilistic lower bound, which shows that, with high probability (i.e., with probability
asymptotically tending to 1), the maximum size of any δ(Z)- dense subgraph is asymptotically
equivalent to 2 log(n)
κ(δ(Z),p).
Because of the very sharp transition, as Z increases, from insignificant to significant, this formulation
has the undesirable property that it has little discriminating power. In particular, the first moment
upper bound implies that
Pr[#{H : H ≥ Z, δ(H ) = δ(Z )} ≥ 1] ≤ e−Θ(Z2).
That is, the p-value decays superexponentially as Z increases.
3.3 Combining Density/Overlap (CoDO)
The measures of statistical significance presented above are not well suited to real-world applications,
where the densities and sizes of the the dense components may vary significantly, and where we
desire smoother transitions. Motivated by these shortcomings, we propose an alternate formulation
that combines information about the size and density of the overlapping set, defined by the following
probabilistic experiment:
• Consider a set V of vertices, with size n, and a distinguished subset B of size B. Choose
uniformly at random from V a subset A of size A.
• In the set A∪ B, choose uniformly at random e(A∪B ) edges to insert.
Then, we define the combined density/overlap p-value to be the probability that the resulting overlap
A∩ B has size at least that of the observed overlap Z and that the density of the overlapping set
δ(A∩ B ) is at least the observed overlap density δ(Z ). That is, it is given by
pCoDO = Pr[A∩ B ≥ Z∩δ(A ∩ B ) ≥ δ(Z )]
By conditioning on the size of the overlap, we can get an explicit formula for this p-value in terms of
hypergeometric tails:
(cid:104) A∩ B = j
(cid:105) · Pr
(cid:104)
Pr
δ( A∩ B) ≥ δ(Z )(cid:12)(cid:12) A∩ B = j
(cid:105)
(2)
min{ A, B}(cid:88)
j=Z
pCoDO =
The first factor in the terms of the sum is easily seen to be a hypergeometric probability mass:
A∩ B∼Hypergeometric(n,B,A),
which is the number of successes when one draws without replacement A samples from a collection
of n items, B of which are successes. Analogously, the second factor is a hypergeometric probability
tail, since
(cid:18)(cid:18)A + B − j
(cid:19)
(cid:18)j
(cid:19)
2
,
2
(cid:19)
, e(A∪B)
.
e( A∩ B)∼Hypergeometric
Thus, the sum is explicitly computable, and tail bounds can be applied if approximations are desired.
Note that the expression (2) involves the observed sizes and densities of the constituent subgraphs, as
well as the overlaps, through the distributions of A∩ B and δ( A∩ B).
3.3.1 Characteristics of the CoDO p-Value
We investigate in more detail some interesting properties of the CoDO p-value defined above.
An elementary observation is that, whenever the density of overlap subgraph δ(Z) is low enough,
the conditional probabilities in the pCoDO formula degenerate to 1, and it becomes equivalent to the
hypergeometric tail p-value. Similarly, when the overlap size Z is small, all probabilities degenerate
to 1.
5
Next, we look at the behavior of pCoDO when we fix δ(Z) = ρZ ∈ (0, 1) and vary the observed
overlap size Z. We consider z =
We have the following lemma:
Lemma 1 (Monotone decrease as Z increases). For ρZ fixed as above, for z1 < z2, we have
Z
M ∈ (0, 1), where we define M = min{A,B}.
pCoDO(z1, ρZ) ≥ pCoDO(z2, ρZ).
Proof. We have
pCoDO(z1, ρZ) − pCoDO(z2, ρZ) =
Pr[ A∩ B = j] Pr
δ( A∩ B) ≥ ρZ
j=z1M
M(cid:88)
− M(cid:88)
z2M−1(cid:88)
j=z2M
=
(cid:104)
(cid:104)
(cid:104)
(cid:105)
(cid:12)(cid:12) A∩ B = j
(cid:105)
(cid:12)(cid:12) A∩ B = j
(cid:105)
(cid:12)(cid:12) A∩ B = j
Pr[ A∩ B = j] Pr
Pr[ A∩ B = j] Pr
δ( A∩ B) ≥ ρZ
δ( A∩ B) ≥ ρZ
Since all of the terms of the final sum are at least 0, this completes the proof.
j=z1M
It then becomes interesting to investigate the point at which pCoDO transitions from insignificant to
significant as a function of z. To do this we, define the threshold point θ(ρZ) by
θ(ρZ) = z∗ = inf{z ∈ (0, 1) : pCoDO(z, ρZ) ≤ 1/2}.
computable. However, the fact that E(cid:104)
Note that, whenever it exists, the threshold point is unique, because of the monotonicity property just
proven. In principle, the asymptotic value of the threshold point, as a function of ρZ, is explicitly
is an increasing function of j whenever
j is large enough makes this somewhat subtle. The following upper bound can be established:
Theorem 1. With ρZ ∈ (0, 1) fixed and
e( A∩ B)(cid:12)(cid:12) A∩ B = j(cid:105)
M = min{A,B} (cid:29) √
n,
we have, for any fixed δ > 0,
θ(ρZ) ≤ E[ A∩ B]
M
(1 + δ).
To prove this, we will need the following lemma giving large deviation bounds for the hypergeometric
distribution [16]. It is a consequence of the Hoeffding inequality [17].
Lemma 2 (Hypergeometric large deviations). Let X∼Hypergeometric(N, K, n) (the parameters
denote the population size, number of successes, and number of trials, respectively). Let p = K/N.
Then we have the following tail bound:
Pr[X ≥ (1 + δ)E[X]] ≤ exp(−nκ((1 + δ)p, p)),
where δ is any number greater than 0, and κ(a, b) is given by (1).
of Theorem 1. Let z = (1 + δ)
M . We have the following upper bound on pCoDO(z, ρZ).
E[ A∩ B]
pCoDO(z, ρZ) ≤ M(cid:88)
(cid:110)
j=zM
p∗ = max
Pr
j
where we define
Pr[ A∩ B = j]p∗ = Pr[ A∩ B ≥ zM ]p∗,
(3)
(cid:104)
δ( A∩ B) ≥ ρZ
(cid:12)(cid:12) A∩ B = j
(cid:105)(cid:111)
,
where the maximum is taken over all terms j in the sum (this is allowed because all of the probabilities
are non-negative).
6
Next, we apply Lemma 2 to further upper bound (3) by
pCoDO(z, ρZ) ≤ Pr[ A∩ B ≥ (1 + δ)E[ A∩ B]]p∗ ≤ exp(−Aκ((1 + δ)B/n,B/n))p∗.
We now examine the role of the relative entropy factor in the exponent. As B/n n→∞−−−−→ 0, its first
term asymptotically dominates:
κ((1 + δ)B/n,B/n) = (1 + δ)B/n log(1 + δ) + o(1).
√
Using the fact that B ≥ M (cid:29) (
n), we then have that the entire exponent tends to −∞. That
is, provided that n is large enough, pCoDO(z, ρZ) is arbitrarily small and, in particular, is less than
1/2.
Note that, in the proof of this theorem, we did not use any information about the conditional
probability in the pCoDO formula. This is another incarnation of the phenomenon that the conditional
expectation of the number of edges in A∩ B increases with j. Thus, broadening the applicability of
this bound requires a more careful study of how the conditional probabilities behave as j increases.
The behavior of pCoDO(z, ρZ) for fixed and varying ρZ is also of interest. We have an analogue of
Lemma 1:
Lemma 3 (Monotone decrease as ρZ increases). For fixed z ∈ (0, 1), we have, for ρ1 < ρ2,
pCoDO(z, ρ1) ≥ pCoDO(z, ρ2).
Proof. We have
pCoDO(z, ρ1) − pCoDO(z, ρ2)
Pr[ A∩ B = j] ·(cid:104)
M(cid:88)
=
(cid:104)
δ( A∩ B) ≥ ρ1
(cid:12)(cid:12) A∩ B = j
(cid:105) − Pr
(cid:104)
δ( A∩ B) ≥ ρ2
(cid:12)(cid:12) A∩ B = j
(cid:105)(cid:105)
Pr
j=zM
By monotonicity of the CDF of a random variable, the difference of conditional probabilities is
non-negative, so that the entire sum is positive. This completes the proof.
As an analogue of the definitions for fixed ρZ and varying z, we can define a threshold point φ(z). We
can also give analogous bounds for the location of the threshold point. The details of the derivation
are entirely similar to those for fixed z and varying ρZ.
4 Experimental Validation
We provide a detailed experimental evaluation of CoDO, in comparison with other measures, in the
contest of synthetic datasets, datasets derived from social networks, and datasets from biomolecular
interactions. We use synthetic datasets to characterize the dependence of our results of choices of
parameters. We use the other datasets to demonstrate the robustness and application scope of our
framework, even in cases where the networks do not follow an Erdos-Renyi model.
4.1 Assessing Overlap in Synthetic Graphs
To evaluate the performance of each measure (and associated method) on a controlled dataset, we
create a synthetic test case that models the behavior of functional modules at a smaller scale. We
sample an ER graph GR from G(n, p) with n = 80 and p = 3
n. We embed two modules with the
same high density (ρA = ρA = 10p) of size 50 and 40 vertices in GR with varying levels of overlaps
and density. For the overlap, the expected value of hypergeometric distribution for this setting is
n = 25, where nA and nB are the number of vertices in modules A and B, respectively. We
nAnA
chose overlap sizes of 20 and 30 vertices, which are below and above the expected value of number
of overlapping vertices, respectively, to represent low and high overlaps. For simulating the density
of overlap region, we tested a sparse overlap by setting ρZ = 2p = ρA
5 and a dense overlap by setting
ρZ = 10p = 2ρA. For each of these four settings, we computed HGT, ERD, and CoDO p-values,
the results of which are illustrated in Figure 1. Each subfigure represents the adjacency matrix of
the constructed test case, with modules A and B color-coded as blue and green, respectively. The
7
(a) Insignificant Overlap/Insignificant Density
(b) Insignificant Overlap/Significant Density
(c) Significant Overlap/Insignificant Density
(d) Significant Overlap/Significant Density
Figure 1: Synthetic graphs with varying levels of density/overlap. Illustrated here is the adjacency
matrix of generated graphs. Black, green, and blue dots (edges) belong to the background, the first,
and the second implanted subgraphs, respectively, whereas red dots represent edges in the overlap.
overlap set of the two modules is separately marked in red. The first notable observation in our
experiments is that ERD has a sharp transition from p-value of 1 to 0 as we vary ρZ from ρ to 2ρ. On
the other hand, CoDO exhibits a smooth transition as we increase ρZ .
When neither the overlap, nor its density are significant, as in Figure 1(a), the p-values from all
methods are close to 1 (as expected). When the overlap size is significant but density of overlap is
not (Figure 1(c)), HGT and CoDO yield identical significant results, while ERD does not identify
the overlap as significant (p-value approaching 1). On the other hand, when size of overlap is not
significant but its density is significant, as in Figure 1(b), HGT p-value is close to one, whereas both
ERD and CoDO identify the overlap as significant, the difference being that ERD p-value abruptly
changes from 1 to 3.29 × 10−70, but CoDO smoothly transitions from 8.77 × 10−1 to 4.45 × 10−3
demonstrating much better discriminating power. Finally, when both the size of the overlap and
its density are significant, CoDO p-value is more significant than in both cases in Figures 1(b) and
Figure 1(c), and it is more significant that HGT p-value alone.
4.2 Significance of Overlap Among Social Circles
Users in social networks are connected not only to their close friends, but also family members,
schoolmates, and colleagues, among others. Organizing friends into communities, or social circles,
is one of the common approaches to organizing, predicting, and recommending contacts. A user's
circles are typically overlapping, and a user can belong to one, many, or none of the circles. Given a
set of overlapping circles, we are interested in assessing whether there is a significant interdependency
among the circles, or that the observed overlap is simply due to the existence of bridge nodes or party
alters.
To evaluate our method, we use three sets of social networks derived from Facebook, Google+, and
Twitter[3]. Each of these networks is centered around a focal user, or ego, along with all other users it
directly connects to. This collection of neighbor nodes is also known as the set of alters. The induced
subgraph of friendships among alter nodes, is known as an ego net. The Facebook dataset is fully
8
01020304050607080900102030405060708090HGT = 8.77e−01, ERD = 1.00e+00, CODO = 8.77e−0101020304050607080900102030405060708090HGT = 8.77e−01, ERD = 3.29e−70, CODO = 4.45e−0301020304050607080900102030405060708090HGT = 8.33e−04, ERD = 1.00e+00, CODO = 8.33e−0401020304050607080900102030405060708090HGT = 8.33e−04, ERD = 2.44e−183, CODO = 1.05e−10Table 1: Statistics of ego nets
Dataset
Facebook
Google+
Twitter
# Nets Avg # Users Avg # Circles
# Over. Circles
# Signif. Overlaps
10
124
834
416.7
1,945.7
137.6
19.3
3.5
4.2
415
1,170
14,610
92
437
5,055
observed, in the sense that each user was asked to manually identify all coherent groups among their
friends. We refer to these coherent groups of friends as circles. In contrast to the Facebook dataset,
circles in Google+ and Twitter are restricted to publicly visible and explicitly designated circles for
each ego net.
To establish a ground truth for interdependency among pairs of circles, we use common features of
users to assign a p-value to their feature overlap. For a given ego net G = (V, E) together with a
K-dimensional feature vector for each node, we compute the total number of feature pairs between
(cid:1). Moreover, we can compute the total number of features common to
any pair of alters as π = K(cid:0)V
any two alters as:
2
ξ =
1f (i, j)
(4)
where V is the set of alter vertices, F is the set of features, and 1f (i, j) is an indicator function that
is one, if alter i and alter j share feature f, and zero, otherwise. Given an overlap set of O, we can
similarly define πO = K(cid:0)O
(cid:1) and:
2
(cid:88)
(cid:88)
i,j∈V
i<j
f∈F
(cid:88)
(cid:88)
i,j∈O
i<j
f∈F
ξO =
1f (i, j)
(5)
(6)
Using this notion, we can define the significance of feature overlap among two circles as:
min(ξ,πO)(cid:88)
x=ξO
(cid:0)ξ
x
(cid:1)
(cid:1)(cid:0) π−ξ
(cid:0) π
(cid:1)
πO−x
πO
p − val(O) =
which is simply the tail of the Hypergeometric distribution, measuring the probability of observing
ξO or more common features in a random set of size O (with πO feature pairs), if we were sampling
at random without replacement from all possible feature pairs. For each dataset, we compute the
significance of all circle pairs for every ego net and correct for multiple hypothesis testing using
Bonferroni method. Finally, we define a pair of circles as significantly correlated if p-value of their
overlap is smaller than or equal to the threshold 0.05. Table 1 summarizes the statistics of these
networks. Here, we remove all ego nets with less than two circles or those without at least one
common feature between alters. Among the three datasets, Facebook had the lowest percentage
of significant overlaps (< 25%) compared to the other two datasets (35% and 37%). This may be
attributed to method used for identifying circles in the Facebook dataset.
Next, to evaluate HGT, ERD, and CoDO methods, we assess all pairs of overlapping circles and sort
them based on their significance. For pairs with similar p-value, we randomly order them. Using
the gold-standard set of significantly correlated circles, computed using feature vector overlaps,
we compute the receiver operating characteristic (ROC) for each dataset individually. These are
presented in Figure 2. Each method is annotated with its area under the curve (AUC) to simplify
comparison. In all three datasets, CoDO outperforms the other two methods. It is worth noting that
CoDO is designed to capture signals from both network density and the overlap size. To illustrate
this point, we emphasize the behavior of CoDO over the Facebook dataset as an example. For small
FPR values, density has higher signal than overlap (observed as the superior performance of ERD
compared to HGT). In this regime, CoDO captures this signal and outperforms of ERD. When ERD
signal plateaus (0.1 < F P R), CoDO leverages network structure to outperform (HGT).
9
(a) Facebook
(b) Google+
Figure 2: Overlapping circles in social networks predict common features
(c) Twitter
4.3 Crosstalk Among Biological Pathways
Biological pathways are higher order constructs that perform key cellular functions. These pathways
are known to work in concert and their cross-talk regulates the systems level behavior of cells. To
evaluate the interaction between different pathways and their shared mechanisms, we seek to construct
a pathway-pathway interaction map that represents the extent of overlap among different pathways.
We construct a comprehensive human interactome from a recently published dataset by Han et al.[18],
resulting in a network of 164,826 interactions among 8,872 proteins. We downloaded the set of
KEGG pathways from MSigDB[19] and filtered pathways that have less than 10 corresponding
vertices in the human interactome. The final dataset consists of 186 pathways with an average of
∼ 66 vertices per pathway. To evaluate the computed p-values, we use co-transcriptional activity
of pathway pairs as a proxy for their functional relatedness. We downloaded the and processed
tissue-specific RNASeq dataset from the Genotype-Tissue Expression (GTEx) project [20], which
contains 2,916 samples from 30 different tissues/ cell types. We summarize tissue-specific expression
of each pathway by averaging the expression of all its member genes in each tissue. Then, we define
co-transcriptional activity of pathways by computing the Pearson's correlation of these tissue-specific
pathway expression signatures.
To evaluate different methods, we first compute the nonparametric Spearman's correlation between
the co-transcriptional activity scores and computed p-values in each method. This yields 0.28, 0.16,
and 0.41 correlation scores for HGT, ERD, and CoDO methods, respectively, which shows that CoDO
significantly outperforms the other two methods with respect to the co-transcriptional activity of
significant pathway pairs. Next, to put the computed p-values by CoDO in context, we construct a
pathway-pathway overlap network by thresholding pairwise overlaps at a stringent cutoff (p-value
≤ 10−30) and use all pairs with significant p-values as edges in the network. This results in a network
of 129 nodes (representing pathways) and 877 interactions (inferred as the significance of the pathway
overlaps) among them. This network is shown in Figure 3. We use Cytoscape [21] to visualize the
graph and MCODE [22] to cluster the network. Each cluster is color-coded independently, and four
major clusters are manually annotated with the dominant function in each group. We observe that
the set of top-ranked pathway pairs cluster together to form coherent groups with highly coherent
functions. These significant overlaps reveal interesting functional connections, which can be used to
understand pathology and identify novel drug targets.
10
00.10.20.30.40.50.60.70.80.9100.10.20.30.40.50.60.70.80.91False Positive Rate (1 − Specificity)True Positive Rate (Sensitivity) HGT (AUC = 0.779)ERD (AUC = 0.834)CoDO (AUC = 0.870)00.10.20.30.40.50.60.70.80.9100.10.20.30.40.50.60.70.80.91False Positive Rate (1 − Specificity)True Positive Rate (Sensitivity) HGT (AUC = 0.761)ERD (AUC = 0.655)CoDO (AUC = 0.763)00.10.20.30.40.50.60.70.80.9100.10.20.30.40.50.60.70.80.91False Positive Rate (1 − Specificity)True Positive Rate (Sensitivity) HGT (AUC = 0.820)ERD (AUC = 0.772)CoDO (AUC = 0.878)Figure 3: Pathway-pathway overlap graph
5 Conclusions
Assessing the statistical significance of observed overlaps between clusters in networks is an important
substrate of many graph analytics problems. In this paper, we present detailed analysis and derivation
of a p-value based measure of significance of cluster overlap. Unlike previous measures, our measure
accounts for cluster sizes, densities, and density of overlap – all critical parameters of the problem.
We show that our measure provides excellent discrimination, smooth transition, and robustness to
wide parameter ranges. Using both synthetic and real datasets, we validate excellent performance of
our analytical formulation.
Our work opens a number of avenues for continued explorations. These include formulations for
alternate graph models, algorithms aimed at explicitly maximizing statistical significance of overlaps,
and application validation in other contexts.
11
Immune ResponseDNA Replication and RepairDrug MetabolismCancer Signaling PathwaysReferences
[1] M. Koyutürk, W. Szpankowski, and A. Grama, "Assessing significance of connectivity and
conservation in protein interaction networks," Journal of Computational Biology, vol. 14, no.
6, pp. 747–764, 2007.
[2] S. Mohammadi et al., "Scope and limitations of yeast as a model organism for studying human
[3]
[4]
tissue-specific pathways," BMC Systems Biology, vol. 9, no. 1, p. 96, Dec. 2015.
J. Mcauley and J. Leskovec, "Discovering social circles in ego networks," ACM Trans. Knowl.
Discov. Data, vol. 8, no. 1, 4:1–4:28, Feb. 2014.
J. McDonald, Handbook of Biological Statistics. Baltimore, MD, USA: Sparky House Publish-
ing, 2014.
[5] V. E. Lee et al., "A survey of algorithms for dense subgraph discovery," English, in Managing
and Mining Graph Data, C. C. Aggarwal and H. Wang, Eds., vol. 40, ser. Advances in Database
Systems, Springer US, 2010, pp. 303–336.
[6] R. Arratia and E. S. Lander, "The distribution of clusters in random graphs," Advances in
Applied Mathematics, vol. 11, pp. 36–48, 1990.
[7] B. Bollobás, Random Graphs, 2nd. Cambridge Studies in Advanced Mathematics, 2001.
[8] D. Gamarnik and M. Sudan, "Limits of local algorithms over sparse random graphs," Proceed-
ings of the 5th Conference on Innovations in Theoretical Computer Science, pp. 369 –376,
2014.
[9] Y. Sun et al., "Crosstalk analysis of pathways in breast cancer using a network model based on
overlapping differentially expressed genes," Experimental and Therapeutic Medicine, May
2015.
[10] Y. Wang et al., "Pathway crosstalk analysis of high-metastasis lung cancer cells.," Tumori,
[11] S. Mohammadi, G. Kollias, and A. Grama, "Role of synthetic genetic interactions in under-
standing functional interactions among pathways.," in Pacific Symposium on Biocomputing
(PSB) 2012, Jan. 2012, pp. 43–54.
[12] A. N. Tegge, N. Sharp, and T. M. Murali, "Xtalk: a path-based approach for identifying
crosstalk between signaling pathways," Bioinformatics, btv549, Sep. 2015.
[13] C. Mitrea et al., "Methods and approaches in the topology-based analysis of biological path-
ways," Frontiers in Physiology, vol. 4, 2013.
[14] X. Dong et al., "LEGO: a novel method for gene set over-representation analysis by incorpo-
rating network-based gene weights," Scientific Reports, vol. 6, p. 18 871, Jan. 2016.
[15] N. Alon and J. H. Spencer, The probabilistic method. Wiley.
[16] V. Chvátal, "The tail of the hypergeometric distribution," Discrete Mathematics, vol. 25,
pp. 285–287, 1979.
[17] A. Dembo and O. Zeitouni, Large Deviations Techniques and Applications, 2nd. Springer-
Verlag, 2010.
J. Han et al., "ESEA: Discovering the Dysregulated Pathways based on Edge Set Enrichment
Analysis.," Scientific reports, vol. 5, p. 13 044, 2015.
[18]
[19] A. Subramanian et al., "Gene set enrichment analysis: A knowledge-based approach for
interpreting genome-wide expression profiles," Proceedings of the National Academy of
Sciences, vol. 102, no. 43, pp. 15 545–15 550, Oct. 2005.
[20] K. G. Ardlie et al., "The Genotype-Tissue Expression (GTEx) pilot analysis: Multitissue gene
regulation in humans," Science, vol. 348, no. 6235, pp. 648–660, May 2015.
[21] P. Shannon et al., "Cytoscape: A software Environment for integrated models of biomolecular
interaction networks," Genome Research, vol. 13, no. 11, pp. 2498–2504, 2003.
[22] G. Bader and C. Hogue, "An automated method for finding molecular complexes in large
protein interaction networks," BMC bioinformatics, vol. 27, pp. 1–27, 2003.
12
|
1505.05657 | 1 | 1505 | 2015-05-21T09:43:09 | Event detection, tracking, and visualization in Twitter: a mention-anomaly-based approach | [
"cs.SI"
] | The ever-growing number of people using Twitter makes it a valuable source of timely information. However, detecting events in Twitter is a difficult task, because tweets that report interesting events are overwhelmed by a large volume of tweets on unrelated topics. Existing methods focus on the textual content of tweets and ignore the social aspect of Twitter. In this paper we propose MABED (i.e. mention-anomaly-based event detection), a novel statistical method that relies solely on tweets and leverages the creation frequency of dynamic links (i.e. mentions) that users insert in tweets to detect significant events and estimate the magnitude of their impact over the crowd. MABED also differs from the literature in that it dynamically estimates the period of time during which each event is discussed, rather than assuming a predefined fixed duration for all events. The experiments we conducted on both English and French Twitter data show that the mention-anomaly-based approach leads to more accurate event detection and improved robustness in presence of noisy Twitter content. Qualitatively speaking, we find that MABED helps with the interpretation of detected events by providing clear textual descriptions and precise temporal descriptions. We also show how MABED can help understanding users' interest. Furthermore, we describe three visualizations designed to favor an efficient exploration of the detected events. | cs.SI | cs | Social Network Analysis and Mining
DOI 10.1007/s13278-015-0258-0 The final publication is available at www.springerlink.com
Event detection, tracking and visualization in Twitter
A mention-anomaly-based approach
Adrien Guille · C´ecile Favre
5
1
0
2
y
a
M
1
2
]
I
S
.
s
c
[
1
v
7
5
6
5
0
.
5
0
5
1
:
v
i
X
r
a
Received: December 14, 2014 / Revised: April 3, 2015 / Accepted: May 13, 2015
Abstract The ever-growing number of people using
Twitter makes it a valuable source of timely informa-
tion. However, detecting events in Twitter is a diffi-
cult task, because tweets that report interesting events
are overwhelmed by a large volume of tweets on unre-
lated topics. Existing methods focus on the textual con-
tent of tweets and ignore the social aspect of Twitter.
In this paper we propose MABED (mention-anomaly-
based Event Detection), a novel statistical method that
relies solely on tweets and leverages the creation fre-
quency of dynamic links (i.e. mentions) that users in-
sert in tweets to detect significant events and estimate
the magnitude of their impact over the crowd. MABED
also differs from the literature in that it dynamically es-
timates the period of time during which each event is
discussed, rather than assuming a predefined fixed du-
ration for all events. The experiments we conducted on
both English and French Twitter data show that the
mention-anomaly-based approach leads to more accu-
rate event detection and improved robustness in pres-
ence of noisy Twitter content. Qualitatively speaking,
we find that MABED helps with the interpretation of
detected events by providing clear textual descriptions
and precise temporal descriptions. We also show how
MABED can help understanding users’ interest. Fur-
thermore, we describe three visualizations designed to
favor an efficient exploration of the detected events.
Keywords Event detection · Twitter · Visualization
A. Guille
ERIC Lab, University of Lyon 2
5 avenue Pierre Mends France
69676 Bron, France
E-mail: [email protected]
C. Favre
[email protected]
1 Introduction
Twitter is a social networking and micro-blogging ser-
vice that allows users to publish short messages limited
to 140 characters, i.e. tweets. Users share, discuss and
forward various kinds of information – ranging from
personal daily events to important and global event re-
lated information – in real-time. The ever-growing num-
ber of users around the world tweeting makes Twit-
ter a valuable source of timely information. On the
other hand, it gives rise to an information overload phe-
nomenon and it becomes increasingly difficult to iden-
tify relevant information related to significant events.
An event is commonly defined as a thing that hap-
pens at one specific time (Becker et al, 2011; Aggarwal
and Subbian, 2012), and it is significant if it may be
discussed by traditional media (McMinn et al, 2013).
These facts raise the following question: How can we
use Twitter for automated significant event detection
and tracking? The answer to this question would help
analyze which events, or types of events, most interest
the crowd. This is critical to applications for journal-
istic analysis, playback of events, etc. Yet the list of
“trends” determined by Twitter isn’t so helpful since
it only lists isolated keywords and provides no infor-
mation about the level of attention it receives from the
crowd nor temporal indications.
Twitter delivers a continuous stream of tweets, thus
allowing the study of how topics grow and fade over
time (Yang and Leskovec, 2011). In particular, event
detection methods focus on detecting “bursty” patterns
– which are intuitively assumed to signal events (Klein-
berg, 2002) – using various approaches ranging from
term-weighting-based approaches (Shamma et al, 2011;
Benhardus and Kalita, 2013) to topic-modeling-based
approaches (Lau et al, 2012; Yuheng et al, 2012), includ-
2
Adrien Guille, C´ecile Favre
ing clustering-based approaches (Weng and Lee, 2011;
Li et al, 2012; Parikh and Karlapalem, 2013). Despite
the wealth of research in the area, the vast majority
of prior work focuses on the textual content of tweets
and mostly neglects the social aspect of Twitter. How-
ever, users often insert extra-textual content in their
tweets. Of particular interest is the “mentioning prac-
tice”, which consists of citing other users’ screennames
in tweets (using the syntax “@username”). Mentions
are in fact dynamic links created either intentionally to
engage the discussion with specific users or automat-
ically when replying to someone or re-tweeting. This
type of link is dynamic because it is related to a partic-
ular time period, i.e. the tweet lifespan, and a particular
topic, i.e. the one being discussed.
Proposal We tackle the issue of event detection and
tracking in Twitter by devising a new statistical method,
named MABED (mention-anomaly-based Event Detec-
tion). It relies solely on statistical measures computed
from tweets and produces a list of events, each event be-
ing described by (i) a main word and a set of weighted
related words, (ii) a period of time and (iii) the magni-
tude of its impact over the crowd. In contrast with ex-
isting methods, MABED doesn’t only focus on the tex-
tual content of tweets but also leverages the frequency
at which users interact through mentions, with the aim
to detect more accurately the most impactful events. It
also differs from the literature in that it dynamically
estimates the period of time during which each event
is discussed, rather than assuming a predefined fixed
duration for all events, in order to provide clearer event
descriptions. What is more, we develop three interac-
tive visualizations to ensure an efficient exploration of
the detected events: (i) a timeline that allows exploring
events through time, (ii) a chart that plots the magni-
tude of impact of events through time and (iii) a graph
that allows identifying semantically related events. The
implementation of MABED is available for re-use and
future research. It is also included in SONDY (Guille
et al, 2013), an open-source social media data mining
software that implements several state-of-the-art algo-
rithms for event detection.
Results We perform quantitative and qualitative stud-
ies of the proposed method on both English and French
Twitter corpora containing respectively about 1.5 and
2 millions tweets. We show that MABED is able to ex-
tract an accurate and meaningful retrospective view of
the events discussed in each corpus, with short compu-
tation times. To study precision and recall, we ask hu-
man annotators to judge whether the detected events
are meaningful and significant events. We demonstrate
the relevance of the mention-anomaly-based approach,
by showing that MABED outperforms a variant that
ignores the presence of mentions in tweets. We also
show that MABED advances the state-of-the-art by
comparing its performance against those of two recent
methods from the literature. The analysis of these re-
sults suggests that considering the frequency at which
users interact through mentions leads to more accurate
event detection and improved robustness in presence of
noisy Twitter content. Lastly, we analyze the types of
events detected by MABED with regard to the commu-
nities detected in the network structure (i.e. the follow-
ing relationships) that interconnects the authors of the
tweets. The results of this analysis shed light on the
interplay between the social and topical structures in
Twitter and show that MABED can help understand-
ing users’ interests.
The rest of this paper is organized as follows. In the
next section we discuss related work, before describ-
ing in detail the proposed method in Section 3. Then
an experimental study showing the method’s effective-
ness and efficiency is presented in Section 4. Next, we
present three visualizations for exploring the detected
events. Finally, we conclude and discuss future work in
Section 6.
2 Related Work
Methods for detecting events in Twitter rely on a rich
body of work dealing with event, topic and burst de-
tection from textual streams. In a seminal work, Klein-
berg (2002) studies time gaps between messages in or-
der to detect bursts of email messages. Assuming that
all messages are about the same topic, he proposes
to model bursts with hidden Markov chains. AlSumait
et al (2008) propose OLDA (On-line Latent Dirichlet
Allocation), a dynamic topic model based on LDA (Blei
et al, 2003). It builds evolutionary matrices translat-
ing the evolution of topics detected in a textual stream
through time, from which events can be identified. Fung
et al (2005) propose to detect and then cluster bursty
words by looking at where the frequency of each word
in a given time window is positioned in the overall dis-
tribution of the number of documents containing that
word.
Tweet streams differ from traditional textual docu-
ment streams, in terms of publishing rate, content, etc.
Therefore, developing event detection methods adapted
to Twitter has been studied in several papers in recent
years. Next, we give a brief survey of the proposed ap-
proaches.
Event detection, tracking and visualization in Twitter
3
2.1 Event Detection and Tracking from Tweets
Term-weighting-based approaches The Peakiness
Score (Shamma et al, 2011) is a normalized word fre-
quency metric, similar to the tf · idf metric, for iden-
tifying words that are particular to a fixed length time
window and not salient in others. However, individual
words may not always be sufficient to describe complex
events because of the possible ambiguity and the lack
of context. To cope with this, Benhardus and Kalita
(2013) propose a different normalized frequency metric,
Trending Score, for identifying event-related n-grams.
For a given n-gram and time window, it consists in
computing the normalized frequency, tfnorm, of that n-
gram with regard to the frequency of the other n-grams
in this window. The Trending Score of a n-gram in a
particular time window is then obtained by normalizing
the value of tfnorm in this time window with regard to
the values calculated in the others.
Topic-modeling-based approaches Lau et al (2012)
propose an online variation of LDA. The idea is to in-
crementally update the topic model in each time win-
dow using the previously generated model to guide the
learning of the new model. At every model update, the
word distribution in topics evolves. Assuming that an
event causes a sudden change in the word distribution
of a topic, authors propose to detect events by monitor-
ing the degree of evolution of topics using the Jensen-
Shannon divergence measure. Yuheng et al (2012) note
that topic modeling methods behave badly when ap-
plied to short documents such as tweets. To remedy
this, they propose ET-LDA (joint Event and Tweets
LDA). It expands tweets with the help of a search en-
gine and then aligns them with re-transcriptions of events
provided by traditional media, which heavily influences
the results. Globally, topic-modeling-based methods suf-
fer from a lack of scalability, which renders their ap-
plication to tweet streams difficult. However, works by
Aiello et al (2013) reveal that dynamic topic models
don’t effectively handle social streams in which many
events are reported in parallel.
Clustering-based approaches EDCoW (Weng and
Lee, 2011) breaks down the frequency of single words
into wavelets and leverages Fourier and Shannon theo-
ries to compute the change of wavelet entropy to iden-
tify bursts. Trivial words are filtered away based on
their corresponding signal’s auto correlation, and the
similarity between each pair of non-trivial words is mea-
sured using cross correlation. Eventually, events are de-
fined as bags of words with high cross correlation during
a predefined fixed time window, detected with modular-
ity-based graph clustering. However, as pointed out by
Li et al (2012) and Parikh and Karlapalem (2013), mea-
suring cross correlation is computationally expensive.
Furthermore, measuring similarity utilizing only cross
correlation can result in clustering together several un-
related events that happened in the same time span.
TwEvent (Li et al, 2012) detects event from tweets by
analyzing n-grams. It filters away trivial n-grams based
on statistical information derived from Wikipedia and
the Microsoft Web N-Gram service. The similarity be-
tween each pair of non-trivial n-grams is then measured
based on frequency and content similarity, in order to
avoid merging distinct events that happen concurrently.
Then, similar n-grams in fixed-length time windows are
clustered together using a k-nearest neighbor strategy.
Eventually, the detected events are filtered using, again,
statistical information derived from Wikipedia. As a
result, the events detected with TwEvent are heavily
influenced by Microsoft Web N-Gram and Wikipedia,
which could potentially distort the perception of events
by Twitter users and also give less importance to re-
cent events that are not yet reported on Wikipedia. It
is also worth mentioning ET (Parikh and Karlapalem,
2013), a recent method similar to TwEvent, except that
it doesn’t make use of external sources of information
and focuses on bigrams. The similarity between pairs
of bigrams is measured based on normalized frequency
and content similarity, and the clustering is performed
using a hierarchical agglomerative strategy.
2.2 Event Visualization in Twitter
Eddi (Bernstein et al, 2010) is among the first tools de-
veloped for visualizing events from tweets. It displays a
single word cloud that describes all the detected events,
as well as a single stacked area chart that plots the evo-
lution of the relative volume of tweets for each event.
Mathioudakis and Koudas (2010) propose TwitterMon-
itor, a system that allows for a finer understanding of
the detected events in comparison with Eddi. It displays
a list of events, each event being described by a set of
words and a chart that plots the evolution of the vol-
ume of related tweets. KeySEE (Lee et al, 2013) is a
tool that offers similar functionalities with more sophis-
ticated visualizations, such as word clouds to describe
events instead of sets of words. Marcus et al (2011) de-
scribe TwitInfo, a tool whose interface revolves around
a timeline of events. The user can click an event to see
the tweets published during the related time interval, or
to see the most cited URLs in these tweets. Let us also
mention work by Kraft et al (2013), in which a heatmap
describes the distribution of events across time.
4
Table 1 Table of notations.
Notation Definition
N
N i
N i
t
N@t
N i
@t
Total number of tweets in the corpus
Number of tweets in the ith time-slice
Number of tweets in the ith time-slice
that contain the word t
Number of tweets in the corpus that
contain the word t and at least one mention
Number of tweets that contain the word t
and at least one mention in the ith time-slice
3 Proposed Method
In this section, we first formulate the problem we intend
to solve. Then we give an overview of the solution we
propose, MABED, before describing it formally.
3.1 Problem Formulation
Input We are dealing with a tweet corpus C. We dis-
cretize the time-axis by partitioning the tweets into n
time-slices of equal length. Let V be the vocabulary of
the words used in all the tweets and V@ be the vocab-
ulary of the words used in the tweets that contain at
least one mention. Table 1 gives the definitions of the
notations used in the rest of this paper.
Output The objective is to produce a list L, such that
L = k, containing the events with the k highest mag-
nitude of impact over the crowd’s tweeting behavior.
We define an event as a bursty topic, with the magni-
tude of its impact characterized by a score. Definitions
1 and 2 below respectively define the concepts of bursty
topic and event.
Definition 1 (Bursty Topic) Given a time interval
I, a topic T is considered bursty if it has attracted
an uncommonly high level of attention (in terms of
creation frequency of mentions) during this interval in
comparison to the rest of the period of observation. The
topic T is defined by a main term t and a set S of
weighted words describing it. Weights vary between 0
and 1. A weight close to 1 means that the word is cen-
tral to the topic during the bursty interval whereas a
weight closer to 0 means it is less specific.
Definition 2 (Event) An event e is characterized by
a bursty topic BT = [T, I] and a value Mag > 0 indi-
cating the magnitude of the impact of the event over
the crowd.
3.2 Overview of the Proposed Method
The method has a two-phase flow. It relies on three
components: (i) the detection of events based on men-
Adrien Guille, C´ecile Favre
tion-anomaly, (ii) the selection of words that best de-
scribe each event and (iii) the generation of the list
of the k most impactful events. The overall flow, illus-
trated on Figure 1, is briefly described hereafter.
Fig. 1 Overall flow of the proposed method, MABED.
1. The mention creation frequency related to each word
t ∈ V@ is analyzed with the first component. The re-
sult is a list of partially defined events, in that they
are missing the set S of related words. This list is
ordered according to the impact of the events.
2. The list is iterated through starting from the most
impactful event. For each event, the second compo-
nent selects the set S of words that best describe
it. The selection relies on measures based on the
co-occurrence and the temporal dynamics of words
tweeted during I. Each event processed by this com-
ponent is then passed to the third component, which
@,wordabE(word)I = [a;b]wwordword1..................abword:co-occurence matrixa ... b......NwordNword1wMag,IDetecting events based on mention anomalySelecting words describing eventsIredundancy graphevent graphNIITweet streamword2Events ordered according to the magnitude of their impact over the crowdWater: moon (0.9), NASA (0.9), found...from 09-11-13 10amto 09-11-15 7:30amGenerating the list of the k most impactful events and managing duplicated eventsword1 word2Mag(I)Veterans:served (0.8), country (0.7)...from 09-11-10 4pmto 09-11-12 8amTiger, Woods: accident (0.9), car (0.9)...from 09-11-27 6pmto 09-11-29 5amiiiINPUTPHASE 1PHASE 2OUTPUTIIIEvent detection, tracking and visualization in Twitter
5
is responsible for storing event descriptions and man-
aging duplicated events. Eventually, when k distinct
events have been processed, the third component
merges duplicated events and returns the list L con-
taining the top k events.
3.3 Detection of Events Based on Mention Anomaly
The objective of this component is to precisely identify
when events happened and to estimate the magnitude
of their impact over the crowd. It relies on the identifica-
tion of bursts based on the computation of the anomaly
in the frequency of mention creation for each individual
word in V@. Existing methods usually assume a fixed
duration for all events that corresponds to the length
of a time-slice. It’s not the case with MABED. In the
following, we describe how to compute the anomaly of
a word for a given time-slice, then we describe how to
measure the magnitude of impact of a word given a
contiguous sequence of time-slices. Eventually, we show
how to identify the intervals that maximize the magni-
tude of impact for each word in V@.
Be-
Computation of the anomaly at a point
fore formulating the anomaly measure, we define the
expected number of mention creation associated to a
word t for each time-slice i ∈ [1; n]. We assume that
the number of tweets that contain the word t and at
least one mention in the ith time-slice, N i
@t, follows a
generative probabilistic model. Thus we can compute
the probability P (N i
@t. For a large
enough corpus, it seems reasonable to model this kind
of probability with a binomial distribution (Fung et al,
2005). Therefore we can write:
@t) of observing N i
P (N i
@t) =
@t (1 − p@t)N i−N i
pN i
@t
@t
(cid:18) N i
(cid:19)
N i
@t
where p@t is the expected probability of a tweet con-
taining t and at least one mention in any time-slice. Be-
cause N i is large we further assume that P (N i
@t) can be
approximated by a normal distribution (Li et al, 2012),
that is to say:
P (N i
@t) ∼ N (N ip@t, N ip@t(1 − p@t))
It follows that the expected frequency of tweets con-
taining the word t and at least one mention in the ith
time-slice is:
E[ti] = N ip@t where p@t = N@t/N
Eventually, we define the anomaly of the mention cre-
ation frequency related to the word t at the ith time-
slice this way:
anomaly(t, i) = N i
@t − E[ti]
Fig. 2 Identification of the time interval that maximizes the
magnitude of impact for a given word.
With this formulation, the anomaly is positive only
if the observed mention creation frequency is strictly
greater than the expectation. Event-related words that
are specific to a given period of time are likely to have
high anomaly values during this interval. In contrast,
recurrent (i.e. trivial) words that aren’t event-specific
are likely to show little discrepancy from expectation.
What is more, as opposed to more sophisticated ap-
proaches like modeling frequencies with Gaussian mix-
ture models, this formulation can easily scale to the
number of distinct words used in tweets.
Computation of the magnitude of impact The
magnitude of impact, Mag, of an event associated with
the time interval I = [a; b] and the main word t is given
by the formula below. It corresponds to the algebraic
area of the anomaly function on [a; b].
(cid:90) b
b(cid:88)
Mag(t, I) =
anomaly(t, i) di =
anomaly(t, i)
a
i=a
The algebraic area is obtained by integrating the dis-
crete anomaly function, which in this case boils down
to a sum.
Identification of events For each word t ∈ V@, we
identify the interval I that maximizes the magnitude of
impact, that is to say :
I = argmax
Mag(t, I)
I
Because the magnitude of impact of an event described
by the main word t and the time interval I is the sum
of the anomaly measured for this word over I, this opti-
mization problem is similar to a “Maximum Contiguous
Subsequence Sum” (MCSS ) problem. The MCSS prob-
lem is well known and finds application in many fields
(Fan et al, 2003; Lappas et al, 2009). In other words, for
a given word t we want to identify the interval I = [a; b],
such that:
Mag(t, I) = max{ b(cid:88)
i=a
anomaly(t, i)1 (cid:54) a (cid:54) b (cid:54) n}
(cid:179)(cid:141)(cid:113)(cid:93)(cid:103)(cid:71)(cid:60)(cid:68)(cid:17)(cid:165)(cid:113)(cid:93)(cid:103)(cid:71)(cid:166)(cid:25)(cid:3)(cid:222)(cid:3)(cid:167)(cid:60)(cid:142)(cid:68)(cid:168)(cid:69)(cid:80)(cid:103)(cid:93)(cid:90)(cid:73)(cid:36)(cid:47)(cid:60)(cid:68)(cid:88)(cid:60)(cid:71)(cid:80)(cid:60)(cid:78)(cid:81)(cid:3)(cid:143)(cid:90)(cid:60)(cid:106)(cid:103)(cid:81)(cid:69)(cid:73)(cid:3)(cid:71)(cid:73)(cid:104)(cid:3)(cid:69)(cid:93)(cid:93)(cid:69)(cid:69)(cid:107)(cid:103)(cid:73)(cid:91)(cid:69)(cid:73)(cid:104)(cid:60)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:144)(cid:144)(cid:144)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:68)(cid:17)(cid:17)(cid:17)(cid:17)(cid:17)(cid:17)(cid:34)(cid:88)(cid:60)(cid:71)(cid:80)(cid:60)(cid:78)(cid:81)(cid:34)(cid:78)(cid:81)(cid:91)(cid:60)(cid:91)(cid:69)(cid:75)(cid:113)(cid:34)(cid:71)(cid:73)(cid:104)(cid:88)(cid:106)(cid:93)(cid:100)(cid:78)(cid:81)(cid:91)(cid:60)(cid:91)(cid:69)(cid:75)(cid:81)(cid:81)(cid:81)(cid:33)(cid:60)(cid:79)(cid:165)(cid:25)(cid:166)(cid:79)(cid:93)(cid:93)(cid:79)(cid:89)(cid:73)(cid:89)(cid:60)(cid:91)(cid:79)(cid:107)(cid:60)(cid:79)(cid:73)(cid:23)(cid:93)(cid:100)(cid:103)(cid:93)(cid:79)(cid:103)(cid:60)(cid:90)(cid:159)(cid:90)(cid:81)(cid:91)(cid:79)(cid:106)(cid:113)(cid:73)(cid:73)(cid:106)(cid:81)(cid:73)(cid:60)(cid:100)(cid:100)(cid:195)(cid:144)(cid:194)(cid:80)(cid:93)(cid:93)(cid:71)(cid:78)(cid:93)(cid:103)(cid:106)(cid:106)(cid:81)(cid:79)(cid:73)(cid:103)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:90)(cid:93)(cid:91)(cid:71)(cid:60)(cid:115)(cid:69)(cid:115)(cid:68)(cid:73)(cid:103)(cid:106)(cid:81)(cid:79)(cid:73)(cid:103)(cid:60)(cid:69)(cid:69)(cid:81)(cid:71)(cid:73)(cid:91)(cid:106)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:69)(cid:103)(cid:60)(cid:104)(cid:80)(cid:69)(cid:60)(cid:103)(cid:23)(cid:103)(cid:60)(cid:100)(cid:80)(cid:73)(cid:3)(cid:71)(cid:73)(cid:104)(cid:3)(cid:103)(cid:73)(cid:71)(cid:93)(cid:91)(cid:71)(cid:60)(cid:91)(cid:69)(cid:73)(cid:104)(cid:23)(cid:103)(cid:60)(cid:100)(cid:80)(cid:73)(cid:3)(cid:71)(cid:73)(cid:104)(cid:3)(cid:75)(cid:112)(cid:74)(cid:91)(cid:73)(cid:90)(cid:73)(cid:91)(cid:106)(cid:104)(cid:60)(cid:112)(cid:60)(cid:91)(cid:106)(cid:3)(cid:78)(cid:107)(cid:104)(cid:81)(cid:93)(cid:91)(cid:106)(cid:81)(cid:79)(cid:73)(cid:103)(cid:60)(cid:69)(cid:69)(cid:81)(cid:71)(cid:73)(cid:91)(cid:106)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:69)(cid:103)(cid:60)(cid:104)(cid:80)(cid:69)(cid:60)(cid:103)(cid:81)(cid:91)(cid:87)(cid:107)(cid:103)(cid:73)(cid:71)(cid:106)(cid:81)(cid:79)(cid:73)(cid:103)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:60)(cid:69)(cid:69)(cid:81)(cid:71)(cid:73)(cid:91)(cid:106)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:69)(cid:103)(cid:60)(cid:104)(cid:80)(cid:69)(cid:60)(cid:103)(cid:23)(cid:103)(cid:60)(cid:100)(cid:80)(cid:73)(cid:3)(cid:71)(cid:73)(cid:104)(cid:3)(cid:75)(cid:112)(cid:74)(cid:91)(cid:73)(cid:90)(cid:73)(cid:91)(cid:106)(cid:104)(cid:60)(cid:100)(cid:103)(cid:74)(cid:104)(cid:3)(cid:78)(cid:107)(cid:104)(cid:81)(cid:93)(cid:91)(cid:81)(cid:91)(cid:87)(cid:107)(cid:103)(cid:73)(cid:71)(cid:219)(cid:159)(cid:219)(cid:104)(cid:93)(cid:107)(cid:103)(cid:69)(cid:73)(cid:33)(cid:60)(cid:79)(cid:193)(cid:3)(cid:141)(cid:3)(cid:25)(cid:193)(cid:33)(cid:60)(cid:79)(cid:3)(cid:141)(cid:3)(cid:25)6
Adrien Guille, C´ecile Favre
This formulation permits the anomaly to be negative
at some points in the interval, as shown in Figure 2,
only if it permits extending the interval while increasing
the total magnitude. This is a desirable property, as it
avoids fragmenting events that last several days because
of the lower activity on Twitter during the night for
instance, which can lead to low or negative anomaly.
Another desirable property of this formulation is that
a given word can’t be considered as the main word of
more than one event. This increases the readability of
events for the following reason. The bigger the number
of events that can be described by a given word, the less
specific to each event this word is. Therefore, this word
should rather be considered as a related word than the
main word. We solve this MCSS type of problem using
the linear-time algorithm described by Bentley (1984).
Eventually, each event detected following this process
is described by: (i) a main word t (ii) a period of time I
and (iii) the magnitude of its impact over the tweeting
behavior of the users, Mag(t, I).
3.4 Selection of Words Describing Events
Observing that clustering-based methods can in some
cases lead to noisy event descriptions (Valkanas and
Gunopulos, 2013), we adopt a different approach which
we describe hereafter, with the aim to provide more
semantically meaningful descriptions.
In order to limit information overload, we choose to
bound the number of words used to describe an event.
This bound is a fixed parameter noted p. We justify
this choice because of the shortness of tweets. Indeed,
because tweets contain very few words, it doesn’t seem
reasonable for an event to be associated with too many
words (Weng and Lee, 2011).
Identification of the candidate words The set of
candidate words for describing an event is the set of the
words with the p highest co-occurrence counts with the
main word t during the period of time I. The most rel-
evant words are selected amongst the candidates based
on the similarity between their temporal dynamics and
the dynamics of the main word during I. For that, we
compute a weight wq for each candidate word t(cid:48)
q. We
propose to estimate this weight from the time-series for
N i
with the correlation coefficient proposed by
Erdem et al (2012). This coefficient, primarily designed
to analyze stock prices, has two desirable properties for
our application: (i) it is parameter-free and (ii) there is
no stationarity assumption for the validity of this coef-
ficient, contrary to common coefficients, e.g. Pearson’s
coefficient. This coefficient takes into account the lag
difference of data points in order to better capture the
t and N i
t(cid:48)
q
direction of the co-variation of the two time-series over
time. For the sake of conciseness, we directly give the
formula for the approximation of the coefficient, given
words t, t(cid:48)
q and the period of time I = [a; b]:
b(cid:88)
ρOt,t(cid:48)
q
=
where At,t(cid:48)
= (N i
At,t(cid:48)
q
i=a+1
(b − a − 1)AtAt(cid:48)
t − N i−1
q
t
)(N i
t(cid:48)
t − N i−1
t
q
)2
i=a+1(N i
b − a − 1
i=a+1(N i
t(cid:48)
− N i−1
t(cid:48)
q
q
b − a − 1
q
(cid:80)b
(cid:80)b
A2
t =
A2
t(cid:48)
q
=
− N i−1
t(cid:48)
q
),
and
)2
t and N i
t(cid:48)
This practically corresponds to the first order auto-cor-
relation of the time-series for N i
. The proof
that ρO satisfies ρO (cid:54) 1 using the Cauchy-Schwartz
inequality is given by Erdem et al (2012). Eventually,
we define the weight of the term t(cid:48)
q as an affine function
of ρO to conform with our definition of bursty topic,
i.e. 0 (cid:54) wq (cid:54) 1:
q
wq =
+ 1
ρOt,t(cid:48)
q
2
Because the temporal dynamics of very frequent words
are less impacted by a particular event, this formulation
– much like tf·idf – diminishes the weight of words that
occur very frequently in the stream and increases the
weight of words that occur less frequently, i.e. more
specific words.
Selection of the most relevant words The final set
of words retained to describe an event is the set S, such
q ∈ S, wq (cid:62) θ. The parameters p and θ allow
that ∀t(cid:48)
the users of MABED to adjust the level of information
and detail they require.
3.5 Generating the List of the Top k Events
Each time an event has been processed by the second
component, it is passed to the third component. It is re-
sponsible for storing the description of the events while
managing duplicated events. For that, it uses two graph
structures: the event graph and the redundancy graph.
The first is a directed, weighted, labeled graph that
stores the descriptions of the detected events. The rep-
resentation of an event e in this graph is as follows. One
node represents the main word t and is labeled with the
interval I and the score Mag. Each related word t(cid:48)
q is
represented by a node and has an arc toward the main
word, which weight is wq. The second structure is a
Event detection, tracking and visualization in Twitter
7
Storing the description of e0 in the event graph.
Checking connectivity between events e0 and e1.
Adding a link between A and D in the redundancy graph.
Fig. 3 Detecting duplication between events e0 and e1.
Detecting duplicated events The event e1 is con-
sidered to be a duplicate of the event e0 already stored
in the event graph if (i) the main words t1 and t0 would
be mutually connected and (ii) if the overlap coefficient
between the periods of time I1 and I0 exceeds a fixed
I1∩I0
threshold. The overlap coefficient is defined as
min(I1,I0)
and the threshold is noted σ, σ ∈]0; 1]. In this case, the
description of e1 is stored aside and a relation is added
between t1 and t0 in the redundancy graph. An exam-
ple is shown in Figure 3, where e0 = {A, {B, C, D, E},
I0, Mag0}, and e1 = {D, {C, E, F}, I1, Mag1}.
Merging duplicated events
Identifying which du-
plicated events should be merged together is equivalent
to identifying the connected components in the redun-
dancy graph. This is done in linear time, w.r.t to the
numbers vertices and edges of the graph, using the al-
gorithm described by Hopcroft and Tarjan (1973). In
each connected component, there is exactly one node
that corresponds to an event stored in the event graph.
Its magnitude of impact and the related time interval
remain the same, but its textual description is updated
according to the following principle. The main word be-
comes the aggregation of the main words of all dupli-
cated events. The words describing the updated event
are the p words among all the words describing the
duplicated events with the p highest weights. Figure 4
shows the description of the event resulting from the
merging of the events e0 and e1, based on the event
and redundancy graphs shown in Figure 3.
3.6 Overall algorithm
To conclude this section, Algorithm 1 sums-up the over-
all flow of MABED.
Fig. 4 Merging event e0 with duplicated event e1.
simple undirected graph that is used to represent the
relations between the eventual duplicated events, rep-
resented by their main words.
Let e1 be the event that the component is process-
ing. First, it checks whether it is a duplicate of an event
that is already stored in the event graph or not. If it
isn’t the case, the event is added to the graph and the
count of distinct events is incremented by one. Oth-
erwise, assuming e1 is a duplicate of the event e0, a
relation is added between t0 and t1 in the redundancy
graph. When the count of distinct events reaches k, the
duplicated events are merged and the list of the top k
most impactful events is returned. We describe how du-
plicated events are identified and how they are merged
hereafter.
4 Experiments
In this section we present the main results of the exten-
sive experimental study we conducted on both English
and French Twitter data to evaluate MABED. In the
quantitative evaluation, we demonstrate the relevance
of the mention-anomaly-based approach and we quan-
tify the performance of MABED by comparing it to
state-of-the-art methods. To evaluate precision and re-
call, we ask human annotators to judge whether the
detected events are meaningful and significant. In the
qualitative evaluation, we show that the descriptions of
the events detected by MABED are semantically and
temporally more meaningful than the descriptions pro-
vided by existing methods, which favors an easy under-
standing of the results. Lastly, we analyse the detected
(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:22)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:33)(cid:60)(cid:79)(cid:192)(cid:141)(cid:3)(cid:25)(cid:192)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:12)(cid:4)(cid:15)(cid:22)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:4)(cid:15)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:22)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:33)(cid:60)(cid:79)(cid:192)(cid:141)(cid:3)(cid:25)(cid:192)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:12)(cid:4)(cid:15)(cid:22)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:4)(cid:15)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:22)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:33)(cid:60)(cid:79)(cid:192)(cid:141)(cid:3)(cid:25)(cid:192)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:12)(cid:4)(cid:15)(cid:22)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:4)(cid:15)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:22)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:33)(cid:60)(cid:79)(cid:192)(cid:141)(cid:3)(cid:25)(cid:192)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:12)(cid:4)(cid:15)(cid:22)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)8
Adrien Guille, C´ecile Favre
Algorithm 1: Overall algorithm for MABED.
Data: A corpus C of N tweets partitioned into n
time-slices of equal length and the
corresponding vocabularies, V and V@
Parameters: k > 0, p > 0, θ ∈ [0; 1] and σ ∈]0; 1]
Result: The ordered list L of the k most impactful
detected events
/* First phase
*/
Initialize the stack P which stores the detected events
during the first phase;
for each word t ∈ V@ do
Mag(t, I) = max{(cid:80)b
Identify the interval I = [a; b] such that :
Add the event e = [t, ∅, I, Mag(t, I)] in P ;
i=a anomalie(t, i);
end
Sort the event stack P by descending magnitude of
impact;
/* Second phase
Initialize the event graph GE and the redundancy
graph GR;
Set count to 0;
while count < k and P > 0 do
*/
Pop the event e on top of the stack P ;
Select the words that describe e, with parameters
p and θ;
if e is redundant with the event e(cid:48) which is
already in GE, for a given σ then
Add a link between the mains word of events e
and e(cid:48) in GR;
Store the description of e aside;
else
Insert the description e in graph GE;
Increment count;
end
end
Identify which events should be merged based on GR
then update GE;
Transform graph GE into list L;
Sort L ;
return L;
event with regard to user communities and find that
MABED can help understanding their interests.
4.1 Experimental Setup
Corpora Since the Twitter corpora used in prior work
aren’t available we base our experiments on two differ-
ent corpora. The first corpus – noted Cen – contains
1,437,126 tweets written in English, collected with a
user-centric strategy. They correspond to all the tweets
published in November 2009 by 52,494 U.S.-based users
(Yang and Leskovec, 2011). This corpus contains a lot
of noise and chatter. According to the study conducted
by PearAnalytics (2009), the proportion of non-event-
related tweets could be as high as 50%. The second
corpus – noted Cf r – contains 2,086,136 tweets written
in French, collected with a keyword-based strategy. We
have collected these tweets in March 2012, during the
Table 2 Corpus Statistics. @: proportion of tweets that con-
tain mentions, RT : proportion of retweets.
Corpus
Cen
Cf r
Tweets
1,437,126
2,086,136
Authors
52,494
150,209
@
0.54
0.68
RT
0.17
0.43
campaign for the 2012 French presidential elections, us-
ing the Twitter streaming API with a query consisting
of the names of the main candidates running for presi-
dent. This corpus is focused on French politics. Trivial
words are removed from both corpora based on English
and French standard stop-word lists. All timestamps
are in UTC. Table 2 gives further details about each
corpus.
Baselines for comparison We consider two recent
methods from the literature: ET (clustering-based) and
TS (term-weighting-based). ET is based on the hier-
archical clustering of bigrams using content and ap-
pearance patterns similarity (Parikh and Karlapalem,
2013). TS is a normalized frequency metric for identify-
ing n-grams that are related to events (Benhardus and
Kalita, 2013). We apply it to both bigrams (TS2 ) and
trigrams (TS3 ). We also consider a variant of MABED,
noted α-MABED, that ignores the presence of men-
tions in tweets. This means that the first component
detects events and estimates their magnitude of impact
based on the values of N i
@t. The reason-
ing for excluding a comparison against topic-modeling-
based methods is that in preliminary experiments we
found that they performed poorly and their computa-
tion times were prohibitive.
Parameter setting
For MABED and α-MABED,
we partition both corpora using 30 minute time-slices,
which allows for a good temporal precision while keep-
ing the number of tweets in each time-slice large enough.
The maximum number of words describing each event,
p, and the weight threshold for selecting relevant words,
θ, are parameters that allow the user to define the re-
quired level of detail. Given that the average number
of words per sentence on Twitter is 10.7 according to
the study conducted by Oxford (2009), we fix p to 10.
For the purpose of the evaluation, we set θ = 0.7 so
judges are only presented with words that are closely
related to each event. There is a parameter that can
affect the performance of MABED: σ. In the following,
we report results for σ = 0.5 (we discuss the impact of
σ in Section 4.1).
t instead of N i
For ET and TS, because they assume a fixed dura-
tion for all events – which corresponds to the length of
one time-slice – we partition both corpora using 1-day
time-slices like in prior work. ET has two parameters,
for which we use optimal values provided by the au-
thors.
Event detection, tracking and visualization in Twitter
9
Evaluation metrics The corpora don’t come with
ground truth, therefore we have asked two human anno-
tators to judge whether the detected events are mean-
ingful and significant. The annotators are French grad-
uate students who aren’t involved in this project. Their
task consisted in reading the descriptions of the events
detected by each method, and independently assign a
rate to each description. This rate can be either 1, if
the annotator decides that the description is meaning-
ful and related to a significant event (i.e. an event that
may be covered in traditional media), or 0 in any other
cases. They also had to identify descriptions similar to
ones which had previously been rated, in order to keep
track of duplicates. Considering that annotating events
is a time consuming task for the annotators, we limit the
evaluation to the 40 most impactful events detected by
each method (i.e. k = 40) in each corpus. We measure
precision as the ratio of the number of detected events
that both annotators have rated 1, which we refer to as
k(cid:48), to the total number of detected events, k:
P =
k(cid:48)
k
Based on the number of duplicated events, k(cid:48)(cid:48), we define
recall as the fraction of distinct significant events among
all the detected events (Li et al, 2012):
R =
k(cid:48) − k(cid:48)(cid:48)
k
We also measure the DERate (Li et al, 2012), which
denotes the percentage of events that are duplicates
among all the significant events detected, that is to say
DERate = k(cid:48)(cid:48)/k(cid:48).
4.2 Quantitative Evaluation
Hereafter, we discuss the performance of the five consid-
ered methods, based on the rates assigned by the anno-
tators. The inter-annotator agreement, measured with
Cohen’s Kappa (Landis and Koch, 1977), is κ (cid:39) 0.76,
showing a strong agreement. Table 3 (page 10) reports
the precision, the F-measure defined as the harmonic
mean of precision and recall (i.e. 2 · P ·R
P +R ), the DERate
and the running-time of each method for both corpora.
Comparison against baselines We notice that MABED
achieves the best performance on the two corpora, with
a precision of 0.775 and F-measure of 0.682 on Cen, and
a precision and a F-measure of 0.825 on Cf r. Although
ET yields a better DERate on Cen, it still achieves lower
precision and recall than MABED on both corpora. Fur-
thermore, we measure an average relative gain of 17.2%
over α-MABED in the F-measure, which suggests that
considering the mentioning behavior of users leads to
MABED
MABED (8 threads)
1
0.5
e
m
i
t
n
u
r
d
e
z
i
l
a
m
r
o
N
0.4
0.55
0.7
0.85
1
Subsample size
Fig. 5 Runtime comparison versus subsample size.
e
t
a
R
E
D
/
e
r
u
s
a
e
m
-
F
/
n
o
i
s
i
c
e
r
P
0.8
0.6
0.4
0.2
Precision
F-measure
DERate
0.2
0.4
0.6
0.8
1
Fig. 6 Precision, F-measure and DERate of MABED on Cen
for different values of σ.
Value of σ
more accurate detection of significant events in Twit-
ter. Interestingly, we notice that MABED outperforms
all baselines in the F-measure with a bigger margin on
Cen, which contains a lot more noise than Cf r – with up
to 50% non-event-related tweets according to the study
conducted by PearAnalytics (2009). This suggests that
considering the mentioning behavior of users also leads
to more robust detection of events from noisy Twitter
content. The DERate reveals that none of the signifi-
cant events detected in Cf r by MABED were duplicated,
whereas 6 of the significant events detected in Cen are
duplicates. Furthermore, we find that the set of events
detected by the four baseline methods is a sub-set of
the events detected by MABED. Further analysis of the
results produced by α-MABED, TS2 and TS3 reveals
that most of non-significant events they detected are
related to spam. The fact that most of these irrelevant
events aren’t detected by MABED suggest that consid-
ering the presence of mentions in tweets helps filtering
away spam. Concerning ET, the average event descrip-
tion is 17.25 bigrams long (i.e. more than 30 words). As
a consequence, the descriptions contain some unrelated
words. Specifically, irrelevant events are mostly sets of
unrelated words that don’t make any sense. This is due
in part to the fact that clustering-based approaches are
prone to aggressively grouping terms together, as Valka-
nas and Gunopulos (2013) stated in a previous study.
10
Adrien Guille, C´ecile Favre
Table 3 Performance of the five methods on the two corpora.
Corpus: Cen
Corpus: Cf r
Method
MABED
α-MABED
ET
TS2
TS3
Precision
F-measure DERate Running-time Precision
F-measure DERate Running-time
0.775
0.625
0.575
0.600
0.375
0.682
0.571
0.575
0.514
0.281
0.167
0.160
0
0.250
0.4
96s
126s
3480s
80s
82s
0.825
0.725
0.700
0.725
0.700
0.825
0.712
0.674
0.671
0.616
0
0.025
0.071
0.138
0.214
88s
113s
4620s
69s
74s
Efficiency
It appears that MABED and TS have
running-times of the same order, whereas ET is or-
ders of magnitude slower, which is due to the clustering
step that requires computing temporal and semantical
similarity between all bigrams. We also observe that
MABED runs faster than α-MABED. The main reason
for this is that V@ (cid:54) V , which speeds up the first
phase. It should be noted that the running-times given
in Table 3 don’t include the time required for prepar-
ing vocabularies and pre-computing term frequencies,
which is more important for methods that rely on bi-
grams or trigrams. We evaluate the scalability of (i)
MABED and (ii) a parallelized version of MABED (8
threads), by measuring their running-times on random
subsamples of both corpora, for subsample sizes varying
from 40% to 100%. Figure 5 shows the average normal-
ized running--time versus subsample size. This means
that the runtimes measured on a corpus are normalized
by the longest runtime on this corpus and are then aver-
aged for MABED and MABED (8 threads). We notice
that runtimes grow linearly in size of the subsample.
Furthermore, we note that MABED (8 threads) is on
average 67% faster than MABED.
Impact of σ on MABED While the list of events is
constructed by MABED, the overlap threshold σ con-
trols the sensitivity to duplicated events. Figure 6 plots
the precision, F-measure and DERate of MABED on
Cen for values of σ ranging from 0.2 to 1. We observe
that the value of σ mainly impacts the DERate. More
specifically, the DERate increases along the increase of
σ as fewer duplicated events are merged. For σ = 1, the
precision increases to 0.825 because of the high percent-
age of duplicated significant events. Globally, it appears
that the highest F-measure is attained for values of σ
ranging from 0.2 to 0.5. However, even using σ = 1,
MABED achieves a F-measure of 0.582, which is higher
than all baselines on Cen.
4.3 Qualitative Evaluation
Next, we qualitatively analyze the results of MABED
and show how they provide relevant information about
the detected events. Table 4 (page 11) lists the top 25
events with highest magnitude of impact over the crowd
max
y
l
a
m
o
n
A
“hood”
“fort”
“shooting”
0
Nov. 5
e6 (13:30) Nov. 6
Nov. 7
Time (CST)
Fig. 7 Measured anomaly for the words “hood”, “fort” and
“shooting” between Nov. 5 and Nov. 7 midnight (CST).
s
t
n
e
v
e
f
o
e
g
a
t
n
e
c
r
e
P
0.4
0.2
0
CenCf r
<12
[12;24]
]24;36]
]36;48]
]48;60] >60
Event duration (in hours)
Fig. 8 Distribution of the duration of the events detected
with MABED.
in Cen. From this table, we make several observations
along three axes: readability, temporal precision and
redundancy.
Readability We argue that highlighting main words
allows for an easy reading of the description, more es-
pecially as main words often correspond to named en-
tities, e.g. Fort Hood (e6), Chrome (e7), Tiger Woods
(e8), Obama (e13). This favors a quicker understanding
of events by putting into light the key places, products
or actors at the heart of the events, in contrast with ex-
isting methods that identify bags of words or n-grams.
What is more, MABED ranks the words that describe
each event and limits their number, which again favors
the interpretation of events.
Temporal precision MABED dynamically estimates
the period of time during which each event is discussed
on Twitter. This improves the temporal precision as
Event detection, tracking and visualization in Twitter
11
Table 4 Top 25 events with highest magnitude of impact over the crowd, detected by MABED in Cen. Main words are in
bold and time intervals are given in UTC (Coordinated Universal Time).
e# Time interval Topic
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
from 25 09:30
to 28 06:30
from 25 09:30
to 27 09:00
from 10 16:00
to 12 08:00
from 26 13:00
to 28 10:30
from 07 13:30
to 09 04:30
from 05 19:30
to 08 09:00
from 19 04:30
to 21 02:30
from 27 18:00
to 29 05:00
from 28 22:30
to 30 23:30
thanksgiving, turkey: hope (0.72), happy (0.71)
Twitter users celebrated Thanksgiving
thankful: happy (0.77), thanksgiving (0.71)
Related to event #1
veterans: served (0.80), country (0.78), military (0.73), happy (0.72)
Twitter users celebrated the Veterans Day that honors people who have served in the U.S. army
black: friday (0.95), amazon (0.75)
Twitter users were talking about the deals offered by Amazon the day before the “Black Friday”
hcr, bill, health, house, vote: reform (0.92), passed (0.91), passes (0.88)
The House of Representatives passed the health care reform bill on November 7
hood, fort: ft (0.92), shooting (0.83), news (0.78), army (0.75), forthood (0.73)
The Fort Hood shooting was a mass murder that took place in a U.S. military post on November 5
chrome: os (0.95), google (0.87), desktop (0.71)
On November 19, Google released Chrome OS’s source code for desktop PC
tiger, woods: accident (0.91), car (0.88), crash (0.88), injured (0.80), seriously (0.80)
Tiger Woods was injured in a car accident on November 27, 2009
tweetie, 2.1, app: retweets (0.93), store (0.90), native (0.89), geotagging (0.88)
The iPhone app named Tweetie (v2.1), hit the app store with additions like retweets and geotagging
from 29 17:00 monday, cyber: deals (0.84), pro (0.75)
to 30 23:30
from 10 01:00
to 12 03:00
from 04 17:00
to 06 05:30
from 15 09:00
to 17 23:30
from 25 10:00
to 26 10:00
from 19 21:30
to 21 16:00
from 07 11:30
to 09 05:00
from 11 03:30
to 13 08:30
Twitter users were talking about the deals offered by online shops for the “Cyber Monday”
linkedin: synced (0.86), updates (0.84), status (0.83), twitter (0.71)
Starting from November 10, LinkedIn status updates can be synced with Twitter
yankees, series: win (0.84), won (0.84), fans (0.78), phillies (0.73), york (0.72)
The Yankees baseball team defeated the Phillies to win their 27th World Series on November 4
obama: chinese (0.75), barack (0.72), twitter (0.72), china (0.70)
Barack Obama admitted that he’d never used Twitter but Chinese should be able to
holiday: shopping (0.72)
Twitter users started talking about the “Black Friday”, a shopping day and holiday in some states
oprah, end: talk (0.81), show (0.79), 2011 (0.73), winfrey (0.71)
On November 19, Oprah Winfrey announced her talk show will end in September 2011
healthcare, reform: house (0.91), bill (0.88), passes (0.83), vote (0.83), passed (0.82)
Related to event #5
facebook: app (0.74), twitter (0.73)
No clear corresponding event
from 18 14:00 whats: happening (0.76), twitter (0.73)
to 21 03:00
from 20 10:00
to 22 00:00
from 26 08:00
to 26 15:30
Twitter started asking ”What’s happening?” instead of ”What are you doing?” from November 18
cern: lhc (0.86), beam (0.79)
On November 20, proton beams were successfully circulated in the ring of the LHC (CERN)
icom: lisbon (0.99), roundtable (0.98), national (0.88)
The I-COM roundtable about market issues in Portugal took place on November 26
from 03 23:00 maine: voters (0.76), marriage (0.71)
to 05 10:00
from 07 13:00
to 10 16:30
from 18 14:00
to 20 09:00
On November 4, Maine voters repealed a state law granting same-sex couples the right to marry
droid: verizon (0.75), iphone (0.72), video (0.70)
On November 7, Verizon stores released the new DROID phone, promoted as an iPhone alternative
read: blog (0.76), article (0.74)
No clear corresponding event
from 02 05:00 wave: guide (0.81), google (0.73)
to 03 19:00
from 18 10:30
to 20 09:00
The complete Google Wave guide was released on November 9
talk, show: oprah (0.89), 2011 (0.85), end (0.77)
Related to event # 15
compared to existing methods, that typically report
events on a daily basis. We illustrate how this improves
the quality of the results with the following example.
The 6th event corresponds to Twitter users reporting
the Fort Hood shooting that, according to Wikipedia1,
happened on November 5, 2009 between 13:34 and 13:44
CST (i.e. 19:34 and 19:44 UTC). The burst of activity
engendered by this event is first detected by MABED
in the time-slice covering the 19:30-20:00 UTC period.
MABED gives the following description:
1Source:
shooting
http://en.wikipedia.org/wiki/Fort_Hood_
12
Adrien Guille, C´ecile Favre
(i) 11-05 19:30 to 11-08 9:00 ; (ii) hood, fort; (iii) ft
(0.92), shooting (0.83), news (0.78), army (0.75), fort-
hood (0.73).
We can clearly understand that (i) something happened
around 7:30pm UTC, (ii) at the Hood Fort and that
(iii) it is a shooting. In contrast, α-MABED fails at
detecting this event on November 5 but reports it on
November 7 when the media coverage was the highest.
Redundancy Some events have several main words,
e.g. events e1, e5, e6, e8. This is due to merges oper-
ated by the third component of MABED to avoid du-
plicated events. Redundancy is further limited because
of the dynamic estimation of each event duration. We
may continue using event e6 to illustrate that. Figure
7 plots the evolution of the anomaly measured for the
words “hood”, “fort” and “shooting” between Novem-
ber 5 and November 7. We see that the measured ano-
maly is closer to 0 during the night (local time), giv-
ing a “dual-peak” shape to the curves. Nevertheless,
MABED reports a unique event which is discussed for
several days, instead of reporting distinct consecutive 1-
day events. The importance of dynamically estimating
the duration of events is further illustrated by Figure
8, which shows the distributions of event duration for
both corpora. It reveals that some events are discussed
during less than 12 hours whereas some are discussed
for more than 60 hours. We note that event durations
in Cf r are normally distributed and that these politics-
related events tend to be discussed for a longer duration
than the events detected in Cen. This is consistent with
the empirical study presented by Romero et al (2011),
which states that controversial and more particularly
political topics are more persistent than other topics
on Twitter.
4.4 Analysis of Detected Events
In this section we analyze events detected by MABED
in Cen, with regard to the communities detected in the
structure of the network that interconnects the authors
of the tweets in that corpus. Our goal is to show that
MABED can help understanding users’, or user com-
munities’ interests.
Network structure The 52,494 authors of the tweets
in Cen are interconnected by 5,793,961 following rela-
tionships (Kwak et al, 2010). This forms a directed, con-
nected network, which diameter is 8, with an average
path length of 2.55 and a clustering coefficient of 0.246.
We measure a small-world-ness metric (Humphries et al,
2006) of s = 47.2, which means – according to the defi-
nition given by Humphries et al (2006), i.e. s > 1 – this
network is a small-world network.
Detecting communities in the network In order
to find communities in this network, we apply the Lou-
vain method proposed by Blondel et al (2008), which
has been notably used to detect communities in online
social networks in several studies (Haynes and Perisic,
2010; Kim et al, 2013). It is a heuristic-based, greedy
method for optimizing modularity (Newman, 2006). It
detects two communities: c0, comprised of 25,625 users,
and c1, comprised of 26,869 users. By Cen(c0) and Cen(c1),
we denote, respectively, the corpus of 479,899 tweets
published by the users belonging to c0 and the corpus
of 932,699 tweets published by users belonging to c1.
Characterizing communities’ interests We ex-
tract the list L0 (respectively L1) of the k most impact-
ful events from the corpus Cen(c0) (respectively Cen(c1)).
Here we choose to fix k = 10, so only events that en-
gendered a significant amount of reactions in the related
community are considered. In order to compare the two
communities’ interests, we first manually label each de-
tected event with one the following categories (McMinn
et al, 2013):
– Armed Conflicts and Attacks;
– Sports;
– Disasters and Accidents;
– Art Culture and Entertainment;
– Business and Economy;
– Law Politics and Scandals;
– Science and Technology;
– Miscellaneous.
Then, we measure the weight of each category in
each event list and compute the category weight dis-
tribution for each community. The weight of a given
category is obtained by the following formula:
(cid:88)
e∈E
Weightcategory =
1 − ((rank(e) − 1) × 0.1)
where E is the set of events labelled with this category.
Thus, the contribution of an event to the weight of the
related category linearly diminishes with its rank in the
list, e.g. an event ranked 1st contributes for a weight of
1, whereas an event ranked 10th contributes for a weight
of 0.1.
For comparison purpose, we do the same for events
detected in Cen and Cen(random). The Cen(random)
corpus contains 725,806 tweets that corresponds to the
subset of tweets published by 26,000 randomly chosen
authors (i.e. about the number of users in communities
c0 or c1) in Cen. Figure 9(a) shows the weight distri-
bution for communities c0 and c1. We note that, vi-
sually, the two distributions seem quite different. For
instance, we notice that the “Miscellaneous” category
has the highest weight for c1 whereas none of the events
Event detection, tracking and visualization in Twitter
13
Cen(c0)
Cen(c1)
users adopt and their social ties – and suggest that the
social network structure can influence event detection.
From a different perspective, these results show that
event detection can help understanding user communi-
ties’ interests.
t
h
g
i
e
W
t
h
g
i
e
W
2
1
0
2
1
0
(a) Events detected in Cen(c0) and Cen(c1).
CenCen(random)
y
g
o
l
o
n
h
c
e
T
d
n
a
e
c
n
e
i
c
S
y
m
o
n
o
c
E
d
n
a
s
s
e
n
i
s
u
B
s
l
a
d
n
a
c
S
d
n
a
s
c
i
t
i
l
o
P
w
a
L
s
t
r
o
p
S
s
t
n
e
d
i
c
c
A
d
n
a
s
r
e
t
s
a
s
i
D
s
u
o
e
n
a
l
l
e
c
s
i
M
s
k
c
a
t
t
A
d
n
a
s
t
c
i
fl
n
o
C
d
e
m
r
A
t
n
e
m
n
i
a
t
r
e
t
n
E
d
n
a
e
r
u
t
l
u
C
t
r
A
(b) Events detected in Cen and Cen(random).
Event category
Fig. 9 Category weight distribution for events detected with
MABED in Cen(c0), Cen(c1), Cen and Cen(random).
detected in Cen(c0) belongs to that category. On the op-
posite, the “Science and Technology” category has the
highest weight for c0 whereas it has the second lowest
weight for c1. We measure a negative linear correlation
of -0.36 between the two distributions using Pearson’s
coefficient, which reinforce this assessment. Figure 9(b)
shows the distribution of event category weight for Cen
and Cen(random). In this case, we measure a linear cor-
relation of 0.93, which means that the two distributions
are very similar. These results indicate that the com-
munities detected in the network structure are also rele-
vant in terms of users’ interests. These results also shed
light on the interplay between the social structure, i.e.
who follows whom, and the topical structure, i.e. who’s
interested in what, in Twitter. More specifically, they
complement the findings from Romero et al (2013) –
who have found a relationship between the hashtags
5 Implementation and Visualizations
We provide a parallel implementation23 of MABED.
It is also included in SONDY (Guille et al, 2013), an
open-source social media data mining software that im-
plements several state-of-the-art methods for event de-
tection in social media. To ensure an efficient explo-
ration of the events detected by MABED, we also de-
velop three visualizations, which we describe below.
Time-oriented visualization It is based on an in-
teractive timeline that allows the user to explore the
detected events through time. As an example, Figure
10 shows the time-oriented visualization generated from
the events detected in Cen. As one can see, the timeline
is divided into two parts. The lower part is a ribbon
labelled with events in chronological order (fig. 10.1).
Selecting a label (i.e. the main term of an event) in the
lower part updates the upper part of the visualization
with details about the related event. More specifically,
the upper part displays the temporal and textual de-
scriptions extracted with MABED (fig. 10.2.a), an im-
age (fig. 10.2.b) and a hypertext (fig. 10.2.c). In the
current implementation, these correspond to the top
image and the description of the top page returned by
the Bing search engine, using the description extracted
by MABED as a query.
This visualization provides a chronological overview
of the events detected in a tweet corpus. In addition,
the hypertexts offer quick access to resources that can
help learning more about these events. For instance, the
hypertext associated to the event selected on the time-
line depicted in Figure 10, reveals that, on November
19, 2009, Google released Chrome OS’s source code and
demonstrated an early version of this operating system
for desktop computers.
Impact-oriented visualization
It is an interac-
tive chart that allows analyzing the magnitude of im-
pact of the detected events. More precisely, it plots the
mention-anomaly function related to each event. Fig-
ure 11 depicts this visualization for the top 20 events
detected in Cen. The interactive legend (fig.11.1) can
be used to display (fig.11.2) only the functions which
are of interest by clicking on them. Single clicking on
a legend item removes the corresponding function from
2Binaries: http://mediamining.univ-lyon2.fr/mabed
3Sources: https://github.com/AdrienGuille/MABED
14
Adrien Guille, C´ecile Favre
Fig. 10 The time-oriented visualization. The lower part is a ribbon (1) labeled with events in chronological order. The upper
part displays details about the event selected in the lower part: the description extracted with MABED (2.a), an image (2.b)
and a hypertext (2.c).
Fig. 11 The impact-oriented visualization is a chart (1) that plots the magnitude of impact of the detected events (2). Each
event is associated to a different color.
Event detection, tracking and visualization in Twitter
15
the chart while double clicking on a item makes it the
only visible one in the chart.
This visualization helps analyzing the temporal pat-
terns that describe how Twitter users reacted to the
detected events. For instance, we observe that different
events trigger different patterns: some events engender
a single significant peak of reactions (e.g. fig.11.a), some
events generate successive peaks of decreasing strength
(e.g. fig.11.b), while other events engender successive
increasing peaks of attention (e.g. fig.11.c).
Topic-oriented visualization
It is based on the
event graph constructed by MABED during the sec-
ond phase. Figure 12 shows the event graph constructed
from Cf r. Main terms are represented with grey nodes
(fig. 12.1), whose diameter is proportional to the mag-
nitude of impact of the corresponding event. Related
words are represented by blue nodes (fig. 12.3), which
are connected to main terms by edges (fig. 12.2) whose
thickness is proportional to the related weight. For the
sake of readability, nodes’ labels are hidden by default,
but the user can click a grey node in order to reveal the
main term and related words describing the event.
This visualization helps identifying similar events by
topic. It also helps discovering words which are com-
mon to several events. This could be useful in cases
when one wants to quickly identify events involving,
e.g. a specific actor or place. For instance, we spot two
nodes (fig.12.a, b) which describe many events. They
correspond to the two main candidates for the 2012
presidential elections. Interestingly, even though they
appear in many different events, they appear together
in only one single event.
5.1 Case study: Monitoring the French Political
Conversation on Twitter
Setup MABED has been used from December 2013
until November 2014 to continuously analyze the French
political conversation on Twitter. For this purpose, it
has been coupled with a system fetching tweets in real-
time about the President of the French Republic, Fran-
cois Hollande, via the Twitter streaming API. During
this period, the highest crawling rate we have reached
was about 150,000 tweets in 24 hours. Every 10 minutes,
the visualizations were refreshed with the five most im-
pactful events detected from the tweets received in the
last 24 hours (partioned into 144 time-slices of 10 min-
utes each).
Results
It has helped us to understand the political
conversation on Twitter, and it has revealed interesting
clues about how public opinion evolves on Twitter. The
visualizations, most notably the impact-oriented visu-
alizations in this case, have also shed light on specific
patterns. As an example, Figure 13 shows two impact-
oriented visualizations. They were automatically gen-
erated from the five most impactful events detected
in two successive 24-hour periods: (i) December 13th,
2013 and (ii) December 14th, 2013. We notice that the
two distinct sets of detected events are distributed dif-
ferently throughout each day. On December 13th, we
observe that Twitter users focus their attention on var-
ious successive events throughout the day. On the other
hand, on the 14th we observe an opposite pattern since
all the events are discussed simultaneously during the
second half of the day. Further analysis, indicates that
all five events detected on December 13th are closely
related. In contrast, the events detected on the 14th
are loosely related. One possible explanation for the
pattern we observe on December 13th is that related
events can “compete” or “collaborate”. The mention-
anomaly measured for competing events should thus be
negatively correlated, while the mention-anomaly mea-
sured for cooperating events should be positively cor-
related. For instance, we observe that events e3 and e4
take place simultaneously and are likely to collaborate.
Eventually, both of them end when events e2 and e1
(likely to be competing with e3 and e4) start.
6 Conclusion
In this paper, we developed MABED, a mention-ano-
maly-based method for event detection in Twitter. In
contrast with prior work, MABED takes the social as-
pect of tweets into account by leveraging the creation
frequency of mentions that users insert in tweets to
engage discussion. Our approach also differ from prior
work in that it dynamically estimates the period of time
during which each event is discussed on Twitter. The
experiments we conducted have shown that MABED
has a linear runtime in the corpus size. They have also
demonstrated the relevance of our approach. Quantita-
tively speaking, MABED yielded better performance in
all our tests than α-MABED – a variant that ignores
mentions – and also outperformed two recent meth-
ods from the literature. Qualitatively speaking, we have
shown that the highlighting of main words improves
the readability of the descriptions of events. We have
also shown that the temporal information provided by
MABED is very helpful. On the one hand, it clearly in-
dicates when real-world events happened. On the other
hand, dynamically identifying the period of time during
which each event is discussed limits the fragmentation
of events. By analyzing the detected events with regard
to the user communities detected in the social network
structure, we have shed light on the interplay between
social and topical structure in Twitter. In particular, we
16
Adrien Guille, C´ecile Favre
Fig. 12 The topic-oriented visualization is an interactive drawing of the event graph. Grey nodes (1) correspond to main
terms while blue nodes (3) correspond to related words. Edges (2) connect words that describe the same event.
Fig. 13 On the left: the impact-oriented visualization generated based on the five most impactful events detected from tweets
collected on December 13th, 2013. On the right: the impact-oriented visualization generated based on the five most impactful
events detected from tweets collected on December 14th, 2013. Each event is associated to a different color.
have found that MABED can help understanding user
communities’ interests. Moreover, we presented three
visualizations designed to help with the exploration of
the detected events. Finally, we described how we lever-
aged MABED and the visualizations we developed in
order to continuously monitor and analyze the French
political conversation on Twitter from December 2013
until November 2014.
As part of future work, we plan to investigate the
effectiveness of utilizing more features to model the dis-
cussions between users (e.g. number of distinct users,
users’ geolocations). Another interesting direction for
future work is to incorporate sentiment analysis in the
event detection process to further enrich event descrip-
tions.
Acknowledgements The authors would like to thank Mi-
chael Gauthier for helpful suggestions. This work was sup-
ported in part by the French National Research Agency and
the ImagiWeb project (ANR-2012-CORD-002-01).
References
Aggarwal CC, Subbian K (2012) Event detection in so-
cial streams. In: SDM, pp 624–635
Aiello LM, Petkos G, Martin C, Corney D, Papadopou-
los S, Skraba R, Goker A, Kompatsiaris Y, Jaimes A
(2013) Sensing trending topics in twitter. IEEE Trans
Multimedia 15(6):1–15
AlSumait L, Barbar´a D, Domeniconi C (2008) On-line
lda: Adaptive topic models for mining text streams
with applications to topic detection and tracking. In:
ICDM, pp 3–12
Becker H, Iter D, Naaman M, Gravano L (2011) Be-
yond trending topics: Real-world event identification
Event detection, tracking and visualization in Twitter
17
on twitter. In: ICWSM, pp 438–441
Benhardus J, Kalita J (2013) Streaming trend detection
in twitter. IJWBC 9(1):122–139
Bentley J (1984) Programming pearls: algorithm design
techniques. CACM 27(9):865–873
Bernstein MS, Suh B, Hong L, Chen J, Kairam S, Chi
EH (2010) Eddi: Interactive topic-based browsing of
social status streams. In: UIST ’10, pp 303–312
Blei D, Ng A, Jordan M (2003) Latent dirichlet alloca-
tion. JMLR 3:993–1022
Blondel V, Guillaume JL, Lambiotte R, Lefebvre E
(2008) Fast unfolding of communities in large net-
works. Journal of Statistical Mechanics: Theory and
Experiment P10008:1–12
Erdem O, Ceyhan E, Varli Y (2012) A new correlation
coefficient for bivariate time-series data. In: MAF, pp
58–73
Fan TH, Lee S, Lu HI, Tsou TS, Wang TC, Yao A
(2003) An optimal algorithm for maximum-sum seg-
ment and its application in bioinformatics. In: CIAA,
pp 251–257
Fung GPC, Yu JX, Yu PS, Lu H (2005) Parameter free
bursty events detection in text streams. In: VLDB,
pp 181–192
Guille A, Favre C, Hacid H, Zighed D (2013) Sondy:
An open source platform for social dynamics mining
and analysis. In: SIGMOD, pp 1005–1008
Lappas T, Arai B, Platakis M, Kotsakos D, Gunopulos
D (2009) On burstiness-aware search for document
sequences. In: KDD, pp 477–486
Lau JH, Collier N, Baldwin T (2012) On-line trend
analysis with topic models: #twitter trends detection
topic model online. In: COLING, pp 1519–1534
Lee P, Lakshmanan LV, Milios E (2013) Keysee: Sup-
porting keyword search on evolving events in social
streams. In: KDD ’13, pp 1478–1481
Li C, Sun A, Datta A (2012) Twevent: Segment-based
event detection from tweets. In: CIKM, pp 155–164
Marcus A, Bernstein MS, Badar O, Karger DR, Mad-
den S, Miller RC (2011) Twitinfo: aggregating and
visualizing microblogs for event exploration.
In:
CHI ’11, pp 227–236
Mathioudakis M, Koudas N (2010) Twittermonitor:
trend detection over the twitter stream. In: SIG-
MOD, pp 1155–1158
McMinn AJ, Moshfeghi Y, Jose JM (2013) Building a
large-scale corpus for evaluating event detection on
twitter. In: CIKM, pp 409–418
Newman MEJ (2006) Modularity and community
structure in networks. Proceedings of the National
Academy of Sciences of the USA 103(23):8577–8582
Oxford UP (2009) OUP dictionary team monitors twit-
terer and tweets. http://blog.oup.com/2009/06/
oxford-twitter/
Haynes J, Perisic I (2010) Mapping search relevance to
Parikh R, Karlapalem K (2013) Et: events from tweets.
social networks. In: SNA-KDD, pp 11–20
In: WWW (companion volume), pp 613–620
Hopcroft J, Tarjan R (1973) Algorithm 447: efficient al-
gorithms for graph manipulation. CACM 16(6):372–
378
Humphries M, Gurney K, Prescott T (2006) The brain-
stem reticular formation is a small-world, not scale-
free, network. In: Biological Sciences, vol 273, p
503511
Kim YH, Seo S, Ha YH, Lim S, Yoon Y (2013) Two
applications of clustering techniques to twitter: Com-
munity detection and issue extraction. Discrete Dy-
namics in Nature and Society 2013:1–9
Kleinberg J (2002) Bursty and hierarchical structure in
streams. In: KDD, pp 91–101
Kraft T, Wang D, Delawder J, Dou W, Li Y, Rib-
arsky W (2013) Less after-the-fact: Investigative vi-
sual analysis of events from streaming twitter. In:
LDAV, pp 95–103
Kwak H, Lee C, Park H, Moon S (2010) What is Twit-
ter, a social network or a news media? In: WWW, pp
591–600
Landis JR, Koch GG (1977) The measurement of ob-
server agreement for categorical data. Biometrics pp
159–174
PearAnalytics (2009) Twitter study. Tech. rep., http:
//www.pearanalytics.com/wp-content/uploads/
2012/12/Twitter-Study-August-2009.pdf
Romero D, Chenhao T, Ugander J (2013) On the
interplay between social and topical structure. In:
ICWSM, pp 516–525
Romero DM, Meeder B, Kleinberg J (2011) Differences
in the mechanics of information diffusion across top-
ics: idioms, political hashtags, and complex contagion
on twitter. In: WWW, pp 695–704
Shamma DA, Kennedy L, Churchill EF (2011) Peaks
and persistence: modeling the shape of microblog
conversations. In: CSCW, pp 355–358
Valkanas G, Gunopulos D (2013) How the live web feels
about events. In: CIKM, pp 639–648
Weng J, Lee BS (2011) Event detection in twitter. In:
ICWSM, pp 401–408
Yang J, Leskovec J (2011) Patterns of temporal varia-
tion in online media. In: WSDM, pp 177–186
Yuheng H, Ajita J, Dor´ee DS, Fei W (2012) What were
the tweets about? topical associations between public
events and twitter feeds. In: ICWSM, pp 154–161
|
1811.01852 | 1 | 1811 | 2018-11-05T17:17:18 | Differences between Health Related News Articles from Reliable and Unreliable Media | [
"cs.SI",
"cs.CY"
] | In this study, we examine a collection of health-related news articles published by reliable and unreliable media outlets. Our analysis shows that there are structural, topical, and semantic differences in the way reliable and unreliable media outlets conduct health journalism. We argue that the findings from this study will be useful for combating health disinformation problem. | cs.SI | cs |
Differences between Health Related News Articles from Reliable
and Unreliable Media
Sameer Dhoju, Md Main Uddin Rony, Naeemul Hassan
Department of Computer Science and Engineering, The University of Mississippi
ABSTRACT
In this study, we examine a collection of health-related news articles
published by reliable and unreliable media outlets. Our analysis
shows that there are structural, topical, and semantic differences
in the way reliable and unreliable media outlets conduct health
journalism. We argue that the findings from this study will be
useful for combating health disinformation problem.
ACM Reference Format:
Sameer Dhoju, Md Main Uddin Rony, Naeemul Hassan. 2019. Differences
between Health Related News Articles from Reliable and Unreliable Media.
In Proceedings of Computation+Journalism Symposium (C+J'19). ACM, New
York, NY, USA, Article 4, 5 pages. https://doi.org/10.475/1234
1 INTRODUCTION
Of the 20 most-shared articles on Facebook in 2016 with the word
"cancer" in the headline, more than half the reports were discredited
by doctors and health authorities [6]. The spread of health-related
hoaxes is not new. However, the advent of Internet, social network-
ing sites (SNS), and click-through-rate (CTR)-based pay policies
have made it possible to create hoaxes/"fake news", published in a
larger scale and reach to a broader audience with a higher speed
than ever [14]. Misleading or erroneous health news can be dan-
gerous as it can lead to a critical situation. [12] reported a measles
outbreak in Europe due to lower immunization rate which experts
believed was the result of anti-vaccination campaigns caused by
a false news about MMR vaccine. Moreover, misinformation can
spoil the credibility of the health-care providers and create a lack of
trust in taking medicine, food, and vaccines. Recently, researchers
have started to address the fake news problem in general [19, 27].
However, health disinformation is a relatively unexplored area. Ac-
cording to a report from Pew Research Center [7], 72% of adult
internet users search online for information about a range of health
issues. So, it is important to ensure that the health information
which is available online is accurate and of good quality. There
are some authoritative and reliable entities such as National In-
stitutes of Health (NIH) 1 or Health On the Net 2 which provide
high-quality health information. Also, there are some fact-checking
1https://www.nih.gov/
2https://www.hon.ch/en/
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
C+J'19, February 2019, Miami, Florida USA
© 2019 Association for Computing Machinery.
ACM ISBN 123-4567-24-567/08/06...$15.00
https://doi.org/10.475/1234
sites such as Snopes.com 3 and Quackwatch.org 4 that regularly de-
bunk health and medical related misinformation. Nonetheless, these
sites are incapable of busting the deluge of health disinformation
continuously produced by unreliable health information outlets
(e.g., RealFarmacy.com, Health Nut News). Moreover, the bots in so-
cial networks significantly promote unsubstantiated health-related
claims [8]. Researchers have tried developing automated health
hoax detection techniques but had limited success due to several
reasons such as small training data size and lack of consciousness
of users [10, 11, 18, 30].
The objective of this paper is to identify discriminating features
that can potentially separate a reliable health news from an unreli-
able health news by leveraging a large-scale dataset. We examine
how reliable media and unreliable media outlets conduct health
journalism. First, we prepare a large dataset of health-related news
articles which were produced and published by a set of reliable
media outlets and unreliable media outlets. Then, using a system-
atic content analysis, we identify the features which separate a
reliable outlet sourced health article from an unreliable sourced
one. These features incorporate the structural, topical, and seman-
tic differences in health articles from these outlets. For instance,
our structural analysis finds that the unreliable media outlets use
clickbaity headlines in their health-related news significantly more
than what reliable outlets do. Our semantic analysis shows that on
average a health news from reliable media contains more reference
quotes than an average unreliable sourced health news. We argue
that these features can be critical in understanding health misinfor-
mation and designing systems to combat such disinformation. In
the future, our goal is to develop a machine learning model using
these features to distinguish unreliable media sourced health news
from reliable articles.
2 RELATED WORK
There has been extensive work on how scientific medical research
outcomes should be disseminated to general people by following
health journalism protocols [3, 4, 16, 26, 28]. For instance, [20] sug-
gests that it is necessary to integrate journalism studies, strategic
communication concepts, and health professional knowledge to
successfully disseminate professional findings. Some researchers
particularly focused on the spread of health misinformation in social
media. For example, [10] analyzes Zika 5 related misinformation in
Twitter. In particular, it shows that tracking health misinformation
in social media is not trivial, and requires some expert supervision.
It used crowdsource to annotate a collection of Tweets and used the
annotated data to build a rumor classification model. One limitation
of this work is that the used dataset is too small (6 rumors) to make
3https://www.snopes.com/
4http://www.quackwatch.org/
5https://en.wikipedia.org/wiki/Zikavirus
C+J'19, February 2019, Miami, Florida USA
S. Dhoju et al.
a general conclusion. Moreover, it didn't consider the features in
the actual news articles unlike us. [11] examines the individuals
on social media that are posting questionable health-related infor-
mation, and in particular promoting cancer treatments which have
been shown to be ineffective. It develops a feature based supervised
classification model to automatically identify users who are com-
paratively more susceptible to health misinformation. There are
other works which focus on automatically identifying health misin-
formation. For example, [17] developed a classifier to detect misin-
formative posts in health forums. One limitation of this work is that
the training data is only labeled by two individuals. Researchers
have also worked on building tools that can help a user to easily
consume health information. [18] developed the "VAC Medi+board",
an interactive visualization platform integrating Twitter data and
news coverage from a reliable source called MediSys6. It covers
public debate related to vaccines and helps users to easily browse
health information on a certain vaccine-related topic.
Our study significantly differs from these already existing researches.
Instead of depending on a small sample of health hoaxes like some
of the existing works, we take a different approach and focus on
the source outlets. This gives us the benefit of investigating with a
larger dataset. We investigate the journalistic practice of reliable
and unreliable health outlets, an area which has not been studied
according to our knowledge.
3 DATA PREPARATION
For investigating how reliable media outlets and unreliable outlets
portray health information, we need a reasonably sized collection
of health-related news articles from these two sides. Unfortunately,
there is not an available dataset which is of adequate size. For this
reason, we prepare a dataset of about 30, 000 health-related news
articles disseminated by reliable or unreliable outlets within the
years 2015 − 2018. Below, we describe the preparation process in
detail.
3.1 Media Outlet Selection
The first challenge is to identify reliable and unreliable outlets. The
matter of reliability is subjective. We decided to consider the outlets
which have been cross-checked as reliable or unreliable by credible
sources.
3.1.1 Reliable Media. We identified 29 reliable media outlets from
three sources -- i) 11 of them are certified by the Health On the
Net [22], a non-profit organization that promotes transparent and
reliable health information online. It is officially related with the
World Health Organization (WHO) [31]. ii) 8 from U.S. govern-
ment's health-related centers and institutions (e.g., CDC, NIH,
NCBI), and iii) 10 from the most circulated broadcast [25] main-
stream media outlets (e.g., CNN, NBC). Note, the mainstream out-
lets generally have a separate section for health information (e.g.,
https://www.cnn.com/health). As our goal is to collect health-
related news, we restricted ourselves to their health portals only.
3.1.2 Unreliable Media. Dr. Melissa Zimdars, a communication and
media expert, prepared a list of false, misleading, clickbaity, and
satirical media outlets [33, 34]. Similar lists are also maintained by
6http://medisys.newsbrief .eu
Reliable
Unreliable
everydayhealth, WebMD, statnews, AmericanHeart, BBCLifestyleHealth,
CBSHealth, FoxNewsHealth, WellNYT, latimesscience, tampabaytimeshealth,
philly.comhealth, AmericanHeart, AmericanCancerSociety, HHS, CNNHealth,
cancer.gov, FDA, mplus.gov, NHLBI, kidshealthparents,
ahrq.gov, healthadvocateinc, HealthCentral, eMedicineHealth, C4YWH,
BabyCenter, MayoClinic, MedicineNet, healthline
liveahealth, healthexpertgroup, healthysolo, organichealthcorner,
justhealthylifestyle1, REALfarmacyCOM, thetruthaboutcancer, BookforHealthyLife,
viralstories.bm, justhealthyway, thereadersfile, pinoyhomeremedies,
onlygenuinehealth, greatremediesgreathealth, HealthRanger, thefoodbabe,
AgeofAutism, HealthNutNews, consciouslifenews, HealthImpactNews
Table 1: List of Facebook page ids of the reliable and unreli-
able outlets. Some of them are unavailable now.
Wikipedia [32] and informationisbeautiful.net [13]. We identified 6
media outlets which primarily spread health-related misinforma-
tion and are present in these lists. Another source for identifying
unreliable outlets is Snopes.com, a popular hoax-debunking website
that fact-checks news of different domains including health. We
followed the health or medical hoaxes debunked by Snopes.com and
identified 14 media outlets which sourced those hoaxes. In total,
we identified 20 unreliable outlets. Table 1 lists the Facebook page
ids of all the reliable and unreliable outlets that have been used in
this study.
3.2 Data Collection
The next challenge is to gather news articles published by the
selected outlets. We identified the official Facebook pages of each of
the 49 media outlets and collected all the link-posts 7 shared by the
outlets within January 1, 2015 and April 2, 2018 8 using Facebook
Graph API. For each post, we gathered the corresponding news
article link, the status message, and the posting date.
3.2.1 News Article Scraping. We used a Python package named
Newspaper3k 9 to gather the news article related data. Given a
news article link, this package provides the headline, body, author
name (if present), and publish date of the article. It also provides
the visual elements (image, video) used in an article. In total, we
collected data for 29, 047 articles from reliable outlets and 15, 017
from unreliable outlets.
Filtering non-Health News Articles. Even though we restricted
3.2.2
ourselves to health-related outlets, we observed that the outlets
also published or shared non-health (e.g., sports, entertainment,
weather) news. We removed these non-health articles from our
dataset and only kept health, food & drink, or fitness & beauty related
articles. Specifically, for each news article, we used the document
categorization service provided by Google Cloud Natural Language
API 10 to determine its topic. If an article doesn't belong to one of the
three above mentioned topics, it is filtered out. This step reduced the
dataset size to 27, 589; 18, 436 from reliable outlets and 9, 153 from
unreliable outlets. We used this health-related dataset only in all the
experiments of this paper. Figure 1 shows the health-related news
percentage distribution for reliable outlets and unreliable outlets
using box-plots. For each of the 29 reliable outlets, we measure the
percentage of health news and then use these 29 percentage values
7Facebook allows posting status, pictures, videos, events, links, etc. We collected the
link type posts only.
8After that, Facebook limited access to pages as a result of the Cambridge Analytica
incident.
9https://newspaper.readthedocs.io/en/latest/
10https://cloud.google.com/natural-language/
Differences between Health Related News Articles from Reliable and Unreliable Media
C+J'19, February 2019, Miami, Florida USA
to draw the box-plot for the reliable outlets; likewise for unreliable.
We observe that the reliable outlets (median 72%) publish news on
health topics comparatively less than unreliable outlets (median
85%).
Figure 2: Distribution of clickbait patterns
We further investigate the linguistic patterns used in the clickbait
headlines. In particular, we analyze the presence of some common
patterns which are generally employed in clickbait according to [1,
23]. The patterns are-
• Presence of demonstrative adjectives (e.g., this, these, that)
• Presence of numbers (e.g., 10, ten)
• Presence of modal words (e.g., must, should, could, can)
• Presence of question or WH words (e.g., what, who, how)
• Presence of superlative words (e.g., best, worst, never)
Figure 2 shows the distribution of these patterns among the clickbait
headlines of reliable and unreliable outlets. Note, one headline may
contain more than one pattern. For example, this headline "Are
these the worst 9 diseases in the world?" contains four of the above
patterns. This is the reason why summation of the percentages
isn't equal to one. We see that unreliable outlets use demonstrative
adjective and numbers significantly more compared to the reliable
outlets.
Figure 3: Distribution of (Shared Date - Published Date) gaps
in days
4.1.2 Time-span Between Publishing and Sharing. We investigate
the time difference between an article's published date and share
date (in Facebook). Figure 3 shows density plots of Facebook Share
Date -- Article Publish Date for reliable and unreliable outlets. We
observe that both outlet categories share their articles on Facebook
within a short period after publishing. However, unreliable outlets
seem to have considerable time gap compared to reliable outlets.
It could be because of re-sharing an article after a long period.
To verify that, we checked how often an article is re-shared on
Facebook. We find that on average a reliable article is shared 1.057
times whereas an unreliable article is shared 1.222 times.
Figure 1: Comparison between reliable and unreliable out-
lets with respect to presence of health-related news contents
4 ANALYSIS
Using this dataset, we conduct content analysis to examine struc-
tural, topical, and semantic differences in health news from reliable
and unreliable outlets.
4.1 Structural Difference
4.1.1 Headline. The headline is a key element of a news article.
According to a study done by American Press Institute and the
Associated Press [15], only 4 out of 10 Americans read beyond
the headline. So, it is important to understand how reliable and
unreliable outlets construct the headlines of their health-related
news. According to to [1], a long headline results in significantly
higher click-through-rate (CTR) than a short headline does. We
observe that the average headline length of an article from reliable
outlets and an article from unreliable outlets is 8.56 words and 12.13
words, respectively. So, on average, an unreliable outlet's headline
has a higher chance of receiving more clicks or attention than a
reliable outlet's headline. To further investigate this, we examine
the clickbaityness of the headlines. The term clickbait refers to a
form of web content (headline, image, thumbnail, etc.) that employs
writing formulas, linguistic techniques, and suspense creating visual
elements to trick readers into clicking links, but does not deliver
on its promises [9]. Chen et al. [2] reported that clickbait usage is
a common pattern in false news articles. We investigate to what
extent the reliable and unreliable outlets use clickbait headlines in
their health articles. For each article headline, we test whether it is a
clickbait or not using two supervised clickbait detection models -- a
sub-word embedding based deep learning model [24] and a feature
engineering based Multinomial Naive Bayes model [21]. Agreement
between these models was measured as 0.44 using Cohen's κ. We
mark a headline as a clickbait if both models labeled it as clickbait.
We observe, 27.29% (5,031 out of 18,436) of the headlines from
reliable outlets are click bait. In unreliable outlets, the percentage
is significantly higher, 40.03% (3,664 out of 9,153). So, it is evident
that the unreliable outlets use more click baits than reliable outlets
in their health journalism.
C+J'19, February 2019, Miami, Florida USA
S. Dhoju et al.
(a) Image
(b) Quotation
(c) Link
Figure 4: Distribution of average number of image/quotation/link per article from reliable and unreliable outlets.
(a) RT1
(b) RT2
(c) RT3
and cancer risk, an unsubstantiated claim, generally propagated
by unreliable media 11, 12. Figure 5e and 5f suggest the discussions
about weight loss, skin, and hair care products (e.g., essential oil,
lemon). Topics in Figure 5b and 5c discuss mostly flu, virus, skin
infection, exercise, diabetes and so on.
(d) UT1
(e) UT2
(f) UT3
Figure 5: Topic modeling (k = 3) of articles from reliable out-
lets (top, denoted as RT) and from unreliable outlets (bot-
tom, denoted as UT).
4.1.3 Use of visual media. We examined how often the outlets
use images in the articles. Our analysis finds that on average an
article from reliable outlets uses 13.83 images and an article from
unreliable outlets uses 14.22 images. Figure 4a shows density plots of
the average number of images per article for both outlet categories.
We observe that a good portion of unreliable outlet sourced articles
uses a high number of images (more than 20).
4.2 Topical Difference
All the articles which we examined are health-related. However,
the health domain is considerably broad and it covers many topics.
We hypothesize that there are differences between the health topics
which are discussed in reliable outlets and in unreliable outlets. To
test that, we conduct an unsupervised and a supervised analysis.
4.2.1 Topic Modeling. We use Latent Dirichlet Allocation(LDA) al-
gorithm to model the topics in the news articles. The number of
topics, k, was set as 3. Figure 5 shows three topics for each of the
outlet categories. Each topic is modeled by the top-10 important
words in that topic. The font size of words is proportional to the
importance. Figure 5a and 5d indicate that "cancer" is a common
topic in reliable and unreliable outlets. Although, the words study,
said, percent, research, and their font sizes in Figure 5a indicate that
the topic "cancer" is associated with research studies, facts, and
references in reliable outlets. On the contrary, unreliable outlets
have the words vaccine, autism, and risk in Figure 5d which suggests
the discussion regarding how vaccines put people under autism
(a) Reliable
(b) Unreliable
Figure 6: Top-10 topics in reliable and unreliable outlets.
4.2.2 Topic Categorization. In addition to topic modeling, we cate-
gorically analyze the articles' topics using Google Cloud Natural
Language API 13. Figure 6 shows the top-10 topics in the reliable
and unreliable outlets. In the case of reliable, the distribution is
significantly dominated by health condition. On the other hand, in
the case of unreliable outlets, percentages of nutrition and food are
noticeable. Only 4 of the 10 categories are common in two outlet
groups. Unreliable topics have weight loss, hair care, face & body
care. This finding supports our claim from topic modeling analysis.
4.3 Semantic Difference
We analyze what efforts the outlets make to make a logical and
meaningful health news. Specifically, we consider to what extent
the outlets use quotations and hyperlinks. Use of quotation and
hyperlinks in a news article is associated with credibility [5, 29].
Presence of quotation and hyperlinks indicates that an article is
11https://www.webmd.com/brain/autism/do-vaccines-cause-autism
12https://www.skepticalraptor.com/skepticalraptorblog.php/polio-vaccine-causes-
cancer-myth/
13https://cloud.google.com/natural-language/
Differences between Health Related News Articles from Reliable and Unreliable Media
C+J'19, February 2019, Miami, Florida USA
logically constructed and supported with credible factual informa-
tion.
4.3.1 Quotation. We use the Stanford QuoteAnnotator 14 to iden-
tify the quotations from a news article. Figure 4b shows density
plots of the number of quotations per article for reliable and unreli-
able outlets. We observe that unreliable outlets use less number of
quotations compared to reliable outlets. We find that the average
number of quotations per article is 1 and 3 in unreliable and reliable
outlets, respectively. This suggests that the reliable outlet sources
articles are more credible and unreliable outlets are less credible.
4.3.2 Hyperlink. We examine the use of the hyperlink in the ar-
ticles. On average, a reliable outlet sourced article contains 8.4
hyperlinks and an unreliable outlet sourced article contains 6.8 hy-
perlinks. Figure 4c shows density plots of the number of links per
article for reliable and unreliable outlets. The peaks indicate that
most of the articles from reliable outlets have close to 8 (median)
hyperlinks. On the other hand, most of the unreliable outlet articles
have less than 2 hyperlinks. This analysis again suggests that the
reliable sourced articles are more credible than unreliable outlet
articles.
5 CONCLUSION AND FUTURE WORK
In this paper, we closely looked at structural, topical, and semantic
differences between articles from reliable and unreliable outlets.
Our findings reconfirm some of the existing claims such as unreli-
able outlets use clickbaity headlines to catch the attention of users.
In addition, this study finds new patterns that can potentially help
separate health disinformation. For example, we find that less quo-
tation and hyperlinks are more associated with unreliable outlets.
However, there are some limitations to this study. For instance, we
didn't consider the videos, cited experts, comments of the users,
and other information. In the future, we want to overcome these
limitations and leverage the findings of this study to combat health
disinformation.
REFERENCES
[1] Chris Breaux.
(accessed September 28, 2018).
"You'll Never Guess
How Chartbeat's Data Scientists Came Up With the Single Greatest Head-
line". http://blog.chartbeat.com/2015/11/20/youll-never-guess-how-chartbeats-
data-scientists-came-up-with-the-single-greatest-headline/
[2] Yimin Chen, Niall J Conroy, and Victoria L Rubin. 2015. Misleading online
content: Recognizing clickbait as false news. In Proceedings of the 2015 ACM on
Workshop on Multimodal Deception Detection. ACM, 15 -- 19.
[3] Nicole K Dalmer. 2017. Questioning reliability assessments of health information
on social media. Journal of the Medical Library Association: JMLA 105, 1 (2017),
61.
[4] Irja Marije de Jong, Frank Kupper, Marlous Arentshorst, and Jacqueline Broerse.
2016. Responsible reporting: neuroimaging news in the age of responsible re-
search and innovation. Science and engineering ethics 22, 4 (2016), 1107 -- 1130.
about linking in online news. Journalism Practice 6, 5-6 (2012), 692 -- 701.
[6] Katie Forster. (accessed October 30, 2018). Revealed: How dangerous fake health
news conquered Facebook. https://www.independent.co.uk/life-style/health-
and-families/health-news/fake-news-health-facebook-cruel-damaging-social-
media-mike-adams-natural-health-ranger-conspiracy-a7498201.html
[7] Susannah Fox. (accessed October 30, 2018). The social life of health infor-
mation. http://www.pewresearch.org/fact-tank/2014/01/15/the-social-life-of-
health-information/
[5] Juliette De Maeyer. 2012. The journalistic hyperlink: Prescriptive discourses
[8] Gaby Galvin. (accessed October 30, 2018).
How Bots Could Hack Your
Health. https://www.usnews.com/news/healthiest-communities/articles/2018-
07-24/how-social-media-bots-could-compromise-public-health
14https://stanfordnlp.github.io/CoreNLP/quote.html
&
Sources.
2016.
Unreliable/Fake
[13] informationisbeautiful.net.
[9] Bryan Gardiner. (accessed September 28, 2018). "You'll Be Outraged at How Easy
It Was to Get You to Click on This Headline". https://www.wired.com/2015/12/
psychology-of-clickbait/
[10] Amira Ghenai and Yelena Mejova. 2017. Catching Zika Fever: Application of
Crowdsourcing and Machine Learning for Tracking Health Misinformation on
Twitter. In Healthcare Informatics (ICHI), 2017 IEEE International Conference on.
IEEE, 518 -- 518.
[11] Amira Ghenai and Yelena Mejova. 2018. Fake Cures: User-centric Modeling of
Health Misinformation in Social Media. In 2018 ACM Conference on Computer-
Supported Cooperative Work and Social Computing (CSCW). ACM.
[12] Muiris Houston. (accessed October 31, 2018). Measles back with a vengeance due
to fake health news. https://www.irishtimes.com/opinion/measles-back-with-a-
vengeance-due-to-fake-health-news-1.3401960
News
Sites
https://docs.google.com/spreadsheets/d/
1xDDmbr54qzzG8wUrRdxQlC1dixJSIYqQUaXVZBqsJs. (2016).
[14] Mathew Ingram. (accessed October 30, 2018). The internet didn't invent viral
content or clickbait journalism âĂŤ there's just more of it now, and it happens
faster. https://gigaom.com/2014/04/01/the-internet-didnt-invent-viral-content-
or-clickbait-journalism-theres-just-more-of-it-now-and-it-happens-faster/
[15] American Press Institute and the Associated Press-NORC Center for Public
Affairs Research. (accessed September 28, 2018). The Personal News Cycle: How
Americans choose to get their news. https://www.americanpressinstitute.org/
publications/reports/survey-research/how-americans-get-news/
[16] Marjorie Kagawa-Singer and Shaheen Kassim-Lakha. 2003. A strategy to reduce
cross-cultural miscommunication and increase the likelihood of improving health
outcomes. Academic Medicine 78, 6 (2003), 577 -- 587.
[17] Alexander Kinsora, Kate Barron, Qiaozhu Mei, and VG Vinod Vydiswaran. 2017.
Creating a Labeled Dataset for Medical Misinformation in Health Forums. In
Healthcare Informatics (ICHI), 2017 IEEE International Conference on. IEEE, 456 --
461.
[18] Patty Kostkova, Vino Mano, Heidi J Larson, and William S Schulz. 2016. Vac
medi+ board: Analysing vaccine rumours in news and social media. In Proceedings
of the 6th International Conference on Digital Health Conference. ACM, 163 -- 164.
[19] David MJ Lazer, Matthew A Baum, Yochai Benkler, Adam J Berinsky, Kelly M
Greenhill, Filippo Menczer, Miriam J Metzger, Brendan Nyhan, Gordon Penny-
cook, David Rothschild, et al. 2018. The science of fake news. Science 359, 6380
(2018), 1094 -- 1096.
[20] Felisbela Lopes, Teresa Ruão, Zara Pinto Coelho, and Sandra Marinho. 2009.
Journalists and health care professionals: what can we do about it?. In 2009
Annual Conference of the International Association for Media and Communication
Research (IAMCR),"Human Rights and Communication". 1 -- 15.
[21] Saurabh Mathur. (accessed September 24, 2018). Clickbait Detector. https://
github.com/saurabhmathur96/clickbait-detector
[22] HEALTH ON THE NET. (accessed September 24, 2018). . https://www.hon.ch/en/
[23] Matthew Opatrny. (accessed September 28, 2018). "9 Headline Tips to Help You
Connect with Your Target Audience". https://www.outbrain.com/blog/9-headline-
tips-to-help-marketers-and-publishers-connect-with-their-target-audiences/
[24] Md Main Uddin Rony, Naeemul Hassan, and Mohammad Yousuf. 2017. Diving
Deep into Clickbaits: Who Use Them to What Extents in Which Topics with
What Effects?. In Proceedings of the 2017 IEEE/ACM International Conference on
Advances in Social Networks Analysis and Mining 2017. ACM, 232 -- 239.
[25] Michael Schneider. (accessed September 24, 2018). Most-Watched Television
Networks: Ranking 2016's Winners and Losers. https://www.indiewire.com/2016/
12/cnn-fox-news-msnbc-nbc-ratings-2016-winners-losers-1201762864/
[26] Gary Schwitzer. 2008. How do US journalists cover treatments, tests, products,
and procedures? An evaluation of 500 stories. PLoS medicine 5, 5 (2008), e95.
[27] Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, and Huan Liu. 2017. Fake news
detection on social media: A data mining perspective. ACM SIGKDD Explorations
Newsletter 19, 1 (2017), 22 -- 36.
[28] Miriam Shuchman and Michael S Wilkes. 1997. Medical scientists and health
news reporting: a case of miscommunication. Annals of Internal Medicine 126, 12
(1997), 976 -- 982.
[29] S Shyam Sundar. 1998. Effect of source attribution on perception of online news
[31] World Health Organization (WHO). (accessed September 24, 2018).
stories. Journalism & Mass Communication Quarterly 75, 1 (1998), 55 -- 68.
[30] Emily K Vraga and Leticia Bode. 2017. Using Expert Sources to Correct Health
Misinformation in Social Media. Science Communication 39, 5 (2017), 621 -- 645.
. http:
//www.who.int/
[32] Wikipedia. (accessed September 24, 2018). List of fake news websites. https:
//bit.ly/2moBDvA
[33] Wikipedia. (accessed September 24, 2018). Wikipedia:Zimdars' fake news list.
https://bit.ly/2ziHafj
[34] Melissa Zimdars. 2016. My 'fake news list' went viral. But made-up stories are
only part of the problem. https://www.washingtonpost.com/posteverything/
wp/2016/11/18/my-fake-news-list-went-viral-but-made-up-stories-are-only-
part-of-the-problem. (2016).
|
1704.03441 | 1 | 1704 | 2017-04-11T17:39:28 | Node-centric community detection in multilayer networks with layer-coverage diversification bias | [
"cs.SI",
"physics.soc-ph"
] | The problem of node-centric, or local, community detection in information networks refers to the identification of a community for a given input node, having limited information about the network topology. Existing methods for solving this problem, however, are not conceived to work on complex networks. In this paper, we propose a novel framework for local community detection based on the multilayer network model. Our approach relies on the maximization of the ratio between the community internal connection density and the external connection density, according to multilayer similarity-based community relations. We also define a biasing scheme that allows the discovery of local communities characterized by different degrees of layer-coverage diversification. Experimental evaluation conducted on real-world multilayer networks has shown the significance of our approach. | cs.SI | cs | NODE-CENTRIC COMMUNITY DETECTION IN
MULTILAYER NETWORKS WITH LAYER-COVERAGE
DIVERSIFICATION BIAS
ROBERTO INTERDONATO
Dept. of Computer, Modeling, Electronics, and Systems Engineering,
University of Calabria, Italy
ANDREA TAGARELLI
Dept. of Computer, Modeling, Electronics, and Systems Engineering,
University of Calabria, Italy
DINO IENCO
IRSTEA - UMR TETIS, France
ARNAUD SALLABERRY
LIRMM - Universit´e Paul Val´ery, France
PASCAL PONCELET
LIRMM - Universit´e de Montpellier, France
7
1
0
2
r
p
A
1
1
]
I
S
.
s
c
[
1
v
1
4
4
3
0
.
4
0
7
1
:
v
i
X
r
a
E-mail addresses: [email protected], [email protected],
[email protected], [email protected], [email protected].
1
2
Abstract. The problem of node-centric, or local, community detec-
tion in information networks refers to the identification of a community
for a given input node, having limited information about the network
topology. Existing methods for solving this problem, however, are not
conceived to work on complex networks. In this paper, we propose a
novel framework for local community detection based on the multilayer
network model. Our approach relies on the maximization of the ratio
between the community internal connection density and the external
connection density, according to multilayer similarity-based community
relations. We also define a biasing scheme that allows the discovery of
local communities characterized by different degrees of layer-coverage
diversification. Experimental evaluation conducted on real-world multi-
layer networks has shown the significance of our approach.
1. Introduction
The classic problem of community detection in a network graph corre-
sponds to an optimization problem which is global as it requires knowledge
on the whole network structure. The problem is known to be computa-
tionally difficult to solve, while its approximate solutions have to cope with
both accuracy and efficiency issues that become more severe as the net-
work increases in size. Large-scale, web-based environments have indeed
traditionally represented a natural scenario for the development and test-
ing of effective community detection approaches. In the last few years, the
problem has attracted increasing attention in research contexts related to
complex networks [12, 2, 13, 9, 7, 11, 8, 14], whose modeling and analysis
is widely recognized as a useful tool to better understand the characteris-
tics and dynamics of multiple, interconnected types of node relations and
interactions [1, 6].
Nevertheless, especially in social computing, one important aspect to con-
sider is that we might often want to identify the personalized network of
social contacts of interest to a single user only. To this aim, we would like
to determine the expanded neighborhood of that user which forms a densely
connected, relatively small subgraph. This is known as local community
detection problem [5, 4], whose general objective is, given limited informa-
tion about the network, to identify a community structure which is centered
on one or few seed users. Existing studies on this problem have focused,
however, on social networks that are built on a single user relation type
or context [4, 15]. As a consequence, they are not able to profitably ex-
ploit the fact that most individuals nowadays have multiple accounts across
different social networks, or that relations of different types (i.e., online as
well as offline relations) can be available for the same population of a social
network [6].
In this work, we propose a novel framework based on the multilayer net-
work model for the problem of local community detection, which overcomes
the aforementioned limitations in the literature, i.e., community detection
NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS
3
on a multilayer network but from a global perspective, and local commu-
nity detection but limited to monoplex networks. We have recently brought
the local community detection problem into the context of multilayer net-
works [10], by providing a preliminary formulation based on an unsupervised
approach. A key aspect of our proposal is the definition of similarity-based
community relations that exploit both internal and external connectivity of
the nodes in the community being constructed for a given seed, while ac-
counting for different layer-specific topological information. Here we push
forward our research by introducing a parametric control in the similarity-
based community relations for the layer-coverage diversification in the local
community being discovered. Our experimental evaluation conducted on
three real-world multilayer networks has shown the significance of our ap-
proach.
2. Multilayer Local Community Detection
2.1. The ML-LCD method. We refer to the multilayer network model
described in [9]. We are given a set of layers L and a set of entities (e.g.,
users) V. We denote with GL = (VL, EL,V,L) the multilayer graph such
that VL is a set of pairs v ∈ V, L ∈ L, and EL ⊆ VL × VL is the set of
undirected edges. Each entity of V appears in at least one layer, but not
necessarily in all layers. Moreover, in the following we will consider the
specific case for which nodes connected through different layers the same
entity in V, i.e., GL is a multiplex graph.
Local community detection approaches generally implement some strat-
egy that at each step considers a node from one of three sets, namely: the
community under construction (initialized with the seed node), the "shell"
of nodes that are neighbors of nodes in the community but do not belong to
the community, and the unexplored portion of the network. A key aspect is
hence how to select the best node in the shell to add to the community to
be identified. Most algorithms, which are designed to deal with monoplex
graphs, try to maximize a function in terms of the internal edges, i.e., edges
that involve nodes in the community, and to minimize a function in terms of
the external edges, i.e., edges to nodes outside the community. By account-
ing for both types of edges, nodes that are candidates to be added to the
community being constructed are penalized in proportion to the amount of
links to nodes external to the community [5]. Moreover, as first analyzed
in [4], considering the internal-to-external connection density ratio (rather
than the absolute amount of internal and external links to the community)
allows for alleviating the issue of inserting many weakly-linked nodes (i.e.,
outliers) into the local community being discovered. In this work we follow
the above general approach and extend it to identify local communities over
a multilayer network.
Given GL = (VL, EL,V,L) and a seed node v0, we denote with C ⊆ V
the node set corresponding to the local community being discovered around
4
NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS
node v0; moreover, when the context is clear, we might also use C to re-
fer to the local community subgraph. We denote with S = {v ∈ V \
C ∃((u, Li), (v, Lj)) ∈ EL ∧ u ∈ C} the shell set of nodes outside C,
and with B = {u ∈ C ∃((u, Li), (v, Lj)) ∈ EL ∧ v ∈ S} the boundary set
of nodes in C.
Our proposed method, named MultiLayer Local Community Detection
(ML-LCD), takes as input the multilayer graph GL and a seed node v0,
and computes the local community C associated to v0 by performing an
iterative search that seeks to maximize the value of similarity-based local
community function for C (LC(C)), which is obtained as the ratio of an
internal community relation LCint(C) to an external community relation
LCext(C). We shall formally define these later in Section 2.2.
Algorithm ML-LCD works as follows. Initially, the boundary set B and
the community C are initialized with the starting seed, while the shell set
S is initialized with the neighborhood set of v0 considering all the layers
in L. Afterwards, the algorithm computes the initial value of LC(C) and
starts expanding the node set in C: it evaluates all the nodes v belonging to
the current shell set S, then selects the vertex v∗ that maximizes the value
of LC(C). The algorithm checks if (i) v∗ actually increases the quality of
C (i.e., LC(C ∪ {v∗}) > LC(C)) and (ii) v∗ helps to strength the internal
connectivity of the community (i.e., LCint(C ∪ {v∗}) > LCint(C)). If both
conditions are satisfied, node v∗ is added to C and the shell set is updated
accordingly, otherwise node v∗ is removed from S as it cannot lead to an
increase in the value of LC(C). In any case, the boundary set B and LC(C)
are updated. The algorithm terminates when no further improvement in
LC(C) is possible.
2.2. Similarity-based local community function. To account for the
multiplicity of layers, we define the multilayer local community function
LC(·) based on a notion of similarity between nodes. In this regard, two
major issues are how to choose the analytical form of the similarity function,
and how to deal with the different, layer-specific connections that any two
nodes might have in the multilayer graph. We address the first issue in an
unsupervised fashion, by resorting to any similarity measure that can express
the topological affinity of two nodes in a graph. Concerning the second issue,
one straightforward solution is to determine the similarity between any two
nodes focusing on each layer at a time. The above points are formally
captured by the following definitions. We denote with EC the set of edges
between nodes that belong to C and with EC
i the subset of EC corresponding
to edges in a given layer Li. Analogously, EB refers to the set of edges
between nodes in B and nodes in S, and EB
to its subset corresponding to
i
Li.
Given a community C, we define the similarity-based local community
function LC(C) as the ratio between the internal community relation and
NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS
5
external community relation, respectively defined as:
(1)
(2)
LCint(C) =
LCext(C) =
1
C
1
B
(cid:88)
(cid:88)
v∈C
(cid:88)
(cid:88)
Li∈L
(cid:88)
(cid:88)
(u,v)∈EC
i ∧ u∈C
simi(u, v)
simi(u, v)
v∈B
Li∈L
(u,v)∈EB
i ∧ u∈S
In the above equations, function simi(u, v) computes the similarity be-
tween any two nodes u, v contextually to layer Li. In this work, we define it
Ni(u)∩Ni(v)
in terms of Jaccard coefficient, i.e., simi(u, v) =
Ni(u)∪Ni(v) , where Ni(u)
denotes the set of neighbors of node u in layer Li.
2.3. Layer-coverage diversification bias. When discovering a multilayer
local community centered on a seed node, the iterative search process in ML-
LCD that seeks to maximize the similarity-based local community measure,
explores the different layers of the network. This implies that the various
layers might contribute very differently from each other in terms of edges
constituting the local community structure. In many cases, it can be desir-
able to control the degree of heterogeneity of relations (i.e., layers) inside
the local community being discovered.
In this regard, we identify two main approaches:
• Diversification-oriented approach. This approach relies on the
assumption that a local community is better defined by increasing
as much as possible the number of edges belonging to different lay-
ers. More specifically, we might want to obtain a local community
characterized by high diversification in terms of presence of layers
and variability of edges coming from different layers.
• Balance-oriented approach. Conversely to the previous case, the
aim is to produce a local community that shows a certain balance
in the presence of layers, i.e., low variability of edges over the dif-
ferent layers. This approach relies on the assumption that a local
community might be well suited to real cases when it is uniformly
distributed among the different edge types taken into account.
Following the above observations, here we propose a methodology to in-
corporate a parametric control of the layer-coverage diversification in the
local community being discovered. To this purpose, we introduce a bias fac-
tor β in ML-LCD which impacts on the node similarity measure according
to the following logic:
(0, 1],
0,
[−1, 0),
(3)
β =
diversification-oriented bias
no bias
balance-oriented bias
6
NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS
Positive values of β push the community expansion process towards a diversi-
fication-oriented approach, and, conversely, negative β lead to different levels
of balance-oriented scheme. Note that the no bias case corresponds to han-
dling the node similarity "as is". Note also that, by assuming values in a
continuous range, at each iteration ML-LCD is enabled to make a decision by
accounting for a wider spectrum of degrees of layer-coverage diversification.
Given a node v ∈ B and a node u ∈ S, for any Li ∈ L, we define the
β-biased similarity simβ,i(u, v) as follows:
(4)
(5)
2simi(u, v)
simβ,i(u, v) =
,
1 + e−bf
bf = β[f (C ∪ {u}) − f (C)]
where bf is a diversification factor and f (C) is a function that measures the
current diversification between the different layers in the community C; in
the following, we assume it is defined as the standard deviation of the number
of edges for each layer in the community. The difference f (C ∪ {u}) − f (C)
is positive when the insertion of node u into the community increases the
coverage over a subset of layers, thus diversifying the presence of layers in
the local community. Consequently, when β is positive, the diversification
effect is desired, i.e., there is a boost in the value of simβ,i (and vice versa
for negative values of β). Note that β introduces a bias on the similarity
between two nodes only when evaluating the inclusion of a shell node into
a community C, i.e., when calculating LCext(C).
3. Experimental Evaluation
We used three multilayer network datasets, namely Airlines (417 nodes
corresponding to airport locations, 3588 edges, 37 layers corresponding to
airline companies) [3], AUCS (61 employees as nodes, 620 edges, 5 acquain-
tance relations as layers) [6], and RealityMining (88 users as nodes, 355
edges, 3 media types employed to communicate as layers) [8]. All network
graphs are undirected, and inter-layer links are regarded as coupling edges.
Size and structural characteristics of local communities. We first
analyzed the size of the local communities extracted by ML-LCD for each
node. Table 1 reports on the mean and standard deviation of the size of
the local communities by varying of β. As regards the no bias solution (i.e,
β = 0.0), largest local communities correspond to Airlines (mean 11.33 ±
14.78), while medium size communities (7.90 ± 2.74) are found for AUCS
and relatively small communities (3.37 ± 1.77) for RealityMining. The im-
pact of β on the community size is roughly proportional to the number of
layers, i.e., high on Airlines, medium on AUCS and low on RealityMin-
ing. For Airlines and AUCS, smallest communities are obtained with the
solution corresponding to β = −1.0, thus suggesting that the discovery pro-
cess becomes more xenophobic (i.e., less inclusive) while shifting towards
a balance-oriented scheme. Moreover, on Airlines, the mean size follows a
NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS
7
Table 1. Mean and standard deviation size of communities
by varying β (with step of 0.1).
dataset
Airlines
AUCS
mean
sd
mean
sd
Reality- mean
Mining
sd
dataset
Airlines
AUCS
mean
sd
mean
sd
Reality- mean
Mining
sd
-0.4
-0.5
-0.6
-0.7
-0.8
-0.9
-0.1
-1.0
-0.3
5.73 5.91 6.20 6.47 6.74 7.06 7.57 8.10
10.33 11.33
4.68 4.97 5.45 5.83 6.39 6.81 7.63 8.62 10.58 12.80 14.78
7.90
6.38 6.59 6.64 6.75 6.84 6.85 6.92 7.13
2.74
1.48 1.51 1.59 1.69 1.85 1.85 1.87 2.15
3.37
3.21 3.24 3.25 3.25 3.32 3.32 3.34 3.34
1.61 1.64 1.66 1.66 1.73 1.73 1.74 1.74
1.77
7.77
2.40
3.37
1.77
7.16
2.18
3.34
1.74
-0.2
9.13
0.0
0.8
0.7
0.6
0.5
0.3
8.82
0.2
9.02
0.4
1.0
0.1
9.80
8.37 8.20 7.93 7.53 7.26 7.06 7.06
12.10 10.61 10.07 9.39 9.15 8.67 7.82 7.46 7.35 7.27
8.89 8.89 8.89 8.87 8.85 8.85 8.85
8.77
3.16
3.27 3.27 3.27 3.26 3.23 3.23 3.23
3.39 3.36 3.36 3.32 3.18 3.17 3.17
3.38
1.78
1.78 1.74 1.74 1.71 1.60 1.59 1.59
8.92
3.33
3.39
1.78
8.92
3.33
3.39
1.78
0.9
roughly normal distribution, with most inclusive solution (i.e., largest size)
corresponding to the unbiased one. A near normal distribution (centered on
0.2 ≤ β ≤ 0.4) is also observed for RealityMining, while mean size values
linearly increase with β for AUCS.
To understand the effect of β on the structure of the local communi-
ties, we analyzed the distributions of per-layer mean average path length
and mean clustering coefficient of the identified communities (results not
shown). One major remark is that on the networks with a small number
of layers, the two types of distributions tend to follow an increasing trend
for balance-oriented bias (i.e., negative β), which becomes roughly constant
for the diversification-oriented bias (i.e., positive β). On Airlines, variabil-
ity happens to be much higher for some layers, which in the case of mean
average path length ranges between 0.1 and 0.5 (as shown by a rapidly de-
creasing trend for negative β, followed by a peak for β = 0.2, then again a
decreasing trend).
Distribution of layers over communities. We also studied how the
bias factor impacts on the distribution of number of layers over communities,
as shown in Figure 1. This analysis confirmed that using positive values of β
produces local communities that lay on a higher number of layers. This out-
come can be easily explained since positive values of β favor the inclusion of
nodes into the community which increase layer-coverage diversification, thus
enabling the exploration of further layers also in an advanced phase of the
discovering process. Conversely, negative values of β are supposed to yield
a roughly uniform distribution of the layers which are covered by the com-
munity, thus preventing the discovery process from including nodes coming
from unexplored layers once the local community is already characterized
by a certain subset of layers.
As regards the effects of the bias factor on the layer-coverage diversifica-
tion, we analyzed the standard deviation of the per-layer number of edges
8
NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS
(a) Airlines
(b) AUCS
(c) RealityMining
Figure 1. Distribution of number of layers over communi-
ties by varying β. Communities are sorted by decreasing
number of layers.
(a) Airlines
(b) AUCS
Figure 2. Average Jaccard similarity between solutions ob-
tained by varying β.
by varying β (results not shown, due to space limits of this paper). As ex-
pected, standard deviation values are roughly proportional to the setting of
the bias factor for all datasets. Considering the local communities obtained
with negative β, the layers on which they lay are characterized by a similar
presence (in terms of number of edges) in the induced community subgraph.
Conversely, for the local communities obtained using positive β, the induced
community subgraph may be characterized by a small subset of layers, while
other layers may be present with a smaller number of relations.
Similarity between communities.
The smooth effect due to the
diversification-oriented bias is confirmed when analyzing the similarity be-
tween the discovered local communities. Figure 2 shows the average Jaccard
similarity between solutions obtained by varying β (i.e., in terms of nodes
included in each local community). Jaccard similarities vary in the range
NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS
9
[0.75, 1.0] for AUCS and Airlines, and in the range [0.9, 1.0] for RealityMin-
ing (results not shown). For datasets with a lower number of layers (i.e.,
AUCS and RealityMining), there is a strong separation between the solu-
tions obtained for β > 0 and the ones obtained with β < 0. On AUCS,
the local communities obtained using a diversification-oriented bias show
Jaccard similarities close to 1, while there is more variability among the
solutions obtained with the balance-oriented bias. Effects of the bias factor
are lower on RealityMining, with generally high Jaccard similarities. On
Airlines, the effects of the bias factor are still present but smoother, with
gradual similarity variations in the range [0.75, 1.0].
4. Conclusion
We addressed the novel problem of local community detection in mul-
tilayer networks, providing a greedy heuristic that iteratively attempts to
maximize the internal-to-external connection density ratio by accounting
for layer-specific topological information. Our method is also able to control
the layer-coverage diversification in the local community being discovered,
by means of a bias factor embedded in the similarity-based local community
function. Evaluation was conducted on real-world multilayer networks. As
future work, we plan to study alternative objective functions for the ML-
LCD problem.
It would also be interesting to enrich the evaluation part
based on data with ground-truth information. We also envisage a number
of application problems for which ML-LCD methods can profitably be used,
such as friendship prediction, targeted influence propagation, and more in
general, mining in incomplete networks.
References
[1] M. Berlingerio, F. Pinelli, and F. Calabrese. ABACUS: frequent pattern mining-
based community discovery in multidimensional networks. Data Min. Knowl. Disc.,
27(3):294–320, 2013.
[2] V. Carchiolo, A. Longheu, M. Malgeri, and G. Mangioni. Communities unfolding in
multislice networks. In Proc. Complex Networks, pp. 187–195, 2010.
[3] A. Cardillo, J. Gomez-Gardenes, M. Zanin, M. Romance, D. Papo, F. del Pozo, and
S. Boccaletti. Emergence of network features from multiplexity. Scientific Reports,
3:1344, 2013.
[4] J. Chen, O. R. Zaıane, and R. Goebel. Local community identification in social net-
works. In Proc. IEEE/ACM ASONAM, pp. 237–242, 2009.
[5] A. Clauset. Finding local community structure in networks. Phys. Rev. E,
72(2):026132, 2005.
[6] M. E. Dickison, M. Magnani, and L. Rossi. Multilayer social networks. Cambridge
University Press, 2016.
[7] M. De Domenico, A. Lancichinetti, A. Arenas, and M. Rosvall. Identifying modular
flows on multilayer networks reveals highly overlapping organization in social systems.
Phys. Rev. X, 5(1):011027, 2015.
[8] J. Kim and J.-G. Lee. Community detection in multi-layer graphs: A survey. SIG-
MOD Record, 44(3):37–48, 2015.
10
NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS
[9] M. Kivela, A. Arenas, M. Barthelemy, J. P. Gleeson, Y. Moreno, and M. A. Porter.
Mutilayer networks. Journal of Complex Networks, 2(3):203–271, 2014.
[10] R. Interdonato, A. Tagarelli, D. Ienco, A. Sallaberry, and P. Poncelet. Local commu-
nity detection in multilayer networks. In Proc. IEEE/ACM ASONAM, pp. 1382–1383,
2016.
[11] C. W. Loe and H. J. Jensen. Comparison of communities detection algorithms for
multiplex. Physica A, 431:29–45, 2015.
[12] P. J. Mucha, T. Richardson, K. Macon, M. A. Porter,
, and J.-P. Onnela. Sci-
ence. Community structure in time-dependent, multiscale, and multiplex networks,
328(5980):876–878, 2010.
[13] E. E. Papalexakis, L. Akoglu, and D. Ienco. Do more views of a graph help? Com-
munity detection and clustering in multi-graphs. In Proc. Fusion, pp. 899–905, 2013.
[14] T. P. Peixoto. Inferring the mesoscale structure of layered, edge-valued, and time-
varying networks. Phys. Rev. E, 92(4):042807, 2015.
[15] A. Zakrzewska and D. A. Bader. A dynamic algorithm for local community detection
in graphs. In Proc. IEEE/ACM ASONAM, pp. 559–564, 2015.
|
1710.01724 | 1 | 1710 | 2017-10-04T17:59:08 | An efficient alternative to Ollivier-Ricci curvature based on the Jaccard metric | [
"cs.SI",
"physics.soc-ph"
] | We study Ollivier-Ricci curvature, a discrete version of Ricci curvature, which has gained popularity over the past several years and has found applications in diverse fields. However, the Ollivier-Ricci curvature requires an optimal mass transport problem to be solved, which can be computationally expensive for large networks. In view of this, we propose two alternative measures of curvature to Ollivier-Ricci which are motivated by the Jaccard coefficient and are demonstrably less computationally intensive, a cheaper Jaccard (JC) and a more expensive generalized Jaccard (gJC) curvature metric. We show theoretically that the gJC closely matches the Ollivier-Ricci curvature for Erdos-Renyi graphs in the asymptotic regime of large networks. Furthermore, we study the goodness of approximation between the proposed curvature metrics and Ollivier-Ricci curvature for several network models and real networks. Our results suggest that in comparison to an alternative curvature metric for graphs, the Forman-Ricci curvature, the gJC exhibits a reasonably good fit to the Ollivier-Ricci curvature for a wide range of networks, while the JC is shown to be a good proxy only for certain scenarios. | cs.SI | cs |
An efficient alternative to Ollivier-Ricci curvature based on the
Jaccard metric ∗
Siddharth Pal†1, Feng Yu‡2, Terrence J. Moore§3, Ram Ramanathan¶ (cid:107)4, Amotz
Bar-Noy∗∗2 and Ananthram Swami††3
1Raytheon BBN Technologies, Cambridge, MA 02138, USA.
2Graduate Center of the City University of New York, New York, NY 10016, USA.
3U.S. Army Research Lab, Adelphi, MD 20783, USA.
4GoTenna Inc, Brooklyn, NY 11201, USA.
October 5, 2017
Abstract
We study Ollivier-Ricci curvature, a discrete version of Ricci curvature, which has gained popularity
over the past several years and has found applications in diverse fields. However, the Ollivier-Ricci cur-
vature requires an optimal mass transport problem to be solved, which can be computationally expensive
for large networks. In view of this, we propose two alternative measures of curvature to Ollivier-Ricci
which are motivated by the Jaccard coefficient and are demonstrably less computationally intensive,
a cheaper Jaccard (JC) and a more expensive generalized Jaccard (gJC) curvature metric. We show
theoretically that the gJC closely matches the Ollivier-Ricci curvature for Erdös-Rényi graphs in the
asymptotic regime of large networks. Furthermore, we study the goodness of approximation between the
proposed curvature metrics and Ollivier-Ricci curvature for several network models and real networks.
Our results suggest that in comparison to an alternative curvature metric for graphs, the Forman-Ricci
curvature, the gJC exhibits a reasonably good fit to the Ollivier-Ricci curvature for a wide range of
networks, while the JC is shown to be a good proxy only for certain scenarios.
Introduction
1
The various notions of curvature in differential geometry measure, in different ways, the curves or bends of
tensors on the surface of a manifold [1, 2, 3]. Several of these definitions of curvature have recently been
interpreted on graphs and applied to networks. Some examples include Gaussian curvature [4], Gromov
curvature [5], and Ricci curvature [6, 7]. Of these, the Ollivier-Ricci curvature seems to be the most promising
new metric for networks. It has been shown to be able to measure robustness in gene expression, reliably
distinguishing between cancerous and non-cancerous cells [8]. Ricci curvature has been shown to indicate
∗Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number
W911NF-09-2-0053 (the ARL Network Science CTA). The views and conclusions contained in this document are those of the
authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research
Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government
purposes notwithstanding any copyright notation here on. This document does not contain technology or technical data
controlled under either the U.S. International Traffic in Arms Regulations or the U.S. Export Administration Regulations.
†[email protected]
‡[email protected]
§[email protected]
¶[email protected]
(cid:107)Work done while the author was with Raytheon BBN Technologies
∗∗[email protected]
††[email protected]
1
fragility in stock markets [9]. Ollivier-Ricci curvature has also been applied to explaining congestion wireless
network capacity [10].
Ollivier-Ricci curvature is defined between a pair of vertices in a network based on the optimal mass
transport, determined by the Wasserstein distance, between their associated mass distributions. When
restricted to the transport between adjacent vertices, Ollivier-Ricci curvature can be viewed as a edge
centrality metric, akin to betweenness or random-walk measures on edges. Positive curvature implies the
neighbors of the two nodes are close (perhaps overlapping or shared). Zero (or near-zero) curvature implies
the nodes are locally embeddable in a flat surface (as in a grid or regular lattice). Negative curvature implies
that the neighbors of the two nodes are further apart.
Unfortunately, Ollivier-Ricci curvature can have high-computational complexity in dense, high-degree
networks as solving the Wasserstein distance can, in the worst case, scale with the quartic of the degree (see
Sec. 4) or, in practice, scale with the product of the two nodes' degrees [11]. This motivates the desire for a
less computationally-intensive approximation. Jost and Liu [12] demonstrated the significance of overlapping
neighborhoods in the Ollivier-Ricci curvature of edges in the formulation of a bound involving the clustering
coefficient [13]. Hence, it seems reasonable to build a metric approximating Ollivier-Ricci from the sets of
common and separate neighbors of the nodes in an edge.
We derive a new curvature metric approximating the Ollivier-Ricci graph curvature metric using the
Jaccard index, which has previously found utility in networks, e.g., as a measure of similarity between
nodes [14]. The Jaccard index naturally captures the overlapping neighborhood feature found in positively
curved edges in a simplistic manner. The notion of set-comparison as a curvature metric leads to a more
general linear approximation function of Ollivier-Ricci formulated from classes of sets of each node's neighbors
that effectively solves a mass exchange problem. The complexity of this new metric is significantly less than
that for Ollivier-Ricci. For random graphs, we find that our new metric shares many asymptotic properties
of the Ollivier-Ricci curvature [15]. Moreover, comparisons of the Jaccard-inspired curvature with Ollivier-
Ricci seem more favorable than the alternative Forman-Ricci curvature metric [6, 16, 17] that is extremely
computationally efficient, on network models and real networks.
2 Curvature Metrics
We first introduce two discretized version of the Ricci curvature – the Ollivier-Ricci curvature as discussed in
[7, 12, 18], and the Forman-Ricci curvature as discussed in [6, 16]. Then, we introduce a new graph curvature
metric which is intuitively similar to Ollivier-Ricci curvature, without requiring as much computational
complexity.
2.1 Ollivier-Ricci curvature
Consider an undirected graph G = (V, E) on n nodes, i.e., V = n, with no self loops. We define the metric
d such that for distinct vertices i,j, d(i, j) is the length of the shortest path connecting i and j. Ollivier-Ricci
curvature can be defined on the graph G, with a probability measure mi attached to each vertex i ∈ V . For
two nodes i and j, we define a mass transport plan νi,j : V × V → [0, 1] such that for every x, y in V
νi,j((cid:96), y) = mj(y).
(1)
(cid:88)
k∈V
νi,j(x, k) = mi(x) and (cid:88)
(cid:96)∈V
The above condition enforces that mass attributed to any neighbor of i, mi(·), is completely transferred to
neighbors of j in such a manner that all the neighbors of j get exactly the required mass mj(·). Let the
space of all valid mass transport plans between nodes i and j be denoted by Π(i, j).
For an edge (i, j) ∈ E, the Ollivier-Ricci (OR) curvature metric is defined as follows
(2)
where W (mi, mj) is the Wasserstein distance or optimal mass transport cost between the two probability
measures mi and mj, expressed as follows
κ(i, j) = 1 − W (mi, mj),
W (mi, mj) =
inf
νi,j∈Π(i,j)
νi,j(x, y)d(x, y).
(3)
(cid:88)
(cid:88)
x∈V
y∈V
2
For each vertex i, the probability measure mi is set as
mi(j) =
1
di
, if i ∼ j
= 0 otherwise,
(4)
where i ∼ j implies an edge between i and j. The probability measure mi shown above assigns weight to all
neighbors of i uniformly as in [8, 12]. A more generic setting is where a mass 0 ≤ α ≤ 1 is assigned to node
i, and the rest of the mass 1 − α is distributed uniformly among the neighbors of i [11, 18].
We can bound the Ollivier-Ricci curvatures defined in (2). First, note that for an edge (i, j), the minimum
distance between a neighbor of i and j is 0 when they are common, and the maximum distance is 3 hops.
This implies the following bound on the Wasserstein distance 0 < W (mi, mj) < 3, which in turn implies
−2 < κ < 1.
2.2 Forman-Ricci curvature
Forman discretized the classical Ricci curvature for a broad class of geometric objects, the CW complexes [6],
which is called the Forman-Ricci or simply Forman curvature. While the original definition of Forman
curvature for CW complexes is not relevant to this paper, we present Forman curvature for undirected
networks as introduced in [16]. This was proposed as a candidate for a discrete Ricci curvature to gain new
insights on the organization of complex networks.
The Forman curvature for an edge e = (i, j) is given as follows
wi
we
− (cid:88)
e(cid:96)∈ei\e
+
wj
we
− (cid:88)
e(cid:96)∈ej\e
wi√
wewe(cid:96)
wj√
wewe(cid:96)
F (e) = w(e)
(5)
where we is a weight associated with the edge e, wi and wj are weights associated with vertices i and j, and
ei \ e and ej \ e denote the set of edges incident on vertices i and j excluding the edge e.
For an unweighted graph, two weighting schemes were proposed [16, 17, 19]. One was to set all the
node and edge weights as 1, and the other was to weight the edges by 1, and the nodes by their degree.
We implemented both the weighting schemes, and did not find a significant difference in terms of their
correlations with the Ollivier-Ricci curvature. The results shown in Section 5 follow the former weighting
scheme, where the original expression of Forman curvature (5) reduces to
F (e) = 4 − di − dj.
(6)
Other, more involved, weighting schemes have also been proposed [20, 21], but are not considered in this
work.
2.3 Jaccard Curvatures
Calculating Ollivier-Ricci curvature can be costly because it involves solving an optimal mass transport
problem, or equivalently a linear program [11], for each edge. Especially for large graphs, with high values of
maximum degree, calculating OR curvature for all the edges can be prohibitively costly (see Section 4). To
address this issue, we introduce an approximation to the OR curvature, which would not require solving the
optimal mass transport problem. Towards this end, we revisit the intuition of OR curvature – An edge has
positive curvature if the neighborhoods of the two concerned nodes are closer to each other compared to the
nodes themselves, zero curvature if the neighborhoods are at the same distance, and negative curvature if
the neighborhoods are farther apart. A simple heuristic would be to measure the fraction of common nodes
between the neighborhoods of the two concerned nodes. This is related to Jaccard's coefficient [14] which
was introduced in network analysis as a similarity measure between nodes. First, we define some notation:
For an edge (i, j), the set of common neighbors of the nodes i and j is given by
C(i, j) = Ni ∩ Nj,
3
where Nk is the neighbor set of node k. We let C(i, j) = C(i, j). We also define the set of separate neighbors
between i and j as follows
S(i, j) = (Ni ∪ Nj) \ C(i, j),
with S(i, j) = S(i, j). We define the union of the neighbor sets of i and j as N (i, j), i.e.,
N (i, j) = C(i, j) ∪ S(i, j),
with N (i, j) = N (i, j).
to their union, i.e.,
Jaccard's coefficient is defined as the ratio between the intersection of neighborhoods of the two nodes
J(i, j) =
C(i, j)
N (i, j)
.
(7)
It is evident that the metric J(i, j) will be closer to 1 if there are more common nodes, and closer to 0
otherwise. However, the range of this metric will be between 0 and 1, as opposed to OR curvature which
takes the range (−2, 1). We want the Jaccard curvature metric for an edge (i, j), JC(i, j), to approach a
value of 1 when the fraction of common nodes to total nodes is close to 1, and −2 when that fraction is equal
to 0. In other words, we have the following requirements,
and
When C(i, j)
N (i, j)
≈ 1, then JC(i, j) ≈ 1
when C(i, j)
N (i, j)
= 0, then JC(i, j) = −2.
Equations (8) and (9) lead to the following expression for the Jaccard curvature,
JC(i, j) = 1 − 3S(i, j)
N (i, j)
= −2 + 3J(i, j).
see Figure 1 for an illustrative example.
(8)
(9)
(10)
Figure 1: Jaccard curvatures shown for an illustrative example – We consider the edge (1, 2) and calculate its
Jaccard (JC), see (10), and generalized Jaccard (gJC) curvatures, see (16) for details. We have one common
neighbor, i.e., C(1, 2) = {3}, and the set of separate numbers is {1, 2, 4, 5, 6}. Therefore, C(1, 2) = 1,
S(1, 2) = 5 and N (1, 2) = 6, and the Jaccard curvature JC(1, 2) = 1 − 3×5
2. Since, node 4 is the
only exclusive neighbor of node 1 directly connected to an exclusive neighbor of node 2, we have S (1)
1 = {4}.
2 = {5}. The remaining exclusive neighbor of node 1, i.e., node 6, is
By the same argument, we have S (1)
connected to node 3 (an exclusive neighbor of node 2) through a path of 2 hops, and S (2)
1 = {6}. Putting
all this together, using (16) we obtain, gJC(1, 2) = 1 − 1+1+2
6 = 0. In comparison, the Ollivier-Riccci
curvature OR(1, 2) = 1
4.
6 − 2 · 1
6 = − 3
4
123456The above expression could be interpreted as subtracting the influence of separate neighbors, with S(i, j)
being the total number of separate neighbors and the denominator N (i, j) being the cardinality of the union
of the neighbor sets of i and j.
Computing Jaccard curvature is very cheap because it only requires the knowledge of the size of neigh-
borhoods of the two relevant nodes and the common nodes in those neighborhood sets. From simulations
and experiments reported in Section 5, we have observed that the Jaccard curvature is a reasonably good
approximation of the Ollivier-Ricci curvature for several instances of generated and real-world networks.
However, since the Jaccard curvature partitions the set of neighbors into common and separate vertices, the
granularities of OR curvature is lost to a great extent. This is best demonstrated by considering randomly
chosen edges in canonical graphs.
In a complete graph the OR curvature of each edge will be close to 1, and the Jaccard curvature will be
exactly 1. For an edge connecting high degree nodes in a tree, the OR curvature will be close to -2, while
the Jaccard curvature will be exactly -2. However on a grid or a line, the OR curvature of the edges will
be 0, while the Jaccard curvature will still be -2, because there are no common nodes. Clearly, the Jaccard
curvature metric should have a more positive value in a grid compared to that on a tree, if we are to obtain
a better approximation of the OR curvature. To address this issue, we now define a generalized version of
the Jaccard curvature metric to take into account nodes that are not common, yet closer than 3 hops apart.
We introduce some more notation: Define Ni(i, j) as the exclusive neighbors of i with respect to the edge
(i, j), i.e.,
Ni(i, j) = {k ∈ V \ {j} (i, k) ∈ E}.
For any two nodes u and v, recall that d(u, v) denotes the shortest path length between the two nodes. Let
the set of separate nodes be partitioned into the following sets
S (r)
i = {k ∈ Ni(i, j) min
(cid:96)∈Nj (i,j)
d(k, (cid:96)) = r},
i = S (r)
with S(r)
hops from the closest exclusive neighbor of j. If Nj(i, j) = ∅, then we set S (1)
, for r = 1, 2, 3. In other words, S (r)
i
i
is the set of neighbors of i that are at a distance of r
i = Ni(i, j). Observe that
(cid:16)∪3
(cid:17) ∪(cid:16)∪3
r=1S (r)
j
(cid:17) ∪ {i ∪ j}.
S(i, j) =
r=1S (r)
i
Jaccard (gJC) metric.
Since Ollivier-Ricci curvature includes the endpoints of the edge itself, we include i and j in the generalized
Therefore, for an edge (i, j) ∈ E, the generalized Jaccard metric is defined as follows
S(3)
i + S(3)
j
N (i, j)
S(1)
i + S(1)
N (i, j)
S(2)
i + S(2)
j
N (i, j)
gJC(α, β, γ, δ, ζ; i, j) = α + β
C(i, j)
N (i, j)
j + 2
(11)
+ γ
+ δ
+ ζ
where the parameters α,β, γ, δ and ζ need to be determined. Since, i /∈ S (1)
, we arrive at the
gJC metric by including the two nodes separately in (11). The parameters are determined by considering
the cases of canonical graphs.
and j /∈ S (1)
j
i
2.3.1 Considering canonical graphs
In a k-complete graph, we would like the generalized Jaccard metric to have a maximum value close to 1, so
as to approximate the OR curvature which approaches 1 as k gets large. Therefore we require, as k → ∞
and
C(i, j)
N (i, j)
→ 1, then gJC(i, j) → 1,
which leads to
(12)
Similarly, for edges in a d-dimensional grid, we would like the generalized Jaccard metric to have a value
close to 0 as d gets large. This requires that as d → ∞ and
α + β = 1.
i + S(1)
S(1)
N (i, j)
j + 2
→ 1, then gJC(i, j) → 0,
5
which leads to
α + γ = 0.
(13)
This would best approximate the OR curvature which has a value of 0 for d -dimensional grids.
For edges in a tree connecting nodes with degree d, we would like the generalized Jaccard metric to have
a value close to a minimum value of -2, approximating the OR curvature which itself approaches −2 as d
gets large. This requires that as d → ∞ and
which leads to
i + S(3)
S(3)
j
N (i, j)
→ 1, then gJC(i, j) → −2
α + ζ = −2.
We set, α = 1, β = 0, γ = −1, ζ = −3, which satisfies (12)-(14). We also enforce the following bound
γ > δ > ζ.
(14)
(15)
so that the effect of S (2) on the edge curvature falls between that of S (1) and S (3). Setting δ = 2 or γ+ζ
obtain
2 , we
gJC(i, j) = 1 − S(1)
j + 2
i + S(1)
N (i, j)
− 2
i + S(2)
S(2)
j
N (i, j)
− 3
i + S(3)
S(3)
j
N (i, j)
.
(16)
2.3.2 Connections to mass transport
The Ollivier-Ricci curvature is related to the solution of an optimal mass transport problem as discussed in
Section 2.1. Here we study if the Jaccard curvature has a similar connection to mass transport. Observe that
the generalized Jaccard expression derived in (16) subtracts the influence of a node in S (1) with a weight of
1, influence of a node in S (2) with a weight of 2, and similarly for a node in S (3) with a weight of 3. These
weights exactly match the transportation cost of moving mass from a source node to any destination node in
the neighborhood of the other node. Next, we observe that the Jaccard curvature is related to the solution
of this optimal mass exchange problem.
N (i,j) for every k in N (i, j).
The mass exchange plan νi,j : V × V → [0, 1] requires that for every x in Ni(i, j) and y in Nj(i, j)
We define a mass exchange problem with an initial mass distribution of mk = 1
(cid:88)
(cid:96)∈V
and (cid:88)
k∈V
νi,j(x, (cid:96)) =
1
N (i, j)
νi,j(k, y) =
1
N (i, j)
(17)
and νi,j(i, j) = 1
N (i,j). The mass exchange problem introduced here only requires that
mass from a particular node x in Ni(i, j) be completely transported to Nj(i, j) and vice-versa, along with
the requirement that mass at node i be transported to node j and vice-versa.
N (i,j) and νi,j(j, i) = 1
It can be shown that the generalized Jaccard expression in (16) is related to the solution of the optimal
mass exchange problem between neighborhoods of the two concerned nodes, where the mass distribution
at the source is predetermined and fixed and the destination mass distribution is kept flexible, with the
constraint that mass from a neighbor of one node needs to be transported to any neighbor of the other node
and vice-versa.
3 Analytical results on random graphs
We state the following result on the behavior of gJC curvature in ER graphs and compare with that of
the OR curvature [15]. We present the results for a sequence of Erdos-Renyi graphs {G1, G2, . . .}, and let
JCn(i, j) and gJCn(i, j) denote the Jaccard and generalized Jaccard curvature of edge (i, j) in the graph
Gn.
Theorem 3.1 Let {G1, G2, . . .} be a sequence of Erdos-Renyi graphs. As n → ∞ and for all (i, j) ∈ E, we
have the following results.
6
a. For pn → p
b. For pn → 0, E [JCn(i, j)] → −2 .
E [JCn(i, j)] → 5p − 4
2 − p
.
(18)
Theorem 3.2 Let {G1, G2, . . .} be a sequence of Erdos-Renyi graphs. As n → ∞ and for all (i, j) ∈ E, we
have the following results.
a. For pn → p
(19)
Note that E [gJCn] > 0 for all p > 0. As p → 1, E [gJCn(i, j)] → 1 and as p → 0, E [gJCn(i, j)] → 0.
E [gJCn(i, j)] → p
2 − p
.
b. For npn → 0 and pn → 0, E [gJCn(i, j)] → 0.
n → ∞ and pn → 0, E [gJCn(i, j)] → 0.
c. For np2
n → ∞, np2
d. For n2p3
e. For npn → ∞,n2p3
n → 0 and pn → 0, E [gJCn(i, j)] → −1.
n → 0 and pn → 0, E [gJCn(i, j)] → −2.
Proof of Theorems 3.1 and 3.2.
Without loss of generality, we set i = 1 and j = 2 in (16). Note that for the generic edge (1, 2) in graph
Nn(1, 2) =
[1 [k ∼ 1, k ∼ 2] + 1 [k ∼ 1, k (cid:28) 2] + 1 [k (cid:28) 1, k ∼ 2]] .
(cid:88)
k∈Vn
Gn,
and
Therefore,
where,
E [Nn(1, 2)] = (n − 2)p2
n + [2(n − 2)pn(1 − pn) + 2]
E [Cn(1, 2)] = (n − 2)p2
n
(20)
(21)
E [Sn(1, 2)] = 2(n − 2)pn(1 − pn) + 2.
(22)
Observe that the number of common and separate nodes Cn(1, 2),Sn(1, 2) have been indexed by n, to denote
that they correspond to the graph Gn. Note that as n → ∞ and if pn → 0, E [Sn(1, 2)] ∼ 2npn and
E [Cn(1, 2)] ∼ o(npn). However, if pn → p, then E [Sn(1, 2)] → 2np(1 − p) and E [Cn(1, 2)] → np2.
For (i, j) ∈ E, the Jaccard curvature for the regime pn → p follows by simply using (20)-(22). For the
other regimes where pn → 0, the fraction of common nodes to the neighborhood size goes to 0, implying
that JC(i, j) → −2. This proves Theorem 3.1.
The argument for the gJC curvature is a bit more involved. From (16), we have
E [gJC(i, j)] = 1 − E
j + 2
i + S(1)
N (i, j)
− 2E
i + S(2)
j
N (i, j)
− 3E
.
(23)
(cid:34) S(1)
(cid:35)
(cid:34) S(2)
(cid:35)
(cid:35)
(cid:34) S(3)
i + S(3)
j
N (i, j)
We obtain the result by considering the different scaling regimes separately: The proof of Theorem 3.2
requires Lemmas A.1 through A.4 which are stated and proved in Appendix A. (a) First, consider the regime
pn → p. From Lemma A.2 it is clear that all separate nodes are in sets S (1)
n,(cid:96) for (cid:96) = i, j. Using this fact and
(21), we obtain the result shown in (19).
(b) First, we consider the regime npn → 0. Under this regime, degree of nodes goes to 0 a.s. Therefore for
edge (i, j), there are no common nodes and the separate nodes are {i, j} whp. Therefore E [gJC(i, j)] → 0.
7
(c) Next, we consider the case np2
n− +1
Lemma A.1. Using Lemma A.4, we note that
2 npn = Θ(1). Multiplying numerator and denominator in E
n → ∞ and pn → 0. Fix 0 < < 1: Suppose np2
by n− +1
(cid:16)
i +S(1)
N (i,j)
(cid:17)
j +2
V ar
n− +1
2 Nn(1, 2)
= n−(+1)V ar(Nn(1, 2)
∼ n−(+1)npn = Θ(n− +1
2 )
(cid:20) S(1)
(cid:21)
n = Θ(n). Therefore
2 allows us to apply
(24)
n → ∞ and np2
n → 0 forces the bound 0 < < 1
Eq. (24) and Lemmas A.2 yields E [gJC(i, j)] → 0.
(d) We consider the scaling range where n2p3
the constraint np2
and denominator of the individual terms of (23) by n− +1
n− +1
(e) Now, we consider the scaling range where npn → ∞ and n2p3
The constraint n2p3
individual terms of (23) by n−, we obtain E [gJC(i, j)] → −2 by applying Lemmas A.3 and A.4.
n → 0. Fix > 0: Suppose n2p3
(cid:16)
3 , we obtain E [gJC(i, j)] → −1 by applying Lemmas A.3 and A.4.
n → 0 forces the bound 0 < < 1
n → 0. Fix > 0 and let npn = Θ(n).
3. Multiplying the numerator and denominator of the
n = Θ(n). Also,
3 npn = Θ(1). Multiplying the numerator
2. Therefore, n− +1
3 , and observing that V ar
n− +1
3 Nn(1, 2)
(cid:17) ∼
Theorems 3.1-3.2 together suggest that gJC is a better approximation of OR curvature than the JC
curvature. We see that as the scaling changes and the ER graph becomes more dense, the gJC curvature
increases progressively. In fact, the scalings at which the asymptotic behavior changes, match for the OR
and gJC curvatures. The behavior of JC, gJC and OR curvatures are tabulated in Table 1 for different
regimes in ER graphs.
p constant
npn → 0
npn → ∞ and n2p3
n → ∞ and np2
n2p3
n → ∞
np2
JC
5p−4
2−p
−2
n → 0 −2
n → 0 −2
−2
gJC OR
p
2−p
0
−2
−1
0
p
0
−2
−1
0
Table 1: The asymptotic values for the three curvatures under different scalings for the ER graph
4 Computational Complexity
Here we analytically study the complexity of computing the Ollivier-Ricci (OR), Forman, Jaccard (JC) and
generalized Jaccard (gJC) curvatures of a graph. Intuitively there is a clear hierarchy in the complexity of
the above-mentioned curvatures. Consider computing them for a generic edge (i, j): In Forman we are only
considering the degree of i and j so the complexity is going to be O(m) for a graph of m edges; while for JC,
we are looking for the number of common neighbors between i and j. In gJC we look for the shortest path
to get from any exclusive neighbor of i to any exclusive neighbor of j. All of these shortest paths could be
to the same neighbor of j. Finally, in OR these shortest paths must represent a perfect fractional matching
in the sense that one neighbor of y cannot be the target of too many neighbors of x. This is obviously a
harder task.
For ease of computation we will first assume that the graph is d-regular and the graph is stored as sorted
adjacency lists. In Appendix B, we extend our analysis to address general graphs.
8
4.1 Jaccard curvatures
In Section 2.3, we divided i, j's neighbor nodes into separate subsets:
S (r)
i = {k ∈ Ni(i, j) min
l∈Nj (i,j)
S (r)
j = {k ∈ Nj(i, j) min
l∈Ni(i,j)
, with S(r) = S (r), then
i ∪ S (r)
j
for r = 0, 1, 2, 3. Let S (r) = S (r)
d(k, l) = r}.
d(k, l) = r}.
N (i, j) = S (0) ∪ S (1) ∪ S (2) ∪ S (3) ∪ {i ∪ j}.
In order to compute JC and gJC, we need to count the size of S(0), S(1), S(2), S(3). In the following we will
show how to compute these and their associated computational complexities. First, we note that computing
the Forman curvature for all edges in the graph will be O(m) or O(nd), if the graph is d-regular.
Lemma 4.1 S(0)(i, j) can be computed with cost O(d), and the total cost for the graph is O(nd2).
Proof. Let N (i),N (j) be the sorted adjacency list of i, j, by merge sorting these two list; we get a new
sorted list as N (i, j) = N (i) ∪ N (j). Then we have C(i, j) = N (i) + N (j) − N (i, j) by inclusion–exclusion
principle, therefore S(0) = 2d − N (i, j). The merge-sort cost is O(d). Since there are m = O(nd) edges, the
total cost of computing S(0) for all the edges in the graph will be O(md) = O(nd2)
Lemma 4.2 S(1)(i, j) can be computed with cost O(d2), and the total cost for the graph is O(nd3).
Proof. Assume that we have N (i) = (i1, i2, ...id), N (j) = (j, j1, j2, ...jd) as i, j's sorted adjacency list.
Let N (is) be the sorted adjacency list of node is. As in Lemma 4.1, we merge-sort N (is) and N (j). If
N (is) ∩ N (j) = ∅, then minl∈Ni(j) d(is, l) > 1, and therefore we must have is /∈ S(1) ∪ S(0); otherwise if
N (is) ∩ N (j) (cid:54)= ∅, then is ∈ S(1) ∪ S(0). We apply the same process to the N (j) list. The total cost for
computing S(1)(i, j) is 2d × O(d) = O(d2), and total cost for the graph is O(md2) = O(nd3)
Lemma 4.3 S(2)(i, j), S(3)(i, j) can be computed with cost of O(d3), the total cost for the graph is O(nd3).
Proof. Assume that we have sorted adjacency lists N (i) = (i1, i2, ...id), N (j) = (j, j1, j2, ...jd), N (is),
N (jt) defined as above. It is easy to see that for any two nodes x, y if N (x) ∩ N (y) = ∅, then d(x, y) > 2.
Therefore for each is, if for all jt ∈ N (j), we have N (is) ∩ N (jt) = ∅, then minl∈N (j) d(is, l) > 2, thus
is ∈ S(3); if there exists jt ∈ N (j) such that N (is) ∩ N (jt) (cid:54)= ∅, then minl∈Ni(j) d(is, l) ≤ 2. With the help
of S(0)(i, j), S(1)(i, j) we determine if is ∈ S(2)(i, j). Therefore the total cost for confirming is ∈ S(2)(i, j) or
is ∈ S(3)(i, j) is O(d2) and total cost for confirming all N (i),N (j) is 2d × O(d2) = O(d3).
The naive way of computing S(2), S(3) for the entire graph would be to apply this to each edge, with
the resulting cost of O(md3) = O(nd4). However we can save when computing S(2)(i, j), S(3)(i, j) for all
the edges in the graph. As a preprocessing step, we apply BFS on each nodes for depth at most 2, Then
we know the distance between all pairs of nodes (distance could be 0, 1, 2, > 2). By using this lookup table,
we can determine if d(is, jt) > 2 with cost of O(1) instead of O(d) by applying merge-sort to N (is) and
N (jt). Therefore the total cost for determining S(2)(i, j), S(3)(i, j) for all the edges could be reduced to
O(md2) = O(nd3). The cost for preprocessing of BFS is O(nd2) which is being dominated. So the total cost
is O(nd3) + O(nd2) = O(nd3).
.
9
Theorem 4.4 The cost for computing JC for the entire graph is O(nd2).
Proof. Note that S (0) = C(i, j) and 2S(0) + S(1) + S(2) + S(3) = 2d. We also have S = S (1) ∪ S (2) ∪ S (3).
Therefore S(i, j) = 2d − 2S(0). Hence for JC we only need to compute S(0).
total cost in computing for the entire graph is m × O(d) = O(nd2).
From Lemma 4.1, S(0)(i, j) can be computed with cost of O(d), and JC(i, j) with a cost of O(d). The
Theorem 4.5 The cost for computing gJC for the entire graph is O(nd3).
Proof. For gJC, we need to calculate all of S(0), S(1), S(2), S(3) . From Lemmas 4.1-4.3, the total cost will
be O(nd3).
4.2 Ollivier-Ricci curvature
The computation of the Olliver-Ricci curvature of an edge (i, j) is an optimization problem. It is usually
solved by an LP solver which is not guaranteed to be in polynomial time. Here we translate the OR curvature
problem into a min-cost max flow problem as follows:
First we create a complete bipartite graph G = (I ∪ J, E), where I = N (i) and J = N (j), with Ni being
the neighbor set of i. Cost of edge (is, jt), cs,t, is set to d(is, jt) in the original graph, and the capacity of
each edge set to infinity. Next, we add a source node x and sink node y; source node x connects to all the
nodes in I with cost of edge (x, is), cx,s, set to 1 and capacity set to the mass mis distributed on the original
graph; the sink node y connects to all the nodes in J with cost of edge (y, jt), cy,t, set to 1 and capacity
set to the mass mjt. The goal is to minimize the total cost along the edge with maximum possible flow f,
where the cost is defined as C =(cid:80)
e∈E ce × f (e).
We can solve the min-cost max flow problem using the network simplex algorithm [22].
Theorem 4.6 The cost for computing OR curvatures for the entire graph is O(nd4 log2 d)
In Tarjan's paper [22], it was shown that the network simplex algorithm has complexity O(mn log n log C),
Proof.
where m, n are the number of nodes and edges in the graph respectively, and C is the maximum edge cost.
In the present setting, m = d2 + 2d, n = 2d + 2, C = 1/ 1
d = d, so computing OR curvature for an edge will
have complexity O(d3 log2 d), with the total complexity for the entire graph being O(nd4 log2 d).
Note that the algorithm is for a general graph, but for ease of computation complexity we still use d-
regular setting here. Results on the computational complexity for general graphs are provided in Appendix B.
Complexity
Forman
O(nd)
JC
gJC
OR
O(nd2) O(nd3) O(n4 log2 n)
Table 2: The complexity hierarchy for Forman, JC, gJC and OR curvatures
5 Experimental Results
5.1 Network models
We consider different network models to investigate the relationship between Jaccard and Forman curvatures
in relation to Ollivier-Ricci curvature. Specifically, we explore network models for which Jaccard curvature
10
or Forman curvature gives a reasonably good approximation to Ollivier-Ricci curvature. This would in-
form types of real-world networks for which Jaccard curvatures could be used to approximate Ollivier-Ricci
curvature. The network models being considered are described below.
Erdös-Rényi (ER) model: The ER model introduced by Erdös and Rényi [23] has long been considered
to be a suitable mathematical model for networks because of the simplicity and mathematical tractability
in analyzing their properties. ER(n, p) is a network on n nodes that connects every pair of nodes with
probability p independent across node pairs. We fix n = 100 and vary p from 0.05 to 0.9, to study the
behavior of the Jaccard and Forman curvatures vis-a-vis Ollivier-Ricci curvature.
Table 3 shows the average curvatures of different ER graphs as the probability of connection p is varied.
We observe that for small p, the average OR curvature is negative, and as p increases the average OR
curvature increases as well. This is because as p increases, the density of the graph increases leading to
more edges with positive curvature. For p small, the ER graph is more disconnected and tree-like, leading to
negative average OR curvature. This behavior is well replicated by the Jaccard curvatures. In particular, the
average gJC curvature closely tracks the average OR curvature as p is varied. On the other hand, the average
Forman curvature decreases as p is increased for the simple reason that the average degree of nodes increase.
We also observe that gJC correlates the best with OR curvature, and this difference is more pronounced for
ER graphs with low p value. The advantage of gJC with respect to JC is somewhat lost as p is increased
beyond 0.2. Furthermore, the correlation between the Jaccard curvatures and OR curvature improves as p
is increased, but deteriorates slightly as p is increased beyond 0.5. Scatter plots shown in Figure 2 provides
a visual representation of the correlation between OR and Jaccard curvatures. It is clear visually that the
spread in the scatter plot is the least for p = 0.5, which is also supported by the correlation coefficients
shown in the table.
Graph
ER(100,0.05)
ER(100,0.1)
ER(100,0.2)
ER(100,0.3)
ER(100,0.4)
ER(100,0.5)
ER(100,0.6)
ER(100,0.7)
ER(100,0.8)
ER(100,0.9)
OR
JC
gJC
F
-0.59
-0.20
0.15
0.26
0.35
0.47
0.55
0.67
0.77
0.87
-1.95
-1.83
-0.77
-1.48
-1.3
-1.01
-0.77
-0.39
-0.06
0.38
-0.86
-0.23
0.09
0.17
0.23
0.35
0.41
0.54
0.65
0.8
-7.8
-19.3
-37.4
-57
-74
-97.12
-113
-137
-154.03
-173
(OR,JC)
τ
rp
0.4
0.28
0.45
0.64
0.76
0.89
0.86
0.97
0.97
0.86
0.83
0.96
0.77
0.93
0.75
0.92
0.91
0.74
0.77
0.91
(OR,gJC)
rp
0.77
0.90
0.94
0.97
0.97
0.96
0.93
0.92
0.91
0.91
τ
0.55
0.73
0.80
0.86
0.86
0.83
0.77
0.75
0.73
0.77
(OR,F)
rp
0.35
-0.31
-0.46
-0.53
-0.44
-0.54
-0.58
-0.64
-0.7
-0.83
τ
0.25
-0.21
-0.3
-0.38
-0.28
-0.37
-0.4
-0.45
-0.5
-0.68
Table 3: Average curvatures shown for different Erdos Renyi (ER) graphs [ER(n,p) - number of nodes being
n, and probability of connection being p]. The Pearson correlation coefficient rp and Kendall's τ coefficient
between the OR and Jaccard curvatures, and the OR and Forman curvature are tabulated.
Barabási-Albert (BA) model: The BA model introduced by Barabási and Albert [24] became popular
and widely used because it was the first network model to explain power-law behavior through the preferential
attachment or the rich-get-richer phenomena. BA(n, m) is a network growth model, which starts with m
nodes and new nodes connect preferentially to m existing nodes with probability proportional to their degree.
We study how the curvature metrics behave as n and m are varied. So first we fix n = 100 and consider
m = 1, 2, 5, and then we study networks with a larger value of n = 500.
In Table 4 we observe that gJC correlates the best with OR curvature for BA(100,1), a dramatic improve-
ment over JC which has a single value of −2 for all the edges. Forman curvature correlates better than JC for
BA(100,1), suggesting that it captures some properties of OR curvature for sparse tree-like graphs. Because
there are no triangles in BA(100,1), JC simply cannot capture any information. On the other hard, gJC
performs very well in approximating OR, because all mass transport paths need to pass through the edge
being considered, leading to most mass transports requiring 3 hop paths, except the endpoints of the edge
itself. Increasing m from 1 to 2 and keeping number of nodes fixed at 100, results in slightly deterioration of
the correlation between gJC and OR curvature because now there could be shorter than 3 hop paths that
11
(a) ER(100,0.1)
(b) ER(100,0.5)
Figure 2: Scatter plots of Ollivier-Ricci and Jaccard curvatures for Erdös-Rényi graphs
(c) ER(100,0.9)
need to be accounted for. However, increasing m further leads to improvement, similar to what was observed
in ER graphs for moderate p values. Increasing number of nodes n to 500 and keeping m fixed, decreases the
correlation of Jaccard curvatures slightly, probably because that makes the graph more tree-like with larger
hubs. Scatter plots in Figure 3 show that the spread is higher in BA graph compared to ER graphs.
Watts-Strogatz (WS) model: The WS model introduced by Watts and Strogatz [13] produces graphs
with small-world properties, exhibiting short average path lengths and high clustering coefficent. W S(n, k, p)
is a network model on n nodes which first constructs a ring among adjacent nodes such that each node is
connected to k closest neighbors. Then every edge is randomly rewired with probability p by keeping
one endpoint fixed and choosing the other endpoint uniformly at random. We show curvature results for
p = 0.1 and k = 4, and vary n = 100, 200, 500. Furthermore, we show results for n = 500,k = 4 and
varying p = 0.1, 0.3, 0.5, 0.7, 0.9, 0.99. Thus, we analyze the results as the number of nodes and the rewiring
probability varies.
Table 5 shows the average curvatures and correlation results for different WS networks. We observe that
keeping the parameters p and k fixed, increasing the number of nodes n does not change the curvatures
much. Increasing the probability of rewiring makes the curvature more negative. This behavior is shown by
OR, JC, gJC and the Forman curvatures. Ollivier-Ricci and Jaccard curvatures show this behavior because
increasing the rewiring probability, increases the number of shortcuts in the network, thus making the average
curvature more negative. Increasing the rewiring probability leads to a steady decrease in correlation between
the Jaccard and the OR curvature, with Forman curvature showing the opposite behavior. This leads us to
believe that the Jaccard curvatures are a better fit for the OR curvature for more positively curved graphs.
Nevertheless, for W S(500, 4, 0.99) where the average OR curvature is −0.93, the correlation coefficients
between gJC and OR are still pretty high. Figure 4 shows how the spread in the scatter plots increases as
12
Graph
BA(100,1)
BA(100,2)
BA(100,5)
BA(500,1)
BA(500,2)
BA(500,5)
OR
JC
gJC
F
-0.31
-0.45
-0.16
-0.31
-0.79
-0.58
-2
-1.9
-1.77
-2
-1.98
-1.94
-0.54
-0.85
-0.19
-0.55
-1.32
-0.62
-3.84
-10.26
-25
-16.8
-11.7
-32
(OR,gJC)
rp
(OR,JC)
rp
τ
N/A N/A 0.92
0.62
0.47
0.73
0.86
N/A N/A 0.93
0.52
0.12
0.52
0.81
-0.05
0.34
0.24
0.54
(OR,F)
rp
0.65
0.6
-0.16
0.33
0.64
-0.08
τ
0.5
0.5
-0.07
0.37
0.58
0.03
τ
0.94
0.45
0.66
0.72
0.4
0.6
Table 4: Average curvatures shown for different Barabasi-Albert graphs [BA(n,m) - m being the number
of connections formed by a new node]. The Pearson correlation coefficient rp and Kendall's τ coefficient
between the OR and Jaccard curvatures, and the OR and Forman curvature are tabulated.
(a) BA(500,1)
(b) BA(500,5)
Figure 3: Scatter plots of Ollivier-Ricci and Jaccard curvatures for Barabási-Albert graphs
the probability of rewiring is increased from 0.1 to 0.99.
Random geometric graph (RGG) model: Random geometric graphs [25] are spatial networks that
have found application in the modeling of ad hoc mobile networks [26]. RGG(n, r) is a network model where
all nodes are distributed uniformly on a metric space, e.g., a unit square, and connections between nodes
are formed only if the pairwise Euclidean distance is less than a certain radius r, with 0 < r < 1. We study
the curvature results for fixed n = 500 and varying radius r.
From Table 6, we observe that increasing the radius r increases the OR curvature slightly. This is because
clustering of the network increases with increasing r, thus leading to an increase in the OR curvature. Both
the Jaccard curvatures exhibit this behavior too, although the mean gJC curvature values are much closer
to the mean OR curvature values. On the other hand, the Forman curvature becomes more negative as r
increases, because of an increase in the average degree of nodes. Furthermore, the correlation coefficients of
the Jaccard curvatures increase as r increases. This observation agrees with the previously mentioned hy-
pothesis that the Jaccard curvature approximates OR curvature better for positively curved graphs. Figure 5
visually shows how the fit of the Jaccard curvature improves as the radius of connectivity r is increased.
5.2 Real-world networks
We consider several real-world networks in this subsection. The Gnutella network has been obtained from the
Stanford large network dataset collection [27], while the rest of the networks were obtained from the Koblenz
Network Collection [28]. A brief description of the datasets is provided below. Their network properties are
displayed in Table 7.
13
Graph
OR
JC
gJC
F
WS(100,4,0.1)
WS(200,4,0.1)
WS(500,4,0.02)
WS(500,4,0.05)
WS(500,4,0.1)
WS(500,4,0.2)
WS(500,4,0.3)
WS(500,4,0.5)
WS(500,4,0.7)
WS(500,4,0.9)
WS(500,4,0.99)
-0.04
-0.08
0.17
0.06
-0.05
-0.31
-0.54
-0.77
-0.9
-0.94
-0.93
-1.46
-1.51
-1.33
-1.41
-1.47
-1.65
-1.78
-1.91
-1.98
-1.99
-2
-0.22
-0.28
0.02
-0.11
-0.24
-0.57
-0.88
-1.2
-1.4
-1.45
-1.45
-4.17
-4.2
-4.04
-4.1
-4.2
-4.36
-4.5
-4.7
-4.8
-4.8
-5
(OR,JC)
τ
rp
0.89
0.89
0.86
0.88
0.93
0.95
0.91
0.9
0.87
0.89
0.79
0.86
0.85
0.73
0.55
0.77
0.3
0.52
0.19
0.35
0.08
0.06
(OR,gJC)
rp
0.96
0.96
0.98
0.96
0.96
0.95
0.94
0.89
0.8
0.78
0.78
τ
0.9
0.9
0.95
0.92
0.9
0.87
0.85
0.83
0.76
0.78
0.68
(OR,F)
τ
rp
0.25
0.33
0.26
0.37
0.29
0.21
0.23
0.29
0.31
0.42
0.3
0.39
0.42
0.34
0.45
0.49
0.61
0.66
0.69
0.76
0.76
0.65
Table 5: Average curvatures shown for different Watts Strogatz graph [WS(n,k,p) - each node connects to
k nearest neighbors and p is the probability of rewiring an edge]. The Pearson correlation coefficient rp
and Kendall's τ coefficient between the OR and Jaccard curvatures, and the OR and Forman curvature are
tabulated.
(a) WS(500,0.1,4)
(b) WS(500,0.99,4)
Figure 4: Scatter Plots of Ollivier-Ricci and Jaccard curvatures for Watts Strogatz graphs
5.2.1 Description of networks:
Infrastructure Networks: We study the US Power Grid network [13] which contains information about
the power grid of the Western states of the United States of America. A node in the network is either
a generator, a transformer or a power substation, while edges represent high-voltage power supply lines
between nodes. This network was studied in [13] as an example of a real network with the small-world
property. Another infrastructure network we consider is the Euroroad network [29], a road network located
mostly in Europe. The network is undirected, with nodes representing cities and an edge between two nodes
denotes a physical road between them. This network was observed to be neither scale-free nor small-world,
and particularly difficult to partition with standard community detection algorithms.
Online social and communication networks: We study a social network formed by people that shares
confidential information using the Pretty Good Privacy (PGP) encryption algorithm, also called the PGP
web of trust [30]. The degree distribution of the network exhibits a power law decay with a particular
exponent for small degrees, and a crossover towards another power-law with a higher exponent for large
degree values. This suggests that unlike many technological networks, the PGP is not a scale-free network
but exhibits bounded degree distribution. Furthermore, the network shows a large clustering coefficient.
We also consider the Gnutella network [31], a peer-to-peer architecture, where nodes represent Gnutella
14
Graph
OR JC
gJC F
RGG(500,0.05)
RGG(500,0.1)
RGG(500,0.15)
RGG(500,0.2)
0.22
0.23
0.28
0.32
-1.13
-0.75
-0.64
-0.61
0.05
0.37
0.44
0.46
-4.89
-28
-64.4
-112
(OR,JC)
τ
rp
0.83
0.86
0.86
0.94
0.96
0.87
0.89
0.97
(OR,gJC)
rp
0.88
0.94
0.96
0.97
τ
0.79
0.82
0.86
0.88
(OR,F)
rp
-0.17
-0.22
0.04
0.16
τ
-0.15
-0.12
0.04
0.09
Table 6: Average curvatures shown for different Random Geometric Graphs [RGG(n,r) - each node connects
to nodes within a distance of r]. The Pearson correlation coefficient rp and Kendall's τ coefficient between
the OR and Jaccard curvatures, and the OR and Forman curvature are tabulated.
(a) RGG(500,0.1)
(b) RGG(500,0.2)
Figure 5: Scatter Plots of Ollivier-Ricci and Jaccard curvatures for random geometric graphs
hosts and the edges represent connections between them. It is not a pure power-law network and preserves
good fault tolerance characteristics, while being less dependent than a pure power-law network on highly
connected nodes. The email communication network [32] at the University Rovira i Virgili in Tarragona
is also studied. Here, the nodes of the network are users, and each edge represents that at least one mail
was exchanged between the concerned nodes. This network was studied as an example of a self-organized
complex system [32].
Other miscellaneous networks: We considered a biological network that was an initial version of a
systematic mapping of protein-protein interactions in humans [33]. We also considered a collaboration
network between Jazz musicians, with each node being a Jazz musician and an edge denoting the two
musicians playing together in a band [34].
5.2.2 Discussion of results
Table 8 shows the mean curvature values and correlation coefficients between OR and the other curvature
metric for different real-world networks. Firstly, we observe that gJC tracks OR the closest in terms of the
mean curvature. Since the range of Forman is not bounded, we see large negative average curvatures for
many networks, unlike Jaccard and OR curvatures which are inherently bounded. Furthermore, the gJC
curvature correlates strongly with OR compared to JC and Forman curvatures for almost every real network
being considered. Even JC seems to outperform Forman curvature in correlating with OR curvature on PGP
Network, p2p-Gnutella, Email network, Hamsterster friendship network and Human protein network, while
Forman correlates stronger with OR solely on the EuroRoad network.
Table 9 shows that the gJC implementation is several orders of magnitude faster than the OR imple-
mentation, while the JC implementation itself is faster compared to the gJC implementation. The Forman
implementation is the fastest among all the curvature metrics being considered, thus agreeing with the the-
oretical analysis in Section 4. However, the results suggest that there is no clear scenario where the Forman
15
Dataset
n
m
dmax
davg
US power grid
EuroRoad
PGP network
p2p-Gnutella
Email network
Hamsterster
Human protein
Jazz musicians
4941
1174
10680
6301
1133
1858
3133
198
6594
1417
24316
20777
5451
12534
6726
2742
19
10
205
97
71
272
129
100
2.67
2.41
4.55
6.59
9.62
13.5
4.29
27.69
Diameter Mean shortest
46
62
24
9
8
14
13
6
path length
20
19
7.65
4.64
3.65
3.4
4.80
2.21
Clustering
coefficient Assortativity
0.1
0.03
0.38
0.01
0.17
0.09
0.04
0.52
0.003
0.13
0.24
0.03
0.08
-0.08
-0.13
0.02
Table 7: Network properties of real-world networks being considered. The number of nodes n, number of
edges m, maximum degree dmax, average degree davg, and other well-known network properties are reported.
is a good proxy for OR curvature, while JC could be a good proxy for OR for positively curved or more clus-
tered networks. Although the gJC curvature is computationally costlier than JC and Forman, it correlates
strongly with OR curvature for most of the real networks being considered across a wide range of network
properties and types.
Graph
OR
JC
gJC
F
US power grid
EuroRoad
PGP network
p2p-Gnutella
Email network
Hamsterster friendships
Human protein
Jazz musicians
-0.34
-0.33
-0.10
-1.01
-0.41
-0.34
-0.62
0.27
-1.89
-1.97
-1.36
-1.98
-1.72
-1.87
-1.93
-0.92
-0.78
-0.97
-0.14
-1.16
-0.38
-0.19
-0.79
0.32
-3.7
-2
-33.76
-31
-33.37
-86.7
-27
-73.3
(OR,JC)
τ
rp
0.23
0.4
0.09
0.15
0.73
0.53
0.27
0.23
0.56
0.73
0.23
0.41
0.31
0.1
0.79
0.91
(OR,gJC)
rp
0.8
0.69
0.85
0.86
0.81
0.58
0.78
0.92
τ
0.69
0.67
0.74
0.58
0.69
0.42
0.6
0.8
(OR,F)
rp
0.48
0.76
0.13
-0.32
0.15
0.13
0.35
0.09
τ
0.41
0.69
0.08
0.08
0.11
0.13
0.34
0.05
Table 8: Average curvatures shown for different real-world networks. The Pearson correlation coefficient rp
and Kendall's τ coefficient between the OR and Jaccard curvatures, and the OR and Forman curvature are
tabulated.
US power grid
EuroRoad
Hamsterster friendships
PGP network
p2p-Gnutella
Email network
Human protein
Jazz musicians
OR(LP solver)
146.011s
9.515s
1052.614s
219.943s
57.279s
424.898s
78.64s
72.137s
gJC
0.67s
0.432s
5.258s
5.66s
1.543s
14.354s
1.312s
1.539s
JC
0.368s
0.227s
2.624s
2.146s
0.718s
5.069s
0.951s
0.957s
Forman
0.099s
0.023s
0.419s
0.331s
0.071s
0.267s
0.084s
0.092s
Table 9: Running times for computing the OR, Jaccard and Forman curvatures for different real networks.
16
6 Conclusion
We investigated a new network curvature metric inspired by the Jaccard coefficient, which we call the Jaccard
curvature. We generalized the notion of Jaccard curvature and studied two Jaccard curvature metrics, JC
and gJC. Theoretically, the gJC metric was shown to better approximate OR curvature for Erdos-Renyi
graphs, compared to the JC metric. We conducted experiments with different classes of network models
and real networks, and observed that gJC outperforms JC and Forman curvatures in approximating the OR
curvature. Nonetheless, the JC curvature is easier to compute than gJC, and correlates moderately well with
OR for positively curved or strongly clustered networks, suggesting that it could be used as a cheap proxy
to the OR curvature for such special scenarios. The Forman curvature while being the cheapest to compute,
shows weak correlation with OR curvature for many real networks.
References
[1] J. Jost, Riemannian geometry and geometric analysis. New York, NY: Springer, 2002.
[2] S. Gallot, J. Lafontaine, and D. Hulin, Riemannian geometry. New York, NY: Springer, 1987.
[3] S. I. Goldberg, Curvature and homology. Mineola, NY: Dover, 1998.
[4] Y. Higuchi, "Combinatorial curvature for planar graphs," Journal of Graph Theory, vol. 38, no. 4, pp.
220–229, 2001.
[5] O. Narayan and I. Saniee, "Large-scale curvature of networks," Physical Review E, vol. 84, no. 6, p.
066108, 2011.
[6] R. Forman, "Bochner's method for cell complexes and combinatorial ricci curvature," Discrete and
Computational Geometry, vol. 29, no. 3, pp. 323–374, 2003.
[7] Y. Ollivier, "Ricci curvature of markov chains on metric spaces," Journal of Functional Analysis, vol.
256, no. 3, pp. 810–864, 2009.
[8] R. Sandhu, T. Georgiou, L. Z. Reznik, I. Kolesov, Y. Senbabaoglu, and A. Tannenbaum, "Graph curva-
ture for differentiating cancer networks," Scientific reports, vol. 5, 2015.
[9] R. S. Sandhu, T. T. Georgiou, and A. R. Tannenbaum, "Ricci curvature: An economic indicator for
market fragility and systemic risk," Science advances, vol. 2, no. 5, p. e1501495, 2016.
[10] C. Wang, E. Jonckheere, and R. Banirazi, "Wireless network capacity versus ollivier-ricci curvature
IEEE, 2014, pp.
under heat-diffusion (hd) protocol," in American Control Conference (ACC), 2014.
3536–3541.
[11] C.-C. Ni, Y.-Y. Lin, J. Gao, X. D. Gu, and E. Saucan, "Ricci curvature of the internet topology," in
IEEE Conference on Computer Communications (INFOCOM).
IEEE, 2015, pp. 2758–2766.
[12] J. Jost and S. Liu, "Ollivier's ricci curvature, local clustering and curvature-dimension inequalities on
graphs," Discrete & Computational Geometry, vol. 51, no. 2, pp. 300–322, 2014.
[13] D. J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world' networks," Nature, vol. 393, no.
6684, p. 440, 1998.
[14] D. Liben-Nowell and J. Kleinberg, "The link-prediction problem for social networks," Journal of the
Association for Information Science and Technology, vol. 58, no. 7, pp. 1019–1031, 2007.
[15] B. B. Bhattacharya and S. Mukherjee, "Exact and asymptotic results on coarse ricci curvature of graphs,"
Discrete Mathematics, vol. 338, no. 1, pp. 23–42, 2015.
[16] R. Sreejith, K. Mohanraj, J. Jost, E. Saucan, and A. Samal, "Forman curvature for complex networks,"
Journal of Statistical Mechanics: Theory and Experiment, vol. 2016, no. 6, p. 063206, 2016.
17
[17] R. Sreejith, J. Jost, E. Saucan, and A. Samal, "Systematic evaluation of a new combinatorial curvature
for complex networks," Chaos, Solitons & Fractals, vol. 101, pp. 50–67, 2017.
[18] Y. Lin, L. Lu, and S.-T. Yau, "Ricci curvature of graphs," Tohoku Mathematical Journal, Second Series,
vol. 63, no. 4, pp. 605–627, 2011.
[19] E. Saucan, A. Samal, M. Weber, and J. Jost, "Discrete curvatures and network analysis," Max Planck
Institute for Mathematics in the Sciences, Preprint, 2017.
[20] M. Weber, E. Saucan, and J. Jost, "Characterizing complex networks with forman-ricci curvature and
associated geometric flows," Journal of Complex Networks, p. cnw030, 2017.
[21] M. Weber, J. Jost, and E. Saucan, "Forman-ricci flow for change detection in large dynamic data sets,"
Axioms, vol. 5, no. 4, p. 26, 2016.
[22] R. E. Tarjan, "Dynamic trees as search trees via euler tours, applied to the network simplex algorithm,"
Mathematical Programming, vol. 78, no. 2, pp. 169–177, 1997.
[23] P. Erdös and A. Rényi, "On the evolution of random graphs," Publ. Math. Inst. Hung. Acad. Sci, vol. 5,
no. 1, pp. 17–60, 1960.
[24] A.-L. Barabási and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439,
pp. 509–512, 1999.
[25] M. Penrose, Random geometric graphs. Oxford University Press, 2003, no. 5.
[26] M. Nekovee, "Worm epidemics in wireless ad hoc networks," New Journal of Physics, vol. 9, no. 6, p.
189, 2007.
[27] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network dataset collection," http://snap.
stanford.edu/data, Jun. 2014.
[28] "KONECT: The Koblenz network collection," http://konect.uni-koblenz.de/, 2017.
[29] L. Šubelj and M. Bajec, "Robust network community detection using balanced propagation," The Eu-
ropean Physical Journal B-Condensed Matter and Complex Systems, vol. 81, no. 3, pp. 353–362, 2011.
[30] M. Boguñá, R. Pastor-Satorras, A. Díaz-Guilera, and A. Arenas, "Models of social networks based on
social distance attachment," Physical review E, vol. 70, no. 5, p. 056122, 2004.
[31] M. Ripeanu and I. Foster, "Mapping the gnutella network: Macroscopic properties of large-scale peer-
to-peer systems," in International Workshop on Peer-to-Peer Systems. Springer, 2002, pp. 85–93.
[32] R. Guimera, L. Danon, A. Diaz-Guilera, F. Giralt, and A. Arenas, "Self-similar community structure in
a network of human interactions," Physical review E, vol. 68, no. 6, p. 065103, 2003.
[33] J.-F. Rual, K. Venkatesan, H. Tong, T. Hirozane-Kishikawa et al., "Towards a proteome-scale map of
the human protein-protein interaction network," Nature, vol. 437, no. 7062, p. 1173, 2005.
[34] P. M. Gleiser and L. Danon, "Community structure in jazz," Advances in complex systems, vol. 6, no. 04,
pp. 565–573, 2003.
[35] G. Grimmett and D. Stirzaker, Probability and random processes. Oxford university press, 2001.
A Proof of Theorem 3.2
A.1 Preliminaries
Since (16) consists of ratios of rvs, we find it helpful to state a result which ensures mean convergence of
ratio of rvs to the ratio of their means.
18
Dn
c2
A.1.1 A probabilistic result on ratios of rvs
First we state a basic result which will help us investigate the asymptotic behavior of the gJC curvature.
Lemma A.1 Consider the following sequences of rvs {Nn, n = 1, 2, . . .} and {Dn, n = 1, 2, . . .}. If E [Nn] n−→
c1 and E [Dn] n−→ c2, then
finite constant c such that
(cid:12)(cid:12)(cid:12)E(cid:104) Nn
(cid:12)(cid:12)(cid:12) n−→ 0 as n → ∞, provided V ar(Dn) n−→ 0 as n → ∞ and there exists
(cid:105) − c1
(cid:12)(cid:12)(cid:12) Nn
(cid:12)(cid:12)(cid:12) < c almost surely.
(cid:20) Nn
(cid:20) Nn
(cid:21)
(cid:20) Nn
Dn
The latter term in (25) yields
Proof. For n = 1, 2, . . .,
1 [Dn − c2 > ]
1 [Dn − c2 < ]
(cid:20) Nn
= E
+ E
(25)
(cid:21)
(cid:21)
(cid:21)
.
Dn
Dn
E
Dn
1 [Dn − c2 < ]c
≤ cP [Dn − c2 > ]
E
Dn
by using Chebyshev's inequality [35]. Using (26) in (25), we obtain
≤ c
V ar(Dn)
n−→ 0
2
(cid:12)(cid:12)(cid:12)(cid:12)E
(cid:20) Nn
(cid:21)
Dn
(cid:12)(cid:12)(cid:12)(cid:12) → 0
− c1
c2
as n → ∞ and → 0.
A.1.2 Mean asymptotics on the sets of Separate nodes
We aim to find the asymptotic behavior of gJC(i, j) for an edge (i, j).
Next, we state results on the asymptotics of the sets S(1)
n,i, S(2)
n,i and S(3)
n,i for i = 1, 2.
Lemma A.2 For edge (i, j) ∈ En, we have
E(cid:104)
S(1)
n,(cid:96)
(cid:105) ∼ npn(1 − pn), when pn → p
∼ npn, when np2
∼ o(npn), when np2
n → ∞
n → 0
for (cid:96) = i, j, which also implies
E(cid:104)(cid:16)
(cid:17)
(cid:16)
+
S(2)
n,i + S(2)
n,j
S(3)
n,i + S(3)
n,j
(cid:17)(cid:105) ∼ o(npn), when np2
∼ 2npn, when np2
n → ∞ or pn → p
n → 0.
Proof. Observe that,
n,1 = {k ∈ Nn,1(1, 2)
S(1)
d(k, (cid:96)) = 1}
= {k ∈ Vn k ∼ 1, k (cid:28) 2 and ∃(cid:96) ∈ Nn,2(1, 2) : k ∼ (cid:96)}
=
1 [k ∼ 1, k (cid:28) 2]
(1 [(cid:96) ∼ 2, (cid:96) (cid:28) k] + 1 [(cid:96) (cid:28) 2])
(cid:88)
k∈Vn
.
min
(cid:96)∈Nn,2(1,2)
1 − (cid:89)
(cid:96)∈Vn\k
19
(26)
(27)
(28)
(29)
(30)
By using the iid property of edges in an Erdos Renyi graph, we obtain from (30),
E(cid:104)
S(1)
n,1
(cid:105)
= npn(1 − pn)
= npn(1 − pn)
1 − (pn(1 − pn) + (1 − pn))n−1(cid:17)
(cid:16)
(cid:16)
1 −(cid:0)1 − p2
(cid:16)
(cid:105) ∼ npn
(cid:1)n−1(cid:17)
(cid:17)
1 − e−np2
n
n
Note that as n → ∞ and pn → 0, E(cid:104)
n → ∞, E(cid:104)
and if pn → p, E(cid:104)
(cid:105) ∼ 2npn, implying that all separate vertices are actually in S (1)
Therefore, first part of the lemma, (28) follows. From (22), we note that E [Sn(i, j)] ∼ 2npn. However, when
n,2. Thus the
np2
second part of the lemma follows as well.
(cid:105) ∼ np(1 − p).
n,1 ∪ S (1)
S(1)
n,1 + S(1)
S(1)
n,1
S(1)
n,1
(31)
n,2
.
Next, we study the properties of S(2).
Lemma A.3 For edge (i, j) ∈ E, we have
for (cid:96) = (i, j), which also implies
E(cid:104)(cid:16)
Proof. Observe that
n → ∞, np2
n → 0
E(cid:104)
S(2)
n,(cid:96)
(cid:105) ∼ npn, n2p3
(cid:17)(cid:105) ∼ o(npn), n2p3
∼ o(npn), n2p3
n → 0
∼ 2npn, n2p3
S(3)
n,i + S(3)
n,j
n → ∞
n → 0, npn → ∞.
(32)
(33)
1 = {k ∈ Nn,1(1, 2)
S(2)
min
(cid:96)∈Nn,2(1,2)
= {k ∈ Nn,1(1, 2) \ (C ∪ S (1)
d(k, (cid:96)) = 2}
From (29), we note that we only need to consider the scaling where np2
requirement of k /∈ S(1)
n,i. Continuing from (34),
n,1) ∃(cid:96), m ∈ Vn s.t. (cid:96) ∼ 2, (cid:96) (cid:28) 1, (cid:96) ∼ m, m ∼ k}.
(34)
n → 0. Therefore, we can drop the
(cid:89)
(1 [(cid:96) ∼ 2, k ∼ m, m (cid:28) (cid:96)] + 1 [(cid:96) ∼ 2, k (cid:28) m] + 1 [(cid:96) (cid:28) 2])
.
1 [k ∼ 1, k (cid:28) 2]
×
k∈Vn
S(2)
n,1 =
(cid:88)
1 − (cid:89)
(cid:105)
E(cid:104)
Note that as n → ∞, E(cid:104)
S(2)
n,1
(cid:96)∈Vn\{1,2,k}
m∈Vn\{1,2,k,(cid:96)}
(cid:16)
= npn(1 − pn)
1 −(cid:0)p2
= npn(1 − pn)(cid:0)1 − p3
(cid:105) ∼ npne−n2p3
n
Using the independence of the involved rvs {k ∼ 1},{k (cid:28) 2}, {(cid:96) ∼ 2}, {k ∼ m} and {m (cid:28) (cid:96)}, we obtain
n(1 − pn) + pn(1 − pn) + (1 − pn)(cid:1)(n−3)(n−4)(cid:17)
(cid:1)(n−3)(n−4)
.
(35)
n,1 ∪ S (2)
n → 0, npn → ∞, since E [Sn(1, 2)] ∼ 2npn, we must have all the separate nodes in S (3)
n. Therefore, first part of the lemma follows. This implies
n,2. For the range
n,1 ∪ S (3)
n,2.
n → 0, all separate vertices are actually in S (2)
that in the range n2p3
n2p3
n → ∞, np2
S(2)
n,1
20
A.1.3 Variance asymptotics
In this section we analyze the variance asymptotics of the set of neighbor nodes.
Lemma A.4 For edge (i, j) in E, we have
V ar(Nn(i, j)) ∼ 2npn.
Proof. Observe that,
Set χk = 1 [k (cid:28) 1] 1 [k (cid:28) 2]. It follows that
Nn(1, 2) = n − (cid:88)
(cid:88)
k∈Vn\{1,2}
V ar(Nn(1, 2)) =
V ar(χk) +
k∈Vn\{1,2}
1 [k (cid:28) 1] 1 [k (cid:28) 2] .
(cid:88)
i(cid:54)=j
Cov(χi, χj).
By independence of links in an ER graph, Cov(χi, χj) = 0, and
V ar(χk) = E [1 [k (cid:28) 1] 1 [k (cid:28) 2]] − (E [1 [k (cid:28) 1]] E [1 [k (cid:28) 2]])2
= (1 − pn)2 − (1 − pn)4
= (1 − pn)2(2pn − p2
n).
Therefore,
V ar(Nn(1, 2)) ∼ 2npn.
(36)
(37)
(38)
(39)
(40)
B Complexity analysis for General Graph
We introduce some notation: Let n, m and ∆ denote the number of nodes, number of edges and the maximum
degree in a graph respectively. Let dx denote the degree of node x, and Dx the sum of the degrees of all the
neighbors of x.
Lemma B.1 Total cost of computing S(0) for all the edges of the graph is 2(cid:80)
Proof. As in Lemma 4.1, merge-sort N (i), N (j) will cost di + dj, so the total cost will be(cid:80)
It is easy to see that each di appears di time in the summation, therefore the total cost is 2(cid:80)
Lemma B.2 Total cost of computing S(1) for all the edges of the graph is 2(cid:80)
(i,j)∈E(di + dj).
v∈V d2
v
v∈V d2
v
v∈V dvDv
Proof. Following a process similar to that for the proof of Lemma 4.2, the cost of calculating S(1)(i, j) is
(dx + dj) +
(dy + di) =
dx +
dy + 2didj = Di + Dj + 2didj
(cid:88)
The total cost is(cid:80)
x∈N (i)
(cid:88)
y∈N (j)
(cid:88)
x∈N (i)
(i,j)∈E(Di + Dj + 2didj). Notice that
(cid:88)
y∈N (j)
(cid:88)
v∈V
dvDV
(cid:88)
(i,j)∈E
(Di + Dj) =
21
(cid:88)
(i,j)∈E
(cid:88)
(cid:88)
(cid:88)
i∈V
(cid:88)
j∈N (i)
(cid:88)
i∈V
and
2didj =
v∈V dvDv
i∈V
j∈N (i)
didj =
di(
dj) =
diDi
Therefore the total cost is 2(cid:80)
Lemma B.3 Total cost of computing S(2) and S(3) for all the edges of the graph is(cid:80)
Proof. The proof is similar to that for Lemma 4.3 The preprocessing of BFS costs(cid:80)
determining each S(2)(i, j) or S(3)(i, j) is(cid:88)
(i,j)∈E 2didj =(cid:80)
So the total cost is(cid:80)
Theorem B.4 The complexity of computing JC for a general graph is O(2(cid:80)
1)Dv), and for OR is O((cid:80)
v∈V dvDV , overall cost is(cid:80)
(i,j)∈E(di + dj + di ∗ dj)(di + dj) log2(di + dj)).
Using the lemmas stated above we obtain the following result.
v∈V (dv + 1)Dv
(cid:88)
x∈N (i)
y∈N (j)
dj +
di = 2didj
v∈V (dv + 1)Dv
v∈V Dv. The cost for
v), for gJC is O((cid:80)
v∈V d2
v∈V (dv+
22
|
1809.05812 | 2 | 1809 | 2018-11-20T17:01:16 | Robust Cascade Reconstruction by Steiner Tree Sampling | [
"cs.SI"
] | We consider a network where an infection cascade has taken place and a subset of infected nodes has been partially observed. Our goal is to reconstruct the underlying cascade that is likely to have generated these observations. We reduce this cascade-reconstruction problem to computing the marginal probability that a node is infected given the partial observations, which is a #P-hard problem. To circumvent this issue, we resort to estimating infection probabilities by generating a sample of probable cascades, which span the nodes that have already been observed to be infected, and avoid the nodes that have been observed to be uninfected. The sampling problem corresponds to sampling directed Steiner trees with a given set of terminals, which is a problem of independent interest and has received limited attention in the literature. For the latter problem we propose two novel algorithms with provable guarantees on the sampling distribution of the returned Steiner trees. The resulting method improves over state-of-the-art approaches that often make explicit assumptions about the infection-propagation model, or require additional parameters. Our method provides a more robust approach to the cascadereconstruction problem, which makes weaker assumptions about the infection model, requires fewer additional parameters, and can be used to estimate node infection probabilities. Empirically, we validate the proposed reconstruction algorithm on real-world graphs with both synthetic and real cascades. We show that our method outperforms all other baseline strategies in most cases | cs.SI | cs | Robust Cascade Reconstruction by
Steiner Tree Sampling
Han Xiao
Aalto University
Espoo, Finland
[email protected]
Cigdem Aslay
Aalto University
Espoo, Finland
Aristides Gionis
Aalto University
Espoo, Finland
[email protected]
[email protected]
8
1
0
2
v
o
N
0
2
]
I
S
.
s
c
[
2
v
2
1
8
5
0
.
9
0
8
1
:
v
i
X
r
a
Abstract -- We consider a network where an infection has taken
place and a subset of infected nodes has been partially observed.
Our goal is to reconstruct the underlying cascade that is likely
to have generated these observations. We reduce this cascade-
reconstruction problem to computing the marginal probability
that a node is infected given the partial observations, which
is a #P-hard problem. To circumvent this issue, we resort
to estimating infection probabilities by generating a sample of
probable cascades, which span the nodes that have already been
observed to be infected, and avoid the nodes that have been
observed to be uninfected. The sampling problem corresponds
to sampling directed Steiner trees with a given set of terminals,
which is a problem of independent interest and has received
limited attention in the literature. For the latter problem we
propose two novel algorithms with provable guarantees on the
sampling distribution of the returned Steiner trees.
that often make explicit assumptions about
The resulting method improves over state-of-the-art ap-
the
proaches
infection-propagation model, or require additional parameters.
Our method provides a more robust approach to the cascade-
reconstruction problem, which makes weaker assumptions about
the infection model, requires fewer additional parameters, and
can be used to estimate node infection probabilities. We experi-
mentally validate the proposed reconstruction algorithm on real-
world graphs with both synthetic and real cascades. We show
that our method outperforms all other baseline strategies in most
cases.
Index Terms -- infection cascades, epidemics, cascade recon-
struction, Steiner tree sampling
I. INTRODUCTION
Diffusion processes have been used to model the spread of
an item in a network, such as rumors, trends, or infections. The
study of diffusion processes has a wide range of applications,
from designing strategies for viral marketing to preventing and
controlling outbreaks. In this paper we consider the problem
of reconstructing a cascade, based on the partially observed
outcome of a propagation process in a network.
Reconstructing a cascade, which may have resulted from the
propagation of an infection or information, has many important
applications, and thus, several variants of the problem have
been studied in the literature [1, 2, 3, 4]. In this work,
we consider the task of probabilistic cascade reconstruction.
Given the partially observed infection state of the network,
our aim is to reconstruct the infection cascade by inferring
the hidden infection state of the nodes with no observation.
We map our cascade reconstruction problem to the task of
(a) Input
(b) Tree sampling
(c) Inference
Fig. 1. Overview of our approach: (a) given input observed infections; (b)
Steiner trees are sampled, each representing a possible cascade explaining the
observation; (c) node infection probabilities are estimated from the samples;
computing the marginal probability that a node is infected
given partial observations. We show that computing these
marginal probabilities is #P-hard and resort to approximation
by sampling cascades from a target distribution. The sampled
cascades are required to span the nodes that have been
observed to be infected, and avoid the nodes that have been
observed to be uninfected. We map this sampling problem to
the problem of sampling directed Steiner trees with a given
set of terminals. The latter problem is of independent interest,
and to our knowledge it has received limited attention in the
literature.
Our main technical contribution is two novel algorithms
with provable guarantees on the distribution of the sampled
Steiner trees. The first algorithm, TRIM, uses Wilson's algo-
rithm [5] to sample spanning trees then "trims" the branches
that are beyond the terminal nodes, with proper adjustment
of the sampling probabilities so that the resulting Steiner tree
is sampled from the desired target distribution. The second
algorithm, loop-erased random walk (LERW), is an adaptation
of Wilson's algorithm [5] adjusted to take into account the
input set of terminal nodes and directly return a Steiner tree
from the desired target distribution.
An illustration of our setting and approach is shown in
Figure 1. To simplify visualization, the example is shown
on a 2-d grid, however, the idea is general for any network.
observed infectedhidden infectedsourcehidden uninfectedP(uninfected)P(infected)Figure 1(a) shows the ground-truth cascade. Among the
infected nodes some are observed (blue squares
) while most
). The uninfected nodes (small
are unknown (yellow circles
white circles ) are also unknown. Figure 1(b) shows four dif-
ferent cascades sampled from the grid. The sampled cascades
are modeled as Steiner trees spanning a set of terminals --
the observed infected nodes. Using the sampled cascades we
estimate the infection probabilities for all the nodes whose
infection status is unknown -- shown in Figure 1(c).
Our main contribution are as follows:
• We define the probabilistic cascade-reconstruction prob-
lem (Section III), which makes weaker assumptions com-
pared to methods such as NetFill [3], thus offering more
robustness.
• To solve the cascade-reconstruction problem, we study
the problem of sampling Steiner trees with a given set
of terminals, and propose two algorithms with provable
guarantees on the sampling distribution (Section IV).
• We empirically demonstrate that our sampling-based
cascade-reconstruction approach outperforms other base-
lines in terms of both node and edge recovery (Section V).
II. RELATED WORK
Cascade reconstruction. Diffusion processes have been stud-
ied in the literature extensively under different viewpoints.
Nevertheless, the problem of "reverse engineering" an epi-
demic so as to reconstruct the most likely cascade, and the
most likely infected nodes, or propagation edges, has received
relatively little attention. Lappas et al. [6] study the problem of
identifying k seed nodes, or effectors, in a partially-activated
network, which is assumed to be in steady-state under the
independent-cascade model (IC). The problem has also been
considered in different settings. For example, recent works by
Rozenshtein et al. [1] and Xiao et al. [4] consider different
cascade-reconstruction problems in a temporal setting, where
interaction timestamps, or infection times, respectively, are
assumed to be known.
A related line of research focuses on finding the source node
(root) of a given cascade, or a number of cascades. Shah and
Zaman [7] formalize the notion of rumor-centrality to identify
the single source node of an epidemic under the susceptible-
infected model (SI), and provide an optimal algorithm for d-
regular trees. The more recent study of Farajtabar et al. [8]
considers the problem of identifying a single source given
multiple partially-observed cascades. In our case, we focus
on detecting the unobserved infected nodes.
The work closest to ours is the work by Sundareisan et
they aim at
al. [3]. Similar to our problem formulation,
recovering hidden infections under a non-temporal setting
where the source nodes are unknown. However, they make
two key assumptions. First, their method NetFill is tailored
specifically for the SI model. Second, they assume that the
fraction of observed infections is known. In contrast, our
method does make such assumptions, making it more robust.
On the other hand, their method also attempts to recover the
infection sources while our method relies on external source-
inference methods. However, we empirically show that the
integration of our method with simple distance-based source-
inference heuristics can still significantly outperform NetFill.
Finally, while NetFill makes binary decisions, our method
produces infection probability estimates: tackling this problem
probabilistically suits more the stochastic nature of a variety
of diffusion processes.
Sampling trees. Sampling combinatorial structures has long
been an active research area. In particular, sampling random
spanning trees [5, 9, 10, 11] is an extensively-studied problem.
On the other hand, the problem of sampling Steiner trees has
not received much attention in the literature. Related work on
Steiner trees has mainly considered the optimization aspect,
such as minimum Steiner tree problem and its variants[12].
III. PROBLEM DEFINITION
Infection cascade model. We consider a reciprocal non-
symmetric directed contact graph G = (V, E, p). By reciprocal
we mean that (u, v) ∈ E implies (v, u) ∈ E. We assume
that under an infection-propagation model, a dynamic process
takes place in the network, and for each edge (u, v) ∈ E,
puv denotes the probability that u transmits the infection to
v. These infection probabilities are non-symmetric, meaning
that in the general case puv (cid:54)= pvu. The infection process
starts at an initial source node s, i.e., patient-zero, which
could potentially be unknown. We denote by T ∗ the resulting
cascade and the corresponding set of infected nodes by V [T ∗].
We assume each node can be infected by only one other node
and infected nodes do not recover.1 Under these assumptions,
the cascade T ∗ forms a tree.
Observation model. For each node u ∈ V we use the variable
yu ∈ {0, 1} to denote its infection state such that yu = 1 if
u ∈ V [T ∗] and 0 otherwise. We assume that we can only
partially observe the infection state of the network and define
the set of observations O = {(u, yu)} as the set of nodes with
known infection states. We use X and U to refer to the nodes
that are reported to be infected and uninfected, respectively.
Thus, abusing the notation slightly, for all u ∈ V \ O, the
value of yu is unknown. We use Pr (yu = 1 O) to denote the
probability that a node u ∈ V \ O is infected when we are
given the partial observation set O.
Probabilistic cascade reconstruction. Given a partially ob-
served infection propagation process, our aim is to reconstruct
the infection cascade by inferring the hidden infection state
of the unreported nodes. Thus, we consider the following
problem.
Problem 1 (Probabilistic cascade reconstruction). Given a re-
ciprocal non-symmetric directed contact graph G = (V, E, p),
and a set O = {(u, yu)} of partial observations, reconstruct
the infection cascade by inferring the hidden infection state of
the unreported nodes.
1These assumptions are aligned with SI and IC models while ruling out
Linear Threshold [13] and SIR models.
Complexity of Problem 1. We now show that, computing the
probability Pr (yu = 1 O) that a node u ∈ V \O is in infected
state is a #P-hard problem. First, notice that an infection
can propagate only via the infected nodes in a graph. Hence,
we can simply handle the observations on uninfected nodes
by removing such nodes and their adjacent edges from the
graph as these nodes can neither become infected nor transmit
infection. Thus, for a given u, to compute Pr (yu = 1 O) in
G = (V, E, p), we can simply assign V = V \ U and E =
E\{(u, v)∪(v, u)}, for all u ∈ U. We provide our complexity
analysis based on this.
Lemma 1. Given a probabilistic graph G = (V, E, p), a
partially observed infection cascade T ∗ with source s, and
the corresponding subset X ⊆ V [T ∗] of partially observed
infected nodes, computing Pr (yu = 1 O = X) for any u ∈
V \ X is #P-hard.
Proof. We prove this by a reduction from the counting prob-
lem of s-t connectedness in a directed graph [14]. Given a
directed graph G = (V, E) and two nodes s, t ∈ V , s-t
connectedness problem is to count the number of subgraphs
of G in which there is a directed path from s to t. We reduce
this problem to the problem of computing marginal infection
probabilities as follows. Let O = ∅ and let T denote a random
infection cascade with infection source s. For any random tree
T , let 1[t ∈ V [T ]] denote the indicator random variable that
equals 1 if t ∈ V [T ] for a given node t. It is easy to see that
Pr (yt = 1 O = ∅) =
(cid:88)
T∼T [1[(t ∈ V [T ])]]
E
(cid:88)
Pr (T ) 1[t ∈ V [T ]]
Pr (g) path g(s, t),
T(cid:118)T
g(cid:118)G
=
=
where g is a possible world sampled from graph G by keeping
each edge (u, v) ∈ E with probability puv and path g(s, t) is
an indicator variable that equals 1 if t is reachable via a path
from s in g. Therefore, for computing Pr (yt = 1 O = ∅),
we solve the s-t connectedness counting problem. It is shown
in
[14] that s-t connectedness is #P-complete, and thus
computing Pr (yt = 1 O = ∅) is #P-hard.
Given the #P-hardness of our problem, we resort to Monte-
Carlo sampling for estimating Pr (yu = 1 O = X), for all
u ∈ V \ X. To do so, we generate a sample of probable
cascades that span X by sampling directed Steiner trees from
the set of all directed Steiner trees on G with terminals X, with
probability proportional to their likeliness to happen. Thus, the
operational definition for the cascade-reconstruction problem
we consider in this paper is the following.
Problem 2 (Random Infection Tree). Given a weighted di-
rected contact network G = (V, E, p), a root node r ∈ V , and
a set X ⊆ V of terminal nodes, sample a directed Steiner tree
TX, rooted at r, with terminal nodes X, and with probability
proportional to P r(TX ) ∝ (cid:81)
(u,v)∈TX
puv.
2We simply define the chain from the transposed graph as we will be using
anti-arborescence model of random-walk based tree samplers.
IV. RANDOM STEINER-TREE SAMPLING
Given a symmetric directed network G = (V, E, p), a set
of terminal nodes X ⊆ V , and a root node r ∈ V , our aim
is to sample a random tree TX from the graph G containing
the terminal nodes X. Our sampling approach is based on
a random walk defined on G. Since G = (V, E, p) is not
necessarily stochastic we need to define the Markov chain G =
(V, E, w), over the graph G, for which we perform the random
walk.
The random walk for the sampler is performed on the
reverse direction of the edges of G. In other words the edge
set of the Markov chain G is defined as E = ET , that is, the
transpose of the edges of G.2
Let Nin (u) denote the set of in-neighbors of a node u in G,
v∈Nin (u) pvu denote the weighted in-degree
of u. We also denote by Nout (u) the set of out-neighbors of u
in G. Furthermore, we denote by Nin (u) and Nout (u) the sets
of in-neighbors and out-neighbors, respectively, in the Markov
chain G. To ensure that the Markov chain G is stochastic
we set w(u, v) = pvu/p(u) so that the weighted out-degree
v∈ Nout (u) w(u, v) is equal to
1 for all the nodes u in G. Our tree sampling method performs
a random walk on G according to edge weights w(u, v). Let
v∈Nin (u) w(u, v) =(cid:80)
(cid:89)
w(u) =(cid:80)
and let p(u) =(cid:80)
w(TX ) =
w(u, v)
(u,v)∈TX
denote the weight of a Steiner tree TX. Assume that we are
able to sample a Steiner tree TX, from the Markov chain G,
with probability proportional to the weight of the tree w(TX ).
Notice that after normalization of the weights, we have
puv = w(TX )
p(u).
(1)
(u,v)∈TX
u∈V [TX ]\{r}
Thus, to solve Problem 2, we need to be able to sample
a Steiner tree TX from G with probability proportional to
w(TX ): once this is achieved, we use sampling importance
resampling [15] (SIR) to correct for the difference. SIR aims at
sampling x from target distribution π(x) via two steps: 1) sam-
pling from proposal distribution q(x) and 2) resampling the
samples with probability proportional to π(x)
q(x) . In our case, we
resample each Steiner tree returned by the proposed algorithms
with probability proportional to
so as
to achieve the target distribution, and thus solving Problem 2.
We address next the problem of sampling a Steiner tree with
probability proportional to its weight.
Problem 3 (Random Steiner Tree). Given a Markov chain
G = (V, E, w), a root node r ∈ V , and a set of terminal
nodes X ⊆ V , sample a Steiner tree TX, rooted at r, with
terminal nodes X, and with probability proportional to
u∈V [TX ]\{r} p(u)
(cid:16)(cid:81)
(cid:17)
(cid:89)
(cid:89)
(cid:89)
w(TX ) =
w(u, v).
(u,v)∈TX
Algorithm 1: TRIM
: Markov chain G = (V, E, w), root r, set of terminals X
Input
Output: Random Steiner tree TX
1 T ← RandomTreeWithRoot(r) ;
2 TX ← TrimTree(T ) ;
The difference between Problems 2 and 3, is that Problem 3
assumes that the input graph is a Markov chain, i.e., the
probabilities out of each node sum up to 1. A general input
probabilistic graph, can be turned to Markov chain using the
weighting scheme transformation outlined above.
Notice that since G is reciprocal (non-symmetric) directed,
the graph G is strongly connected, hence, the chain is irre-
ducible. However, it is not time-reversible due to the non-
symmetricity of the transition probabilities. In the next sec-
tions, we propose two sampling algorithms that can produce
non-uniformly distributed Steiner trees from irreducible but
not time-reversible Markov chains.
A. TRIM algorithm
Our first algorithm, TRIM, receives as input
the edge
weights of the Markov chain G, a root r ∈ V and a set
of terminal nodes X ⊆ V . TRIM first samples a random
spanning tree T with root r from the chain G and then trims
T into a Steiner tree TX rooted at r, such that all the leafs of
TX are terminal nodes.
Before we proceed to present the details of the algorithm
TRIM, we first discuss how to sample a random spanning tree
for a given root r. This is a classic problem studied extensively
in the literature [5, 9, 10]. Note that in our case the chain G
is not time-reversible. Hence, we cannot use Broder's algo-
rithm [10] as it can only operate on time-reversible Markov
chains defined on unweighted undirected graphs. Similarly, the
algorithm by Mosbah and Saheb [9] is devised for reversible
chains defined on weighted but undirected graphs hence is also
not suitable for our setting.
Thus, to generate a random tree T from a weighted directed
graph G, with probability distribution different than the uni-
form, we use Wilson's RandomTreeWithRoot algorithm [5],
which works on any irreducible chain that is not necessarily
time-reversible.
Now we give the details of the TRIM algorithm. The
pseudocode is provided in Algorithm 1. The algorithm first
samples a spanning tree T with root r. Then, the sampled
spanning tree T is given as input to the TrimTree procedure,
which removes all the subtrees that are below each terminal
node x ∈ X, which then become leafs in the tree T . The
trimmed tree TX is returned as the output of TRIM. It is
clear that all terminal nodes X are contained in TX, and also
that the set of leafs of TX is a subset of X.
Before we start analyzing the distribution of the sampled
Steiner trees TX returned by TRIM, we first introduce some
concepts used in our analysis.
We use S( G) to denote the set of all directed spanning trees
of G rooted at r. Given TX, we use STX ( G) ⊆ S( G) to denote
the set of spanning trees of G, with root r, in which TX is
contained as a subgraph.
For any weighted directed chain G = (V, E, w), with V =
{v1,··· , vn}, we define its Laplacian matrix L( G) as follows:
(cid:80)
−w(i, j)
0
vi∈ Nin (vj ) w(vi, vj)
Lij( G) =
if i = j
if i (cid:54)= j and (vi, vj) ∈ E
otherwise
its weight wc(u, vc) = (cid:80)
its weight wc(vc, u) = (cid:80)
Given G and a Steiner tree TX, we denote the contracted
graph of TX on G as Gc[TX ] = (Vc, Ec, wc, (cid:96)c). The
contraction of TX on G merges all the nodes of TX into
a supernode vc. Thus, the node set of Gc[TX ] is given by
Vc = (V \ V [TX ])∪{vc}. The contraction may create parallel
edges from a node u ∈ V \V [TX ] to vc if Nout (u)∩V [TX ] >
1, where Nout (u) denotes the out-neighbors of u in G. For
each u ∈ V \ V [TX ] such that Nout (u) ∩ V [TX ] > 1,
we merge the parallel edges into a single edge (u, vc), set
v∈ Nout (u)∩V [TX ] w(u, v), and set
its label (cid:96)c(u, vc) = Nout (u) ∩ V [TX ]. Similarly, for each
u ∈ V \ V [TX ] such that Nin (u) ∩ V [TX ] > 1, we merge
the parallel edges from vc to u into a single edge (vc, u), set
v∈ Nin (u)∩V [TX ] w(v, u), and set its
label (cid:96)c(vc, u) = Nin (u) ∩ V [TX ]. For the rest of the edges,
we use their original weights from G and set their labels to
1, i.e., for each u, v ∈ V \ V [TX ], we set wc(u, v) = w(u, v)
and (cid:96)c(u, v) = 1.
Let S( Gc[TX ]) denote the spanning trees of Gc[TX ] with
root vc. The following lemma depicts the relation between
S( Gc[TX ]) and STX ( G).
Lemma 2. Given a weighted directed graph G = (V, E, w), a
Steiner tree TX of G, and the contracted graph Gc[TX ] of TX
on G, define a structure-preserving mapping f : STX ( G) (cid:55)→
S( Gc[TX ]), where for a given tree T ∈ STX ( G), a tree
f (T ) is obtained by contracting TX on T . The function f is
surjective and any spanning tree Tc in S( Gc[TX ]) is the image
(u,v)∈Tc
(cid:96)c(u, v) spanning trees in STX ( G). Moreover
of(cid:81)
(cid:88)
w(T )
w(TX )
= w(Tc).
T∈f−1(Tc)
Proof. To show that f is surjective, we need to show that:
(i) each T ∈ STX ( G) maps to a unique spanning tree Tc ∈
S( Gc[TX ]) and (ii) each spanning tree Tc ∈ S( Gc[TX ]) is the
image of at least one spanning tree in STX ( G).
Regarding (i) it is clear that for each T ∈ STX ( G), f (T ) is
a unique spanning tree with root vc in Gc[TX ]. The existence
and uniqueness hold by construction.
Regarding (ii) given a spanning tree Tc ∈ S( Gc[TX ]), we
define an "expansion" process, which is the reverse process of
contracting TX on G: we first replace the contracted node
vc in Tc with TX. For each (u, vc) ∈ Gc[TX ] such that
(cid:96)c(u, vc) = 1, we can directly replace the edge (u, vc) ∈
Gc[TX ] with the corresponding original edge (u, v) ∈ E,
(cid:80)
where {v} = Nout (u) ∩ V [TX ]. On the other hand, for each
(u, vc) ∈ Gc[TX ] such that (cid:96)c(u, vc) > 1, we cannot simply
insert the original edges in G that go from u to the nodes of TX
since we would then have (cid:96)c(u, vc) paths from node u to root
r hence the expansion process would not create a valid tree.
Thus, for each (u, vc) in Tc with (cid:96)c(u, vc) > 1, the expansion
process should perform (cid:96)c(u, vc) different assignments, where
in each assignment, a different (u, v) : v ∈ Nout (u)∩V [TX ] is
selected to replace (u, vc). Hence, for a given Tc, the number
of feasible assignments that create valid spanning trees are
given by(cid:81)
(u,v)∈Tc
(cid:96)c(u, v).
Finally, given the structure-preserving surjection and the
way we assign the weights in Gc[TX ], it follows that for any
Tc ∈ S( Gc[TX ]), we have
(cid:88)
w(Tc) =
T∈f−1(Tc)
w(T )
w(TX )
.
Theorem 1. Algorithm 1 (TRIM) returns a random Steiner
tree TX rooted at r with probability proportional to w(TX ) ·
det(Lr( Gc[TX ])) where det(Lr( Gc[TX ])) is the determinant
of the Laplacian matrix of Gc[TX ] with row and column r
removed.
Proof. First, notice that
the algorithm RandomTreeWith-
Root(r) of Wilson [5], returns a random spanning tree T with
probability proportional to w(T ). Then, using Lemma 2 we
have:
Pr (TX ) =
Pr (T )
T∈STX ( G)
(cid:88)
∝ (cid:88)
(cid:88)
(cid:88)
= w(TX ) · (cid:88)
Tc∈S( Gc[TX ])
T∈STX ( G)
w(T )
=
T∈f−1(Tc)
w(T )
w(Tc)
Tc∈S( Gc[TX ])
= w(TX ) · det(Lr( Gc[TX ]))
where the last line follows from Tutte's Matrix Tree Theorem
for weighted directed graphs [16].
Theorem 1 implies that
the TRIM algorithm returns a
Steiner tree with probability proportional to its weight among
all the Steiner trees that contain the same set of Steiner nodes:
let TX and T (cid:48)
X be two Steiner trees returned by the TRIM
algorithm, such that V [TX ] = V [T (cid:48)
X ]. Then, the contracted
graph of TX on G and the contracted graph of T (cid:48)
X on G
will be identical, which means that the sum of the weights
of the spanning trees of Gc[TX ] with root vc, i.e., the term
Tc∈S( Gc[TX ]) w(Tc), will be the same for both TX and
T (cid:48)
X. On the other hand, our aim is to sample a Steiner
tree with probability proportional to its weight among all
the Steiner trees (that could contain different set of Steiner
nodes). Thus,
to remove the bias introduced by the term
(cid:80)
(cid:17)
(cid:16)(cid:80)
Tc∈S( Gc[TX ]) w(Tc), we employ importance resampling [15]
and resample each tree returned by the TRIM algorithm with
probability proportional to
Special case: unweighted graphs. Consider the special case
when G is unweighted, i.e., we perform a simple random walk
on G = (V, E). Then, it follows from Tutte's Matrix Tree
Theorem for directed graphs [16] that S( G) = det(Lr( G))
where the Laplacian of unweighted directed G is given by:
Tc∈S( Gc[TX ]) w(Tc)
.
Lij( G) =
if i = j
if i (cid:54)= j and (vi, vj) ∈ E
otherwise
Then, the TRIM algorithm returns a Steiner tree TX rooted
at r with probability equal to
Pr (TX ) =
Pr (T )
−1
0
Nin (vj)
(cid:88)
T∈STX ( G)
STX ( G)
(cid:80)
S( G)
Tc∈S( Gc[TX ])
=
=
(cid:81)
(u,v)∈Tc
(cid:96)c(u, v)
det(Lr( G))
where the last line follows from Lemma 2.
B. Loop-erased random walk algorithm
In this section, we propose a more efficient algorithm, based
on loop-erased random walk (LERW), which is a more direct
adaptation of the RandomTreeWithRoot algorithm [5]. The
LERW algorithm can directly sample a Steiner tree TX from
the chain G with probability proportional to its weight w(TX ).
The pseudocode for algorithm LERW is provided in Algo-
rithm 2. LERW maintains a current tree TX, which initially
consists of just the root r. As long as there are terminal nodes
that are not in the tree, LERW performs a random walk in G
starting from such v ∈ X \ V [TX ], erasing loops (i.e., cycles)
as they are created, until the walk encounters a node that is
in the current tree TX. This cycle-erased trajectory is then
added to the current tree. The algorithm terminates once all
the terminal nodes are added to the current tree TX.
Theorem 2. The LERW algorithm returns a random Steiner
tree TX rooted at r with probability proportional to w(TX ).
To prove this result, we will use an adaptation of the cycle-
popping algorithm, devised by Wilson [5], which was shown
to be equivalent to loop-erased random walk when sampling
a spanning tree.
Given G and root r, following Wilson [5], we associate to
each non-root node u an infinite stack
Su = [Su,1, Su,2,··· ],
whose elements are states of the chain G such that
Pr (Su,i = v) = Pr (RandomSuccessor(u) = v) ,
for all u and i and such that all the items Su,i are jointly
independent of one another. We refer to the left-most element
: Markov chain G = (V, E, w), root r, terminals X
Next[i] ← f alse;
Algorithm 2: LERW
Input
Output: Random Steiner tree TX
1 for i ← 1 . . . n do
2
3 Next[r] ← nil;
4 InTree[r] ← true;
5 for i ∈ X do
6
7
8
9
u ← i;
while not InTree[u] do
10
11
12
13
14
u ← i;
while not InTree[u] do
InTree[u] ← true ;
u ← Next[u];
return Next;
Next[u] ← RandomSuccessor(u);
u ← Next[u];
(cid:46) erase the loop
Algorithm 3: CYCLEPOPPING procedure
: Markov chain G = (V, E, w), root r, terminals X
Input
Output: Random Steiner tree TX
1 while Gr has a cycle involing any item in X do
2
pop any such cycle off the stack;
3 TX ← the edges that are traversed on Gr starting from
each terminal to the root;
4 return TX;
Su as the element that is at the top of stack Su, and by popping
the stack Su we mean removing the top element from Su. At
any moment, the top elements of the stacks define a directed
stack graph Gr such that Gr contains an edge (u, v) only if
the top element of Su is v. If there is a directed cycle C in
Gr, we pop Su for every u ∈ C, which creates another stack
graph with cycle C removed.
Wilson showed that when the cycle-popping process termi-
nates, the stack graph Gr is a directed spanning tree rooted at
r [5]. Our aim instead is to obtain a Steiner tree: this translates
to an early termination of the cycle-popping procedure as soon
as the cycles do not contain any terminal node, thus, defining a
Steiner tree on top of the stacks. The pseudocode of the cycle-
popping procedure for sampling a Steiner tree is provided in
Algorithm 3.
Lemma 3. CYCLEPOPPING terminates with probability 1
and the stack graph Gr upon termination is a Steiner tree.
Proof. We first show that Gr is a Steiner tree. Suppose some
terminal node u is connected to another connected subgraph
G(cid:48)
r induced by the top entries of the stacks. Since G(cid:48)
r does not
touch the current tree, root r does not belong in G(cid:48)
r. Thus, it
must have G(cid:48)
r edges, which implies that it contains a cycle,
which is a contradiction since cycle popping terminates when
no u ∈ X is involved in a cycle.
We now show that CYCLEPOPPING terminates with
probability 1. Following Wilson [5], when the cycle-popping
procedure is performed until no node in V is involved in a
cycle, i.e., without early termination, it returns a spanning tree
with probability 1. This directly implies that it must also return
a Steiner tree in a finite number of steps since every Steiner
tree of G is a subgraph of at least one spanning tree of G.
Using similar arguments as by Propp and Wilson [11],
we now show that the cycle-popping procedure with early
termination is equivalent to loop-erased random walk that
operates on an arbitrary ordering of the terminal nodes. First,
notice that, instead of generating infinitely long stacks and
looking for cycles to pop, LERW uses the principle of de-
ferred decisions and generates stack elements when necessary.
LERW starts with an arbitrary terminal node u ∈ X, does a
walk on the stacks so that the next node is given by the top of
the current node's stack. If LERW encounters a loop, then it
has found a cycle in the stack graph induced by the stacks that
LERW generates. Erasing the loop is equivalent to popping
this cycle. When the current tree (initially just the root r) is
encountered, the cycle erased trajectory starting from node u
is added to the tree. This process is then repeated for the other
terminals that are not yet added to the current tree.
Given the equivalence between the methods LERW and
CYCLEPOPPING, we now provide the proof of Theorem 2
by reasoning with the cycle-popping procedure.
Proof. (of Theorem 2) It follows from Lemma 3 that when
CYCLEPOPPING terminates, the stack graph Gr induced by
the stack entries containing the root node r is a Steiner tree.
Now, given a collection of cycles C, let C denote the event
that C is the collection of cycles that CYCLEPOPPING pops
before it terminates. Similarly, let TX denote the event that a
fixed Steiner tree TX is produced by the algorithm. Finally, let
C∧ TX denote the event that the algorithm popped the cycles
C and terminated with TX. Following Propp and Wilson [11],
the order of cycles being popped until termination and the tree
returned upon termination are independent, hence, we have
Pr (TX) =
Pr (C ∧ TX)
(cid:88)
C
= Pr (TX)
∝ w(TX ),
(cid:88)
C
P (C)
where the last line follows from the fact that Pr (TX) is the
probability that the edges traversed on Gr starting from each
terminal to the root is equal to TX, which is given by the stack
entries containing root r upon termination.
Comparison. Both TRIM and LERW rely on loop-erased
random walk and run in time O(τ ), where τ is the mean hitting
time [5] However, while TRIM, needs to visit all the nodes
at least once, LERW is equipped with an early termination
procedure, hence can terminate without having to visit all the
TABLE I
DATASETS
V
410
1 133
1 266
4158
279 631
E
2 765
5 451
6 451
13 428
1 548 131
Assortativity
0.0121
-0.0007
-0.0039
0.1641
0.0015
Name
infectious
email-univ
student
grqc
Digg
nodes, making it more efficient than TRIM in practice. Thus,
we use LERW in our experiments.
V. EXPERIMENTAL EVALUATION
In this section, we conduct an extensive empirical evaluation
of the proposed approach and several baselines.
A. Experimental setup
Datasets. We experiment on real-world graphs with both
synthetic and real-world cascades. We use public benchmark
graph datasets, in particular, infectious,3 email-univ,4
student,5 grqc,6 and Digg.7 The characteristics of these
graphs are shown in Table I. In addition, we perform a case
study on a lattice graph.
For all the datasets, except Digg, we generate synthetic
cascades using the following diffusion models: (i) SI model
with the infection probability β set to 0.1; (ii) IC model,
where the infection probability on each edge is independently
drawn from the uniform distribution [0, 1]. For each graph
that is originally undirected, we create directed copies of each
undirected edge.
For the Digg dataset, we experiment on real-world avail-
able cascades, which correspond to stories that propagate in
the network. In most of the cases, the activated nodes do not
form a connected component, hence, we extract the largest
connected component as the cascade. We experiment using
the top-10 largest cascades, with an average cascade size of
1868.
Reconstruction methods. We test and compare the following
reconstruction methods.8
• Tree-sampling: our sampling-based method that returns,
for each hidden node, the marginal probability of being in
infected state. We use LERW for the sampling of Steiner-
trees and set the size of the Steiner-tree sample to 1000.9
For the case when the real infection source is unknown, we
use different root selection strategies to be used as a proxy
to the real infection source. Obviously, the accuracy of our
sampling approach is affected by the choice of root node.
3http://konect.uni-koblenz.de/networks/sociopatterns-infectious
4http://networkrepository.com/ia-email-univ.php
5http://networkrepository.com/ia-fb-messages.php
6http://snap.stanford.edu/data/ca-GrQc.html
7https://www.isi.edu/lerman/downloads/digg2009.html
8Our implementation is available at github/xiaohan2012
9We observed that increasing the sample size beyond 1000 gives little
marginal gain in accuracy.
We discuss the different root selection strategies employed
in the next sub-section.
• NetFill: a method designed specifically for the SI model by
Sundareisan et al. [3], which assumes a single propagation
probability β common to all edges. This method addition-
ally assumes that the fraction of observed infections are
known. For completeness, we also test NetFill using IC
cascades where we set β = 0.5, corresponding to the mean
of the infection probabilities drawn from the uniform [0, 1]
distribution.
• PageRank: a baseline that ranks the nodes based on their
Personalized PageRank scores [17], with the personaliza-
tion vector initialized to 1/O for the observed nodes and
0 for the unobserved nodes.
• Min-Steiner-tree: a baseline that constructs the minimum-
weight Steiner tree where the weight of each edge (u, v) is
defined as − log puv. Note that, this baseline is inspired by
the approach in [6] for constructing a Steiner tree with the
minimum negative log-likelihood. Notice that, this baseline
can also be considered as the time-agnostic version of
the minimum Steiner tree based reconstruction approach
proposed in [4].
Root selection. we experiment with the following root-
selection methods:
• Min-dist
selects the "centroid" node with minimum
weighted shortest path distance to the terminals, where the
weight on each edge (u, v) is defined as − log puv.
• PageRank chooses the node with the highest Personalized
PageRank score as the root, where the personalization
vector is initialized to 1/O for observed nodes and to
0 for unobserved nodes.
• True-root is an oracle that simply returns the true infection
source s. We consider this case to eliminate the effect of
root selection on the final performance
We observe that, while PageRank is more scalable than Min-
dist, Min-dist gives slightly better performance in practice.
Evaluation measure. We evaluate the performance of the
algorithms not only for recovering the nodes, but also recov-
ering the edges: ideally a good method should discover many
hidden infected nodes, along with the edges that the infection
propagated.
We use average precision (AP) to evaluate the quality
of different reconstruction methods. The AP measure sum-
marizes a precision-recall curve as the weighted mean of
precision achieved at each threshold, with the increase in recall
from the previous threshold used as the weight. In particular,
(cid:88)
AP =
(Rn − Rn−1)Pn,
n
where Pn and Rn is the precision and recall at the n-th
threshold, respectively. The AP measure is widely used for
evaluating the accuracy of information retrieval (IR) tasks,
where giving higher ranking to a small set of relevant docu-
ments against non-relevant ones is the primary goal. Notice
that our task is very similar to an IR task, since in real-
world scenarios, cascades tend to be small with respect to
graph size, thus, a good reconstruction method should give
high ranking to the actual hidden infected nodes (and the
edges). By convention, we exclude all observed nodes from
evaluation. For each experiment setting, we report the results
of experiments averaged over 100 runs.
B. Case study on a lattice graph
We perform a case study on simulated SI cascades on a
32×32 lattice graph, where 20% of the nodes are infected,
among which 50% are observed. Figure 2 illustrates the be-
havior of different reconstruction algorithms by a color-coding
of the predictions they produce. In contrast to Tree-sampling
that provides, for each hidden node, the probability to be
infected, NetFill and Min-Steiner-tree can only produce binary
predictions, which is reflected by their binary colored output.
Notice that Tree-sampling correctly assigns high probability to
the actual hidden infections, which is shown by the assignment
of dark red color to the actual
infection region. We also
observe that NetFill finds considerable amount of true positives
and false
. Finally, Min-Steiner-tree, by design, produces
than the
negatives
small trees, thus, producing more false negatives
other two methods.
, but also returns quite a few false positives
C. Node-level performance on synthetic cascades
Next, we evaluate node-level AP scores in different settings.
We experiment with various values of the following three
parameters:
• cascade generation model: either IC or SI;
• observation fraction: the fraction of the number of ob-
served infections by the number of true infected nodes;
• cascade fraction: the fraction of the number of true in-
fected nodes by the total number of nodes in the graph.
though PageRank is a simple heuristic,
Effect of observation fraction. We fix cascade fraction to
0.1 and vary the observation fraction from 0.1 to 0.9 at step
size 0.1. Figure 3 shows node-level AP scores under different
graphs and cascade models. We see that Tree-sampling (with
both Min-dist and True-root) and PageRank outperform Net-
Fill10 and Min-Steiner-tree by a large margin. This result is
consistent on all graphs we experiment and cascade models.
Notice that,
is
among the top-performing methods, even outperforming Tree-
sampling with True-root on grqc by as much as 0.1. We also
see that, the effect of root selection plays an important role for
most graphs. For example, on all graphs except grqc, with
True-root, Tree-sampling is the best, while with Min-dist, Tree-
sampling falls behind PageRank. Finally, as the observation
fraction increases, all methods' performance tends to drop.
This is expected as more infections are observed, there are
fewer hidden infections, which makes the task harder.
it
Effect of cascade fraction. We fix observation fraction to
0.5 and vary the cascade fraction from 0.1 to 0.5 at step
size 0.1. Figure 4 shows node AP scores under different
graphs and cascade models. Again, NetFill and Min-Steiner-
tree are out-performed by other methods. For Tree-sampling
and PageRank, AP scores are very close except on grqc,
where PageRank outperforms the others. Also, as cascade
fraction increases, all methods tend to give better AP scores.
Discussion on grqc graph. On the grqc graph, PageRank
performs better than Tree-sampling with True-root while this
is not the case in other graphs. We now provide some remarks
to explain this difference in performance for the grqc graph.
First of all, we observe that grqc has a very high assortativity
coefficient [18] (AC) compared to the other graphs (as shown
in Table I). In graphs with large assortativity coefficient, high
degree nodes tend to connect to each other, which implies
that, the infected nodes in simulated cascades tend to form
densely connected subgraphs. Notice that the random walker
of PageRank tends to give higher scores to the cascade
subgraph if it's densely connected, which gives prediction
advantage to PageRank. In contrast, if the graph has low AC,
the cascade subgraph tends to be sparsely connected, making
PageRank less effective.
D. Edge-level performance on synthetic cascades
Next, we evaluate edge-level AP scores under the same
setting as the node-level evaluation. Similarly, we consider two
variants of Tree-sampling with True-root or Min-dist, while
here we focus on the IC model -- SI model yields similar
results. Note that in this case, NetFill and PageRank are not
applicable by design because neither produces prediction on
the edges.
Shown in Figure 5, Tree-sampling, regardless of root selec-
tion strategy, outperforms Min-Steiner-tree. Also, we observe
that
the performance increases both with the observation
fraction and the cascade fraction. Meanwhile, the effect of root
selection does not play an important role as we observe that
the performance with Tree-sampling with Min-dist or True-
root are very close.
E. Real cascades
Figure 6 shows the experiment results on Digg dataset.11
We vary the observation fraction from 0.1 to 0.8 to recover
only the hidden nodes since the dataset does not provide the
edge-level propagation information. We observe that in Digg
dataset, the AP scores of all the methods are much lower
than what is obtained for synthetic cascades. We also make
the following observation: first, the AP scores of all methods
are much lower than synthetic cascades in above sections. The
reason can be two-fold: (1) the underlying infection propaga-
tion probabilities on the edges are unknown; (2) the size of
the cascade is very small (on average only 0.7% of the whole
graph is infected), making the prediction task much harder.
10We are not able to run NetFill with observation fraction < 0.5 using the
implementation provided by the original authors.
11NetFill was not able to terminate within reasonable amount of time when
using the implementation provided by the authors.
cascade with observation
Tree-sampling
NetFill
Min-Steiner-tree
Fig. 2. Case study on lattice graph. Underlying cascade and observation is shown in left most figure. Output by different methods are shown in the
remaining figures. Note that Tree-sampling outputs node infection probability while NetFill and Min-Steiner-tree make binary decision (infected or not).
infectious
email-univ
student
grqc
Fig. 3. Node-level AP score with respect to the fraction of observation: top row (IC model), bottom row (SI model)
We also observe that, Tree-sampling (both with PageRank and
True-root) perform the best in such difficult setting, followed
by PageRank, and Min-Steiner-tree which performs the worst.
Notice that Digg has assortativity coefficient close to zero
and the fact Tree-sampling outperforms PageRank supports our
remarks provided in Section V-C.
VI. CONCLUSION
We study the problem of cascade-reconstruction in the
probabilistic setting. To estimate node infection probability, we
reduce our problem to sampling Steiner trees. We propose two
novel algorithms with provable guarantees on the distribution
of the sampled Steiner trees. The proposed reconstruction
algorithm makes fewer assumptions (e.g., cascade model and
observation fraction) compared to previous work. This makes
our approach more robust in practice. Experimental results
show that the proposed approach outperforms the other base-
lines on most cases.
algorithms that sample directly from (cid:81)
Our work opens interesting directions for future research.
First, it is important to re-visit Problem 2 and design sampling
(u,v)∈T puv. Second,
is interesting to consider the problem of reconstructing
it
cascades in the presence of temporal information, where we
need to sample Steiner trees with node-order constraints.
ACKNOWLEDGMENTS
This work has been supported by three Academy of Finland
projects (286211, 313927, and 317085), and the EC H2020
RIA project "SoBigData" (654024)". Part of the work was
done while the second author was at ISI Foundation.
REFERENCES
[1] P. Rozenshtein, A. Gionis, B. A. Prakash, and J. Vreeken,
"Reconstructing an epidemic over time," in KDD. ACM,
2016, pp. 1835 -- 1844.
[2] A. Braunstein and A.
Ingrosso, "Network recon-
struction from infection cascades," arXiv preprint
arXiv:1609.00432, 2016.
[3] S. Sundareisan, J. Vreeken, and B. A. Prakash, "Hid-
den hazards: Finding missing nodes in large graph epi-
demics," in SDM. SIAM, 2015, pp. 415 -- 423.
P(uninfected)P(infected)0.00.51.0obs. fraction0.00.20.40.60.8AP0.00.51.0obs. fraction0.00.10.20.30.4AP0.00.51.0obs. fraction0.00.10.20.3AP0.00.51.0obs. fraction0.00.20.40.6AP0.00.51.0obs. fraction0.00.20.40.6AP0.00.51.0obs. fraction0.00.10.20.30.4AP0.00.51.0obs. fraction0.00.10.20.30.4AP0.00.51.0obs. fraction0.00.20.40.60.8APmin steiner treenetfillpageranktree sampling (true root)tree sampling (min dist)infectious
email-univ
student
grqc
Fig. 4. Node-level AP score with respect to cascade size: top row (IC model), bottom row (SI model)
infectious
email-univ
student
grqc
Fig. 5. Edge-level AP score on IC model with respect to the observation fraction (top row) and cascade fraction (bottom row)
296 -- 303.
[6] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila,
"Finding effectors in social networks," in KDD. ACM,
2010, pp. 1059 -- 1068.
[7] D. Shah and T. Zaman, "Rumors in a network: Who's
the culprit?" IEEE, vol. 57, no. 8, pp. 5163 -- 5181, 2011.
[8] M. Farajtabar, M. G. Rodriguez, M. Zamani, N. Du,
H. Zha, and L. Song, "Back to the past: Source iden-
tification in diffusion networks from partially observed
cascades," in AISTATS, 2015, pp. 232 -- 240.
[9] M. Mosbah and N. Saheb, "Non-uniform random span-
ning trees on weighted graphs," vol. 218, no. 2. Elsevier,
1999, pp. 263 -- 271.
[10] A. Broder, "Generating random spanning trees," in
FOCS.
IEEE, 1989, pp. 442 -- 447.
[11] J. G. Propp and D. B. Wilson, "How to get a perfectly
random sample from a generic markov chain and gener-
ate a random spanning tree of a directed graph," Journal
of Algorithms, vol. 27, no. 2, pp. 170 -- 217, 1998.
Fig. 6. Node-level AP score with respect to observation fraction on real
cascades from Digg
[4] H. Xiao, P. Rozenshtein, N. Tatti, and A. Gionis, "Recon-
structing a cascade from temporal observations," SDM,
2018.
[5] D. B. Wilson, "Generating random spanning trees more
quickly than the cover time," in STOC. ACM, 1996, pp.
0.10.20.30.40.5cascade fraction0.00.51.0AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.51.0AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8APmin steiner treenetfillpageranktree sampling (true root)tree sampling (min dist)0.00.51.0obs. fraction0.00.10.20.3AP0.00.51.0obs. fraction0.00.10.20.3AP0.00.51.0obs. fraction0.00.10.20.3AP0.00.51.0obs. fraction0.00.20.40.6AP0.10.20.30.40.5cascade fraction0.00.10.20.3AP0.10.20.30.40.5cascade fraction0.00.10.20.3AP0.10.20.30.40.5cascade fraction0.00.10.20.3AP0.10.20.30.40.5cascade fraction0.00.20.4APtree sampling (min dist)tree sampling (true root)min steiner tree0.00.20.40.60.8obs. fraction0.000.020.040.060.08APmin steiner treepageranktree sampling (pagerank)tree sampling (true root)[12] M. Hauptmann and M. Karpinski, "A compendium on
steiner tree problems," 2015.
[13] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing the
spread of influence through a social network," in KDD.
ACM, 2003, pp. 137 -- 146.
[14] L. G. Valiant, "The complexity of enumeration and
SIAM, 1979, pp.
reliability problems," vol. 8, no. 3.
410 -- 421.
[15] A. F. Smith and A. E. Gelfand, "Bayesian statistics
without tears: a sampling -- resampling perspective," The
American Statistician, vol. 46, no. 2, pp. 84 -- 88, 1992.
[16] W. T. Tutte, "Graph theory, volume 21 of encyclopedia
of mathematics and its applications," 1984.
[17] B. Bahmani, A. Chowdhury, and A. Goel, "Fast incre-
mental and personalized pagerank," VLDB, vol. 4, no. 3,
pp. 173 -- 184, 2010.
[18] M. E. Newman, "Assortative mixing in networks," Phys-
ical review letters, vol. 89, no. 20, p. 208701, 2002.
|
1301.6870 | 1 | 1301 | 2013-01-29T09:29:54 | Studying User Footprints in Different Online Social Networks | [
"cs.SI"
] | With the growing popularity and usage of online social media services, people now have accounts (some times several) on multiple and diverse services like Facebook, LinkedIn, Twitter and YouTube. Publicly available information can be used to create a digital footprint of any user using these social media services. Generating such digital footprints can be very useful for personalization, profile management, detecting malicious behavior of users. A very important application of analyzing users' online digital footprints is to protect users from potential privacy and security risks arising from the huge publicly available user information. We extracted information about user identities on different social networks through Social Graph API, FriendFeed, and Profilactic; we collated our own dataset to create the digital footprints of the users. We used username, display name, description, location, profile image, and number of connections to generate the digital footprints of the user. We applied context specific techniques (e.g. Jaro Winkler similarity, Wordnet based ontologies) to measure the similarity of the user profiles on different social networks. We specifically focused on Twitter and LinkedIn. In this paper, we present the analysis and results from applying automated classifiers for disambiguating profiles belonging to the same user from different social networks. UserID and Name were found to be the most discriminative features for disambiguating user profiles. Using the most promising set of features and similarity metrics, we achieved accuracy, precision and recall of 98%, 99%, and 96%, respectively. | cs.SI | cs | Studying User Footprints in
Different Online Social Networks
Anshu Malhotra† Luam Totti(cid:63) Wagner Meira Jr.(cid:63) Ponnurangam Kumaraguru† Virg´ılio Almeida(cid:63)
† Indraprastha Institute of Information Technology
New Delhi, India
{anshu1001,pk}@iiitd.ac.in
(cid:63)Departamento de Ci encia da Computac¸ ao
Universidade Federal de Minas Gerais
Belo Horizonte, Brazil
{luamct,meira,virgilio}@dcc.ufmg.br
3
1
0
2
n
a
J
9
2
]
I
S
.
s
c
[
1
v
0
7
8
6
.
1
0
3
1
:
v
i
X
r
a
Abstract—With the growing popularity and usage of online
social media services, people now have accounts (some times
several) on multiple and diverse services like Facebook, LinkedIn,
Twitter and YouTube. Publicly available information can be
used to create a digital
footprint of any user using these
social media services. Generating such digital footprints can be
very useful for personalization, profile management, detecting
malicious behavior of users. A very important application of
analyzing users’ online digital footprints is to protect users
from potential privacy and security risks arising from the huge
publicly available user information. We extracted information
about user identities on different social networks through Social
Graph API, FriendFeed, and Profilactic; we collated our own
dataset to create the digital footprints of the users. We used
username, display name, description, location, profile image, and
number of connections to generate the digital footprints of the
user. We applied context specific techniques (e.g. Jaro Winkler
similarity, Wordnet based ontologies) to measure the similarity
of the user profiles on different social networks. We specifically
focused on Twitter and LinkedIn. In this paper, we present
the analysis and results from applying automated classifiers for
disambiguating profiles belonging to the same user from different
social networks. UserID and Name were found to be the most
discriminative features for disambiguating user profiles. Using
the most promising set of features and similarity metrics, we
achieved accuracy, precision and recall of 98%, 99%, and 96%,
respectively.
I . IN TRODUC T ION
In this digital age, when we all are living two lives, offline
and online, our paper trails and digital trails coexist. Our
digital trail captures our interactions and behaviors in the
digital environment. In this virtual age, an important com-
ponent of our footprints are our online digital footprints [1].
Due to the tremendous growth in online social media, the
size of a users’ online digital footprints is also growing.
We interact with friends, post updates about our day to day
lives, bookmark links, write online blogs and micro blogs,
share pictures, watch and upload videos, read news articles,
make professional connections, listen to music, tag online
resources, share location updates and what not. Our online
digital footprints capture our online identity and whatever we
do on the web becomes part of our online identity forever.
Due to strong relationship between users’ offline and online
identity [2], [3], users’ online digital footprints can help
in uniquely identifying them. By uniquely identifying users
across social networks we can discover and link her mul-
tiple online profiles. Linking together users’ multiple online
identities has many benefits e.g. profile management [4] like
managing setting 1 and building a global social networking
profile, 2 help user monitor and control her personal informa-
tion leakage [3], user profile portability [5], personalization
[4], [6]–[8]. In addition, linking users’ multiple online profiles
facilitates analysis across different social networks [6] which
helps in detecting and protecting users from various privacy
and security threats arising due to vast amount of publicly
available user information.
Unification of users’ multiple online identities can lead
to various privacy and security threats like: identity thefts
and profile cloning [3], [9] which can lead to compromised
accounts [1]; directed spam and phishing [10]; online profiling
by advertisers and attackers [11]; online stalking [1]. An inter-
esting attack was demonstrated by PleaseRobMe.com 3 where
they used Tweets containing Check-Ins from FourSquare to
discover if the user was away from her home. We believe,
formulating users’ digital footprints and linking her multiple
online identities can help to keep the user informed about such
threats and suggest her preventive measures.
The users of the social networks can choose the usernames
they wish to, which may be totally unrelated to their real iden-
tity [12], and also users may choose different (and unrelated)
usernames on different services. People with common names
tend to have similar usernames [2], [11]. Users may enter
inconsistent and misleading information across their profiles
[12], unintentionally or often deliberately in order to disguise.
Each social network has different purpose and functional-
ity. Heterogeneity in the network structure and profile fields
between the services becomes a complicating factor in the
task of linking online accounts. All these factors make user
profile linking across social networks a challenging task in
comparison to Named Entity Recognition [13].
In this work, we propose a scalable and automated technique
for disambiguating user profiles by extracting his online digital
footprints from publicly available profile information. The
major contributions of our work are:
• We propose the use of automated classifiers to classify
the input profiles as belonging to the same user or not.
• Our approach works on publicly available data and does
not require user authentication or standardization by
different social networks. Sophisticated similarity metrics
1 http://blisscontrol.com/
3 http://pleaserobme.com/
2 http://www.digfoot.com/
were used to compare different categories of profile fields.
• We conduct a large scale analysis of our approach for
linking user accounts across Twitter and LinkedIn, the
second and the third most popular social networking
sites. 4 We also evaluate our systems’ performance in
real world.
In the next section, we discuss the closely related work. Sec-
tion III describes our system for user profile disambiguation. In
section IV, we provide details on the dataset construction. Sec-
tion V discuss the user profile features and the corresponding
similarity metrics used to compare them. Results and analysis
from our experimental evaluation is presented in Section VI.
Section VII discusses the conclusions and main findings of
our work.
I I . R ELAT ED WORK
Different techniques have been proposed for user disam-
biguation across social networks. In this section, we discuss
the techniques, their limitations and compare them with our
approach. Various graph based techniques have been suggested
for unifying accounts belonging to the same user across social
networks [3], [6], [7], [14]. Golbeck et al. generated Friend
Of A Friend (FOAF) ontology based graphs from FOAF
files / data obtained from different social networks [6] and
linked multiple user accounts based on the identifiers like
Email ID, Instant Messenger ID. The majority of the analysis
was done for blogging websites. Rowe et al. applied graph
based similarity metrics to compare user graphs generated
from the FOAF files corresponding to the user accounts on
different social networks; if the graphs qualified a threshold
similarity score, they were considered to be belonging to the
same user [7]. They applied this approach to identify web
references / resources belonging to users [3], [14]. Such FOAF
graph based techniques might not be scalable and FOAF based
data might not be available publicly for all social networks and
all users.
Researchers have also used tags created by users (on
different social networking sites such as Flickr, Delicious,
StumbleUpon) to connect accounts using semantic analysis
of the tags [5], [8], [12]. While using tags, accuracy has been
around 60 – 80 %. Zafarani et al. mathematically modeled
the user identification problem and used web searches based
on usernames for correlating accounts [2] with an accuracy of
66%. Another probabilistic model was proposed by Perito et
al. [11]. User profile attributes were used to identify accounts
belonging to the same user [1], [2], [4], [15]–[18]. Carmagnola
et al. proposed a user account identification algorithm which
computes a weighted score by comparing different user profile
attributes, and if the score is above a threshold, they are
deemed to be matched. Vosecky et al. proposed a similar
threshold based approach for comparing profile attributes [17].
They used exact, partial and fuzzy string matching to compare
attributes of user profiles from Facebook and StudiVZ and
achieved 83% accuracy. Kontaxis et al. used profile fields to
detect user profile cloning [18]. They used string matching
to discover exactly matching profile attributes extracted by
HTML parsing. Irani et al. did some preliminary work to
4 http://www.ebizmba.com/articles/social- networking-websites
match publicly available profile attributes to assess users’
online social footprints [1]. However, their work was limited to
categorical and single value text fields and did not include free
text profile fields, location and image. Even they suggested as
their future work, the use of sophisticated matching techniques
and a flexible similarity score for matching profile fields
instead of a binary match or a non match decision.
Some of the major limitations of the techniques discussed
above are – specificity to certain type of social networks,
e.g., blogging website, networks which support tagging; de-
pendency on identifiers like email IDs, Instant Messenger IDs
which might not be publicly available for most of the net-
works; computationally expensive; use of simple text matching
algorithms for comparing different types of profile fields. Also,
assignment of weights and thresholds is very subjective and
it might not be scalable with the growing size and number
of social networks. Most importantly, all the above techniques
have been tested on a small dataset (the biggest being 5,000
users), wherein the data collection and evaluation was done
manually in some approaches. Lastly, with growing privacy
awareness, most of the fields (like gender, marital status, date
of birth) which have been used in most of the techniques
above, might not be publicly available at present or in future.
Real world evaluation has not been done for most of the above
techniques. In our work, we address these concerns and hence
improve the process of user disambiguation across networks.
I I I . U S ER PRO FILE D I SAMB IGUAT ION
User’s digital footprints within a service is the set of
all (personal) information related to her, which was either
provided by the user directly or extracted by observing the
user’s interaction with the service. In this paper, we investigate
how to match a users’ digital footprints across different online
services, aggregate online accounts belonging to the user
across different services, and hence assemble a unified and
hopefully richer online digital footprints of the users. For
the purpose of automating this task, we employed simple
supervised techniques. Using a dataset of paired accounts
known to belong to a same user, we compared correspond-
ing features from each social network using feature-specific
similarity techniques. Each pair of accounts belonging to
a same entity generated a similarity vector in the form
< usernamescore , namescore , descriptionscore ,
locationscore , imagescore , connectionsscore >, where fscore
is the similarity score between the field f (e.g. location) of the
user profile in both services. This vector was used as a train-
ing instance for supervised classifiers. Similar vectors were
generated for profile pairs known to belong to different users.
We test the use of these vectors with four classifiers: Naıve
Bayes, kNN, Decision Tree and SVM. Our system architecture
is depicted in the Figure 1. Account Correlation Extractor
collates the user profiles known to be belonging to the same
user across different social networks. Profile Crawler crawls
the public profile information from Twitter and LinkedIn APIs
for paired user accounts for these services. A user’s Online
Digital Footprints are generated after Feature Extraction and
Selection. Various classifiers are trained for account pairs
belonging to same users and pairs belonging to different users,
which are then used to disambiguate user profiles i.e. classify
After this first stage of data collection, we had true positive
connections of the profiles belonging to the same user across
different social networks. This data for each user U was a
1 , us2
N-tuple record of the form (us1
n ), where si is
2 , . . . , usn
the online service in which user U has an account using
the identifier ui . We wanted to measure the effectiveness of
different features of a user profile in forming unique and distin-
guishable digital footprints of a user. For this, we formulated
a model to disambiguate a user on a social network given his
digital from some other social network. To accomplish these
tasks, we required the profile features of the user profiles from
different social networks. This comprised the second phase of
our data collection. Using the unique user handle, we crawled
and collected the publicly available profile fields of the users.8
B. Data Summary
To start with, our data consisted of 41,336 user profiles
from each of the following services: Twitter, YouTube and
Flickr. Each account triple were know to belong to the same
user. Additionally, 29,129 pair of accounts were collected from
Twitter and LinkedIn. We observed that profile information
from YouTube and Flickr had large proportion of missing
fields (Figure 2). We used 29,129 accounts from Twitter and
LinkedIn for all further analysis in this work.
Fig. 1: System Architecture. Account Correlation Extractor and
Profile Crawler helped in dataset collection. Features were extracted
and the Classification Engine was trained using selected features.
User Profile Disambiguator was used for system evaluation.
the given input profile pairs to be belonging to the same user
or not.
IV. DATA S ET
In this section, we discuss the dataset we collated for
developing automated mechanisms for disambiguating digital
footprints of a user.
A. Collection
The data collection consisted of two phases. The first
stage involved collecting the true positive connections, i.e. the
profiles from different services known to belong to the same
user. We used the following sources in this phase:
Social Graph API: 5 This Google API provides access
to declared connections between public URLs. A URL can
be a website or a user’s profile page. When connections
for a given user profile URL are requested, Social Graph
returns other profile URLs that are alternative identities of the
requested user, allowing us to retrieve accounts of a same user
across multiple services. We collected information of around
14 million users, although only 28% of those users had useful
declared connections.
Social Aggregators: Social network aggregators are ser-
vices that pull together the feeds from multiple social networks
that the user manually configured. We crawled 883,668 users
from FriendFeed 6 and 38,755 users from Profilactic. 7
5 http://code.google.com/apis/socialgraph/docs/
7 http://www.profilactic.com/
6 http://friendfeed.com/
Fig. 2: Percentage of missing features in each service.
V. ON L IN E D IG I TAL FOOT PR IN T S
A user profile on any social networking website can be seen
as an N dimensional vector, where each dimension is a profile
field, e.g., username, first name, last name, location, descrip-
tion / about me, relationship and others [17]. A subset of these
features (e.g. username, location) from one social network can
be used to disambiguate the same user from millions of other
users on another social network. We chose to study the Twitter-
LinkedIn connections since they had some comparable profile
features like location, ‘about me’ / description and others. In
this section we discuss the features and techniques we used for
matching the users’ digital footprints across social networks.
A. UserID
This refers to the unique username / user ID / handle which
identifies a user on the social network and in many cases is
used by the person to log in to the service. A person may
have different usernames across social networks and hence
8 All profiles declared as non-English were ignored (around 13%).
0 10 20 30 40 50 60 70 80NameLocationDescriptionImageMissing (%)TwitterLinkedInYouTubeFlickrcannot be identified with only her username. We employed a
sophisticated string matching method, Jaro-Winkler 9 distance
(jw) that is designed for comparing short strings and gives a
score in the range [0, 1]. Higher the score, higher the similarity
of the two strings.
B. Display name
This refers to the first name and / or the last name which
the user has entered in his profile. Instead of exactly matching
display names, we again employed the Jaro-Winkler distance
for computing the similarity between display names. How-
ever, users with the same display name might have similar
usernames and hence we need to look at other features which
can help identify a user.
C. Description
This is the short write up / ‘bio’ / ‘about me’ which
the user provides about himself. We employed the following
three methods to compare description fields from two profiles
which were to be matched – tf-idf vector space model:
The description fields were first pre-processed by removing
the punctuations, stop words to extract
the tokens which
were lemmatized and converted to lower case. The cosine
similarity was then computed between the two token sets,
considering each to be a document, therefore resulting in a
score in the range [0,1] between the two fields. Jaccard’s
Similarity: Applying the same pre-processing described in
the previous method, the Jaccard’s similarity10 between the
two token sets was taken as the similarity score. WorldNet
based Ontologies: Wordnet11 is a common English language
lexical database which provides ontologies i.e. groupings of
synsets based on hypernym-hyponym (is-a-relation) tree. This
ontology organized using hypernym tree can be used to explain
the similarity or dissimilarity between synsets. We use the Wu-
Palmer similarity metric [19] between tokens of the description
fields from the two user profiles to be matched [20].
D. Location
The next profile field we chose for comparison was location
(loc). For comparing the location field, we extracted the tokens
from the location field of both the profiles to be matched by
removing the punctuations and converting to lower case. For
these tokens, we computed the following metrics – Sub Strings
Score (substr): normalized score of number of tokens from one
location field present as a sub-string in the other; Jaccard’s
Score: Jaccard’s similarity of tokens from two location fields;
Jaro-Winkler Score; Geographic Distance (geo): Euclidean
Distance between the two locations was found using their
latitude and longitudes. Latitude and longitude were found by
querying Google Maps GeoCoding API. 12
E. Profile Image
A profile image is a thumbnail provided by the user for
the purpose of visually representing him. The collected user
profiles provide the URL in which the image is made available.
The images were downloaded and stored locally. Each image
9 http://en.wikipedia.org/wiki/Jaro-Winkler distance
10 http://infolab.stanford.edu/∼ullman/mmds/ch3.pdf
11 http://wordnet.princeton.edu/
12 https://developers.google.com/maps
was then scaled down to 48 x 48 pixels using cubic spline
interpolation and then converted to gray scale by taking the
scalar product of the RGB components vector (r, g , b) with
the coefficient vector (0.299, 0.587, 0.114). Each image could
then be seen as a vector of values from 0 to 255 to which
simple functions were applied to quantify their similarity. This
feature may be abbreviated as ‘img’ throughout the paper.
We used Mean Square Error, Peak Signal-to-Noise Ratio, and
Levenshtein (ls) for analyzing the profile image.
F. Number of Connections
The last feature was derived from the intuition that a user
has a similar number of friends (which we generalize as con-
nections) across different services. For Twitter, we considered
the number of connections of a user u to be the number of
users that u follows. For LinkedIn, a user v is a connection of
u if v belongs to the private network of user u. The number of
connections in different services can assume different ranges,
with different meanings. For example, a certain number of
connections on LinkedIn can mean that a user is very active
and popular, while the same number on Twitter can be much
less significant. Taking this into consideration, two different
techniques were employed to compare those two values –
Normalized (norm): Each connection value c was normalized
to the range [0..1] using the smallest and greatest connection
values observed in each service. The similarity was then taken
as the unsigned difference between the two values. Class: norm
is very vulnerable to outliers, e.g. a single big value would
compress all the other values into a very small range, possibly
suppressing relevant information. To overcome this, each value
was assigned a class denoting how big it was. This was done
by organizing all connection values into a sorted vector and
then dividing it into k equally sized clusters, where k was the
chosen number of classes. Once each value was assigned a
class index between 1 and k , the similarity was taken as the
unsigned different between those two indexes. We adopted
k = 5 in this work.
V I . EVA LUAT ION EX PER IM EN T S
In this section, we describe and evaluate the experiments
performed using the dataset and metrics proposed in Sec-
tion V. The analysis was done using a dataset of account pairs
for 29,129 unique users.
A. Feature Analysis
With the purpose of effectively measuring the similarity
between two fields, different approaches were proposed in this
work to assess the usefulness of each feature and similarity
metric in the classification process. Table I shows the features’
discriminative capacity according to four different scores:
Information Gain (IG), Relief [21], Minimum Description
Length (MDL) [22] and Gini coefficient [23]. For the metrics
that can only be applied to categorical attributes an entropy
based discretization approach was used [24]. Throughout this
section, we represent each component of a similarity vector
as the feature name subscripted with the similarity metric
used, e.g. <useridjw , descjaccard , locgeo >. For each feature
the similarity metric with the highest score is highlighted.
Additionally, box plots are shown in Figure 3 for some of
IG
Relief
MDL
Gini
U SER ID
NAM E
CONN ECT ION S
D E SCR I P T ION
LOCAT ION
IMAG E
Class MSE
Geo
TF-IDF
JW
JW
Norm
Ontology
Jaccard
JW
Substr
Jaccard
PSNR
0.009
0.520
0.323
0.548
0.812
0.000
0.183
0.161
0.286
0.232
0.337
0.350
0.184
0.095
0.227
0.180
0.434
0.521
0.157
0.002
0.113
0.134
0.108
0.039
0.041
0.158
0.006
0.488
0.300
0.379
0.562
0.205
-0.006
0.188
0.274
0.158
0.270
0.233
0.205
0.003
0.146
0.092
0.151
0.217
0.000
0.051
0.051
0.084
0.067
0.098
0.102
0.051
TABLE I: Discriminative capacity of each pair < f eature, metric > according to four different approaches.
LS
0.215
0.188
0.227
0.061
the feature to enlighten how their value distributions affect
their discriminative capacity. For each feature different boxes
are plotted for the values of each class, “Match” and “Non
Match.” Outliers were omitted for better clarity. In Table I,
we can see a consistency across all four scores in all feature
groups. UserID and Name are the most discriminative features,
which are clearly supported by the values distributions on
Figure 3. Both features show very polarized distributions, with
no overlap between the ranges of the different classes. For
the Description values, tf-idf has shown to be slightly better
than Jaccard, while Ontology presented poor results. The
Geo-Location metric has shown to be considerably superior
than the other metrics for the Location field. For fast and
low cost solutions though, Jaccard and Sub-String can be
considered viable alternatives. Both implemented metrics for
the Connections showed low values for all scores, which is also
supported by the box plots. Manual verification confirmed that
the intuition that a same user should have a similar number
of friends in different social networks may be flawed. In
particular, for Twitter and LinkedIn this is generally not true
due to the different nature of the services. The Image feature
presented a small but significant informational relevance, being
the Levenshtein distance the best metric to be used.
B. Matching profiles
The similarity methods presented in the previous section
were applied to the accounts collected from Twitter and
LinkedIn to produce a training set for the classifiers. The
positive examples consisted of all the similarity vectors for the
account pairs of the Social Graph dataset. An equal number
of negative examples were synthesized by randomly pairing
accounts that don’t belong to the same user and calculating
their similarity vectors. This yielded a total of 58, 258 training
instances. After training the classifier, they were tested by
giving them as input a Twitter-LinkedIn profile pair to be
classified as a “Match” or a “Non Match.” A “Match” means
that the two given input profiles belong to the same user,
while “Non Match” means they don’t. The results shown
in this section were obtained by 10-fold cross-validation on
the data. In order to further evaluate the effectiveness of the
adopted similarity metrics, we generated results for all the
possible combinations of the features and metrics. The feature
set with the best accuracy using Naıve Bayes was <namejw ,
useridjw , locgeo , descjaccard , imgls >. We also observed that
the features Name, UserID and Location using Geo-Location
were present on all of the top 10 results, confirming that they
are relevant features.
Table II presents detailed results for the most promising
set of features according to previous results. The results for
each classifier are very comparable, except for the kNN. Using
the most promising set of features and similarity metrics, we
achieved accuracy, precision and recall as 98%, 99% and 96%
respectively.
Recall
Precision
Accuracy
F1
0.980
0.964
0.980
Naıve Bayes
0.996
0.964
0.936
0.994
0.965
Decision Tree
0.971
0.956
0.988
0.972
SVM
0.998
0.887
0.798
0.898
kNN
TABLE II: Results for multiple classifiers using the feature set
{namejw , useridjw , locgeo , descjaccard , imgls , connnorm }.
C. Finding Candidate User Profiles
To evaluate how our model for user profile disambiguation
would perform in a real scenario, we developed a system for
retrieving account / profile candidates from the services’ API,
in order to find a possible match for a known account. More
specifically, we reserve a part of the true positive data to be
a testing set T . A classifier C (vi ) is then trained with the
remaining dataset. We modified Naıve Bayes to return the
probability that the similarity vector vi was generated by 2
profiles that belong to the same user. Now, for each instance
< pt , pl >∈ T we query Twitter’s API using the LinkedIn
display name, pl [name]. Let C be all the accounts returned
by Twitter. For each ci ∈ C we compute the similarity vector
S (ci , pl ) = vi , which is now a instance suitable for our model.
For each vi , calculate the probability Pi of ci belonging to the
same user of pl , which is basically C (vi ). At last, we sort
all the values C (vi ) in decreasing order to form a rank R
in which, ideally, pt should be at the top. Figure 4 shows
how good our profile ranking mechanism is. The x axis is the
position in the rank and the y axis is the percentage of times
the right profile was found in a position lower or equal to x. We
plotted curves first using UserID and Name, and next using all
the profile features in order to verify whether using all features
was unnecessary. Although the best features have shown to be
really good discriminators, when doing searches in the services
APIs using a given name, most of the returned accounts have
very similar values in the fields Name and UserID, making
the use of more features specially important. This assumption
was confirmed by the observed results.
Figure 4 shows that in 64% of the cases the right profile was
found in the first position of the rank when using all features,
while this value was 49% for the set of the best features.
This shows that our model could be used to match profiles
automatically with a 64% accuracy rate by choosing the best
guess. The system could also be used in a semi-supervised
manner to narrow down candidates. For example, we can see
that in 75% of the times the right profile was in the first 3
positions of the rank.
Fig. 3: Box plots for each feature separating the values of the “Match” class and the “Non Match” class.
[2] R. Zafarani and H. Liu, “Connecting corresponding identities across
communities,” 2009. [Online]. Available: http://aaai.org/ocs/index.php/
ICWSM/09/paper/view/209/538
[3] M. Rowe and F. Ciravegna, “Harnessing the social web: The science of
identity disambiguation,” in Web Science Conference, 2010.
[4] F. Carmagnola and F. Cena, “User identification for cross-system per-
sonalisation,” Inf. Sci., vol. 179, no. 1-2, pp. 16–32, Jan. 2009.
[5] M. Szomszor, H. Alani, I. Cantador, K. O’Hara, and N. Shadbolt, “Se-
mantic modelling of user interests based on cross-folksonomy analysis,”
ser. ISWC ’08, 2008, pp. 632–648.
[6] J. Golbeck and M. Rothstein, “Linking social networks on the web with
foaf: a semantic web case study,” ser. AAAI’08, 2008, pp. 1138–1143.
[7] M. Rowe, “Interlinking distributed social graphs,” in LDOW2009,
April,Spring 2009.
[8] M. N. Szomszor, I. Cantador, and H. Alani, “Correlating user profiles
from multiple folksonomies,” ser. HT ’08, 2008, pp. 33–42.
[9] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are
belong to us: automated identity theft attacks on social networks.”
[10] M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel,
“Abusing social networks for automated user profiling,” ser. RAID’10,
2010, pp. 422–441.
[11] D. Perito, C. Castelluccia, M. A. K aafar, and P. Manils, “How unique
and traceable are usernames?” in PETS, 2011, pp. 1–17.
[12] T.
Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, “Identifying
users across social tagging systems,” 2011. [Online]. Available: https:
//www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/2779
[13] D. V. Kalashnikov and S. Mehrotra, “Domain-independent data cleaning
via analysis of entity-relationship graph,” ACM Trans. Database Syst.,
vol. 31, no. 2, pp. 716–767, Jun. 2006.
[14] M. Rowe, “Applying semantic social graphs to disambiguate iden-
tity references,” in 6th Annual European Semantic Web Conference
(ESWC2009), June 2009, pp. 461–475.
[15] F. Carmagnola, F. Osborne, and I. Torre, “Cross-systems identification
of users in the social web,” in 8th IADIS Int. Conf. WWW/INTERNET,
Rome, Italy, 2009, pp. 129–134.
[16] ——, “User data distributed on the social web: how to identify users
on different social systems and collecting data about them.”
[17] J. Vosecky, D. Hong, and V. Y. Shen, “User identification across multiple
social networks,” in NDT’09, July 2009.
[18] G. Kontaxis, I. Polakis, S. Ioannidis, and E. Markatos, “Detecting social
network profile cloning,” in PerCom, march 2011, pp. 295 –300.
[19] http://nltk.googlecode.com/svn/trunk/doc/api/nltk.corpus.reader.
wordnet-module.html.
[20] P. Bhattacharyya, A. Garg, and S. F. Wu, “Analysis of user keyword
similarity in online social networks,” Social Netw. Analys. Mining, vol. 1,
no. 3, pp. 143–158, 2011.
[21] K. Kira and L. A. Rendell, “The feature selection problem: traditional
methods and a new algorithm,” ser. AAAI’92, 1992, pp. 129–134.
[22] A. R. Barron, J. Rissanen, and B. Yu, “The minimum description length
principle in coding and modeling,” IEEE Transactions on Information
Theory, vol. 44, no. 6, pp. 2743–, 1998.
[23] S. R. Singh, H. A. Murthy, and T. A. Gonsalves, “Feature selection for
text classification based on gini coefficient of inequality.” Journal of
Fig. 4: Relation between the position in the rank r and the percentage
of times the right profile is found in a position lower or equal to r .
V I I . D I SCU S S ION
In this work, we applied automated techniques along with
users’ online digital footprints from one social network to
identify her on another social network. We extracted the
users’ online digital footprints entirely from the public profile
information. We used multiple profile features and sophisti-
cated similarity metrics to compare them and assessed their
discriminative capacity for user profile disambiguation. UserID
and Name when compared using the Jaro-Winkler metric
were the most discriminative ones. Using the most promising
set of features and similarity metrics, we achieved accuracy,
precision and recall as 98%, 99% and 96% respectively. We
tested our system in real world to find candidate user profiles
on Twitter, using the display name of a LinkedIn user. Seventy
five percent of the times, the correct user profile was in the
top 3 results returned by our system. Our proposed user profile
disambiguation system can help security analysts compare and
analyze two different social networks. In future, we plan to
incorporate more profile fields and generalize our model to
make it applicable to include other social networks. We also
want to adapt our system to handle missing and incorrect
profile attributes.
R E F ER ENC E S
[1] D. Irani, S. Webb, K. Li, and C. Pu, “Large online social footprints–an
emerging threat,” in CSE ’09, vol. 3, aug. 2009, pp. 271 –276.
0 0.2 0.4 0.6 0.8 1MatchNon Matchuserid jw 0 0.2 0.4 0.6 0.8 1MatchNon Matchname jw 0 0.1 0.2 0.3 0.4 0.5MatchNon Matchdescription jaccard 0 0.1MatchNon Matchdescription ontology 0 1 2 3 4 5MatchNon Matchconnections class 0 5 10 15 20 25 30MatchNon Matchimage psnr 0.8 0.9 1MatchNon Matchimage levenshtein 0 0.2 0.4 0.6 0.8 1MatchNon Matchlocation jw 0 0.2 0.4 0.6 0.8 1MatchNon Matchlocation jaccard 0 50 100 150 200 250 300MatchNon Matchlocation geo 40 45 50 55 60 65 70 75 80 5 10 15 20Profiles Found (%)Rank positionAll featuresBest FeaturesMachine Learning Research - Proceedings Track, vol. 10, pp. 76–85,
2010.
Irani, “Multi-interval discretization of
[24] U. M. Fayyad and K. B.
continuous-valued attributes for classification learning.” in IJCAI, 1993,
pp. 1022–1029.
|
1904.04583 | 1 | 1904 | 2019-04-09T10:53:11 | Correlation-Based Community Detection | [
"cs.SI",
"physics.soc-ph"
] | Mining community structures from the complex network is an important problem across a variety of fields. Many existing community detection methods detect communities through optimizing a community evaluation function. However, most of these functions even have high values on random graphs and may fail to detect small communities in the large-scale network (the so-called resolution limit problem). In this paper, we introduce two novel node-centric community evaluation functions by connecting correlation analysis with community detection. We will further show that the correlation analysis can provide a novel theoretical framework which unifies some existing evaluation functions in the context of a correlation-based optimization problem. In this framework, we can mitigate the resolution limit problem and eliminate the influence of random fluctuations by selecting the right correlation function. Furthermore, we introduce three key properties used in mining association rule into the context of community detection to help us choose the appropriate correlation function. Based on our introduced correlation functions, we propose a community detection algorithm called CBCD. Our proposed algorithm outperforms existing state-of-the-art algorithms on both synthetic benchmark networks and real-world networks. | cs.SI | cs |
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
1
Correlation-Based Community Detection
Zheng Chen, Zengyou He, Hao Liang, Can Zhao and Yan Liu
Abstract -- Mining community structures from the complex network is an important problem across a variety of fields. Many existing
community detection methods detect communities through optimizing a community evaluation function. However, most of these
functions even have high values on random graphs and may fail to detect small communities in the large-scale network (the so-called
resolution limit problem). In this paper, we introduce two novel node-centric community evaluation functions by connecting correlation
analysis with community detection. We will further show that the correlation analysis can provide a novel theoretical framework which
unifies some existing evaluation functions in the context of a correlation-based optimization problem. In this framework, we can mitigate
the resolution limit problem and eliminate the influence of random fluctuations by selecting the right correlation function. Furthermore,
we introduce three key properties used in mining association rule into the context of community detection to help us choose the
appropriate correlation function. Based on our introduced correlation functions, we propose a community detection algorithm called
CBCD. Our proposed algorithm outperforms existing state-of-the-art algorithms on both synthetic benchmark networks and real-world
networks.
Index Terms -- Complex networks, community detection, correlation analysis, random graph, node-centric function.
!
1 INTRODUCTION
C OMMUNITY detection plays a key role in network
science, bioinformatics [1], sociological analysis [2] and
data mining. It not only helps us identify the network
modules, but also offers insight into how the entire network
is organized by local structures. The detected communities
could be interpreted as the basic modules of various kind of
networks, e.g. social circles in social networks [3], protein
complexes in protein interaction network [4], or groups
of organisms in food web network [5]. More generally, a
widely accepted consensus on community [6] is that the
community should be a set of vertices that has more edges
within the community than edges linking vertices of the
community with the rest of the graph.
Although community detection has been extensively
investigated during the past decades, there is still no com-
mon agreement on a formal definition regarding what a
community exactly is. Many existing community detection
algorithms are based on the previously mentioned crite-
rion (more internal connections than external connections),
with proposed quality metrics that quantify how commu-
nity nodes connect internal nodes densely and external
nodes sparsely. For example, popular metrics such as be-
tweenness [5], modularity [7], conductance [8], ratio cut [9],
density [10] and normalized cut [11] are all based on this
intuitive idea. And existing related algorithms first utilize
these metrics to derive globally-defined objective functions,
then maximize (or minimize) the objective function by par-
titioning the whole graph [12] [13] [14] [15] [16] [17] [18] [19]
[20] [21] [22].
The traditional view on community evaluation relies
on counting edges in different ways. Simply doing that
University of Technology, Dalian, China.
• Z. Chen, H. Liang and Y. Liu are with School of Software, Dalian
• Z. He is with School of Software, Dalian University of Technology,
Dalian,China, and Key Laboratory for Ubiquitous Network and Service
Software of Liaoning Province, Dalian, China.
E-mail: [email protected]
• C. Zhao is with Institute of Information Engineering, CAS.
is not a sensible way, and it is not sufficient to convince
people that identified community structure is pronounced.
In [23], Fortunato and Hric pointed out an amazing fact
that an Erdos-Renyi (E-R) random graph [24] can generate
the modular structures. To exemplify this phenomenon, a
400×400 matrix of E-R random graph is illustrated in Fig. 1.
As shown in Fig. 1(a), the matrix is evidently disordered and
random such that no one believes there exist community
structures. However, as long as rearranging the entries of
the matrix by reorganizing the index of the vertices, the
modular structures emerge at the diagonal of the matrix.
Such structures should not be real and are generated due
to the random fluctuations in the network construction pro-
cess [23]. This weird phenomenon causes that many cluster-
ing algorithms whose metrics do not consider the influence
of random fluctuations identify communities even in the
random networks as well. From the above illustrations, it
makes sense that community metrics should be considered
how significant their result is.
Probably the most popular community quality metric
is the modularity introduced by Newman and Girvan [7].
This metric is based on a prior work about a measure of
assortative mixing which is proposed in [25]. It evaluates the
quality of a partition of the network. The global expression
of the modularity function is:
(cid:88)
ij
Q =
1
2m
(Wij − Eij)δ(Ci, Cj),
(1)
where m is the number of edges, Wij is the element of the
adjacency matrix W , δ(x, y) is the kronecker delta function
whose value is 1 if x = y and 0 otherwise, Ci and Cj
represent the community index of i and j respectively, Eij
is the expected number of edges that connect vertex i and
vertex j under the random graph null model. The null model
specifies how to generate a random graph that preserves
some characteristics of the original graph. The most com-
monly used null model is the configuration model [26] [27],
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
2
solution to the problem [29]. In addition, it is also known
that the modularity can be a high value even in the E-R
random graph [30]. This seems counterintuitive, but it is the
fact since the modularity is a kind of measurement which
measures the distance between real network structure and
the "average" of random network structures. As a result,
there is no sufficient information to confirm the distribution
of the modularity.
In addition, the community is a local structure of the
network. We should examine the community from the local
view. The strength of connectedness between one node and
a community embeds the local feature of that community.
Using these local features to construct a global evaluation
function for a community helps us avoid from missing
the local structural information. However, how to assess
the strength of connectedness between one node and the
community is a challenging task since there is no convinced
definition on what the strength of connectedness is.
Our Contributions.
In this paper, we propose a
correlation-based community detection framework,
in
which the local connectedness strength between each node
and a community is assessed through correlation analysis.
More precisely, we represent the basic structural information
of a node as the corresponding row vector embedded in
the adjacency matrix and encode the structural information
of a community into a binary vector. To demonstrate the
feasibility and advantages of this framework, we intro-
duce two concrete node-centric community metrics based
on the correlation between a node and a community, PS-
metric (node version of modularity) and φ-Coefficient met-
ric. Moreover, we provide the detailed theoretical analysis
for our metrics, which show that these metrics are capable of
mitigating the resolution limit problem and alleviating the
fake community issue in E-R random graph. Besides, we
present a correlation-based community detection (CBCD)
method which adopts two introduced metrics to identify the
community structure. Experimental results on both real net-
works and the LFR networks show that CBCD outperforms
state-of-the-art methods. The summary of contributions of
this paper is listed as follows:
• To the best of our knowledge, we are the first to intro-
duce correlation analysis into the node-centric metrics,
which calculate the correlation value between a node
and a community. Besides, we slightly modify three key
properties for mining association rule [31] in the context
of community detection, which can guide us select the
right correlation function for community detection.
• We further investigate the relationship between the
correlation analysis and community detection. It has
been found that correlation analysis can be viewed as a
theoretical interpretation framework for community de-
tection, which unifies some exiting metrics and provide
the potential of the deriving new and better community
evaluation measures.
• The introduced PS-metric (node version of modularity)
is less affected by the random fluctuations. We not only
give the detailed theoretical proof, but also show the
empirical results to validate the effectiveness of this
metric under the E-R model. Moreover, we prove that
the φ-Coefficient metric can mitigate the resolution limit
problem and give an intuitive interpretation.
(a)
(b)
Fig. 1. Two matrices of the same random graph that is generated
according to the E-R model. Fig. 1(a) shows the original matrix. Fig.
1(b) is a matrix obtained by reshuffling the order of vertices.
where the degrees of all vertexes are preserved in the ran-
dom graph. Under the configuration model, one can derive
that Eij = didj/2m (di and dj are the degree of i and j,
respectively). Now we can reformulate the modularity as:
Q =
,
(2)
(cid:88)
(cid:104) lj
m
j
(cid:17)2(cid:105)
−(cid:16) Kj
2m
where Kj represents the sum of degrees of all vertexes
in community j and lj is the number of internal edges
within community j. At the same time, we could use
lj/m − (Kj/2m)2 as a metric for evaluating the quality
of community j. The intuition behind this formula is that
simply counting edges are not sufficient to determine a
true community structure so that the number of expected
edges in the null model should be incorporated as well.
Unfortunately, the modularity maximum does not equal to
the most pronounced community structure. This is the well-
known resolution limit problem which modularity suffers
from, i.e., the modularity function may fail to detect mod-
ules which are smaller than a scale in large networks. Many
techniques have been used to mitigate the resolution limit
problem [28], such as the multi-resolution method. Note
that the multi-resolution method does not provide a reliable
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
• Experimental results demonstrate that our method out-
performs state-of-the-art methods on real networks and
LFR networks.
The organization of this paper is structured as follows:
Section 2 discusses the related work. Section 3 introduces
several basic definitions of correlation analysis and proves
some properties of proposed metrics. Section 3 describes
our corresponding community detection method. Section 4
presents the experimental results of CBCD along with the
other methods. Section 5 concludes this paper.
2 RELATED WORK
2.1 Correlation-Based Method
There are already some algorithms in the literature that
utilize the different types of correlation information hid-
den behind the network structure to solve the community
detection problem. Once the correlation definition is spec-
ified, community detection can be cast as an optimization
problem by maximizing a correlation-based objective func-
tion. The existing community detection algorithms based
on correlation can be categorized according to the different
correlation definitions.
2.1.1 Node-Node Similarity
The pairwise similarity between two nodes can be viewed
as a kind of correlation. The goal of community detection
based on node-node similarity is to put the nodes which are
close to each other into the same group. In [32], a random-
walk based node similarity was proposed, which can be
used in an agglomerative algorithm to efficiently detect the
communities in the network. The method in [33] is based on
the node similarity proposed in [34] to find communities in
an iterative manner.
2.1.2 Node-Node Correlation
A covariance matrix of the network is derived from the
incidence matrix in [35], which can be viewed as the un-
biased version of the well-known modularity matrix. A
correlation matrix is obtained through introducing the re-
scaling transformation into the covariance matrix, which
significantly outperforms the covariance matrix on the iden-
tification of communities. The algorithm in [36] constructs a
node-node correlation matrix based on the Laplacian matrix
so as to incorporate the feature of NMF (non-negative matrix
factorization) method. In [37], MacMahon et al. introduce
the appropriate correlation-based counterparts of the most
popular community detection techniques via a consistent
redefinition of null models based on random matrix theory.
A correlation clustering [38] based community detection
framework is proposed in [39], which unifies the modular-
ity, normalized cut, sparsest cut, correlation clustering and
cluster deletion by introducing a single resolution parameter
λ.
2.1.3 Edge-Community Correlation
In [40] [41], Duan et al. connect the modularity with correla-
tion analysis by reformulating modularity's objective func-
tion as a correlation function based on the probability that
an edge falls into the community under the configuration
model. Hence, it can be viewed as a method based on edge-
community correlation information.
3
2.2 Node-Centric Method
Almost all classical community detection metrics implicitly
assume that all nodes in a community are equally important.
These metrics, viewing the community as a whole, only
focus on the total number of edges within the community,
the sum of degree of all nodes or the size of the com-
munity. The connection strength between each vertex and
the community is not involved in these metrics. This may
result in missing important structural information so that
two distinct communities cannot be distinguished in certain
circumstances. Node-centric methods take into account how
each vertex connects the community densely. This is consis-
tent with the fact that the community is a local structure of
the network.
Chakraborty et al. [42] [43] [44] propose a new node-
centric metric called permanence, which describes the mem-
bership strength of a node to a community. The central
idea behind permanence is to consider the following two
factors: (1) the distribution of the external edges rather
than the number of all external connections (2) the strength
of the internal-connectivity instead of the number of all
internal edges. The corresponding algorithm is to maximize
the permanence-based objective function. WCC is another
node-centric metric proposed in [45] [46], which considers
the triangle as the basic structure instead of the edge or
node. WCC of a node consists of two parts: isolation and
intra-connectivity. The proposed algorithm aims at the op-
timization of a WCC-based objective function. Focs [47] is
a heuristic method that accounts for local connectedness.
The local connectedness of a node to a community depends
upon two scores of the node with respect to the community:
community connectedness and neighborhood connected-
ness. Focs mainly consists of two phases: leave phase and
expand phase, which is respectively based on community
connectedness and neighborhood connectedness.
2.3 Summary
Our method is different from all above existing methods.
Although the proposed metrics in our method are node-
centric as well, they are derived from the perspective of
correlation analysis. Different from the existing correlation-
based methods, our method utilizes the correlation between
the node and the community based on a 2 × 2 contingency
table. Thus, our method can be viwed as a node-community
correlation based method. Besides, we will choose appro-
priate correlation functions to mitigate the resolution limit
problem under the guidance of [48] [49]. The further analy-
sis will be given in section 3.
3 CORRELATION ANALYSIS IN NETWORK
In this section, we first formalize the community detec-
tion problem, then, introduce two correlation measures and
extend it for community structure evaluation. Two new
correlation metrics for community detection will be pro-
posed in this section. Next we will describe modularity from
correlation analysis perspective and discuss its relation with
our metrics. At last, we will discuss the desirable properties
for new correlation metric.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
3.1 Preliminaries
Undirected Graph. Let G = (V, E, W ) be an undirected
graph with n nodes and m edges, where V is the node set,
E is the edge set, W is the adjacency matrix. If an edge
(u, v) ∈ E, then Wuv = 1 and Wuv = 0 otherwise. In the
case of undirected graph, Wuv = Wvu, it means that the
adjacency matrix W is a symmetric matrix.
Community Detection. Given a graph G = (V, E, W ),
the goal of community detection is to partition the graph
with V = n vertices into l pairwise disjoint groups
P = {S1, ..., Sl}, where S1
for any i, j.
(cid:83) ..(cid:83) Sl = V and Si
(cid:84) Sj = ∅
To begin with, we define f (u, S) as a measurement func-
tion which takes a vertex u and a community S containing
u as the input, and return a real value which indicates the
connectivity of vertex u regarding the community S. The
function f (u, S) should satisfy certain basic requirements
so that it can be used to evaluate the structure of commu-
nity S. First, f (u, S) must be bounded to guarantee the
convergence of community search algorithms. Second, the
more strongly a vertex connects to a community, the higher
f (u, S) becomes. The detailed properties that a measure-
ment function needs to possess for satisfying the second
requirement will be further discussed in section 3.2. Now,
we can define the vertex-centric metric of a community S as
the sum of the function f (u, S) of all members u that belong
to the community S:
F (S) =
f (u, S).
(3)
(cid:88)
u∈S
l(cid:88)
Analogously to what we have done before, we define the
objective function of a partition P through taking the sum of
the vertex-centric metric value of each community Si ∈ P :
Γ(P ) =
F (Sj).
(4)
j=1
Given a graph G = (V, E, W ), community detection can
be cast as an optimization problem with (4) as the objective
function. The partition P is optimal when Γ(P ) achieves
a maximum value, and we call this partition the optimal
partition.
Now the key point lies in how to formulate a feasible
f (u, S). A natural idea is to use the correlation function
between u and S as f (u, S). The correlation function mea-
sures the correlation relationship between u and S, in which
a higher correlation value indicates that there is a strong
affinity between u and S. However, we need to choose an
appropriate correlation model to represent the connectivity
cohesion of vertex u regarding community S. Moreover,
the information about the topology structure of a node and
a community should also be considered in this model. In
this paper, we convert the set of nodes which belong to
a community into a binary vector to embody the basic
structural information of the community. The positions of
nodes in the graph are determined by their neighbourhoods,
that is, if two nodes connect to the same set of neighbors,
then the whole graph will retain the same structure after
exchanging the positions of these two nodes. Therefore, the
local structure of a node can be depicted by its row vector
4
embedded in the adjacency matrix. In summary, we have
the following definitions.
Community vector and Neighbor vector. The com-
munity vector of u with respect
to S, ΨS\{u} =
(e1, ...eu−1, eu+1, ...en), is a binary vector of length n − 1,
where ev = 1 if vertex v belongs to community S and ev = 0
otherwise. ΨS\{u}[v] denotes the value of vector element ev.
ψu = (g1, ...gu−1, gu+1, ...gn) is called the neighbor vector
of vertex u, where gv = 1 if there exists an edge between
u and v, and gv = 0 otherwise. ψu[v] denotes the value of
vector element gv. Note that vertex u is excluded from the
vector, we will give an explanation from the probabilistic
perspective in the following part.
The above two binary vectors can be viewed as the
samples of two binary variables C(x, u) and G(x, S\{u}),
where C(x, u) = ψu[x] and G(x, S\{u}) = ΨS\{u}[x]. A
2 × 2 contingency table for these two variables is given in
Table 2. The entry f11 is denoted by ω, that represents the
count of inner connections of vertex u regarding community
S. The entry f11 + f10 is denoted by , = S − 1 and S
is the size of community S. The entry f11 + f01 is denoted
A 2 × 2 contingency table for vertex u and community S .
TABLE 1
C(x, u) = 0 (cid:80)
G(x, S\{u}) = 1
G(x, S\{u}) = 0
(cid:80)
i fij
C(x, u) = 1
ω
f01
du
j fij
f01 + f00
f10
f00
f10 + f00
N
by du, where du is the degree of vertex u. The uppercase
Roman letter N is the length of the binary vector, where
N = n − 1.
Now we can give several probability definitions that
will be used in the correlation measure. Firstly, to simplify
the notations, C is used to denote C(x, u) = 1, and G is
used to denote G(x, S\{u}) = 1. Then, P (CG) = ω
N is the
probability that a randomly chosen vertex from the vertex
set V \{u} connects to vertex u and belongs to community
S simultaneously. P (C) = du
N is the probability that a
randomly selected vertex from V \{u} has a connection with
u. P (G) =
N is the probability that a randomly chosen
vertex from V \{u} belongs to community S. Under the
assumption of independence, the probability of CG can be
calculated by P (CG) = P (C)P (G) = du/N 2.
The above definitions and notations are exemplified in
Fig. 2, where there is a community S of size 5. Here we let
u = 5, C denotes C(x, 5) = 1 and G denotes G(x, S\{5}) =
1. We will calculate P (G), P (C) and P (CG). To begin with,
we should know how to get two vectors ΨS\{5} and ψ5.
In Fig. 2, since node 5 connects almost all the nodes except
node 3, ψ5 has only one zero entry g3. Since node 6 and node
7 are not included in community S , their corresponding
entries e6 and e7 are both zeros. After getting these two
binary vectors, ω, d5, N and can be calculated accordingly,
that is, ω = 3, d5 = 5, N = 6, = 4. Then, we have:
P (G) =
, P (C) =
4
6
5
6
, P (CG) =
3
6
.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
5
ΨS\{5} = (e1, e2, e3, e4, e6, e7)
= (1, 1, 1, 1, 0, 0)
ψ5 = (g1, g2, g3, g4, g6, g7)
= (1, 1, 0, 1, 1, 1)
Fig. 2. One example graph with 7 nodes and 10 edges, and S is a community of size 5. The community vector ΨS\{5} and neighbor vector ψ5 are
given in the right part of the figure.
3.2 Correlation Measure
Many functions have been proposed to measure the cor-
relation between two binary vectors in statistics, data
mining and machine learning. There are some guide-
lines [48] [50] [49] provided for users to select the right mea-
sure according to their needs. The most measures consist of
P (G), P (C) and P (CG). Here we will list several properties
to instruct us in choosing the appropriate measure for
community detection. Let M be a measure for correlation
analysis between two variables C and G. In [31], Piatetsky-
Shaprio came up with three key properties about a good
correlation measure for association analysis:
P1: M = 0 if C and G are statistically independent;
P2: M monotonically increases with P (CG) when P (C) and
P (G) are both fixed;
P3: M monotonically decreases with P (C) (or P (G)) when
P (CG) and P (G) (or P (CG) and P (C)) are fixed.
Note that these three properties are used in association
analysis, we need further investigation in the context of
community detection. P1 indicates that M should be able to
measure the deviation from statistical independence. Then,
the higher M is, the stronger dependence between C and G
is. Node u can be regarded as the member of community S
when M > 0. In this paper, we use the E-R model as the
underlying random graph model to describe the statistical
independence. Given the graph G with n nodes and m
edges, one random graph under the E-R model is generated
by forming an edge between any two nodes randomly and
independently with the probability p = 2m/(n(n − 1)).
By redefining P1, M should be a measure such that the
expected value of M equals to zero for any node u and
community S under the E-R model.
According to the definitions introduced in section 3.1,
P (CG), P (C) and P (G) are respectively decided by ω, du
and since N is fixed. As a result, the monotonicity of
P (CG), P (C) and P (G) is respectively determined by ω,
du and as well. P2 and P3 describe two features of the
cohesion of u with respect to community S: intra-connection
and isolation. The intra-connection of node u with respect to
community S indicates how node u connects community S
densely, and it can be quantified by ω/. This is exemplified
Fig. 3. Node 7 has stronger intra-connection than node 6.
in Fig. 3, where node 7 connects four nodes of subgraph S
and node 6 connects two nodes of subgraph S. Despite node
6 connects subgraph S with all its edges, node 7 has more
links than node 6 within subgraph S. Apparently, node 7 is
more qualified for the member of community S. Note that
the increase of ω will lead to the increase of ω/ when
and du are both fixed. According to P2, M should increase
with the increment of ω/, which means that strength of the
intra-connection between u and S is becoming higher. In a
similar way for P3, M should monotonically decrease with
the increment of when ω and du are both fixed since ω/
will decrease. On the other hand, it will lead to the biased
result if we exclusively maximize the intra-connection. In
Fig. 4, node u have connections with all the left three nodes,
but we cannot confidently infer that node u and the left
three nodes should be put together to form a community.
This is because the number of links from u connecting the
rest of the graph is twice its number of links with the left
three nodes. A node belonging to a community should have
strong isolation from the rest of the graph. The isolation can
be quantified by ω/du, where the higher ω/du indicates that
node u connects external nodes sparsely. It is easy to see that
4567123S861357S 24JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
6
the probability du
N and belongs to community S with the
probability
N . In the case of random graph, the expected
probability that the chosen node simultaneously connects
vertex u and belongs to community S is
N · du
N .
The modularity function has a few variants, but they are
all identical in nature. Without loss of generality, we will
adopt the definition given in Equation (2) as our modularity
function. Given a community S, the partial modularity of S
is reformulated as:
(cid:17)2
−(cid:16) KS
2m
QS =
lS
m
(cid:80)
(cid:80)
=
−
lS
m
j∈S dj
2m
·
i∈S di
2m
,
i∈S di
j∈S dj
(cid:80)
(cid:80)
2m ·
where m is the number of the edges in graph G and lS is the
number of the edges inside community S. If we randomly
choose an edge from the edge set E, the probability of the
chosen edge inside community S is lS/m. Likewise, the
probability that one randomly chosen edge has at least one
j∈S dj
end inside community S is
2m . Then, the expected
(cid:80)
probability of the chosen edge inside community S is
2m when G is a random graph. Let H denotes
a binary random variable where H = 1 if the randomly
chosen edge has at least one end inside community S
and H = 0 otherwise. Then, the partial modularity QS
can be rewritten as: P (HH) − P (H)P (H). We can find
that the partial modularity owns the same idea with our
measurement function in (5), i.e., they are both the concrete
examples of Piatetsky-Shaprio Rule-Interest. However, the
derivation of the partial modularity and our function starts
from two different perspectives respectively. The partial
modularity is edge-centric, which utilizes the relationship
between edge and community. Our formulation in (5) is
node-centric, which utilizes the relationship between node
and community. For the sake of simplicity, we will use PS
to denote our measurement function in (5) and we can also
call it "node modularity".
Despite the PS function can be used for evaluating the
strength of the correlation between a node and a community,
it is still not clear if it satisfies aforementioned three proper-
ties. A thorough analysis is essential to confirm the utility
of PS in the context of community detection. P2 and P3
are necessary properties that a good community correlation
measure should have. Essentially, these two properties can
be interpreted as "a higher value of P S(u, S) indicates a
strong correlation between u and S". P1 is concerned how
far the correlation between u and S is away from what it
is in the random graph. For the PS measure, we have the
following two theorems, where Theorem 1 proves that P2
and P3 hold and Theorem 2 proves that P1 is correct.
Theorem 1. For fixed N > 0, we have 0 < < N, 0 < du < N
and 0 < ω ≤ min(, du). Let P S(u, S) be the correlation value
between u and S defined in (5), then 1) P S(u, S) monotonically
increases with the increment of ω when and du are fixed, 2)
P S(u, S) monotonically decreases with the increment of when
ω and du are fixed, and 3) P S(u, S) monotonically decreases with
the increment of du when and ω are fixed.
Proof. Let P S(u, S) = J(ω, , du). We will directly calculate
Fig. 4. Node u does not have strong isolation from the rest of graph
which is circled by dash line.
P (GC)
P (C)
P (GC)
P (G)
ω
d
ω
=
,
the increment of ω will lead to the increment of ω/du when
and du are both fixed. In regard to P2, M should increase
with the increment of ω/du, which means that the isolation
of u from the rest of the graph is becoming stronger. In a
similar way for P3, M should monotonically decrease with
the increment of du when ω and are both fixed since ω/
will decrease.
To further analyze the relationship between correlation
measure and community detection, let us consider the con-
fidence measure of C and G. We have:
confidence(C ⇒ G) = P (GC) =
=
,
confidence(G ⇒ C) = P (CG) =
where confidence(C ⇒ G) and confidence(G ⇒ C) are defined
as the neighborhood connectedness score (nb-score) of a
node and the community connectedness score (com-score)
of a node in the Focs algorithm [47], respectively. These two
node-based measures are the theoretical basis of the Focs
algorithm. This fact tells us that correlation analysis can be
appropriately applied in community detection.
3.2.1 Piatetsky-Shapiro's Rule-Interest
Piatetsky-Shapiro's rule-interest [31] measures the differ-
ence between the true probability and the expected prob-
ability under the assumption of independence between C
and G. Piatetsky-Shapiro's rule-interest is appropriate for
the task of community detection, and we will show that
modularity can be explained under our framework when
the correlation measure is Piatetsky-Shapiro's rule-interest
later on. Our measurement function based on Piatetsky-
Shapiro's rule-interest is calculated as:
P S(u, S) = P (CG) − P (C)P (G) =
ω
N
− du
N 2 .
(5)
Recalling the aforementioned variables in Table 2, the de-
gree of vertex u is du, the size of set S\{u} is and the
number of links between vertex u and community S is ω.
If we randomly select a node from the node set V \{u}, the
probability that the selected node simultaneously connects
vertex u and belongs to community S is ω
N . Similarly, a
randomly selected node from V \{u} connects vertex u with
uJOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
the partial derivatives of P S(u, S) regarding to , ω and du.
∂J(ω, , du)
∂ω
∂J(ω, , du)
∂du
=
=
> 0,
1
N
−
N 2 < 0.
∂J(ω, , du)
∂
−du
N 2 < 0,
=
Overall, the monotonicity of P S(u, S) is consistent with the
monotonicity of ω, and du respectively.
Theorem 2. Given the E-R model G(n, m) with the probability
p = 2m/(n(n − 1)) and let P S(u, S) be the correlation value
between u and S, then E[P S(u, S)] = 0 holds for any subgraph
S ∈ GS and node u ∈ S, where GS is the set of all the subgraphs
of G.
Proof. Let Xv be a random variable such that:
(cid:40)
(cid:80)n
i=1 Xi and ω =(cid:80)
Clearly, E[Xv] = 1 · P(Xv = 1) + 0 · P(Xv = 0) = p, du =
v∈S Xv. By the linearity of expectations,
1 if v has a link with u,
0 otherwise.
Xv =
7
Let Y = P S(u, S), the second moment of Y can be obtained
by the linearity of expectations:
(cid:16) ω
(cid:17)2
E[Y 2] = E[
− du
N 2
N
E[ω2] − 2
N 3
] = E[
ω2
N 2 − 2duω
N 3 +
E[du
2].
2
N 4
E[duω] +
2d2
u
N 4 ]
=
1
N 2
Calculating E[ω2], E[duω] and E[du
have
2] independently, we
E[ω2] = E[
=
i∈S
E[duω] = E[
i∈S
j∈S
(cid:16)(cid:88)
(cid:88)
(cid:88)
(cid:16) n(cid:88)
n(cid:88)
(cid:88)
(cid:16) n(cid:88)
j∈S
i=1
i=1
Xj
(cid:17)
] = E[
(cid:17)(cid:16)(cid:88)
(cid:88)
(cid:88)
Xi
j∈S
E[XiXj] = ( − 1)p2 + p,
(cid:88)
n(cid:88)
(cid:17)(cid:16)(cid:88)
(cid:17)
j∈S
i∈S
Xj
] = E[
Xi
i=1
j∈S
XiXj]
XiXj]
j∈S
(cid:17)(cid:16) n(cid:88)
(cid:17)
n(cid:88)
n(cid:88)
=
E[XiXj] = N p2 + p = λp + p,
du
N 2 ]
E[du
2] = E[
Xi
Xj
] =
E[XiXj]
i=1
j=1
i=1
j=1
= N (N − 1)p2 + N p = λ(λ − p + 1).
du =
Xi, ω =
Xv.
lim
N→+∞,p→0
E[P S(u, S)] = E[
=
=
=
1
N
1
N
p
N
ω
N
E[
− du
(cid:88)
N 2 ] = E[
Xv] −
(cid:88)
N 2
v∈S
E[Xv] −
N 2
v∈S
−
N 2 · N p = 0.
] − E[
ω
N
E[
n(cid:88)
n(cid:88)
i=1
i=1
Xi]
E[Xi]
Theorem 2 shows that PS can be regarded as the distance
between the correlation value of u and S in a real network
and the average correlation value of u and S over all the
random networks. However, this theoretic result ignores the
variance of PS variable over all the random networks. If the
distribution of PS values is not strongly peaked, it is very
likely that most PS values will far exceed zero even in the
random networks. Thus, we should investigate the variance
of PS values as well. Then, we have the following Lemma.
Lemma 1. Given the E-R model G(n, m) with the probability
p = 2m/(n(n − 1)). Let λ = N p, which is the expected degree
under the E-R model. P S(u, S) is correlation value between u
and S. Let GS be the set of all the subgraphs of G. Then, ∀κ > 0,
∀S ∈ GS and ∀u ∈ S, we have the upper bound on the probability
that PS(u, S) is no less than
(cid:17)
P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ √
(cid:105)
(cid:16) p22 − p2 + p
λ2(λ − p + 1)
√
κ:
κ
N 2
+
N 4
− 2p2(λ + 1)
.
N 3
≤ 1
κ
Proof. Analogously to what we have done in the proof of
Theorem 2, we will use the sum of random variable Xi to
denote ω and du:
n(cid:88)
i=1
(cid:88)
v∈S
To obtain the variance of Y , we first apply Theorem 2:
V ar[Y ] = E[Y 2] − (E[Y ])2 = E[Y 2]
( − 1)p2 + p
=
N 2
− 2p2(λ + 1)
N 3
+
λ2(λ − p + 1)
N 4
.
Then, by the Chebyshev inequality, we finish the proof:
P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ √
(cid:105)
(cid:16) ( − 1)p2 + p
κ
=
1
κ
N 2
= P(cid:104)(cid:12)(cid:12)Y − E[Y ](cid:12)(cid:12) ≥ √
− 2p2(λ + 1)
N 3
+
(cid:105) ≤ V ar[Y ]
(cid:17)
λ2(λ − p + 1)
κ
κ
.
N 4
Most
appear
networks
large-scale
real
be
sparse [51] [52] [53],
in which the number of edges is
generally the order n rather than n2 [52]. In addition, sparse
graphs are particularly sensitive to random fluctuations [23].
Therefore, we should concentrate more on the performance
of PS on the sparse graph. With respect to the sparsity
under the E-R model, we have the following Theorem.
to
Theorem 3. Given the ER model G(n, m) with the probability
p = 2m/(n(n− 1)) and λ = N p is the expected degree under E-
R model. Assuming λ always remains finite in the limit of infinite
size [23]. P S(u, S) is the correlation value between u and S.
Then, ∀κ > 0, any subgraph S and ∀u ∈ S, we have:
P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ κ
(cid:105)
= 0.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
Proof. We first apply Lemma 1:
P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ κ
(cid:105)
(cid:16) ( − 1)p2 + p
(cid:16) ( − 1)p2 + p
(cid:16) (N p)2 + pN
(cid:16) 2(λ)2 + 2λ − λp
≤ 1
κ2
≤ 1
κ2
≤ 1
κ2
1
κ2
N 2
N 2
N 2
N 2
=
+
λ2(λ − p + 1)
N 4
N 3
+
λ2(λ − p + 1)
− 2p2(λ + 1)
(cid:17)
+
N 4
λ(λ − p + 1)
(cid:17)
(cid:17)
.
N 2
Then, we take the limit:
P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ κ
(cid:105)
(cid:16) 2(λ)2 + 2λ − λp
N 2
lim
N→+∞,p→0
≤
lim
N→+∞,p→0
1
κ2
(cid:17)
= 0.
8
(cid:17)
node u will have all its links connecting all the members
of community S and have no other links with the rest of
graph. The above discussions are subjective and intuitive.
To further analyze φ(u, S), we have some similar theoretic
results as PS owns.
Theorem 4. For fixed N > 0, we have 0 < < N, 0 < du < N
and 0 < ω ≤ min(, du). Let φ(u, S) be φ-Coefficient value
between u and S defined in (8), then 1) φ(u, S) monotonically
increases with the increment of ω when and du are fixed, 2)
φ(u, S) monotonically decreases with the increment of when ω
and du are fixed, and 3) φ(u, S) monotonically decreases with the
increase of du when and ω are fixed.
=
N
∂
∂ω
> 0
∂J(ω, , du)
∂J(ω, , du)
∂J(ω, , du)
Proof. Let φ(u, S) = J(ω, , du). We will directly calculate
the partial derivatives of φ(u, S) regarding to , ω and du.
(cid:112)(N − )du(N − du)
=(cid:0)du(N − du)(cid:1)− 1
=(cid:0)(N − )(cid:1)− 1
2 · −N(cid:2)(du − 2ω) + ωN(cid:3)
2(cid:0)(N − )(cid:1) 3
2 · −N(cid:2)du( − 2ω) + ωN(cid:3)
2(cid:0)du(N − du)(cid:1) 3
We only need to focus on the term −N(cid:2)du( − 2ω) + ωN(cid:3).
This term is obviously negative when ≥ 2ω. Now assum-
ing < 2ω. Since ω ≤ , we have 2ω − ≤ ω. Then,
−N(cid:2)du( − 2ω) + ωN(cid:3) = −N(cid:2)ωN − du(2ω − )(cid:3)
≤ −N(cid:0)ωN − duω(cid:1)
< −N(cid:0)ωN − N ω(cid:1) = 0.
∂du
.
2
2
< 0 holds. In a similar way, ∂J(ω,,du)
Thus, ∂J(ω,,du)
< 0
holds as well. Overall, the monotonicity of φ(u, S) is consis-
tent with the monotonicity of ω, and du respectively.
∂du
∂
Theorem 5. Given the E-R model G(n, m) with the probability
p = 2m/(n(n − 1)) and let φ(u, S) be φ-Coefficient value
between u and S. For fixed 0 < < N, E[φ(u, S)] = 0 holds for
any subgraph S ∈ GS and node u ∈ S, where GS is the set of all
the subgraphs of G.
Proof. Firstly, we introduce a random variable:
1(cid:112)du(N − du)
.
Y =
(cid:40)
At the same time, let Xv be a random variable such that:
(8)
Xv =
1 if v has a link with u,
0 otherwise.
Theorem 3 shows that it is difficult to obtain a high PS
value in the large sparse random network. This theoretic
result indicates that the distribution of PS values is strongly
peaked, that is, most PS values are near by zero. In fact,
even in the small random network, the upper bound intro-
duced in Lemma 1 is often a small value. For example, let
κ = 0.0001, N = 280, = 20 and λ = 8, then we have
P r(cid:2)P S(u, S) ≥ 0.01(cid:3) ≤ 6.54%. Overall, the high PS value
between u and S in the real sparse network is an indicator
that there is a significant correlation between u and S. This
provides us a theoretical basis for our community detection
algorithm.
To formulate a vertex-centric metric of a community, we
have:
F (S) =
P S(u, S) =
2lS
N
− KS
N 2 ,
(6)
(cid:88)
u∈S
where lS is the number of the edges inside community S
and KS represents the sum of degrees of all vertexes in
community S. Then, the objective function for a community
partition is:
M(cid:88)
M(cid:88)
(cid:16) 2lSj
Γ(P ) =
F (Sj) =
j=1
j=1
− KSj
N 2
N
(7)
(cid:17)
.
3.2.2 φ-Coefficient
φ-Coefficient [54] is a variant of Pearson's Product-moment
Correlation Coefficient for binary variables. In association
mining, it is often used to estimate whether there is a non-
random pattern. Our measurement function based on φ-
Coefficient is calculated as:
φ(u, S) =
=
P (CG) − P (C)P (G)
(cid:112)P (C)(1 − P (C))P (G)(1 − P (G))
(cid:112)(N − )du(N − du)
ωN − du
.
A positive φ(u, S) value indicates that node u has denser
intra-connection with community S and stronger isolation
from the rest of graph. Moreover, φ(u, S) has the same
range of values as Pearson's Product-moment Correlation
Coefficient, i.e. −1 ≤ φ(u, S) ≤ 1. When φ(u, S) = 1,
Integrating these two random variables, we have:
E[XvY ] = E[Y Xv = 1] · P(Xv = 1) + 0 · P(Xv = 0)
= E[Hv]p,
1(cid:112)du(N − du)
(cid:105)
Xv = 1
= p · E(cid:104)
E[φ(u, S)] = E[
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
(cid:80)n
i=1 Xi and ω = (cid:80)
where E[Hv] = E[Y Xv = 1]. Besides, we have du =
2 . By
the linearity of expectations,
v∈S Xv. Let K = (cid:0)(N − )(cid:1)− 1
(cid:112)(N − )du(N − du)
n(cid:88)
ωN − du
(cid:88)
]
= K · E[(ωN − du)Y ]
= K · E[(N
Xv −
= K ·(cid:16)
(cid:88)
= K · E[HV ] ·(cid:16)
v∈S
N · E[Y
Xi)Y ]
i=1
Xv] − · E[Y
(cid:17)
v∈S
N p − N p
= 0.
(cid:17)
Xi]
n(cid:88)
i=1
Theorem 4 and Theorem 5 indicate that φ(u, S) is a
good community measurement function since it owns the
necessary properties P1,P2 and P3. This is the theoretic basis
for φ(u, S) to be employed in community detection. Now
we can take the sum of φ(u, S) over all u ∈ S to formulate
a vertex-centric metric:
(cid:88)
(cid:88)
2 (cid:88)
=(cid:0)(N − )(cid:1)− 1
φ(u, S) =
u∈S
u∈S
u∈S
ωN − du
(cid:112)(N − )du(N − du)
(cid:112)du(N − du)
ωN − du
.
Φ(S) =
Despite different definitions on what a community
should be have been proposed, some general ideas are
widely accepted by most scholars. One of them is that the
clique can be regarded as a perfect community. Thus, the
loosely connected cliques should be separated from each
other as different communities. The modularity function
may fail to detect modules which are smaller than a scale
in large networks, which is called the resolution limit prob-
lem [28] [29]. A more general example in real network has
been given in [28], which is shown in Fig. 5. There are
two cliques of the same size Cs and Ct, and there is an
edge connecting one node u from Cs and another node v
from Ct. When the network is large enough, the modularity-
9
a bigger community since this operation will help increase
the value of modularity function. Apparently, it is counter-
intuitive and disturbing. Fortunately, we can prove that such
issue does not occur in Φ(S).
Theorem 6. Given a graph G(n, m) with a subgraph which
consists of two equal-sized cliques Cs and Ct. There is only one
(cid:83)Ct and I = Cs = Ct. Two nodes c and o, where c ∈ Cs
edge connecting u and v, where u ∈ Cs and v ∈ Ct. Let P =
Cs
and o ∈ Ct, both have one edge connecting the rest of graph
respectively. Assuming 5 ≤ I < n
4 , then we have Φ(Cs) +
Φ(Ct) > Φ(P ).
Proof. From I < n
4 . Let ∆Φ =
Φ(P ) − (Φ(Cs) + Φ(Ct)) and T = 2 + 1, then ∆Φ can be
calculated as:
4 , we can know that < n
2 (cid:88)
∆Φ =(cid:0)T (N − T )(cid:1)− 1
(cid:88)
(cid:112)di(N − di)
i∈P
ωiN − di
N(cid:112)du(N − du)
i∈Cs
= 2
+ 2
(9)
Let L =
√
ωiN−di
di(N−di)
N√
du(N−du)
, we have:
∆Φ = B(
1
2
Since T = 2 + 1 ≤ n
We can obtain:
∆Φ < −B(
1
2
2 .
i∈Cs
φ(i, P ) − 2Φ(Cs)
2(cid:17)
2 −(cid:0)(N − )(cid:1)− 1
2 and B = (cid:80)
(cid:16)(cid:0)T (N − T )(cid:1)− 1
(cid:0)T (N − T )(cid:1)− 1
(cid:0)T (N − T )(cid:1)− 1
(cid:112)(N − ) −(cid:112)T (N − T )
(cid:112)T (N − T )(N − )
2 , then(cid:112)2(N − 2) < (cid:112)T (N − T ).
(cid:112)2(N − 2) −(cid:112)(N − )
(cid:112)T (N − T )(N − )
(cid:88)
(N − di)
) + L.
) + L.
(cid:112)di(N − di)
ωi======
i∈Cs
Now we need to analyze B. Firstly, B can be calculated as:
Cs
u
c
v
o
Ct
B =
=
(cid:88)
(cid:88)
i∈Cs
i∈Cs
(cid:112)di(N − di)
ωiN − di
(cid:115)
N − di
.
di
Fig. 5. A network with two equal-sized cliques Cs and Ct, in which there
is only one edge between these two cliques. In addition, there is only
one edge between each clique and the rest of graph. If network is large
enough, modularity optimization will merge these two small modules into
one community.
based algorithms prefer to merge these two cliques to form
We have di = ωi = for i (cid:54)= u and i (cid:54)= c and dc = du = +1,
then:
(cid:113)
(cid:113)
B =( − 1)
>( − 1)
(N − ) + 2
(N − ).
(cid:115)
N − ( + 1)
+ 1
Next, we will analyze L as well. Since < du < n
2 , we have:
L <
N(cid:112)(N − )
(cid:0)T (N − T )(cid:1)− 1
2 .
(cid:113)
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
Thus, we have a upper bound of 1
2 ∆Φ as:
(cid:112)2(N − 2) −(cid:112)(N − )
(cid:112)T (N − T )(N − )
)
∆Φ < − ( − 1)
(N − )(
1
2
=
+
N
(cid:112)(N − )T (N − T )
−( − 1)(cid:112)(N − )(cid:0)(cid:112)2(N − 2) −(cid:112)(N − )(cid:1) + N
−( − 1)(N − )(cid:0)(cid:113)
−( − 1)(N − )(cid:0)(cid:113) 4
(cid:112)(N − )T (N − T )
Let g() = −(− 1)(N − )(cid:0)(cid:113) 4
(cid:112)(N − )T (N − T )
N− ) − 1(cid:1) + N
(cid:112)(N − )T (N − T )
3 − 1(cid:1) + N
3 − 1(cid:1) + N. Since 4 ≤ < n
2(2 − N
2 ,
<
=
.
g() decreases as increases. Then, we have:
g() ≤ g(4) < −1.8(N − 4) + N < 0.
Thus, ∆Φ < 0. We finish the proof.
Theorem 6 reveals the fact that Φ(S) can avoid merging
two very pronounced communities. The reason is that Φ(S)
takes into account the local structural information of every
vertex. Now we will provide a comprehensible interpreta-
tion on this point. Firstly, it can be found that all the φ(u, S)
values of vertices from Cs are 1 or approximately 1. The
value 1 is the maximum value that a vertex can achieve,
which indicates that a node completely belongs to a com-
munity in the sense that this node connects every member
of the community and has no external links. Obviously,
the φ(u, S) value will be reduced after merging Cs and Ct
if the number of edges across Cs and Ct are too few. If
we want to retain the correlation value 1 for each vertex,
the vertices from Cs should connect all vertices from Ct.
However, it is a far cry from the situation shown in Fig.
6. We can observe that the number of inter-edges across
two communities which allows two communities to merge
is affected by the Φ(S) values in two communities. When
Φ(S) values of two communities are both higher, it will
require more inter-edges.
One of the main causes of the resolution limit problem
is that the modularity only considers the whole community
rather than every vertex. Besides, it only depends on the
number of edges m when the network is sufficiently large.
Let Q be the modularity sum of two communities before the
mergence and ´Q be the modularity value after the union.
Then, we have:
∆Q = ´Q − Q =
∆l
2m
− K1K2
2m2 ,
where K1 is the degree sum of community 1, K2 is the de-
gree sum of community 2 and ∆l is the difference between
the number of intra-edges after merging two communities
and that before the combination. If ∆Q > 0, it requires
∆l > K1K2
2m . As we can see, when m increases, the number of
inter-edges needed will be reduced. As m tends to infinity,
any two communities will be merged even if there is only
one edge between them. The reason why this happens is
that ∆l only embodies the overall structural information
of a community and the modularity misses local structural
10
information. To avoid the resolution limit problem as much
as possible, first of all, the community metric should con-
sider every vertex rather than view the community as a
single unit. Second, the community metric should take full
advantage of the local structural information. Then, we have
the following Theorem.
Theorem 7. Given a graph G(n, m) with a vertex u and a
community S. To simplify the notations, let Ψ = ΨS\{u} and
ψ = ψu, where Ψ is the community vector of S and ψ is the
neighbor vector of u. For fixed > 0, du > 0 and ω > 0, we
have:
Ψ · ψ
N→+∞ φ(u, S) =
lim
(cid:107)Ψ(cid:107)2(cid:107)ψ(cid:107)2
,
where (cid:107).(cid:107)2 is Euclidean norm.
Proof. We directly calculate the limit of φ(u, S) as N tends
to infinity.
lim
N→+∞ φ(u, S) = lim
N→+∞
= lim
N→+∞
ωN − du
(cid:112)(N − )du(N − du)
(cid:113)
ω − du
(cid:80)N
N )du(1 − du
N )
(cid:113)(cid:80)N
(cid:113)(cid:80)N
i=1 Ψiψi
(1 −
N
i=1 Ψ2
i
i=1 ψ2
i
=
ω√
du
Ψ · ψ
=
=
(cid:107)Ψ(cid:107)2(cid:107)ψ(cid:107)2
.
Theorem 7 indicates that φ(u, S) is the Cosine similarity
between Ψ and ψ as N tends to infinity. Then, we can
recalculate Φ(S) in the limit:
Φ(S) = Cos(S) =
ωu√
du
.
(10)
(cid:88)
u∈S
Obviously, it considers the Cosine similarity values between
each node and the community. As a result, it is unlikely to
perform the community mergence operation in the case of
weak inter-connections between two communities. Theorem
6 and Theorem 7 both indicate Φ(S) can mitigate the reso-
lution limit problem.
3.3 Summary
As a short summary, we would like to present the following
remarks. First of all, the use of different correlation functions
in our node-centric framework may lead to some different
but known community evaluation measures. As shown,
modularity, node modularity, neighborhood connectedness
and community connectedness in Focs [47] are all concrete
examples in our abstract framework. More importantly,
we may explore more correlation functions to obtain more
effective community evaluation measures in the future.
4 CORRELATION-BASED COMMUNITY DETECTION
In this section, we propose a Correlation-Based Community
Detection (CBCD) algorithm, which is based on PS measure
and φ-Coefficient. CBCD takes a graph G(V, E) as input
and generates a partition of G which is the set of detected
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
11
node modularity
modularity
H
M eas u re ofC a n d G
f
o
e
r
u
s
a
S M e
P
confidence of C ⇒ G
confidenceofG⇒C
nb-score
com-score
P S
Correlation Measure
Fig. 6. The use of different correlation functions may lead to several
different known community evaluation measures.
communities. The algorithm is divided into three phases:
Seed Selection, Local Optimization Iteration and Commu-
nity Merging.
4.1 Seed Selection
The goal of Seed Selection is to initialize a set of seed com-
munities for our next phase. Our algorithm adopts a local
search strategy to optimize the objective function defined in
(7), which requires seed nodes to start with. Triadic closure
is an important property of social network, which describes
the basic process of social network formation [55] [56] [57].
Triangle (clique of size 3) in the network embodies this
property. A node contained by a large number of triangles
has higher probability of being the core of a community.
Thus, we will use the number of triangles as the criterion
to select the seed nodes. The specific process is described
in Algorithm 1. We first count the number of triangles of
every node in the graph and then sort the nodes by their
triangle numbers decreasingly. For those nodes with the
same number of triangles, we compare their degrees. Then,
we go through all the nodes in this order. For every node
u that has not been previously visited, we mark u and its
neighbor nodes as visited and then put u into the seed node
set P .
Triangle counting is an important task in data mining
and network science [58], which has been widely used
in many applications such as community detection and
link prediction. There are many exact triangle counting
algorithms in the literature [59] [60] [61] [62]. Here we
modify the Ayz-Node-Counting algorithm [61] to imple-
ment the Triangle-Counting function in Algorithm 1. Ayz-
Node-Counting divides the nodes into two parts with a
degree threshold β: one set of nodes whose degrees are
at most β and another set of nodes whose degrees are at
least β. Ayz-Node-Counting enumerates node-pairs that are
adjacent to each node from the low degree node set. For the
subgraph G induced from the high degree node set, Ayz-
Node-Counting uses the fast matrix product to compute the
number of triangles for each node in G. By choosing appro-
priate β, the worst time complexity of Ayz-Node-Counting
is O(m1.4). Since matrix multiplication-based methods may
Algorithm 1 Seed Selection.
Input: A graph G(V, E).
Output: The set of seed nodes P .
1: Initial P = ∅.
2: Triangle-Counting(G).
3: Sort V by the number of triangles decreasingly.
4: for each u ∈ V do
5:
6:
7:
8:
9:
10:
11:
12: end for
13: return P ;
Mark u visited.
for each v ∈ neighbors(u) do
P = P(cid:83){u}.
if not visited(u) then
Mark v visited.
end for
end if
require large memory due to adjacency matrix storage, we
also enumerate over node-pairs in the induced subgraph
G. Since the total degree is 2m, then the number of high
of Algorithm 2 is O((cid:80)
degree nodes is at most 2m
β . The worst time complexity
β )3). Since we
deg(u)2 ≤ (cid:88)
have:(cid:88)
u∈U deg(u)2) + O(( 2m
deg(u)β ≤ β
deg(u) = 2mβ,
(cid:88)
u∈U
u∈U
u∈V
√
√
2m, we have time complexity O(m
the time complexity can be written as O(2mβ) + O(( 2m
β )3).
Let β =
m). In fact,
in large sparse network, the number of high degree nodes
is small even for low β. In this case, the time complexity of
Triangle Counting can be viewed as O(βm).
4.2 Local Optimization Iteration
In this phase, we aim at finding a partition that maximizes
the objective function defined in (7). Let P be a partition of
graph G and P (u) represents the index of the community
of a node u. Since the local search strategy (Line 5 to 20) is
adopted in this phase, we initially start with a set of seed
nodes. Suppose we obtain a partition P = {S1, ..., SM}
with P = M from Seed Selection. Despite we call P
the "partition", every Sj ∈ P has only one seed node and
many other nodes are not assigned to any community. To
deal with this initial state, for each node u that is not
assigned to any community, we let P (u) = −1. Then, we
reformulate the objective function (7) to make it convenient
for implementing Local Optimization Iteration:
arg max
P
Γ(P )
= arg max
P
(cid:88)
M(cid:88)
u∈V
j=1
δ(cid:0)P (u), j(cid:1)(cid:16) lu,Sj
N
(cid:17)
,
− Sj du
N 2
(10)
where lu,Sj is the number of edges between u and Sj, δ(x, y)
is the kronecker delta function whose value is 1 if x = y
and 0 otherwise. Our optimization algorithm is an iterative
process. In each iteration, it will reorganize the partition
to improve the value of (9) until a locally optimal solution
is achieved. First, we should consider how to assign those
end if
else
end if
if u < v then
triangles containing u.
else if deg(v) < β then
if deg(u) ≤ β then
if deg(v) < β and deg(w) < β then
Increase T C[u], T C[v] and T C[w] by 1.
for each pair (v, w) of neighbors of u do
if (v, w) exist an edge and v < w then
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
Algorithm 2 Triangle Counting.
Input: A graph G(V, E).
Output: A array T C such that T C[u] is the number of
1: Initial T C[u] = 0 for all u, U = ∅ and V = ∅.
2: for each u ∈ V do
3:
Add u to U.
4:
5:
Add u to V.
6:
7:
8: end for
9: for each u ∈ U do
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29: end for
30: Induce a subgraph G(V, E(cid:48)) by V.
31: for each u ∈ U do
32:
33:
34:
35:
36:
37:
38:
39: end for
40: return T C;
for each pair (v, w) of neighbors of u in G do
Increase T C[u], T C[v] and T C[w] by 1.
Increase T C[u], T C[v] and T C[w] by 1.
Increase T C[u], T C[v] and T C[w] by 1.
Increase T C[u], T C[v] and T C[w] by 1.
if (v, w) exist an edge and v < w then
else if deg(w) < β then
end if
end for
end if
end for
if u < v then
if u < w then
if u < v then
else
end if
end if
end if
end if
nodes that are not contained in any community. According
to (9), for any partition P , we have:
Γ(P ) =
(cid:88)
≤ (cid:88)
u∈V
u∈V
M(cid:88)
j=1
δ(cid:0)P (u), j(cid:1)(cid:16) lu,Sj
(cid:16) lu,S
N
max
S∈AC(u)
N
− Sdu
N 2
(cid:17)
− Sj du
N 2
(cid:17)
,
(11)
where AC(u) is the set of communities whose nodes are
adjacent to node u. Obviously, (10) is more easily to find
the maximum value than (9) if we do not modify the
current partition and the PS value of each node is computed
independently from others. Thus, we will find a community
S for each unassigned node u by maximizing P S(u, S)
12
(cid:1)
− SKS
N 2
(Line 7 to 13). Then, we put node u into community S and
update Γ(P ) with the difference brought by this operation
(Line 14 to 18):
∆F = F (S(cid:48)) − F (S) =
2(lS(cid:48) − lS)
2lS(cid:48)
N
− S(cid:48)KS(cid:48)
− S(cid:48)KS(cid:48) − SKS
N 2 −(cid:0) 2lS
− (S + 1)(KS + du) − SKS
N 2
− (S + 1)du + KS
N 2
N
.
N 2
=
=
=
N
2lu,S
N
2lu,S
N
In practice, for each node, the partition is modified after
performing the steps described in Line 7 to 18, which is
to make the algorithm more robust to local maxima. Next,
we consider the nodes that have already been assigned to a
community. Line 21 to 39 in Algorithm 3 describes the parti-
tion refinement step. It refines the partition obtained in local
search step (Line 5 to 20) using a hill climbing method. In
each iteration, we perform the movements of nodes between
communities to improve the value of Γ(P ). For each node
u belonging to a community S, we compute the difference
brought by removing u from S, ∆F = F (S)−F (S(cid:48)) (Line 23
to Line 25). For a community Sj, we compute the difference
j) − F (Sj). We
brought by adding u to Sj, ∆Fj = F (S(cid:48)
choose a community Si such that ∆Fi > ∆F and ∆Fi−∆F
are maximized. Then, we add u to Si and remove u from
S to update the partition. The local search step and the
partition refinement step are performed alternately until
every node has been assigned to a community and objective
function Γ(P ) converges.
4.3 Community Merging
After Local Optimization Iteration, there may be many small
but significant communities. We need a merging operation
to find communities with suitable size. The theoretical basis
of Community Merging comes from section 3.2.2. Φ(S) is
the criterion used in Community Merging to judge whether
two communities should be merged. Note that here Φ(S)
is just used to implement the merging operation instead
of being an objective function. In the whole process, we
maintain a max-heap which contains a set of elements
and supports delete or insert operation in O(log n) time.
Community Merging is described in Algorithm 4. First,
we start off with each community Si ∈ P being the sole
node of a graph F and establish an edge between Si
and Sj if at least one edge links them. F is a weighted
graph, in which the weight between community i and j
is ∆Wij = Φ(Si
pair (i, j) that ∆Wij > T h, we put a triad (i, j, ∆Wij)
into max-heap M ax H. In each iteration, we take the triad
(i, j, ∆Wij) from the top of M ax H whose ∆Wij is the
maximum and merge community i and community j. For
the union operation, we can use the disjoint-set data struc-
ture to implement it. Next, we update the graph F and
put the new triad (i, k, ∆Wik) whose ∆Wik > T h into
M ax H. We continue these steps until M ax H is empty.
The threshold T h controls the size of communities we find.
If T h is too high, the detected communities may be too
small. If T h is too low, the detected communities may be too
(cid:83) Sj) − Φ(Si) − Φ(Sj). Then, for each
i = −1, t = −∞.
for each S ∈ neighbor community(u) do
N − (S +1)du+KS
N 2
.
i = −1, j = Pk(u).
t = 0, H = Sj\{u}.
M = 2lu,H
for each S ∈ neighbor community(u) do
.
N − (S +1)du+KS
N 2
N 2
− M.
end if
end for
if i (cid:54)= −1 then
if u not in any community then
Compute P S = lu,S
if P S > t then
k + +.
Pk = Pk−1.
for each u ∈ V do
Γ(Pk) = Γ(Pk) + 2lu,S
Add u to Si.
Update Pk.
N − S du
N 2 .
i = index(S), t = P S.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
Algorithm 3 Local Optimization Iteration.
Input: A graph G(V, E) and a seed set P .
Output: A partition of graph G.
1: Initial P0 = P , k = 0 and Γ(Pk) = 0.
2: repeat
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
38:
39:
40: until Γ(Pk) < Γ(Pk−1)
41: return Pk−1;
N − H du+KH
Compute ∆Γ = 2lu,S
if ∆Γ > t then
Γ(Pk) = Γ(Pk) + t.
Add u to Si.
Remove u from Sj.
Update Pk.
end for
for each u ∈ V do
if u assigned to a community then
end for
if i (cid:54)= −1 then
i = index(S), t = ∆Γ.
end for
end if
end if
end if
end if
end if
big so that even the resolution limit problem will happen.
In practice, Φ(S) often requires a great number of inter-
connections for merging two communities. Thus, we need
to properly relax T h to be an appropriate small negative
value. Such a relaxation will not lead to the resolution limit
problem, but can help us find communities with suitable
size. To give a theoretical analysis in large network, recalling
Theorem 7 introduced in section 3.2.2, the mathematical
expression of Cos(S) is given in (10). If we do not want
to merge two equal-sized cliques C1 and C2 (C1 = C2 ≥ 5
and there is only one edge between C1 and C1), we should
have:
T h > Cos(C1
(cid:91)C2) − Cos(C1) − Cos(C2) = −2.947214.
13
end if
end for
if ∆Wuv > T h then
M ax H. push( (cid:104)u, v, Wuv(cid:105) ).
for each Sv ∈ neighbors(Su) do
Algorithm 4 Community Merging.
Input: A graph G(V, E) , a threshold T h and a partition P .
Output: Detected communities.
1: Initialize a max-heap M ax H = ∅.
2: Construct a community graph F(P, ∆W ) by G and P .
3: for each Su ∈ P do
4:
5:
6:
7:
8:
9: end for
10: while M ax H not empty do
11:
12: M ax H.pop( ).
13:
14:
15:
16:
17:
18:
19:
20:
end if
21:
22: end while
23: Update P .
24: return P ;
Union Sv and Su.
for each Sw ∈ neighbors(Sv) do
Update ∆Wuw and ∆Wwu.
if ∆Wuw > T h then
(cid:104)u, v, ∆W (cid:48)
uv(cid:105) = M ax H.top( ).
if Su exist and Sv exist and ∆W (cid:48)
M ax H.push( (cid:104)u, w, Wuw(cid:105) ).
uv = ∆Wuv then
end for
end if
We suggest the user to choose an appropriate threshold T h
such that −2.9 < T h < 0.
4.4 Complexity Analysis
As it has been discussed, the time complexity of Seed Selec-
tion is O(βm), where β is a constant. As for Local Optimiza-
tion Iteration, we need to go through all the edges in each
iteration. Thus, its time complexity is O(M ax It·m), where
M ax It is the number of iterations that Local Optimization
Iteration needs. In practice, we can set M ax It = 20 and it
is sufficient for Local Optimization Iteration to converge. For
Community Merging, we need to merge two communities
and insert new elements into a max-heap in each iteration.
We use both path compression and union by size to en-
sure that the amortized time per union operation is only
O(α(n)) [63] [64], where α(n) is the inverse Ackermann
function which can be viewed as a constant. Thus, we
have O(n) for the union operation in general. For insert
operation, the worst time complexity is O(m log n) since we
have to go through every neighbor of the community in each
iteration. Totally, the time complexity is O(m + n + m log n).
5 EXPERIMENTAL RESULTS
In this section, the proposed algorithm CBCD is compared
with the existing state-of-the-art algorithms on both syn-
thetic networks and real networks. Each node in these
two different kinds of networks has a ground truth com-
munity label. For communities found by the detection
algorithms, we need to compare them with the ground
truth communities. A criterion is necessary to measure the
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
similarity between the final partition of the algorithm and
the actual communities. Many evaluation measures, such
as Normalized Mutual Information (NMI) [65], ARI [66]
and Purity, have been proposed to evaluate the clustering
quality of algorithms. NMI is the most widely-accepted and
important evaluation measure, since it is more discrimina-
tory and more sensitive to errors in the community detec-
tion procedure [65]. We will use NMI as our performance
evaluation measure in the experiments. The code of NMI
calculation offered by McDaid et al. [67] can be found at
https://github.com/aaronmcdaid/Overlapping-NMI.
According to the comparative analysis of community
detection algorithms [68], Louvain and Infomap are two
of the best classical algorithms in the literature. Thus, we
will take these two algorithms as the competing algorithms.
Besides, some novel algorithms proposed in recent years
will also be compared with CBCD. These algorithms are
listed as follow:
• Louvain [69] is a well-known heuristic algorithm based
on modularity. The algorithm is composed of two steps
which are performed iteratively. The first step is to
move each node to the community that the gain of
modularity is positive and maximum. The next step is
to build a new weighted network whose nodes are com-
munities found in first step. The procedure will con-
tinue until modularity achieves a maximum. Louvain
can unfold a complete hierarchical community struc-
ture for the network. The program can be downloaded
from https://sites.google.com/site/findcommunities/.
• Infomap [70] is another well-known algorithm based
on information theory and random walk. It uses the
probability flow of random walks taking place over a
network as a description of the network structure and
decomposes the network into modules using informa-
tion theoretic result to compress the probability flow. It
simplifies the organization of network and highlights
their relationships. The program can be downloaded
from http://www.mapequation.org/code.html.
• FOCS [47] is a fast overlapping community detection
algorithm, which can detect overlapped communities
using the local connectedness. FOCS takes a param-
eter OVL as the input, which is a threshold allow-
ing for maximum overlapping between two commu-
nities. Since our comparison is conducted over the non-
overlapped algorithms, we set OVL to 0. The pro-
gram can be downloaded from https://github.com/
garishach/focs.
• SCD [45] [46] is a community detection algorithm based
on a new community metric WCC. WCC considers the
triangle as the basic structure instead of the edge or
node. The theoretic analysis given in [46] shows that
WCC can correctly capture the community structure.
The program can be downloaded from https://github.
com/DAMA-UPC/SCD.
• Attractor [71] is an algorithm based on distance dy-
namics. The fundamental basis of Attractor is to view
the whole network as an adaptive dynamical system.
Each node in this dynamical system interacts with its
neighbors and distances among nodes will be changed
by the interactions. At the same time, distances will
14
affect the interactions conversely. The dynamical sys-
tem eventually evolves a steady system. The Attractor
algorithm require a cohesion parameter λ that ranges
from 0 to 1, which is used to determine how exclusive
neighbors affect distance (positive or negative influ-
ence). According to [71], we set λ = 0.5. The pro-
gram can be downloaded from https://github.com/
YcheCourseProject/CommunityDetection.
For all experiments, without further statement, we set
the threshold parameter of our algorithm T h = −2.8 when
0 < V < 4000 and T h = −0.43 when 4000 ≤ V , cor-
responding to small networks and large-scale networks. All
experimental results have been obtained on a workstation
with 3.5 GHz Intel(R) Xeon(R) CPU E5-1620 v3 and 16.0 GB
RAM. For Louvain, we adopted the lowest partition of the
hierarchy, which is stored in the graph.tree file. For Infomap,
the number of outer-most loops to run before picking the
best solution is specified to be 10.
5.1 LFR Benchmark
LFR Benchmark which is introduced by Lancichinetti et
al. [72] is a very popular graph simulation model. The
most important parameter of LFR Benchmark is the mixing
parameter u. The community structure of LFR network
becomes more pronounced as u decreases. In particular,
u = 0 indicates that each node only connects the nodes
inside its community and u = 1 indicates that each node
only connects the nodes outside its community. The pro-
gram of LFR Benchmark can be downloaded from https:
//sites.google.com/site/santofortunato/inthepress2.
We generate several LFR networks characterized by dif-
ferent features to compre the performance of various algo-
rithms. The number of nodes in all LFR networks is fixed to
1000. We consider 2 × 2 cases, in which the community size
parameter is specified within the range [15,30] and [20,50]
and the average degree is set to be 15 and 20. For each case,
we fix the average degree and the community size, and then
increase the mixing parameter u from 0 to 1 to generate a
variety of LFR networks for comparison.
The performance comparison result in terms of NMI
is shown in Fig. 7. As we can see from Fig. 7, CBCD,
Louvain and Infomap almost achieve the best clustering
performance. The NMI values of all algorithms will decrease
when the mixing parameter u tends to 1. This is because the
increment of mixing parameter u will introduce more edges
among different communities, making it difficult to identify
the underlying true communities. CBCD have better perfor-
mance when the community size parameter is smaller. Note
that even when the community size parameter is relatively
big, CBCD still has good performance in comparison with
the other algorithms. Except for Infomap and Focs, the
performance of other algorithms become better when the
average degree parameter is increased, and CBCD is better
than all other algorithms when the degree is 20. We can
find that Infomap always starts to decrease dramatically
when u ranges between 0.6 and 0.7. It is because that
Infomap is based on the random walk dynamics and is
more sensitive to the noisy inter-edges between commu-
nities as u tends to 1. By contrast, CBCD is more robust
to these noisy inter-edges despite the fact that Infomap is
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
15
Fig. 7. The performance of different algorithms on LFR benchmark. The panels indicate the NMI value of the detection algorithm as a function of
the mixing parameter u.
slightly better than CBCD when average degree is 15 and
u ranges between 0.55 and 0.65. Compared to Louvain,
CBCD is always the winner. Let us consider the maximum
community size in the partition obtained by Louvain and
CBCD. The relation between the mixing parameter u and the
maximum community size of detected partition is plotted
in Fig. 8. The maximum community size of both CBCD and
Louvain increases as the mixing parameter u is increased.
This demonstrates that the detection algorithms tend to
combine of two ground-truth communities when u is high.
The maximum community size of CBCD is almost always
lower than that of Louvain. We can observe that, especially
when the mixing parameter u ranges between 0.5 and 0.6,
the maximum community size of CBCD is significantly
lower than the maximum community size of Louvain. This
result show that CBCD can mitigate the resolution problem
to some extent.
5.2 Real-World Network
In most real-world networks, each node has no ground-
truth label. The modularity is typically used to evaluate
the quality of detected communities. However, as we have
discussed before, modularity is not a good quality measure
of communities because of the resolution limit problem.
Besides, modularity is found out owning the tendency of
following the same general pattern for different classes of
networks [73]. Thus, we only conduct our experiment on
several well-known real-world networks with ground-truth
communities: Karate (karate) [74], Football (football) [5],
Personal Facebook (personal) [75], Political blogs (polblogs)
[76], Books about US politics (polbooks) [77]. The detailed
statistics of real-world networks are given in Table 3, where
V denotes the number of the nodes,
E denotes the
number of the edges, dmax denotes the maximal degree
of the nodes, (cid:104)d(cid:105) denotes the average degree of the nodes
and C denotes the number of ground-truth communities
mixing parameter u00.10.20.30.40.50.60.70.80.91NMI00.10.20.30.40.50.60.70.80.91(a) average degree = 15, community size ranging from 15 to 30mixing parameter u00.10.20.30.40.50.60.70.80.91NMI00.10.20.30.40.50.60.70.80.91(b) average degree = 15, community size ranging from 20 to 50CBCDInfomapLouvainAttractorSCDFocsmixing parameter u00.10.20.30.40.50.60.70.80.91NMI00.10.20.30.40.50.60.70.80.91(c) average degree = 20, community size ranging from 15 to 30mixing parameter u00.10.20.30.40.50.60.70.80.91NMI00.10.20.30.40.50.60.70.80.91(d) average degree = 20, community size ranging from 20 to 50JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
16
Fig. 8. The maximum community size in the partition generated when the mixing parameter u is ranged from 0 to 0.7. The red curve corresponds
to the ground-truth partition.
in the network. The performance of the algorithms on the
real-world network is shown in Table 4, where NC is the
number of communities detected by the algorithm.
American college football: American college football
network describes football games between Division IA col-
leges during the regular season in Fall 2000. It has 115 teams
and 631 games between these teams. For each node (team),
there is an edge connecting two nodes if two teams played a
game. The teams were partitioned into 12 conferences (com-
munities). Louvain, Infomap, SCD and Attractor all have
good performance on the football data set, and SCD achieve
the best performance among these algorithms. We have to
admit the fact that these algorithms outperform our method
on the football data set. Fig. 9 plots the variation of NMI
of the partition detected by CBCD when the threshold T h
used in the merging operation increases from -2.8 to 0. As
T h increases from -2.8 to -2.2, NMI increases to 0.773 which
is the maximal NMI value of CBCD on the football data set.
NMI begins to decrease when T h further increases. Note
that the number of detected communities increases with the
increment of T h. The number of detected communities is 10
when T h = −2.2. The quality of algorithm 4 (Community
Merging) is mainly determined by the output of algorithm 3
(Local Optimization Iteration). Although CBCD can achieve
a NMI value of 0.773, it still cannot beat other algorithms
except Focs. This demonstrates that there is still room for
improving algorithm 3.
Zachary's karate club network: Karate is a famous
network derived from the Zachary's observation about a
karate club. The network describes the friendship among
the members of a karate club. The network was divided into
two parts because of the divergence between administrator
and instructor. According to Table 4, CBCD outperforms all
other algorithms and achieves a NMI value of 0.840. Two
communities are successfully found by CBCD, but our al-
gorithm classifies one node '10' into the wrong community.
We observe that this node only have two edges and each
edge connects one of two communities respectively. It is
mixing parameter u00.10.20.30.40.50.60.7Maximum Community Size020406080100120140160(a) average degree = 15, community size ranging from 15 to 30LouvainGround-truthCBCDmixing parameter u00.10.20.30.40.50.60.7Maximum Community Size020406080100120140160(b) average degree = 15, community size ranging from 20 to 50LouvainGround-truthCBCDmixing parameter u00.10.20.30.40.50.60.7Maximum Community Size020406080100120140160(c) average degree = 20, community size ranging from 15 to 30LouvainGround-truthCBCDmixing parameter u00.10.20.30.40.50.60.7Maximum Community Size020406080100120140160(d) average degree = 20, community size ranging from 20 to 50LouvainGround-truthCBCDJOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
17
The characteristics of real-world network data sets.
TABLE 2
Data Sets
football
karate
personal
polbooks
polblogs
V
115
34
561
105
1490
E
613
78
8375
441
19090
(cid:104)d(cid:105)
10.57
4.59
29.91
8.4
27.32
dmax
12
17
166
25
351
C
12
2
8
3
2
The performance of different algorithms on the real-world network.
TABLE 3
CBCD
Infomap
Louvain
SCD
Focs
Attractor
football
0.734
0.833
0.838
0.840
0.392
0.833
karate
0.837
0.563
0.259
0.395
0.189
0.04
NMI
personal
0.3639
0.248
0.08
0.179
0.171
0.299
polbooks
0.330
0.293
0.158
0.116
0.166
0.315
polblogs
0.391
0.268
0.212
0.085
0.106
0.124
football
9
12
12
14
5
12
karate
2
3
7
8
1
1
NC
personal
11
6
17
125
13
56
polbooks
4
5
10
23
9
7
polblogs
6
303
32
664
19
313
tions. CBCD achieves the best performance with relatively
high quality (NMI=0.3639) on the personal data set. For
Attractor and Infomap, they also achieve good performance.
Louvain achieves the worst result.
Books about US politics: This network consists of 105
nodes and 441 edges, which is derived from the politic
books about US politics published in 2004 when presidential
election takes place. Each node represents the book sold at
Amazon.com, and each edge represents that two books are
frequently co-purchased by the same buyer. Each book is
labeled with "liberal", "neutral" or "conservative", that is
given by Amazon.com. CBCD gives the best partition with
NMI = 0.33 among the comparing algorithms. For Attractor
and Infomap yield good performance while Lovain, SCD
and Focs have relatively bad performance.
U.S. political blog: The polblog network consists of 1490
nodes and 19090 edges, which describes the degree of inter-
action between liberal and conservative blogs. Compared
to other algorithms, CBCD has the best performance on
the polblog data set. Infomap and Louvain also produce
good partitions. Attractor, Focs, and SCD yield relatively
bad partitions.
Fig. 9. The variation of NMI of the partition detected by CBCD when the
threshold T h is increased from -2.8 to 0 on the football network.
difficult to decide which community it really belongs to.
Thus, we consider this node as a noisy node. In fact, it
can make sense to assign node '10' to both communities in
the context of overlapping community detection. However,
this study mainly focuses on non-overlapping community
detection. If we delete node '10' from the karate, our CBCD
algorithm can achieve the perfect performance of NMI=1. Its
output exactly matches the partition of ground-truth com-
munities. Infomap achieves the second best performance.
For Attractor, the worst performance is due to that it puts
all the members into one community.
Personal Facebook network: Personal is the network
which gives the friendship structure of the first author,
where each individual (node) is labeled according to the
time period when he or she met the first author. Persons
are divided into the different groups according to their loca-
5.3 Large-Scale Real-World Network
The large-scale real networks which are provided from [78]
all have overlapping ground-truth communities. Despite it
is out of the scope of our paper, we will still run CBCD
along with other algorithms on these networks to test the
performance of our algorithm on large-scale real networks.
To evaluate the performance of community detection al-
gorithms on the networks with overlapping community
structures, Overlapping Normalized Mutual Information
(ONMI) [79] is the major evaluation metric in this section.
Since we will make a comparison on the networks with
overlapping structures, then we set OVL of Focs to 0.6 for
detecting overlapping communities. We choose two large-
scale networks, Amazon and DBLP, for testing the perfor-
mance of different methods. The specific information of
these two networks is given as follow.
Threshold Th-3-2.5-2-1.5-1-0.500.680.70.720.740.760.780.8JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
18
Fig. 10. The distribution of the PS values of a community for E-R random networks with different parameters.
Amazon: It is an undirected network collected by crawl-
ing the Amazon website, where each node is a product
sold on the website and an edge exists between two nodes
(products) if they are frequently co-purchased. The ground-
truth communities are determined by the product category.
Each connected component in a product category is re-
garded as an independent ground-truth community. The
whole network have 334863 nodes, 925872 edges and 70928
communities. Ninety-one percent of the nodes participate in
at least two communities.
DBLP: It is a co-authorship network derived from the
DBLP computer science bibliography. Each author of a
paper is viewed as a node. Two authors are connected by an
edge if they have published at least one paper together. Pub-
lication venue, e.g, journal or conference, is the indicator of
ground-truth community. The authors who publish papers
on the same journal or conference form a community. The
whole network have 317080 nodes, 1049866 edges and 13477
communities. Thirty-five percent of the nodes participate in
at least two communities.
The performance comparison of different algorithms on large-scale real
TABLE 4
ET
48s
120s
13s
15s
7s
CBCD
Infomap
Louvain
SCD
Focs
networks with overlapping ground-truth communities
Data sets Algorithm ONMI NC
40k
109k
170k
140k
24k
17k
40k
213k
266k
141k
20k
23k
0.132
0.008
0.124
0.146
0.213
0.061
0.246
0.057
0.154
0.158
0.207
0.201
Attractor
CBCD
Infomap
Louvain
43min
42s
132s
16s
6s
5s
22min
SCD
Focs
Attractor
DBLP
Amazon
Table 4 summaries the experimental results of different
algorithms on two large-scale real networks, where NC is
-0.04-0.03-0.02-0.0100.010.020.030.040.05Bins of PS value00.10.20.30.40.5Fraction of communities(a) community size = 100, 6=10, n=1000-0.04-0.03-0.02-0.0100.010.020.030.04Bins of PS value00.10.20.30.40.5Fraction of communities(b) community size = 100, 6=5, n=1000-2-1012Bins of PS value#10-300.10.20.30.40.5Fraction of communities(c) community size = 100, 6=10, n=10000-101Bins of PS value#10-300.10.20.30.40.5Fraction of communities(d) community size = 100, 6=5, n=10000JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
the number of detected communities and ET is the execution
time of various algorithms. For the DBLP network, Focs
achieves the best performance and SCD achieves the second-
best performance. Despite the performance of CBCD on
DBLP is not as good as these two algorithms, CBCD is
still better than others. For the Amazon netowrk, CBCD
outperforms the other algorithms. Focs is the second-best
performer and Attractor is slightly inferior to Focs. Infomap
has the worst performance on both DBLP and Amazon,
which is in contrast with its performance on small real
networks and LFR networks. Although CBCD is effective
on detecting meaningful communities, it has no obvious
advantage with respect to the execution time. This is what
we should focus on in our future work.
5.4 The Distribution of PS Values
In this section, we study the distribution of PS values
defined in Formula (6) of a community under the E-R model.
First, we generate 300 random networks for the specific
parameters under the E-R model. These parameters are the
average degree λ and the network size n of random net-
work. Then, we calculate the PS value of a given community
S, which is composed of 100 fixed nodes. Consequently,
we obtain 300 PS values of the given communities derived
from 300 different random networks. We divide PS values
into many bins with equal length, where the low (high) bins
correspond to the set of lower (higher) PS values. In Fig. 10,
bins are plotted on the x-axis, and for each bin, the fraction
of communities whose PS values fall into that bin are plotted
on the y-axis. We can observe that the distribution of PS
value follows a Gaussian-like distribution. The PS metric
values are concentrated near 0 and most values fall into a
very narrow interval. This phenomenon corresponds to our
theoretical result in section 3.2.1. Comparing Fig. 10 (a) with
Fig. 10 (b) and comparing Fig. 10(c) with Fig. 10(d), we can
find that the interval that most PS values fall into becomes
shorter with the decrease of average degree λ. Besides, the
interval that most PS values fall into sharply shortens when
the network size n increases. It is a remarkable fact that the
PS value of a community in the random networks generated
from the E-R model is a very small value. This demonstrates
that the PS value of a community is an effective metric for
quantifying the goodness of a community structure.
6 CONCLUTION
In this paper, we introduce two novel node-centric commu-
nity evaluation functions by connecting correlation anal-
ysis with community detection. We further show that
the correlation analysis is a novel theoretical framework
which unifies some existing quality functions and converts
community detection into a correlation-based optimization
problem. In this framework, we choose PS-metric and φ-
coefficient to eliminate the influence of random fluctuations
and mitigate the resolution limit problem. Furthermore, we
introduce three key properties used in mining association
rule into the context of community detection to help us
choose the appropriate correlation function. A correlation-
based community detection algorithm CBCD that makes
use of PS-metric and φ-coefficient is proposed in this paper.
19
Our proposed algorithm outperforms five existing state-of-
the-art algorithms on both LFR benchmark networks and
real-world networks. In the future, we will investigate more
correlation functions and extend our method to overlapping
community detection.
ACKNOWLEDGMENTS
This work was partially supported by the Natural Science
Foundation of China under Grant No. 61572094.
[2]
[3]
REFERENCES
[1] V. Spirin and L. A. Mirny, "Protein complexes and functional mod-
ules in molecular networks," Proceedings of the National Academy of
Sciences of the United States of America, vol. 100, no. 21, pp. 12 123 --
12 128, 2003.
S. Papadopoulos, Y. Kompatsiaris, A. Vakali, and P. Spyridonos,
"Community detection in social media," Data Mining and Knowl-
edge Discovery, vol. 24, no. 3, pp. 515 -- 554, 2012.
S. L. Feld, "The focused organization of social ties," American
journal of sociology, vol. 86, no. 5, pp. 1015 -- 1035, 1981.
[4] N. J. Krogan, G. Cagney, H. Yu, G. Zhong, X. Guo, A. Ignatchenko,
J. Li, S. Pu, N. Datta, A. P. Tikuisis et al., "Global landscape of
protein complexes in the yeast saccharomyces cerevisiae," Nature,
vol. 440, no. 7084, p. 637, 2006.
[5] M. Girvan and M. E. Newman, "Community structure in social
and biological networks," Proceedings of the National Academy of
Sciences of the United States of America, vol. 99, no. 12, pp. 7821 --
7826, 2002.
S. Fortunato, "Community detection in graphs," Physics Reports,
vol. 486, no. 3, pp. 75 -- 174, 2009.
[7] M. E. Newman and M. Girvan, "Finding and evaluating commu-
nity structure in networks," Physical review E, vol. 69, no. 2, p.
026113, 2004.
[8] F. Chung, "Spectral graph theory," in Regional Conference Series in
[6]
Mathematics, 1997, p. 212.
[9] Y.-C. Wei and C.-K. Cheng, "Towards efficient hierarchical designs
by ratio cut partitioning," in Computer-Aided Design, 1989. ICCAD-
89. Digest of Technical Papers., 1989 IEEE International Conference on.
IEEE, 1989, pp. 298 -- 301.
[10] S. Mancoridis, B. S. Mitchell, C. Rorres, Y. Chen, and E. R. Gansner,
"Using automatic clustering to produce high-level system organi-
zations of source code," in Program Comprehension, 1998. IWPC'98.
Proceedings., 6th International Workshop on.
IEEE, 1998, pp. 45 -- 52.
[11] J. Shi and J. Malik, "Normalized cuts and image segmentation,"
IEEE Transactions on pattern analysis and machine intelligence, vol. 22,
no. 8, pp. 888 -- 905, 2000.
[12] M. E. Newman, "Fast algorithm for detecting community structure
in networks," Physical review E, vol. 69, no. 6, p. 066133, 2004.
[13] P. Schuetz and A. Caflisch, "Efficient modularity optimization
by multistep greedy algorithm and vertex mover refinement,"
Physical Review E, vol. 77, no. 4, p. 046112, 2008.
[14] J. M. Pujol, J. B´ejar, and J. Delgado, "Clustering algorithm for
determining community structure in large networks," Physical
Review E, vol. 74, no. 1, p. 016107, 2006.
[15] A. Noack and R. Rotta, "Multi-level algorithms for modularity
clustering," in International Symposium on Experimental Algorithms.
Springer, 2009, pp. 257 -- 268.
[16] D. A. Spielman and S.-H. Teng, "Nearly-linear time algorithms
for graph partitioning, graph sparsification, and solving linear
systems," in Proceedings of the thirty-sixth annual ACM symposium
on Theory of computing. ACM, 2004, pp. 81 -- 90.
[17] R. Andersen and K. J. Lang, "Communities from seed sets," in
Proceedings of the 15th international conference on World Wide Web.
ACM, 2006, pp. 223 -- 232.
[18] R. Andersen, F. Chung, and K. Lang, "Local graph partitioning
using pagerank vectors," in Foundations of Computer Science, 2006.
FOCS'06. 47th Annual IEEE Symposium on.
IEEE, 2006, pp. 475 --
486.
[19] K. Kloster and D. F. Gleich, "Heat kernel based community
detection," in Proceedings of the 20th ACM SIGKDD international
conference on Knowledge discovery and data mining. ACM, 2014, pp.
1386 -- 1395.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
20
[20] Z. A. Zhu, S. Lattanzi, and V. S. Mirrokni, "A local algorithm for
finding well-connected clusters." in ICML (3), 2013, pp. 396 -- 404.
[21] T. Van Laarhoven and E. Marchiori, "Local network commu-
nity detection with continuous optimization of conductance and
weighted kernel k-means," Journal of Machine Learning Research,
vol. 17, no. 147, pp. 1 -- 28, 2016.
[22] A. R. Benson, D. F. Gleich, and J. Leskovec, "Higher-order organi-
zation of complex networks," Science, vol. 353, no. 6295, pp. 163 --
166, 2016.
[23] S. Fortunato and D. Hric, "Community detection in networks: A
user guide," Physics Reports, vol. 659, pp. 1 -- 44, 2016.
[24] P. Erdos, "On random graphs," Publicationes mathematicae, vol. 6,
pp. 290 -- 297, 1959.
[25] M. E. Newman, "Mixing patterns in networks," Physical Review E,
vol. 67, no. 2, p. 026126, 2003.
[26] B. Bollob´as, "A probabilistic proof of an asymptotic formula
for the number of labelled regular graphs," European Journal of
Combinatorics, vol. 1, no. 4, pp. 311 -- 316, 1980.
[27] M. Molloy and B. Reed, "A critical point for random graphs with
a given degree sequence," Random structures & algorithms, vol. 6,
no. 2-3, pp. 161 -- 180, 1995.
[28] S. Fortunato and M. Barthlemy, "Resolution limit in community
detection." Proceedings of the National Academy of Sciences of the
United States of America, vol. 104, no. 1, pp. 36 -- 41, 2007.
[29] A. Lancichinetti and S. Fortunato, "Limits of modularity maxi-
mization in community detection." Phys.rev.e, vol. 84, no. 2, p.
066122, 2011.
[30] R. Guimera, M. Sales-Pardo, and L. A. N. Amaral, "Modularity
from fluctuations in random graphs and complex networks,"
Physical Review E, vol. 70, no. 2, p. 025101, 2004.
[31] G. Piatetsky-Shapiro and W. J. Frawley, "Discovery, analysis, and
presentation of strong rules," in Knowledge Discovery in Databases,
1991, pp. 229 -- 248.
[32] P. Pons and M. Latapy, "Computing communities in large net-
works using random walks," in International symposium on com-
puter and information sciences. Springer, 2005, pp. 284 -- 293.
[33] Y. Pan, D.-H. Li, J.-G. Liu, and J.-Z. Liang, "Detecting community
structure in complex networks via node similarity," Physica A:
Statistical Mechanics and its Applications, vol. 389, no. 14, pp. 2849 --
2857, 2010.
[34] T. Zhou, L. L u, and Y.-C. Zhang, "Predicting missing links via
local information," The European Physical Journal B, vol. 71, no. 4,
pp. 623 -- 630, 2009.
[35] H.-W. Shen, X.-Q. Cheng, and B.-X. Fang, "Covariance, correlation
matrix, and the multiscale community structure of networks,"
Physical Review E, vol. 82, no. 1, p. 016114, 2010.
[36] M. Zarei, D. Izadi, and K. A. Samani, "Detecting overlapping
community structure of networks based on vertex -- vertex corre-
lations," Journal of Statistical Mechanics: Theory and Experiment, vol.
2009, no. 11, p. P11013, 2009.
[37] M. MacMahon and D. Garlaschelli, "Community detection for
correlation matrices," Phys. Rev. X, vol. 5, p. 021006, Apr 2015.
[Online]. Available: https://link.aps.org/doi/10.1103/PhysRevX.
5.021006
[38] N. Bansal, A. Blum, and S. Chawla, "Correlation clustering,"
Machine learning, vol. 56, no. 1-3, pp. 89 -- 113, 2004.
[39] N. Veldt, D. F. Gleich, and A. Wirth, "A correlation clustering
framework for community detection," in Proceedings of the 2018
World Wide Web Conference on World Wide Web.
International
World Wide Web Conferences Steering Committee, 2018, pp. 439 --
448.
[40] L. Duan, W. N. Street, Y. Liu, and H. Lu, "Community detection
in graphs through correlation," in Proceedings of the 20th ACM
SIGKDD international conference on Knowledge discovery and data
mining. ACM, 2014, pp. 1376 -- 1385.
[41] L. Duan, Y. Liu, W. N. Street, and H. Lu, "Utilizing advances
in correlation analysis for community structure detection," Expert
Systems with Applications, vol. 84, pp. 74 -- 91, 2017.
[42] T. Chakraborty, S. Srinivasan, N. Ganguly, A. Mukherjee, and
S. Bhowmick, "On the permanence of vertices in network com-
munities," in Proceedings of the 20th ACM SIGKDD international
conference on Knowledge discovery and data mining. ACM, 2014, pp.
1396 -- 1405.
[43] T. Chakraborty, S. Kumar, N. Ganguly, A. Mukherjee, and
S. Bhowmick, "Genperm: a unified method for detecting non-
overlapping and overlapping communities," IEEE Transactions on
Knowledge and Data Engineering, vol. 28, no. 8, pp. 2101 -- 2114, 2016.
[44] T. Chakraborty, S. Srinivasan, N. Ganguly, A. Mukherjee, and
S. Bhowmick, "Permanence and community structure in complex
networks," ACM Transactions on Knowledge Discovery from Data
(TKDD), vol. 11, no. 2, p. 14, 2016.
[45] A. Prat-P´erez, D. Dominguez-Sal, and J.-L. Larriba-Pey, "High
quality, scalable and parallel community detection for large real
graphs," in Proceedings of the 23rd international conference on World
wide web. ACM, 2014, pp. 225 -- 236.
[46] A. Prat-P´erez, D. Dominguez-Sal, J.-M. Brunat, and J.-L. Larriba-
Pey, "Put three and three together: Triangle-driven community
detection," ACM Transactions on Knowledge Discovery from Data
(TKDD), vol. 10, no. 3, p. 22, 2016.
[47] S. Bandyopadhyay, G. Chowdhary, and D. Sengupta, "Focs: fast
overlapped community search," IEEE Transactions on Knowledge
and Data Engineering, vol. 27, no. 11, pp. 2974 -- 2985, 2015.
[48] P.-N. Tan, V. Kumar, and J. Srivastava, "Selecting the right objec-
tive measure for association analysis," Information Systems, vol. 29,
no. 4, pp. 293 -- 313, 2004.
[49] L. Duan, W. N. Street, Y. Liu, S. Xu, and B. Wu, "Selecting the
right correlation measure for binary data," ACM Transactions on
Knowledge Discovery from Data (TKDD), vol. 9, no. 2, p. 13, 2014.
[50] L. Geng and H. J. Hamilton, "Interestingness measures for data
mining: A survey," ACM Computing Surveys (CSUR), vol. 38, no. 3,
p. 9, 2006.
[51] X. F. Wang and G. Chen, "Complex networks: small-world, scale-
free and beyond," IEEE circuits and systems magazine, vol. 3, no. 1,
pp. 6 -- 20, 2003.
[52] R. Albert and A.-L. Barab´asi, "Statistical mechanics of complex
networks," Reviews of modern physics, vol. 74, no. 1, p. 47, 2002.
[53] C. I. Del Genio, T. Gross, and K. E. Bassler, "All scale-free networks
are sparse," Physical review letters, vol. 107, no. 17, p. 178701, 2011.
[54] A. Agresti, Categorical Data Analysis, Second Edition, 2003.
[55] M. S. Granovetter, "The strength of weak ties," in Social networks.
Elsevier, 1977, pp. 347 -- 367.
[56] A. Rapoport, "Spread of information through a population with
socio-structural bias: I. assumption of transitivity," The bulletin of
mathematical biophysics, vol. 15, no. 4, pp. 523 -- 533, 1953.
[57] G. Kossinets and D. J. Watts, "Empirical analysis of an evolving
social network," science, vol. 311, no. 5757, pp. 88 -- 90, 2006.
[58] M. Al Hasan and V. S. Dave, "Triangle counting in large networks:
a review," Wiley Interdisciplinary Reviews: Data Mining and Knowl-
edge Discovery, vol. 8, no. 2, p. e1226, 2018.
[59] A. Itai and M. Rodeh, "Finding a minimum circuit in a graph,"
SIAM Journal on Computing, vol. 7, no. 4, pp. 413 -- 423, 1978.
[60] T. Schank and D. Wagner, "Finding, counting and listing all
triangles in large graphs, an experimental study," in International
workshop on experimental and efficient algorithms.
Springer, 2005,
pp. 606 -- 609.
[61] N. Alon, R. Yuster, and U. Zwick, "Finding and counting given
length cycles," Algorithmica, vol. 17, no. 3, pp. 209 -- 223, 1997.
[62] M. Latapy, "Main-memory triangle computations for very large
(sparse (power-law)) graphs," Theoretical computer science, vol. 407,
no. 1-3, pp. 458 -- 473, 2008.
[63] R. E. Tarjan and J. Van Leeuwen, "Worst-case analysis of set union
algorithms," Journal of the ACM (JACM), vol. 31, no. 2, pp. 245 -- 281,
1984.
[64] R. E. Tarjan, "A class of algorithms which require nonlinear time
to maintain disjoint sets," Journal of computer and system sciences,
vol. 18, no. 2, pp. 110 -- 127, 1979.
[65] L. Danon, A. Diaz-Guilera, J. Duch, and A. Arenas, "Comparing
community structure identification," Journal of Statistical Mechan-
ics: Theory and Experiment, vol. 2005, no. 09, p. P09008, 2005.
[66] L. Hubert and P. Arabie, "Comparing partitions," Journal of classi-
fication, vol. 2, no. 1, pp. 193 -- 218, 1985.
[67] A. F. McDaid, D. Greene, and N. Hurley, "Normalized mutual
information to evaluate overlapping community finding algo-
rithms," arXiv preprint arXiv:1110.2515, 2011.
[68] A. Lancichinetti and S. Fortunato, "Community detection algo-
rithms: a comparative analysis," Physical review E, vol. 80, no. 5, p.
056117, 2009.
[69] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast
unfolding of communities in large networks," Journal of statistical
mechanics: theory and experiment, vol. 2008, no. 10, p. P10008, 2008.
[70] M. Rosvall and C. T. Bergstrom, "Maps of random walks on
complex networks reveal community structure," Proceedings of the
National Academy of Sciences, vol. 105, no. 4, pp. 1118 -- 1123, 2008.
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
21
[71] J. Shao, Z. Han, Q. Yang, and T. Zhou, "Community detection
based on distance dynamics," in Proceedings of the 21th ACM
SIGKDD International Conference on Knowledge Discovery and Data
Mining. ACM, 2015, pp. 1075 -- 1084.
[72] A. Lancichinetti, S. Fortunato, and F. Radicchi, "Benchmark graphs
for testing community detection algorithms," Physical review E,
vol. 78, no. 4, p. 046110, 2008.
[73] J. Leskovec, K. J. Lang, and M. Mahoney, "Empirical comparison
of algorithms for network community detection," in Proceedings of
the 19th international conference on World wide web. ACM, 2010, pp.
631 -- 640.
[78] J. Yang and J. Leskovec, "Defining and evaluating network com-
munities based on ground-truth," Knowledge and Information Sys-
tems, vol. 42, no. 1, pp. 181 -- 213, 2015.
[79] A. Lancichinetti, S. Fortunato, and J. Kert´esz, "Detecting the
overlapping and hierarchical community structure in complex
networks," New Journal of Physics, vol. 11, no. 3, p. 033015, 2009.
[74] W. W. Zachary, "An information flow model for conflict and fission
in small groups," Journal of anthropological research, vol. 33, no. 4,
pp. 452 -- 473, 1977.
[75] J. D. Wilson, S. Wang, P. J. Mucha, S. Bhamidi, A. B. Nobel et al.,
"A testing based extraction algorithm for identifying significant
communities in networks," The Annals of Applied Statistics, vol. 8,
no. 3, pp. 1853 -- 1891, 2014.
[76] L. A. Adamic and N. Glance, "The political blogosphere and the
2004 us election: divided they blog," in Proceedings of the 3rd
international workshop on Link discovery. ACM, 2005, pp. 36 -- 43.
[77] V. Krebs, "Social network analysis software & services for organi-
zations, communities, and their consultants," 2013.
|
1602.00252 | 1 | 1602 | 2016-01-31T14:31:20 | Comment Diffusons-nous sur les R\'eseaux Sociaux ? | [
"cs.SI"
] | The emergence of new communication media such as blogs, online newspapers and social networks allow us to go further in the understanding of human behavior. Indeed, these public exchange spaces are now firmly planted in our modern society and appear to be powerful sensors of social behavior and opinion movements. In this paper, we focus on information spreading and attempt to understand what are the conditions in which a person decides to speak on a subject. For this purpose, we propose a set of measures that aim to characterize the diffusion behavior. Our measures have been used on messages related to two events that took place in January 2015: presentation by Microsoft of a new virtual reality headset and the election of a political party of radical left in Greece. | cs.SI | cs | Comment Diffusons-nous sur les Réseaux Sociaux ?
Erick STATTNER
Maitre de Conférences en Informatique
Université des Antilles
[email protected]
Information, influences et propagation via les médias en ligne
Communication de recherche
Mots-clés: Réseaux complexes; Média sociaux; Diffusion; Analyse et fouille de
données; Comportement humain
RESUME
L'émergence des nouveaux moyens de communication tels que les blogs, les
journaux en ligne ou les réseaux sociaux nous permettent d'aller plus loin dans la
compréhension des comportements humains. En effet, ces espaces d'échange
publiques sont aujourd'hui fermement ancrés dans nos sociétés modernes et
s'avèrent être de puissants capteurs des comportements sociaux et des mouvements
d’opinions. Dans ce travail, nous nous intéressons à la diffusion d'informations et
cherchons à comprendre quelles sont les conditions dans lesquelles une personne
décide de s'exprimer sur un sujet. Nous proposons pour cela un ensemble de
mesures qui visent à caractériser les comportements de diffusion. Nos mesures ont
été utilisées sur les messages liés à deux évènements ayant eu lieu au mois de Janvier
2015: la présentation par Microsoft d'un nouveau casque de réalité virtuelle et
l'élection d'un parti politique de gauche radical en Grèce.
1
I. INTRODUCTION
La capacité qu'ont aujourd'hui les medias sociaux à agréger les écrits, les opinions et
les pensées de l'humanité en font des outils puissants pour comprendre l'inconscient
collectif et identifier les tendances émergentes. De nombreux travaux ont par
exemple montré qu'un réseau social tel que Twitter est un extraordinaire capteur de
comportements sociaux qui renferme en son sein des indicateurs qui, une fois traités
et fouillés, permettent d'aborder des questions très larges telles que l'incidence d'une
épidémie dans une population (Gomide et al., 2011), le résultat d'une élection
politique (Tumasjan et al., 2010), l'évolution des indices de marché boursier (Bollen et
al., 2011) ou la prévision du revenu d'un film au box office (Asur et Huberman, 2010).
Dans ce travail, nous nous intéressons au problème de la diffusion d'informations et
cherchons à comprendre quelles sont les conditions dans lesquelles une personne
décide de s'exprimer sur un sujet. Ce problème est particulièrement intéressant
puisque l'émergence de ces mêmes médias sociaux a également redéfini nos
comportements de communication. D'une transmission d'informations de personne à
personne, longtemps qualifiée de "bouche à oreille", nous sommes aujourd'hui dans
l'ère de la communication impersonnelle, où nous retransmettons de l'information de
manière asynchrone sans contact personnalisé avec les potentiels destinataires.
Si de nombreux modèles de diffusion ont été proposés dans la littérature, tels que
modèles à compartiments (Mollison, 1995; Diekmann and Heesterbeek, 2000), des
modèles à métapopulation (Grenfell et al., 1997, Colizza et al. 2007) ou des modèles
basés sur les réseaux (Salathe and Jones, 2010; Stattner et al., 2012), ils visent à
reproduire les tendances globales observées, à travers des règles de transmission
simplifiées qui ne reflètent pas toute la complexité des comportements individuels
véritablement impliqués dans ces processus. Par exemple, en étudiant la diffusion de
fichiers dans un réseau pair-à-pair, Albano et al. (Albano et al., 2010) ont montré que
le modèle de diffusion classique SI (Susceptible-Infecté) ne reproduit pas fidèlement le
phénomène.
Le réseau social Twitter est un bon cas d'étude pour aborder le problème de la
diffusion puisque tous les sujets de société y sont abordés. Il possède une grande
variété d'utilisateurs: professionnels, particuliers, politiciens, associations, syndicats,
entreprises, etc. La plateforme est, de plus, utilisée par 200 millions d'utilisateurs et
500 millions de messages y sont publiés chaque jour1. Ainsi, les tendances observées
sur ce réseau fournissent des indicateurs pertinents pour comprendre comment
l'information se transmet et se propage dans une communauté.
Dans ce travail, nous utilisons donc Twitter comme média support et cherchons à
comprendre les comportements en termes de diffusion. Notre objectif est d'apporter
des éléments de réponse à des questions telles que:
(Qi) Un individu diffuse t-il parce qu'il se sait très écouté?
(Qii) Un individu diffuse t-il parce qu'il est inondé de messages par sa communauté?
(Qiii) Combien de temps attend un individu avant de s'exprimer?
1 source: www.blogdumoderateur.com/chiffres-twitter/
2
Pour répondre à ces questions, nous proposons un ensemble de mesures qui visent à
décrire le processus globalement et localement. Nous commençons par utiliser l'API
Twitter (Yamamoto, 2010) pour collecter tous les messages émis sur un sujet donné et
pour obtenir l'état de voisinage d'un individu à chaque fois qu'il s'exprime sur le
sujet ciblé. Nos mesures sont parallèlement calculées sur le jeu de données chaque
fois qu'un nouveau message est identifié.
Notre approche a été utilisée pour étudier pendant trois jours, les messages liés à
deux événements ayant eu lieu en Janvier 2015. Le vendredi 23, la présentation par
Microsoft d'un nouveau casque de réalité virtuelle appelé HoloLens et le Samedi 25,
l'élection du parti politique de gauche radical Syriza en Grèce. Ces événements ont
été choisis pour leur nature différente. D'une part un sujet technologique qu'on
suppose être relativement neutre, et de l'autre un sujet politique, naturellement plus
clivant, et susceptible de générer des discussions actives au sein du réseau. Les
résultats obtenus montrent qu'il existe une
les
comportements individuels de diffusion. Enfin, notre approche a été implémentée
dans un outil graphique, appelé ThotS, qui permet de mener une analyse en temps
réel sur toute sorte de sujets ciblés sur Twitter.
Ce papier est organisé en sept sections. La Section 2 présente les travaux pionnés
menés sur l'analyse de données issues de Twitter pour aborder différents
phénomènes. La Section 3 est consacrée à la méthodologie que nous proposons pour
caractériser le processus de diffusion. Les Sections 4 et 5 présentent les résultats
obtenus sur deux cas d'étude. La Section 6 décrit l'outil graphique ThotS qui
implémente l'approche proposée. Enfin, nous concluons dans la Section 7 et
présentons nos travaux futurs.
forte hétérogénéité dans
II. DE TWITTER A LA CONNAISSANCE
Twitter offre une gigantesque base de données, qui couvre à la fois les messages
publiés sur différentes catégories de sujets et des informations personnelles sur les
utilisateurs du système. Bien que les travaux menés sur l'analyse des données issues
de Twitter soient relativement récents, ils ont déjà permis d'aborder de nombreux
phénomènes du monde réel.
Par exemple, Guille et Favre (Guille et Favre, 2014) ont récemment proposé une
méthode qui analyse en temps réel les messages postés sur Twitter afin de détecter
l'apparition de pics de popularité sur des sujets. Contrairement à l'approche classique
appelée Peaky Topics (Shamma et al., 2011), qui repose sur une augmentation
soudaine de la fréquence d'apparition d'un mot ou d'une expression, la méthode
proposée est basée sur la notion de liens dynamiques, c'est-à-dire des messages
faisant référence à d'autres utilisateurs. Les auteurs montrent ainsi que la fréquence
des références est un indicateur du niveau d'intérêt que génère le sujet.
Dans un autre contexte, Sakaki et al. (Sakaki et al., 2010) s'intéressent à la détection
d'événements ciblés et proposent un algorithme capable de surveiller les messages
postés sur Twitter et de détecter ces événements. Ils se concentrent en particulier sur
la détection des tremblements de terre et ils montrent que leur système détecte les
tremblements de terre rapidement avec une forte probabilité (96% des tremblements
3
de terre recensés par l'Agence météorologique japonaise (JMA)). Leur approche a été
mise en oeuvre dans un système d'alertes qui fournit des notifications beaucoup plus
rapidement que les annonces envoyées par la JMA.
Sur le même principe, nous pouvons citer les travaux d'analyse des messages postés
sur Twitter menés par Gomide et al. (Gomide et al., 2011) pour évaluer l'incidence de
l'épidémie de dengue au Brésil en termes de perception du public et d'évolution
spatio-temporelles, ou les travaux de Velardi et al. (Velardi et al., 2014) pour la
détection précoce et l'analyse d'une épidémie dans une population.
Plus généralement, les messages issus de Twitter ont été utilisés pour étudier
différents types d'événements du monde réel. Tumasjan et al. s'intéressent par
exemple à l'élection fédérale allemande (Tumasjan et al., 2010). Ils observent que les
opinions présentes dans les messages mentionnant un parti reflètent le résultat des
élections. Dans (Bollen et al., 2011), les auteurs observent que l'humeur publique
extraite de messages sur Twitter peut améliorer la prédiction des indices de marché
boursier. Asur et Huberman vont plus loin et déclarent que les médias sociaux tels
que Twitter peuvent "prédire le futur" (Asur et Huberman, 2010). Ils démontrent leur
assertion en analysant les messages de Twitter pour prédire les recettes de films au
box-office.
Sakaki et al. tentent de généraliser ce type d'approche en soutenant que des médias
sociaux tels que Twitter peuvent être exploités pour étudier tout phénomène
présentant trois propriétés principales (Sakaki et al., 2011): (i) une apparition à
grande échelle, c'est-à-dire qu'un très grand nombre d'utilisateurs sont concernés, (ii)
une influence sur la vie quotidienne des gens, qui est la raison pour laquelle ils
décident de poster un ou plusieurs messages sur le sujet, et (iii) une dimension
spatiale et temporelle, de sorte qu'une analyse spatio-temporelle soit possible. Ces
propriétés sont couvertes par de nombreux phénomènes naturels tels que des
tremblements de terre, des ouragans, des tsunamis, etc., mais aussi des événements
sociaux tels que des événements sportifs, des conférences, des élections, etc.
III. MESURER LA DIFFUSION
Le site de micro-blogging Twitter (Le microblog est un dérivé du blog, qui permet de
publier des articles courts) peut être vu comme un immense réseau orienté (c’est-à-
dire qu’un lien de A vers B, n’implique pas nécessaire l’existence d’un lien de B vers
A) dans lequel chaque utilisateur (noeud du réseau) a un ensemble d'abonnés qui le
"suivent" appelés Followers et un ensemble d'utilisateurs auxquels il est abonné et qu’il
"suit", appelés Followings. L’ensemble des followers
et des followings constitue les liens du réseau. La
notion de "suivi" fait ici référence à l'intérêt pour le
contenu publié par un utilisateur.
La Figure 1 montre un exemple du réseau induit par
Twitter à travers les liens de suivi. Les utilisateurs 2
et 3 sont les Followers de l’utilisateur 1 et les
utilisateurs 4, 5 et 6 sont ses Followings.
Figure 1. Exemple de followers et
followings de l'utilisateur 1
4
Chaque utilisateur peut publier des messages, appelés Tweets, qui correspondent à
des textes courts qui n’excedent pas 140 caractères. Ces messages sont généralement
des nouvelles, des opinions sur un sujet donné ou des informations personnelles sur
la vie de l’utilisateur. Ils peuvent également contenir des liens vers des images, des
vidéos ou des articles. Les tweets sont affichés sur la page de profil de l'utilisateur et
sont présentés à ses followers. Un ensemble de meta-données est également associé à
chaque tweet telles que la date, le lieu, l’auteur, les liens et les hashtags utilisés, etc.
Twitter offre également la possibilité de retransmettre un tweet publié par un
utilisateur, ce concept est appelé le retweet. Le retweet est un moyen populaire de
propager un contenu intéressant à ses Followers. Ainsi, chaque fois qu'un utilisateur
publie un message, ses followers sont susceptibles de le lire et de le retransmettre à
l'attention de leurs propres followers, soit en retweetant le message original, soit en
publiant un nouveau tweet sur le même sujet.
Notre objectif est de comprendre quelles sont les conditions dans lesquelles une
personne décide de s’exprimer sur un sujet. Nous proposons pour cela un ensemble
de mesures que nous utilisons pour répondre aux questions (Qi), (Qii) et (Qiii)
présentées dans l'introduction. Plus concrètement, nous utilisons l'API Twitter pour
capturer en temps réel l'ensemble des messages émis sur un sujet donné. Chaque fois
qu’un message est publié sur le sujet ciblé, nous maintenons à jour deux types
d’indicateurs :
1.
Indicateurs globaux, qui visent à décrire globalement le processus et son
évolution dans le temps :
NbTw, NbRTw, NbUs: correspondent respectivement aux nombres
de tweets, de retweets et d’utilisateurs enregistrés sur la période
d’étude.
AVG(Tw/Us), AVG(RTw/Us) : correspondent respectivement aux
nombres moyens de tweets et de retweets publiés par utilisateur.
AVG(Ttw), AVG(Trtw): correspondent respectivement à la durée
moyenne (en secondes) entre deux tweets et deux retweets publiés
sur le sujet ciblé.
2.
Indicateurs locaux, qui visent à caractériser
l’environnement d’un
utilisateur u donné la première fois qu’il publie un message sur le sujet
ciblé.
NbFeu: représente le nombre de followers de l’utilisateur u.
NbFgPu: correspond au nombre de followings de l’utilisateur u qui
ont publié un message avant lui sur le sujet ciblé.
NbTu: est le nombre total de tweets publiés sur le sujet par
l’utilisateur u.
TotalRu: correspond au nombre total de messages envoyés par les
followings de l’utilisateur u.
Elapsedu: est le temps écoulé avant que l'utilisateur u s’exprime
pour la première fois (en heures).
Ces mesures ont été utilisées pour étudier deux événements ayant eu lieu en Janvier
2015: (a) le vendredi 23, la présentation par Microsoft d'un nouveau casque de réalité
virtuelle appelé HoloLens et (b) le Samedi 25, l'élection en Grèce du parti politique de
gauche radical Syriza. Les messages sur ces deux événements ont été collectés sur 72
5
heures. Nous précisons également que les résultats sont présentés avec le fuseau
horaire de Paris en France (UTC+1).
Les messages sur l’événement HoloLens ont été obtenus en capturant tous les tweets
contenant les mots-clés "HoloLens" ou "Holo Lens". De même, l’ensemble des
messages sur Syriza a été obtenu en capturant tous les messages contenant les mots-
clés "Syriza" ou "Tsipras". Enfin, nous précisons que la méthode de collecte n’est pas
sensible à la casse.
IV. COMPORTEMENTS MACROSCOPIQUES
(AVG(Ttw)
Dans une première approche, nous nous sommes concentrés sur le comportement
global des phénomènes étudiés. Notre objectif était de comprendre comment évolue
avec le temps la diffusion des messages, au travers des indicateurs globaux proposés
dans la section précédente. La Figure 2 montre, pour chacun des évènements,
l’évolution de ces indicteurs en fonction du temps : (a) nombre de tweets, de retweets
et de nouveaux utilisateurs (NbTw, NbRTw et NbUs), (b) nombre moyen de tweets et
de retweets par utilisateur (AVG(Tw/Us) et AVG(RTw/Us) et (c) temps moyen (en
secondes) entre deux tweets et
retweets
et
AVG(Trtw)).
Nous observons tout d’abord
que les deux évènements n’ont
pas la même amplitude: 46 317
tweets, 1 5633 retweets et 30 629
utilisateurs ont été collectés pour
HoloLens alors que pour Syriza
nous dénombrons
255
tweets, 94 780 retweets et 74 101
utilisateurs.
Nous
également
observer que dans les deux cas,
l'intérêt pour le sujet diminue
avec le temps (cf. Figure 2 (a)).
Cela se traduit par une baisse au
cours du temps du nombre de
messages (tweets et retweets) et
du
nouveaux
utilisateurs s'exprimant. Il est
également intéressant de noter la
différence dans le comportement
des utilisateurs pour ces deux
évènements. En effet, pour l'événement HoloLens, le nombre de nouveaux
utilisateurs est plus élevé que le nombre de retweets. Ce résultat laisse à penser que
pour le sujet technologique, les utilisateurs ont peu utilisé la fonctionnalité de retweet
et ont préféré soumettre leur propre message.
Figure 2. Evolution des indicateurs globaux
nombre
de
168
pouvons
6
En ce qui concerne le nombre moyen de messages (tweets et reteweets) par
utilisateur (cf. Figure 2 (b)), nous observons que pour les deux évènements, le
nombre de tweets par utilisateur est toujours supérieur à celui des retweets. Ce
résultat traduit le fait que les utilisateurs tendent à commenter eux-mêmes le sujet
plutôt que retweeter un message déjà soumis. En revanche, bien que le nombre
d'utilisateurs décroisse avec le temps (observé sur la Figure 2 (a)), nous notons que
sur le sujet politique, ceux qui poursuivent les discussions sont beaucoup plus actifs.
Cela se traduit en particulier par une hausse du nombre moyen de messages par
utilisateur, qui n'est pas observée dans le cas du sujet technologique. Ainsi, alors que
la communauté autour du sujet politique décroit, les utilisateurs qui maintiennent les
discussions sont, eux, plus actifs. Cela peut s’expliquer par la nature politique du
sujet, qui est plus enclin à générer des échanges actifs du type "argument/contre
argument".
Les résultats obtenus concernant le temps moyen entre deux messages sont très
intéressants (cf. Figure 2 (c)). Dans les deux événements, nous notons que le temps
écoulé entre deux retweets est toujours plus élevé que celui observé entre deux
tweets. Cela confirme notre précédente observation selon laquelle le nombre de
retweets est moins important. De plus, sur le cas Syriza, des motifs répétitifs peuvent
être observés, durant lesquels le temps entre deux messages est très faible, puis croît
considérablement avant de rechuter. Les périodes où le temps est le plus long
correspondent aux nuits en Europe. On peut supposer que les citoyens européens,
qui sont les plus concernés par l'événement, et donc les plus présents dans les
discussions, sont moins actifs durant ces périodes. Ces motifs ne s’observent pas dans
le cas de HoloLens. Cela peut être expliqué par le fait que le sujet de la réalité
augmentée est un sujet qui va au-delà des zones géographiques et qui fait réagir des
communautés présentes dans le monde entier.
V. VERS UNE DIFFUSION
COMPORTEMENTS INDIVIDUELS
INDUITE
PAR DES
Dans une deuxième approche, nous abordons le problème d’un point de vue local, en
étudiant les situations dans lesquelles un individu est le plus susceptible de
s’exprimer sur un sujet. Nous cherchons, en particulier, à répondre aux questions
soulevées dans l’introduction: (Qi) Un individu diffuse t-il parce qu'il se sait très
écouté? (Qii) Un individu diffuse t-il parce qu'il est inondé de messages par sa
communauté? (Qiii) Combien de temps attend un individu avant de s'exprimer?
Pour répondre à ces questions, nous nous intéressons à la distribution des indicateurs
locaux présentés à la Section III. La figure 3 montre les résultats obtenus pour les
deux évènements : (a) nombre de tweets envoyés (NbTu), (b) nombre de followers
(NbFeu), (c) nombre de followings qui se sont exprimés avant (NbFgPu), (d) nombre
total de messages reçus avant de publier son premier message (TotalRu) et (e) le
temps écoulé avant tweeting (Elapsedu).
Nous pouvons tout d’abord observer que la majorité des utilisateurs n’a publié qu’un
seul message (cf. Figure 3 (a)). En effet, environ 80% des utilisateurs n’ont envoyé
qu’un message dans le cas de HoloLens, contre 65% dans le cas de Syriza. Ce résultat
7
évènements. En
effet,
confirme une observation déjà faite
dans
la section précédente, selon
laquelle la majorité des utilisateurs
publie finalement peu de messages.
En ce qui concerne les résultats obtenus
pour
le nombre de followers des
individus qui publient (cf Figure 3 (b)),
les tendances sont similaires pour les
deux
la
distribution suit une loi de puissance
ce qui traduit le fait que la grande
majorité des personnes qui se sont
exprimées ont peu de followers. Il est,
de plus, particulièrement intéressant
de noter qu’un pourcentage élevé
d’utilisateurs ont posté un message
alors qu'ils n’ont aucun follower. Par
exemple, dans
le cas d’HoloLens,
environ 20% des individus ont publié
un message alors qu’il ne sont suivis
par aucun follower (16% dans le cas de
Syriza).
Ainsi, ces résultats n'accréditent pas la
thèse de l'influence du nombre de
followers sur le comportement de
diffusion comme formulée par la
question (Qi).
En revanche, les résultats obtenus pour
le nombre de followings à avoir publié
un message avant que l’utilisateur ne
poste lui-même un message sont assez
différents pour les deux évènements
(cf. Figure 3 (c)). En effet, pour le cas
HoloLens, environ 30% des utilisateurs
ont publié un message alors qu’aucun
de leur followings n’en avait soumis
(environ 7% pour Syriza). Ce résultat suggère que, dans le cas du sujet politique
étudié, les individus ont tendance à attendre les réactions des personnes qu’ils
suivent avant de réagir. Les mêmes tendances sont observées si on s’intéresse au
nombre total de messages envoyés par les followings d’un utilisateur avant qu’il
publie lui-même un message (cf. Figure 3 (d)). En effet, dans le cas d’HoloLens 30%
des utilisateurs ont publié un message sans qu’aucun de leur following n’en ait posté
(6,5% for Syriza).
Ainsi, les résultats obtenus ne montrent pas clairement que les personnes
attendent d'être submergées de messages par leur communauté avant de réagir,
comme suggéré par la question (Qii). Nous observons en effet une forte différence
dans les comportements de diffusion selon les sujets étudiés. Si pour le sujet
technologique les réactions ne semblent pas être dépendantes des messages reçus,
Figure 3. Distribution des indicateurs
locaux
8
pour le sujet politique, les utilisateurs semblent attendre les premières réactions
de leur communauté avant de réagir.
Enfin, en ce qui concerne le temps écoulé avant que les utilisateurs postent leur
premier message (cf. Figure 3 (e)), nous observons que pour les deux évènements, la
majeure partie des premières réactions survient durant les premières 24 heures. Elles
décroissent également avec le temps. Par exemple, pour le cas HoloLens, la moitié
des messages a été postée au cours des 24 premières heures (environ 62% pour
Syriza). Évidemment, le nombre de premières réactions diminue avec le temps, ce
qui reflète une perte d’'intérêt pour le sujet déjà observée dans nos résultats
précédents. Il est d’ailleurs intéressant de noter que certains utilisateurs postent des
messages pour la premiere fois jusqu'à 72 heures après le début de l’évènement :
environ 5% des individus pour HoloLens, contre 2% pour Syriza.
Ces résultats apportent ainsi des éléments de réponse à la question (Qiii), puisque
nous observons que les premières réactions ont lieu dans les premières heures
après le début de l'événement et diminuent fortement avec le temps.
Pour aller plus loin dans la compréhension de ces processus, nous avons cherché à
vérifier s’il existe des corrélations dans certains comportements de diffusion. Plus
particulièrement, nous cherchions à savoir si ceux qui postent le plus de messages
sont ceux qui ont le plus de followers, ou sont ceux qui ont été exposés au plus grand
nombre de messages de
leur
followings. La figure 4 montre les
résultats obtenus entre:
le
nombre total de messages postés
(NbTu)) et le nombre de followers
(NbFeu) ; (b) le nombre de messages
total des
postés
messages
par
les
publiés
followings (TotalRu).
tout
d’abord
Nous
individus qui
observer que
postent peu de messages (moins de
20) sont très hétérogènes en termes
de followers (cf. Figure 4 (a)).
Certains ont très peu de followers,
alors
ont
énormément. Cependant, si nous
nous concentrons sur les individus
qui se sont exprimés le plus, la population est beaucoup plus homogène. En effet, les
individus les plus actifs ne possèdent finalement que très peu de followers.
Ce résultat confirme, pour les deux évènements étudiés, la non-influence du
nombre de followers dans la quantité de messages envoyés par un utilisateur
comme le suggère la question (Qi).
Des tendances similaires sont observables en ce qui concerne les corrélations entre le
nombre de messages postés et le total des messages publiés par les followings (cf.
Figure 4 (b)). En effet, les individus qui s’expriment le moins sont très hétérogènes,
puisque nous y trouvons des individus dont les followings peuvent avoir envoyé très
Figure 4. Correlations d’attributs individuels
pouvons
(NbTu)) et
le
les
(a)
que
d’autres
en
9
peu ou énormément de messages. Cependant, la population composée des individus
les plus actifs est plus homogène, dans le sens où on y retrouve uniquement des
individus dont les followings ont publié peu de messages.
VI. THOTS: UN OUTIL DE COLLECTE ET D'ANALYSE
La méthodologie proposée a été implémentée dans un outil graphique appelé ThotS 2
(cf. capture d’écran Figure 5). ThotS a été conçu pour collecter et analyser en temps
réel les messages publiés sur Twitter. L'outil met en oeuvre les mesures globales et
locales proposées pour décrire le phénomène et travaille sur trois axes.
1. Collecte. ThotS
capture en temps réel
tous
les messages
publiés sur un sujet
donné. Les messages
filtrés
peuvent être
selon
différents
critères :
mot-clés,
langue, position, etc.
(cf. panneau gauche
les
Figure 5). Tous
messages
collectés
sont
sauvegardés
dans un fichier texte
pour une
analyse
future ou dans le but
d’une analyse avec des
logiciels
d’analyse
spécialisés dans la visualisation, l’extraction de connaissances, le big data, la
modélisation, etc.
2. Exploration. ThotS explore les données collectées selon les indicateurs globaux et
locaux présentés à la Section III. Les indicateurs sont calculés et accessibles en temps
réel, à travers des tableaux récapitulatifs (cf. panneau bas Figure 5) et des graphiques
montrant leur évolution au cours du temps (cf. panneau central Figure 5). Les
graphiques sont générés en utilisant l’API développée en JAVA JFreeChart (Gilbert,
2002). L’outil permet également de choisir les indicateurs à afficher et de les
superposer sur un même graphique.
Figure 5. Capture d'écran de ThotS
3. Extraction de connaissances. ThotS analyse enfin jusqu'au contenu des messages
pour en extraire toute l'essence, en fournissant une connaissance utile et directement
opérationnelle: meilleurs tweets, mots les plus utilisés, utilisateurs les plus actifs,
liens les plus cités, etc. (cf. panneau droite Figure 5).
2 ThotS: http://erickstattner.com/thots-analytics/
10
VII. CONCLUSION ET PERSPECTIVES
Dans cet article, nous avons abordé le problème de la diffusion d'informations sur les
medias sociaux. Contrairement aux approches traditionnelles qui se concentrent sur
différents types de modèles de diffusion pour comprendre ces phénomènes, nous
avons abordé ici le problème d'un autre point de vue en étudiant la diffusion à partir
de situations réelles survenant sur le site de micro-blogging Twitter.
La première étape de notre travail a consisté à proposer un ensemble de mesures qui
visent à décrire la diffusion globalement et localement. Ces mesures ont ainsi pu
mettre en lumière certaines dynamiques individuelles impliquées dans la diffusion
de messages liée à deux évènements ayant eu lieu en janvier 2015.
Cependant, bien que ces résultats aient permis d’apporter des éléments de réponse
sur les comportements de diffusion, nous devons garder à l'esprit qu’ils ne peuvent
être généralisés, puisque nous avons également observé que la sémantique du sujet
ciblé est une dimension à prendre en compte pour comprendre pleinement ces
phénomènes. Ainsi, à court terme, nous prévoyons d'étendre notre étude à d'autres
types de sujets, dans l'objectif de comprendre l’impact de la sémantique du sujet sur
les comportements.
Les résultats obtenus soulèvent également de nombreuses questions intéressantes
concernant la modélisation. En effet, la plupart des modèles de diffusion supposent
que la diffusion est induite par des règles très simples. A long terme, nous voulons
exploiter les tendances observées pour proposer des modèles plus réalistes tenant
compte des comportements individuels et la sémantique du phénomène.
Enfin, ce travail ouvre également des perspectives intéressantes en termes de
modélisation prédictive. En effet, les données recueillies pourraient être utilisées
pour construire des modèles prédictifs qui pourraient être en mesure de prédire,
pour un utilisateur donné, s’il transmettra une information.
BIBLIOGRAPHIE
A. Albano, J.-L. Guillaume, and B. L. Grand, “File diffusion in a dynamic peer-to-peer
network,” Mining Social Network Dynamic 2012 Workshop (MSND), 2012.
S. Asur and B. A. Huberman, “Predicting the future with social media,” in Web
Intelligence and Intelligent Agent Technology (WI-IAT), 2010 IEEE/WIC/ACM
International Conference on, vol. 1. IEEE, 2010, pp. 492–499.
J. Bollen, H. Mao, and X. Zeng, “Twitter mood predicts the stock market,” Journal of
Computational Science, vol. 2, no. 1, pp. 1–8, 2011.
V. Colizza, R. Pastor-Satorras, and A. Vespignani. Reaction–diffusion processes and
metapopulation models in heterogeneous networks. Nature Physics, 3(4), 276-282,
2007
11
O. Diekmann and J. A. P. Heesterbeek, Mathematical Epidemiology of Infectious
Diseases: Model Building, Analysis and Interpretation. Wiley Series in
Mathematical & Computational, Biology, 2000
D. Gilbert, “The jfreechart class library,” Developer Guide. Object Refinery, vol. 7,
2002.
J. Gomide, A. Veloso, W. Meira Jr, V. Almeida, F. Benevenuto, F. Ferraz, and M.
Teixeira, “Dengue surveillance based on a computational model of spatio-
temporal locality of twitter,” in Proceedings of the 3rd International Web Science
Conference. ACM, 2011, p. 3.
B. Grenfell and J. Harwood. "(Meta) population dynamics of infectious
diseases." Trends in ecology & evolution 12.10, 1997
A. Guille and C. Favre, “Une methode pour la detection de thematiques populaires
sur twitter,” in Actes de la conference EGC, 2014
D. Mollison, Epidemic Models: Their Structure and Relation to Data, Cambridge, Ed.
Cambridge University Press, 1995
T. Sakaki, M. Okazaki, and Y. Matsuo, “Earthquake shakes twitter users: real-time
event detection by social sensors,” in Proceedings of the 19th international
conference on World wide web. ACM, 2010, pp. 851–860.
M. Salathe and J. H. Jones, “Dynamics and control of diseases in networks with
community structure,” PLoS Comput Biol, vol. 6, 2010.
D. A. Shamma, L. Kennedy, and E. F. Churchill, “Peaks and persistence: modeling
the shape of microblog conversations,” in Proceedings of the ACM 2011
conference on Computer supported cooperative work. ACM, 2011, pp. 355–358.
E. Stattner, R. Eugenie and M. Collard, "How Do We Spread on Twitter?," IEEE Ninth
International Conference on Research Challenges in Information Science, May 13-
15 2015, Athens, Greece
E. Stattner, M. Collard, and N. Vidot, “D2snet: Dynamics of diffusion and dynamic
human behaviour in social networks,” Computers in Human Behavior, 2012.
A. Tumasjan, T. O. Sprenger, P. G. Sandner, and I. M. Welpe, “Predicting elections
with twitter: What 140 characters reveal about political sentiment.” ICWSM, vol.
10, pp. 178–185, 2010.
P. Velardi, G. Stilo, A. E. Tozzi, and F. Gesualdo, “Twitter mining for fine-grained
syndromic surveillance,” Artificial Intelligence in Medicine, 2014.
Y. Yamamoto. Twitter4J-A Java Library for the Twitter API, 2010.
12
|
1909.12642 | 1 | 1909 | 2019-09-27T12:15:58 | HateMonitors: Language Agnostic Abuse Detection in Social Media | [
"cs.SI",
"cs.CL"
] | Reducing hateful and offensive content in online social media pose a dual problem for the moderators. On the one hand, rigid censorship on social media cannot be imposed. On the other, the free flow of such content cannot be allowed. Hence, we require efficient abusive language detection system to detect such harmful content in social media. In this paper, we present our machine learning model, HateMonitor, developed for Hate Speech and Offensive Content Identification in Indo-European Languages (HASOC), a shared task at FIRE 2019. We have used a Gradient Boosting model, along with BERT and LASER embeddings, to make the system language agnostic. Our model came at First position for the German sub-task A. We have also made our model public at https://github.com/punyajoy/HateMonitors-HASOC . | cs.SI | cs | HateMonitors: Language Agnostic Abuse
Detection in Social Media
Punyajoy Saha1[0000−0002−3952−2514], Binny Mathew1[0000−0003−4853−0345],
Pawan Goyal1[0000−0002−9414−8166], and Animesh
Mukherjee1[0000−0003−4534−0044]
9
1
0
2
p
e
S
7
2
]
I
S
.
s
c
[
1
v
2
4
6
2
1
.
9
0
9
1
:
v
i
X
r
a
Indian Institute of Technology, Kharagpur, West Bengal, India - 721302
Abstract. Reducing hateful and offensive content in online social me-
dia pose a dual problem for the moderators. On the one hand, rigid
censorship on social media cannot be imposed. On the other, the free
flow of such content cannot be allowed. Hence, we require efficient abu-
sive language detection system to detect such harmful content in social
media. In this paper, we present our machine learning model, HateMon-
itor, developed for Hate Speech and Offensive Content Identification in
Indo-European Languages (HASOC) [19], a shared task at FIRE 2019.
We have used Gradient Boosting model, along with BERT and LASER
embeddings, to make the system language agnostic. Our model came
at First position for the German sub-task A. We have also made our
model public 1.
Keywords: Hate speech · Offensive language · Multilingual · LASER
embeddings · BERT embeddings · Classification.
1
Introduction
In social media, abusive language denotes a text which contains any form of
unacceptable language in a post or a comment. Abusive language can be divided
into hate speech, offensive language and profanity. Hate speech is a derogatory
comment that hurts an entire group in terms of ethnicity, race or gender. Of-
fensive language is similar to derogatory comment, but it is targeted towards
an individual. Profanity refers to any use of unacceptable language without a
specific target. While profanity is the least threatening, hate speech has the most
detrimental effect on the society.
Social media moderators are having a hard time in combating the rampant
spread of hate speech2 as it is closely related to the other forms of abusive
language. The evolution of new slangs and multilingualism, further adding to
the complexity.
Recently, there has been a sharp rise in hate speech related incidents in India,
the lynchings being the clear indication [3]. Arun et al. [3] suggests that hate
1 https://github.com/punyajoy/HateMonitors-HASOC
2 https://tinyurl.com/y6tgv865
2
P. Saha et al.
speech in India is very complicated as people are not directly spreading hate
but are spreading misinformation against a particular community. Hence, it has
become imperative to study hate speech in Indian language.
For the first time, a shared task on abusive content detection has been re-
leased for Hindi language at HASOC 2019. This will fuel the hate speech and
offensive language research for Indian languages. The inclusion of datasets for
English and German language will give a performance comparison for detection
of abusive content in high and low resource language.
In this paper, we focus on the detection of multilingual hate speech detection
that are written in Hindi, English, and German and describe our submission
(HateMonitors) for HASOC at FIRE 2019 competition. Our system concate-
nates two types of sentence embeddings to represent each tweet and use machine
learning models for classification.
2 Related works
Analyzing abusive language in social media is a daunting task. Waseem et al. [33]
categorizes abusive language into two sub-classes -- hate speech and offensive lan-
guage. In their analysis of abusive language, Classifying abusive language into
these two subtypes is more challenging due to the correlation between offensive
language and hate speech [10]. Nobata et al. [22] uses predefined language el-
ement and embeddings to train a regression model. With the introduction of
better classification models [23,29] and newer features [1,10,30], the research in
hate and offensive speech detection has gained momentum.
Silva et al. [28] performed a large scale study to understand the target of such
hate speech on two social media platforms: Twitter and Whisper. These target
could be the Refugees and Immigrants [25], Jews [7,14] and Muslims [4,32]. Peo-
ple could become the target of hate speech based on Nationality [12], sex [5,26],
and gender [24,16] as well. Public expressions of hate speech affects the devalua-
tion of minority members [17], the exclusion of minorities from the society [21],
and tend to diffuse through the network at a faster rate [20].
One of the key issues with the current state of the hate and offensive language
research is that the majority of the research is dedicated to the English language
on [15]. Few researchers have tried to solve the problem of abusive language in
other languages [25,27], but the works are mostly monolingual. Any online social
media platform contains people of different ethnicity, which results in the spread
of information in multiple languages. Hence, a robust classifier is needed, which
can deal with abusive language in the multilingual domain. Several shared tasks
like HASOC [19], HaSpeeDe [8], GermEval [34], AMI [13], HatEval [6] have
focused on detection of abusive text in multiple languages recently.
HateMonitors: Language Agnostic Abuse Detection in Social Media
3
3 Dataset and Task description
The dataset at HASOC 2019 3 were given in three languages: Hindi, English, and
German. Dataset in Hindi and English had three subtasks each, while German
had only two subtasks. We participated in all the tasks provided by the organisers
and decided to develop a single model that would be language agnostic. We used
the same model architecture for all the three languages.
3.1 Datasets
We present the statistics for HASOC dataset in Table 1. From the table, we can
observe that the dataset for the German language is highly unbalanced, English
and Hindi are more or less balanced for sub-task A. For sub-task B German
dataset is balanced but others are unbalanced. For sub-task C both the datasets
are highly unbalanced.
Table 1. This table shows the initial statistics about the training and test data
English
German
Language
Sub-Task A Train Test Train Test Train Test
407 136 2469 605
2261 288
3142 714 2196 713
3591 865
5852 1153 3819 850 4665 1318
HOF
NOT
Total
Hindi
Sub-Task B Train Test Train Test Train Test
111
556 190
210
676 197
86
1237 218
407 136 2469 605
1141 124
451
71
667
93
2261 288
HATE
OFFN
PRFN
Total
41
77
18
Sub-Task C Train Test Train Test Train Test
1545 542
924
63
2469 605
2041 245
220
43
2261 288
TIN
UNT
Total
- -
- -
- -
- -
- -
- -
3.2 Tasks
Sub-task A consists of building a binary classification model which can predict
if a given piece of text is hateful and offensive (HOF) or not (NOT). A data
point is annotated as HOF if it contains any form of non-acceptable language
such as hate speech, aggression, profanity. Each of the three languages had this
subtask.
Sub-task B consists of building a multi-class classification model which can
predict the three different classes in the data points annotated as HOF: Hate
3 https://hasoc2019.github.io/
4
P. Saha et al.
speech (HATE), Offensive language (OFFN), and Profane (PRFN). Again all
three languages have this sub-task.
Sub-task C consists of building a binary classification model which can predict
the type of offense: Targeted (TIN) and Untargeted (UNT). Sub-task C was not
conducted for the German dataset.
4 System Description
In this section, we will explain the details about our system, which comprises
of two sub-parts- feature generation and model selection. Figure 1 shows the
architecture of our system.
4.1 Feature Generation
Preprocessing: We preprocess the tweets before performing the feature ex-
traction. The following steps were followed:
-- We remove all the URLs.
-- Convert text to lowercase. This step was not applied to the Hindi language
since Devanagari script does not have lowercase and uppercase characters.
-- We did not normalize the mentions in the text as they could potentially
reveal important information for the embeddings encoders.
-- Any numerical figure was normalized to a string 'number'.
We did not remove any punctuation and stop-words since the context of the
sentence might get lost in such a process. Since we are using sentence embedding,
it is essential to keep the context of the sentence intact.
Feature vectors: The preprocessed posts are then used to generate features for
the classifier. For our model, we decided to generate two types of feature vector:
BERT Embeddings and LASER Embeddings. For each post, we generate the
BERT and LASER Embedding, which are then concatenated and fed as input
to the final classifier.
Multilingual BERT embeddings: Bidirectional Encoder Representations
from Transformers(BERT) [11] has played a key role in the advancement of
natural language processing domain (NLP). BERT is a language model which
is trained to predict the masked words in a sentence. To generate the sentence
embedding4 for a post, we take the mean of the last 11 layers (out of 12) to get
a sentence vector with length of 768.
LASER embeddings: Researchers at Facebook released a language agnos-
tic sentence embeddings representations (LASER) [2], where the model jointly
learns on 93 languages. The model takes the sentence as input and produces a
vector representation of length 1024. The model is able to handle code mixing
as well [31].
4 We use the BERT-base-multilingual-cased which has 104 languages, 12-layer, 768-
hidden, 12-heads and 110M parameters
HateMonitors: Language Agnostic Abuse Detection in Social Media
5
Fig. 1. Architecture of our system
We pass the preprocessed sentences through each of these embedding mod-
els and got two separate sentence representation. Further, we concatenate the
embeddings into one single feature vector of length 1792, which is then passed
to the final classification model.
4.2 Our Model
The amount of data in each category was insufficient to train a deep learning
model. Building such deep models would lead to overfitting. So, we resorted to
using simpler models such as SVM and Gradient boosted trees. Gradient boosted
trees [9] are often the choice for systems where features are pre-extracted from
the raw data5. In the category of gradient boosted trees, Light Gradient Boosting
Machine (LGBM) [18] is considered one of the most efficient in terms of memory
footprint. Moreover, it has been part of winning solutions of many competition
6. Hence, we used LGBM as model for the downstream tasks in this competition.
5 Results
The performance of our models across different languages for sub-task A are
shown in table 2. Our model got the first position in the German sub-task
with a macro F1 score of 0.62. The results of sub-task B and sub-task C is
shown in table 3 and 4 respectively.
5 https://tinyurl.com/yxmuwzla
6 https://tinyurl.com/y2g8nuuo
SentencesPre-processing moduleLASERMultilingual BERTsentenceembedding1024 X 1sentenceembedding768 X 1ConcatenateLGBMLabels6
P. Saha et al.
Table 2. This table gives the language wise result of sub-task A by comparing the
macro F1 values
Language English German Hindi
0.76
0.79
0.78
HOF
NOT
Total
0.59
0.79
0.69
0.36
0.87
0.62
Table 3. This table gives the language wise result of sub-task B by comparing the
macro F1 values
Language English German Hindi
0.29
0.29
0.59
0.79
0.49
HATE
OFFN
PRFN
NONE
Total
0.28
0.00
0.31
0.79
0.34
0.04
0.0
0.19
0.87
0.28
Table 4. This table gives the language wise result of sub-task C by comparing the
macro F1 values
Language English Hindi
0.63
0.17
0.79
0.53
TIN
UNT
NONE
Total
0.51
0.11
0.79
0.47
6 Discussion
In the results of subtask A, models are mainly affected by imbalance of the
dataset. The training dataset of Hindi dataset was more balanced than English
or German dataset. Hence, the results were around 0.78. As the dataset in
German language was highly imbalanced, the results drops to 0.62. In subtask
B, the highest F1 score reached was by the profane class for each language in
table 3. The model got confused between OFFN, HATE and PRFN labels which
suggests that these models are not able to capture the context in the sentence.
The subtask C was again a case of imbalanced dataset as targeted(TIN) label
gets the highest F1 score in table 4.
7 Conclusion
In this shared task, we experimented with zero-shot transfer learning on abusive
text detection with pre-trained BERT and LASER sentence embeddings. We
use an LGBM model to train the embeddings to perform downstream task. Our
model for German language got the first position. The results provided a strong
baseline for further research in multilingual hate speech. We have also made the
models public for use by other researchers7.
7 https://github.com/punyajoy/HateMonitors-HASOC
HateMonitors: Language Agnostic Abuse Detection in Social Media
7
References
1. Alorainy, W., Burnap, P., Liu, H., Williams, M.: The enemy among us: Detect-
ing hate speech with threats based'othering'language embeddings. arXiv preprint
arXiv:1801.07495 (2018)
2. Artetxe, M., Schwenk, H.: Massively multilingual sentence embeddings for zero-
shot cross-lingual transfer and beyond. CoRR abs/1812.10464 (2018), http://
arxiv.org/abs/1812.10464
3. Arun, C.: On whatsapp, rumours, and lynchings. Economic & Political Weekly
54(6), 30 -- 35 (2019)
4. Awan, I.: Islamophobia on social media: A qualitative analysis of the facebook's
walls of hate. International Journal of Cyber Criminology 10(1) (2016)
5. Bartlett, J., Norrie, R., Patel, S., Rumpel, R., Wibberley, S.: Misogyny on twitter.
Demos (2014)
6. Basile, V., Bosco, C., Fersini, E., Nozza, D., Patti, V., Pardo, F.M.R., Rosso,
P., Sanguinetti, M.: Semeval-2019 task 5: Multilingual detection of hate speech
against immigrants and women in twitter. In: Proceedings of the 13th International
Workshop on Semantic Evaluation. pp. 54 -- 63 (2019)
7. Bilewicz, M., Winiewski, M., Kofta, M., W´ojcik, A.: Harmful ideas, the structure
and consequences of anti-s emitic beliefs in p oland. Political Psychology 34(6),
821 -- 839 (2013)
8. Bosco, C., Felice, D., Poletto, F., Sanguinetti, M., Maurizio, T.: Overview of the
evalita 2018 hate speech detection task. In: EVALITA 2018-Sixth Evaluation Cam-
paign of Natural Language Processing and Speech Tools for Italian. vol. 2263,
pp. 1 -- 9. CEUR (2018)
9. Chen, T., Guestrin, C.: Xgboost: A scalable tree boosting system. CoRR
abs/1603.02754 (2016), http://arxiv.org/abs/1603.02754
10. Davidson, T., Warmsley, D., Macy, M., Weber, I.: Automated hate speech detection
and the problem of offensive language. arXiv preprint arXiv:1703.04009 (2017)
11. Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirec-
tional transformers for language understanding. CoRR abs/1810.04805 (2018),
http://arxiv.org/abs/1810.04805
12. Erjavec, K., Kovacic, M.P.: you don't understand, this is a new war! analysis of
hate speech in news web sites' comments. Mass Communication and Society 15(6),
899 -- 920 (2012)
13. Fersini, E., Nozza, D., Rosso, P.: Overview of the evalita 2018 task on automatic
misogyny identification (ami). In: EVALITA@ CLiC-it (2018)
14. Finkelstein, J., Zannettou, S., Bradlyn, B., Blackburn, J.: A quantitative approach
to understanding online antisemitism. arXiv preprint arXiv:1809.01644 (2018)
15. Fortuna, P., Nunes, S.: A survey on automatic detection of hate speech in text.
ACM Computing Surveys (CSUR) 51(4), 85 (2018)
16. Gatehouse, C., Wood, M., Briggs, J., Pickles, J., Lawson, S.: Troubling vulnerabil-
ity: Designing with lgbt young people's ambivalence towards hate crime reporting.
In: Proceedings of the 2018 CHI Conference on Human Factors in Computing
Systems. p. 109. ACM (2018)
17. Greenberg, J., Pyszczynski, T.: The effect of an overheard ethnic slur on evalua-
tions of the target: How to spread a social disease. Journal of Experimental Social
Psychology 21(1), 61 -- 72 (1985)
18. Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W.J., Ma, W., Ye, Q., Liu, T.M.:
Lightgbm: A highly efficient gradient boosting decision tree. In: NIPS (2017)
8
P. Saha et al.
19. Mandl, T., Modha, S., Patel, D., Dave, M., Mandlia, C., Patel, A.: Overview of
the HASOC track at FIRE 2019: Hate Speech and Offensive Content Identification
in Indo-European Languages). In: Proceedings of the 11th annual meeting of the
Forum for Information Retrieval Evaluation (December 2019)
20. Mathew, B., Dutt, R., Goyal, P., Mukherjee, A.: Spread of hate speech in online
social media. In: Proceedings of the 10th ACM Conference on Web Science. pp.
173 -- 182. ACM (2019)
21. Mullen, B., Rice, D.R.: Ethnophaulisms and exclusion: The behavioral conse-
quences of cognitive representation of ethnic immigrant groups. Personality and
Social Psychology Bulletin 29(8), 1056 -- 1067 (2003)
22. Nobata, C., Tetreault, J., Thomas, A., Mehdad, Y., Chang, Y.: Abusive language
detection in online user content. In: Proceedings of the 25th international confer-
ence on world wide web. pp. 145 -- 153. International World Wide Web Conferences
Steering Committee (2016)
23. Qian, J., ElSherief, M., Belding, E., Wang, W.Y.: Hierarchical cvae for fine-grained
hate speech classification. In: Proceedings of the 2018 Conference on Empirical
Methods in Natural Language Processing. pp. 3550 -- 3559 (2018)
24. Reddy, V.: Perverts and sodomites: Homophobia as hate speech in africa. Southern
African Linguistics and Applied Language Studies 20(3), 163 -- 175 (2002)
25. Ross, B., Rist, M., Carbonell, G., Cabrera, B., Kurowsky, N., Wojatzki, M.: Mea-
suring the reliability of hate speech annotations: The case of the european refugee
crisis. arXiv preprint arXiv:1701.08118 (2017)
26. Saha, P., Mathew, B., Goyal, P., Mukherjee, A.: Hateminers: Detecting hate speech
against women. arXiv preprint arXiv:1812.06700 (2018)
27. Sanguinetti, M., Poletto, F., Bosco, C., Patti, V., Stranisci, M.: An italian twitter
corpus of hate speech against immigrants. In: Proceedings of the Eleventh Inter-
national Conference on Language Resources and Evaluation (LREC-2018) (2018)
28. Silva, L.A., Mondal, M., Correa, D., Benevenuto, F., Weber, I.: Analyzing the
targets of hate in online social media. In: ICWSM. pp. 687 -- 690 (2016)
29. Stammbach, D., Zahraei, A., Stadnikova, P., Klakow, D.: Offensive language detec-
tion with neural networks for germeval task 2018. In: 14th Conference on Natural
Language Processing KONVENS 2018. p. 58 (2018)
30. Unsvag, E.F., Gamback, B.: The effects of user features on twitter hate speech
detection. In: Proceedings of the 2nd Workshop on Abusive Language Online
(ALW2). pp. 75 -- 85 (2018)
S.: Code-switching: Hindi-english. Lingua
38(2),
--
31. Verma,
(1976).
http://www.sciencedirect.com/science/article/pii/0024384176900772
165
https://doi.org/https://doi.org/10.1016/0024-3841(76)90077-2,
153
32. Vidgen, B., Yasseri, T.: Detecting weak and strong islamophobic hate speech on
social media. arXiv preprint arXiv:1812.10400 (2018)
33. Waseem, Z., Davidson, T., Warmsley, D., Weber, I.: Understanding abuse: A ty-
pology of abusive language detection subtasks. arXiv preprint arXiv:1705.09899
(2017)
34. Wiegand, M., Siegel, M., Ruppenhofer, J.: Overview of the germeval 2018 shared
task on the identification of offensive language (2018)
|
1501.01270 | 1 | 1501 | 2015-01-06T19:21:24 | Using Linear Dynamical Topic Model for Inferring Temporal Social Correlation in Latent Space | [
"cs.SI"
] | The abundance of online user data has led to a surge of interests in understanding the dynamics of social relationships using computational methods. Utilizing users' items adoption data, we develop a new method to compute the Granger-causal (GC) relationships among users. In order to handle the high dimensional and sparse nature of the adoption data, we propose to model the relationships among users in latent space instead of the original data space. We devise a Linear Dynamical Topic Model (LDTM) that can capture the dynamics of the users' items adoption behaviors in latent (topic) space. Using the time series of temporal topic distributions learned by LDTM, we conduct Granger causality tests to measure the social correlation relationships between pairs of users. We call the combination of our LDTM and Granger causality tests as Temporal Social Correlation. By conducting extensive experiments on bibliographic data, where authors are analogous to users, we show that the ordering of authors' name on their publications plays a statistically significant role in the interaction of research topics among the authors. We also present a case study to illustrate the correlational relationships between pairs of authors. | cs.SI | cs | Using Linear Dynamical Topic Model for Inferring
Temporal Social Correlation in Latent Space
Freddy Chong Tat Chua, Richard J. Oentaryo, and Ee-Peng Lim
Living Analytics Research Centre
School of Information Systems
Singapore Management University
80 Stamford Road, Singapore 178902
Abstract
The abundance of online user data has led to a surge of interests in
understanding the dynamics of social relationships using computational
methods. Utilizing users’ items adoption data, we develop a new method
to compute the Granger-causal (GC) relationships among users. In order
to handle the high dimensional and sparse nature of the adoption data,
we propose to model the relationships among users in latent space instead
of the original data space. We devise a Linear Dynamical Topic Model
(LDTM) that can capture the dynamics of the users’ items adoption be-
haviors in latent (topic) space. Using the time series of temporal topic
distributions learned by LDTM, we conduct Granger causality tests to
measure the social correlation relationships between pairs of users. We call
the combination of our LDTM and Granger causality tests as Temporal
Social Correlation. By conducting extensive experiments on bibliographic
data, where authors are analogous to users, we show that the ordering of
authors’ name on their publications plays a statistically significant role
in the interaction of research topics among the authors. We also present
a case study to illustrate the correlational relationships between pairs of
authors.
1
Introduction
Rapid advances in social media and internet technologies have led to the gen-
eration of massive user data in digital forms. This gives rise to an important
question: How do users relate to and socially influence one another? Social in-
fluence is the mechanism of a user modifying her behavior or attributes so as to
be more similar to her other socially connected users. For many decades, social
scientists recognize the importance of social influence contributing to homophily
in social networks, and have embarked on research that determine and measure
the effect of social influence on homophily [32, 23]. Measuring social influence
has many practical applications; for instance, it provides an effective means to
1
target influential individuals for product marketing, or to identify pivotal peo-
ple in an organization for optimizing corporate management as well as driving
innovations.
In this paper, we define social influence from a user i to another user j as
“the actions of i causes j to perform a set of actions in the future”. Social
influence has been previously studied by various researchers [20, 39, 55, 15].
However, their approaches do not take into account the temporal aspects of so-
cial influence. Instead of analyzing users’ past and future actions, they consider
user actions independent of their timestamps.
Many existing works also fail to account for the causality aspect of social
influence. Knowing how user i’s past actions can predict user j’s future actions
better than j’s past actions is only a necessary condition and not sufficient
for finding social influence. Since the definition of social influence reflects the
widely discussed notion of causality [27, 43], the sufficient condition for finding
social influence requires us to exclude other external factors that could affect
the actions of j. That is, we need to eliminate the confounding variables that
give doubt to the predictive power of i’s and j’s past on j’s future [28].
It is generally difficult, however, to satisfy this sufficient condition, due to
the absence of complete user data capturing all external factors that influence
the users’ actions. There is also a need to conduct randomized controlled exper-
iments [29, 47], which is very challenging in practice. Given these difficulties,
we relax our assumptions and use a simplified notion of social influence, known
as Temporal Social Correlation (TSC), whereby we ignore the presence of con-
founding variables, and assume that users who are socially correlated tend to
make similar choices over time.
1.1 Problem Formulation
We apply the aforementioned notion of social influence for the analysis of users’
items adoption behavior. We use the term “users adopting items” to refer to
any action of a user on items reflecting her preferences. The concept of users
adopting items can be applied in various contexts, e.g., users watching movies,
users joining online communities [16, 18], or users producing words [17].
In this research, we model social influence-driven changes in users’ adop-
tion behavior as a form of information transfer between users. We first obtain
the time series representation of users’ behavior using our proposed Linear Dy-
namical Topic Model (LDTM), then we quantify the information transfer us-
ing Granger causality (GC) tests [28], resulting in the derived Temporal Social
Correlation (TSC) values between two users. We say that “j follows i” or “i
transfers information to j” when Temporal Social Correlation (TSC) exists from
i to j at the time point of their interaction τ ; we denote this as T SC(i → j, τ ).
With respect to our simplified notion of social influence, we shall hereafter use
the term “follow”, “information transfer” or “Granger cause” in place of “social
influence”, since causality cannot be proven adequately without randomized ex-
periments. It is also worth noting that T SC(i → j, τ ) and T SC(j → i, τ ) are
not necessarily the same.
2
t = 1
t = 2
t = 3
a
b
c
d
e
j
i
a
b
c
d
e
j
i
a
b
c
d
e
j
i
Adoption Link
Social Link
Item
User
Figure 1: Example of Temporal Social Correlation from i to j in temporal
adoption data
As an illustration for Temporal Social Correlation in temporal item adoption
data, consider the pedagogical example in Figure 1. The figure shows two users
i and j adopting different subsets of five items over three time steps. When
temporal information is missing, we could only observe the adoption states at
the last time step (i.e., t = 3), but based on the most recent states alone we
cannot tell whether i follows j or j follows i. Only by observing the adoption
states of t = 1 and t = 2, we can infer that j progressively follows i in adopting
item c at t = 2 and item d at t = 3. The converse is unlikely because i’s adoption
states remain the same over time. In other words, i’s adoption states at t = 1
is sufficient to predict her states for t > 1.
We can further generalize the example in Figure 1, and arrive at the following
problem formulation: Given a set of users U and a set of items V that U
adopt from time step 1 to T , determine the T SC(i → j, τ ) and T SC(j → i, τ )
for all pair of users i, j ∈ U when i and j interacts at a specific time point
τ ∈ {1, . . . , T }. When T SC(i → j, τ ) > T SC(j → i, τ ), we can say that i
influences j, or j follows i.
1.2 Measuring Causality in Adoption Data
To quantify T SC(i → j, τ ) in item adoption data, one can take a straightfor-
ward approach, directly derived from the data. First, the raw frequencies of the
adopted items for users i and j at time step t can be represented as adoption vec-
tors vi,t ∈ RM and vj,t ∈ RM respectively, where M is the total number of items.
Vectors for each user i over T time steps form a time series {vi,1, . . . , vi,T }. (An
additional normalization step, e.g., Term Frequency and Inverse Document Fre-
quency (TF-IDF), may be performed a priori on the raw frequencies to balance
the importance of popular and unique items.) Subsequently, one can compare
the time series {vi,1, . . . , vi,T } and {vj,1, . . . , vj,T } and measure social influence
3
by computing T SC(i → j, τ ) and T SC(j → i, τ ).
Despite the simplicity, this direct approach gives rise to several issues:
1. The adoption vectors vi,t are usually high dimensional in practice, i.e., the
number of items M is often large. As a result, comparing vectors vi,t and
vj,t of two users i and j would be computationally demanding (even with
a linear-time algorithm).
2. A related issue is the sparse nature of the adoption vectors vi,t, since each
user only adopts a small subset of items at a particular time t. Comparing
two sparse vectors will hardly yield any indication of significant relation-
ship between them, because we ignore the co-occurrences of different items
adopted by the users.
3. Since the adoption counts accumulate over time, the rate of change in vi,t
relative to its previous time step vi,t−1 will gradually decay and become
marginally small. At this point, the time series representing the user i’s
behavior becomes stagnant. As T SC measures how users change their
behavior due to other users, stagnant time series can hardly show any
correlation effects among the interacting users.
4. If the time series {vi,1, . . . , vi,T } and {vj,1, . . . , vj,T } of users i and j are
observed for a long period (i.e., large T ), their comparison may give a
misleading conclusion that no influence exists, because the T SC between
the two users typically takes place within a specific time window.
1.3 Proposal and Contributions
To address issues 1) and 2), there is a need for a temporal latent factor model
that can induce from sparse and high dimensional data, a compressed latent
representation of the adoption behaviors over time. The latent representation
should also exhibit good semantic interpretability. To handle issue 3), one may
learn the users’ latent factors at each time step independently. However, such
naıve approach is biased towards the most recent information and subject to
catastrophic ignorance of the past behaviors. Normally, a user does not change
her behavior abruptly and there should be a smooth, decaying transition of
the user’s latent factors over time. In consideration of the necessity for smooth
transition of users’ latent factors, we develop a method to automatically estimate
a set of decay parameters for balancing between the importance of past and
recent information. Finally, to address issue 4), we need to specify a time
window for constraining the comparison period in which T SC is measured.
To fulfill these requirements, we propose in this paper a novel Linear Dynam-
ical Topic Model (LDTM). The proposed model represents each user’s adoption
behavior as topic distribution (i.e., latent factors) at different time steps, and
the evolution of the topic distribution is captured using the concept of Linear
Dynamical Systems (LDS) [19, 25, 46, 54]. Based on the topic distributions
learned by LDTM, we can then conduct Granger causality tests to determine
the social influence between pairs of users.
4
Deviating from the traditional methods that operate on the original data
space, the proposed LDTM provides a novel inductive approach facilitating dis-
covery of social influence and causality in latent topic space. To the best of our
knowledge, LDTM is also the first kind of dynamic topic model that compre-
hensively models the dynamics of the users’ adoption behaviors by leveraging
on the LDS concept. We summarize our key contributions as follows:
1. Utilizing LDS to model the transition of topic distributions over time, we
can automatically compute, for each user n, a dynamics matrix An,t that
contains the decay parameters of the user’s adoption behavior at every
time step. Such transition modeling via dynamics matrix An,t has not
been proposed in any topic models.
2. For LDS estimation on the topic distribution parameters, we develop a
forward inference algorithm based on the idea of Kalman Filter (KF) [31].
The optimization of the dynamics matrix An,t is done in such a way that
maintains the notion of decaying adoption behavior, while ensuring that
the temporal correlations of parameters in each topic distribution remains
numerically stable.
3. For inference of the decay parameters in An,t, we develop a new alternative
method that aims at minimizing the Kullback-Leibler (KL) divergence be-
tween the expected posterior distribution at time step t and the expected
prior distribution at time step t. This approach conforms nicely to the
notion of smooth transition in the users’ latent factors. In addition, it is
computationally simpler and more efficient than traditional LDS methods,
which first perform the Rauch-Tung-Striebel (RTS) smoothing algorithm
[44] for backward inference and then an additional optimization step to
derive the dynamics matrix [25, 46].
4. Based on the temporal topic distributions derived by LDTM, we are able to
identify information transfer between pairs of users by means of Granger
causality tests. Through extensive experiments on bibliographic data,
including DBLP and ACMDL datasets, we find evidences for Granger
causality among the paper co-authors. Our statistical significance tests
also reveal that the ordering of the co-authors’ names plays a role in
determining the information transfer among them.
The remainder of this paper is organized as follows. In Section 2, we first
review several works related to our research. Section 3 discusses several desider-
ata in modeling temporal adoption data. The proposed LDTM is subsequently
presented in Section 4, followed by the procedure for the Granger causality test
in Section 5. Section 6 presents the experimental results and discussions using
the bibliographic datasets. Finally, Section 7 concludes this paper.
5
2 Related Work
We first introduce the classical concepts on social influence in Section 2.1, and
present a review of the existing latent factor approaches for modeling temporal
data in Section 2.2. We also cover in Section 2.3 some related works that use
some of latent factor modeling and influence concepts but in a significantly
different way from our approach.
2.1 Social Influence
To eliminate confounding variables for proving the existence of social influ-
ence, researchers use randomized experiments that involve treatment and con-
trol groups.
[6] created a Facebook application to test whether broadcast or
personalized messages have social influence on friends of a recruited user. [11]
conducted experiments on Facebook users to study whether online political mes-
sages could influence the voting decisions of users.
[42] studied how the votes
of news articles affected the articles’ discussions .
An alternative to randomized experiments is to perform quasi-experiments.
This approach is similar to the traditional randomized experiments, but lacks
the element of random assignment to treatment or control.
Instead, quasi-
experimental designs typically allow us to control the assignment to the treat-
ment condition, but using some criterion other than random assignment.
[5]
adapted matched sampling technique in Yahoo! Messenger data to distinguish
between influence and homophily in the adoption of a mobile service applica-
tion (Yahoo! Go) .
[4] proposed the shuffle test to distinguish influence from
homophily.
Research on social influence has revolved around the adoption of a single
item and satisfaction of the confounding condition. The research we pursue in
this paper is different in several ways. First, we consider a set of items adopted
by users instead of just a single item. Second, we propose LDTM to translate the
high-dimensional set of items adopted by users into a low-dimensional temporal
latent representation.
While existing works prove the existence of social influence in the adoption
of item for users, the social influence is expressed as a discrete value that sim-
ply indicates presence or absence of influence. By contrast, we propose to use
Granger causality measure to quantify the level of social influence between every
pair of users, indicating how correlated their adoption behavior are over time.
2.2 Temporal Latent Factor Models
In general, there are two forms of temporal latent factor models. The first
form seeks to obtain more accurate latent factors in the temporal domain by
obtaining latent factors that globally approximate the observed data [3, 9, 33,
34, 54, 60, 63]. The other form known as online learning focuses on the efficiency
of handling real time streaming data by maximizing the likelihood of the latent
6
factors to fit the observed data from the most recent time window only [2, 13,
14, 26, 30, 41, 48, 59].
We note that the online learning models are extensions of latent factor mod-
els that are themselves not necessarily designed for dynamic data, but for effi-
cient learning of new model parameters given new additional data. In this paper,
we are concerned with modeling user behavioral data using some dynamic latent
factor models, instead of the online learning of the dynamic models.
[9] proposed Dynamic Topic Model (DTM) for text documents. DTM was
extended from the Latent Dirichlet Allocation (LDA) [10] to model the evolution
of words within topics, i.e. words prominently used in a particular topic at a
particular time step will be replaced by a different set of words at a later time.
However, our requirement is slightly different. Instead of the evolution of topic-
word distributions, we focus on the evolution of document-topic distributions.
The evolution of document-topic distributions has not been considered pre-
viously in LDA-based models (e.g. DTM), because LDA is mainly used for
modeling text documents that remain static over time. Hence, DTM does not
consider the evolution of users’ behavior in the way we do. When we apply
LDA for modeling users’ behavior, the users replace the role of the documents,
while the adopted items replace the words. In our work, we assume that topic-
item distributions remain static over time while the human users’ evolve their
preferences over time. Since the generative process in DTM does not meet our
temporal requirements, we are motivated to develop LDTM that extends static
LDA by utilizing the concepts of Linear Dynamical System (LDS).
For modeling users’ behavior, [3] used an exponential decay function to
model the decay of users’ search intent on search engines. But they assume
that the parameters of the decay function remain constant for all topics and
all users. On the contrary, we assume that there is a decay parameter for each
topic and that the decay parameters vary for each user. We aim to estimate the
decay parameters automatically, which are representative of the users’ temporal
behavior.
To automatically determine the natural decay of each topic, [60] proposed a
non-Markovian approach that models the trend of topics evolution. The key idea
is to associate additional Beta distribution with each topic in order to generate
the time stamps of the words sampled from the topics. But this approach
assumes that each topic is only relevant for each specific time period, and does
not directly model the evolution of user behavior.
Latent factor models have also been widely used for collaborative filtering
in recommendation tasks, and several researchers have proposed dynamic latent
factor models for handling temporal data [33, 34, 54, 63]. However, these ap-
proaches have always been focused on predicting users’ ratings on items, and
so their models cannot be directly applied for modeling users’ items adoptions.
Nevertheless, owing to the similarity in the fundamental concept of dynamicity
in latent factors, we give an overview of these works here.
[33, 34] developed TimeSVD++ to address temporal dynamics through a
specific parameterization with factors drifting from a central time. Koren as-
sumed that users’ item ratings remain static over time, since users do not rate
7
the same items in different time periods. However, in item adoption scenario,
users could adopt the same items at different time periods with different fre-
quency.
[63] extended the factorization of users’ item ratings from a static RM ×N
matrix to a RM ×N ×T tensor, where N , M , and T represent the number of
users, items, and time steps respectively. Three sets of latent factors were
derived from their tensor factorization method (rather than just two in matrix
factorization case). The additional set of latent factor, known as the time latent
factor, can be used to derive the temporal users’ and items’ latent factors from
its multiplication. But such time latent factor assumes that the items’ latent
factor evolves over time in the same way as the users’ latent factors. However,
we require the items’ latent factor to remain static, while allowing only the
users’ latent factors to change.
[54] proposed Dynamic Matrix Factorization (DMF) which uses Linear Dy-
namical Systems (LDS) [25, 46, 51, 53]. The centerpiece of this work is a dy-
namic state-space model that builds upon probabilistic matrix factorization in
[50, 49] and Kalman filter/smoothing [31, 44] in order to provide recommenda-
tions in the presence of process and measurement noises. Although the LDS
component of DMF is able to model the evolution of users’ behavior, the latent
factors obtained by [54] are not constrained to be non-negative. Hence, their
approach is not able to provide intuitive interpretation on the preferences of
users’ adoption behavior.
To summarize, all these prior works fail to satisfy the following requirements
for inferring temporal social dependencies between users: 1) They are not explic-
itly designed to model item adoption data. 2) They do not obtain non-negative
latent factors for easy interpretation of the users’ behavior. 3) They neither as-
sume that users’ behavior can decay over time nor show how the users’ behavior
can evolve over time.
We combine the LDA and LDS approaches to obtain LDTM. Our LDTM is
able to model the users’ items adoption data, obtain probabilistic (non-negative)
latent factors for characterizing user behavior over time, and automatically infer
the optimal decay parameters for each user at different time steps.
2.3 Topic-based Influence Measures
To model a set of items for diffusion or inferring influence, many authors [20,
22, 24, 39, 40, 55, 56, 57, 61, 62]. have also turned to the use of topic models.
[20] proposed an influence matrix to suggest what items a user should share
to maximize their individual influence in their own community. Their matrix
measures influence between users and items while ours measure between users
and users. Similar to [45], [62] extended PageRank [12] to include topic models
in the computation of influence between users.
[24] extended dynamic LDA to identify the most influential documents in
a scientific corpus. But the dynamic LDA assumes that the documents’ latent
factors evolve only with small perturbations while words’ latent factors evolve
over time. [24]’s work differ from our approach, because we allow greater vari-
8
ability in users’ (documents’) latent factors and assume that items’ (words’)
latent factors remain constant.
A notable contender to our approach is the work proposed by [57]. They
also use topic models to reduce the dimensionality of item adoptions, followed
by analysis using an information theoretic measure of causality known as trans-
fer entropy. The algorithm to estimate transfer entropy is based on the nearest
neighbor approach developed in Statistical Physics [35, 36, 58]. But there are
significant drawbacks to this approach. First, it makes no assumption on the
joint distributions of the variables, and thus requires many time steps for achiev-
ing accurate estimation. It also ignores the temporal correlations between users’
topic distributions and the users’ behavior evolution.
Apart from [24, 57], all the prior works which uses latent factors does not
use the time information when inferring influence. In this aspect, our work goes
beyond the norms by considering temporal users’ items adoption and proposing
several temporal models. We distinguish our work by devising a Linear Dynam-
ical System (LDS) approach to linearly correlate the users’ topic distributions,
and using Granger causality that likewise assumes linear relationship among
variables. Due to this linear assumption in Granger causality measure, our
method also requires less number of time steps to derive an accurate measure
of social influence between (pairs of) users.
3 Desiderata in Modeling Temporal Adoption
Data
Measuring T SC between two users i and j requires two crucial steps. First,
an accurate measure of the users’ adoption behavior represented as time series
vectors in latent space is required for every time step. That is, we require latent
factors θi,t, θj,t ∈ RK for each user pair (i, j) at time step t. θi,t and θj,t has K
dimensions where K is much smaller than M (the total number of items). Sec-
ond, a temporal correlation measure is needed to compare between the trends
of two time series. Knowing how two time series temporally correlate should
help us make better predictions or reduce our uncertainty for their future adop-
tion behavior. However, we need to address some issues in modeling temporal
adoption data, as elaborated in Sections 3.1 and 3.2.
3.1 Latent Representation of Temporal Adoption Data
We propose a new way of representing user’s adoption behavior in temporal
latent space as opposed to the traditional method of using only the frequency of
adoption in high dimensional space. There are some advantages of representing
adoption behavior in temporal latent space as well as some difficulties, which
we will elaborate further.
For illustration, consider the temporal item adoption problem in Figure 2,
involving three users {u1, u2, u3} and eight items {w1, . . . , w8} over two time
steps. If we model the topic distributions at each time step independently of
9
w
5
w
6
w
7
w
8
u
1
t=1
u
2
t=1
u
3
t=1
w
1
w
2
w
3
w
4
(a) t = 1
w
5
w
6
w
7
w
8
u
1
t=2
u
2
t=2
u
3
t=2
w
1
w
2
w
3
w
4
(b) t = 2
Figure 2: Topic Modeling in Temporal User Item Adoptions
other time steps, we would obtain the scenarios in Figure 2(a) for time step 1,
and Figure 2(b) for time step 2. One may see that the edges between users
and items are sparse, which does not allow us to draw any meaningful intu-
itions about the relationship of items and does not show us any common item
adoptions among the users.
However, when we combine the temporal adoptions into a single time step,
we obtain the scenarios as illustrated in Figure 3(a). Figure 3(a) shows the
result of performing topic modeling on data without temporal considerations.
The items adopted by users u1, u2 and u3 are clustered according to topics 1 and
2 based on the density of edges between users and items. We therefore require
a method of modeling the temporal adoptions such that it allows us to preserve
the edge densities across time steps and provides us with the topic distributions
at different time steps. Such model could combine the temporal adoptions and
construct dependencies between different time steps by having the scenario as
shown in Figure 3(b).
3.2 The Need for Temporal Probabilistic Topic Model
There are many ways of modeling users’ adoption behavior in latent spaces,
and we wish to justify our choice of using probabilistic topic model. Besides
probabilistic method, one may use Non-negative Matrix Factorizations (NMF)
10
Cluster (Topic) 1
w
5
w
6
w
7
w
8
u
1
u
2
u
3
w
1
w
2
w
3
w
4
Cluster (Topic) 2
(a) Without time steps
Cluster (Topic) 1
w
5
w
6
w
7
w
8
u
1
t=1
u
1
t=2
u
2
t=1
u
2
t=2
u
3
t=1
u
3
t=2
w
1
w
2
w
3
w
4
Cluster (Topic) 2
(b) With time steps
Figure 3: Topic Modeling in Static User Item Adoptions
to obtain low-rank matrices that can substitute for the users’ and items’ latent
factors [64, 38]. Our previous work in temporal item adoptions has also explored
the use of LDS with NMF [19] for modeling evolving users’ preferences. LDS
with NMF can be stated as follows,
xn,t = An,t−1 · xn,t−1 + ǫ,
ǫ ∼ N (0, Q)
wn,t,m = Cm · xn,t
where xn,t ∈ RK is the vector representing user n’s adoption behavior at time
step t, An,t−1 ∈ RK×K is the dynamics matrix which evolves user’s behavior
from time t − 1 to t, wn,t,m ∈ R is the number of times user n adopts item m
at time t, and Cm ∈ RK represents item m’s latent factor.
In [19], we estimated the items latent factor matrix C ∈ RM ×K for NMF
by minimizing the sum-of-squared errors via stochastic gradient descent (SGD)
with non-negativity constraints. The model was subsequently solved as an in-
stance of Expectation Maximization (EM) algorithm [8, 21], where the E-step
carries out Kalman Filtering and RTS Smoothing, and the M-step serves to
optimize the dynamics matrix An,t.
In order to obtain interpretable topics, it is imperative that the items latent
11
factor matrix contains only non-negative values [19]. We often rank the impor-
tance of items according to the items’ value in the respective latent factor, but
this is not true if the latent factors contain negative values. A negative cm,k
can also be important for contributing to the value wn,t,m if the corresponding
xn,t,k is also negative.
Due to the different amounts of item adoptions for each user at different
time steps, a single static matrix C that is defined in real space RM ×K does not
fit well for the adoption patterns of every user. C was also only estimated once
before running EM algorithm to estimate the rest of the parameters.
There is thus a strong requirement to have a non-negative items’ latent factor
matrix that is normalized across different time steps which is estimated by an
algorithm that updates the items’ latent factor iteratively while learning the
other parameters. Probabilistic approaches give us normalized parameters that
sum to one and are non-negative (since probabilities cannot be less than zero).
By alternating Gibbs Sampling with Kalman Filter and additional optimizing
steps to derive the dynamics matrix, we derive an algorithm summarized in
Algorithm 1 to estimate all the necessary parameters that achieves an overall
better fit to the observed data.
4 Linear Dynamical Topic Model
Figure 4 shows the probabilistic graphical representation (a.k.a. Bayesian net-
work) of LDTM using plate diagram. In essence, LDTM is a combination of
Latent Dirichlet Allocation (LDA) and Linear Dynamical System (LDS). We ob-
tain the users-topic distributions at each time step by inferring the latent topic
variable conditioned on the words written in each time step and the topic-item
distributions.
4.1 Modeling Assumptions
We assume that the topic item distribution remains static over time, while the
users’ topic distribution evolves over time through a linear dynamical process
conditioned on the previous time steps and the inferred latent variables in cur-
rent time step. We further elaborate our assumptions of LDTM as follows:
1. Given that there are K topics and temporal adoption data, the topic dis-
tribution θn,t of user n at time step t is defined by the Dirichlet distribution
with parameters xn,t ∈ RK .
θn,t ∼ Dir(xn,t)
2. To relate the current parameters xn,t with the previous time step param-
eters xn,t−1, we assume a linear distribution as defined by,
xn,t = An,t−1 · xn,t−1
12
An,1
xn,1
xn,2
θn,1
θn,2
α
z
w
z
w
Mn,1
Mn,2
K
β
An,T
xn,T
θn,T
z
w
Mn,T
N
Figure 4: Probabilistic graphical representation of the proposed LDTM
where An,t ∈ RK×K represents the dynamics matrix of user n at t. This
step distinguishes our model from all other topic models, i.e., we model the
evolution of users’ topic distribution using a dynamics matrix. We also
derive a whole new set of inference equations for estimating the model
parameters in Section 4.3.
3. The topic zn,t,m of an item m adopted by user n at time t is given by,
zn,t,m ∼ M ult(θn,t)
Each topic item distribution is given by a simple symmetric Dirichlet
distribution,
φk ∼ Dir(β)
Then each item m adopted by user n at time t conditioned on topic variable
zn,t,m is given by,
[wn,t,m (zn,t,m = k)] ∼ M ult(φk)
4.2 Estimating Topic Distribution Parameters
To calculate T SC, we require the topic distributions for each user n at each time
step t conditioned on the information up to t as denoted by θn,tt, also known as
the posterior topic distribution. Since we have defined θn,t as a Dirichlet distri-
bution with parameters xn,t, knowing xn,tt is sufficient for deriving θn,tt. θn,tt,
13
the posterior topic distribution of user n at time t conditioned on information
up to time step t is given by,
θn,tt ∼ Dir(xn,tt)
xn,tt, the posterior parameters of the Dirichlet distribution for user n at time
t conditioned on information up to time step t is given by a slight modification
of the Kalman Filter [31] algorithm,
xn,tt = xn,tt−1 + ψn,t
where ψn,t ∈ RK and ψn,t,k denote the number of times user n at time t gen-
erated topic k. xn,tt−1 is the prior parameters of the Dirichlet distribution for
user n at time t conditioned on information up to time step t − 1,
xn,tt−1 = An,t−1 · xn,t−1t−1
where An,t−1 ∈ RK×K is the dynamics matrix that evolves the parameters from
t − 1 to t. If An,t for all time steps t is assumed to be an identity matrix, the
model reduces to the traditional LDA model for temporal data sets.
In previous works that use LDA on static data, there is a lack of emphasis
on the importance of posterior and prior distributions. In temporal data, it is
more important to distinguish between the two, as the posterior parameters of
time step t − 1 becomes the prior parameters at time step t after factoring in
the dynamics matrix An,t−1.
4.3 Estimating the Decay Parameters for Dynamics Ma-
trix
Since the dynamics matrix An,t−1 gives us the prior distribution θn,tt−1, an ideal
dynamics matrix should be able to predict the posterior distribution θn,tt well.
Therefore, to find the optimal dynamics matrix would require us to minimize
the divergence between the expected prior and expected posterior distribution.
A simple divergence to use would be the Kullback-Leibler (KL) Divergence. We
minimize the KL Divergence between the expected posterior topic distribution
θn,tt and expected prior topic distribution θn,tt−1 of user n at time t as follows,
minimize
T
Xt=2
DKL(cid:2)E(cid:0)θn,tt(cid:1) E(cid:0)θn,tt−1(cid:1)(cid:3)
The KL divergence is defined in terms of topic counts and Dirichlet parameters:
An,t−1 · xn,t−1t−1 + ψn,t + α
E(cid:0)θn,tt(cid:1) =
DKL(cid:2)E(cid:0)θn,tt(cid:1) E(cid:0)θn,tt−1(cid:1)(cid:3) =
1′(cid:0)An,t−1 · xn,t−1t−1 + ψn,t(cid:1) + Kα
14
E(cid:0)θn,tt−1(cid:1) =
An,t−1 · xn,t−1t−1 + α
1′An,t−1 · xn,t−1t−1 + Kα
K
Xk=1
E(cid:0)θn,t,kt(cid:1)(cid:2)log E(cid:0)θn,t,kt(cid:1) − log E(cid:0)θn,t,kt−1(cid:1)(cid:3)
We then find the dynamics matrix An,t−1 that minimizes the objective func-
tion L given by Equation 1,
T
K
L =
Xt=2
Xk=1
E(cid:0)θn,t,kt(cid:1)(cid:2)log E(cid:0)θn,t,kt(cid:1) − log E(cid:0)θn,t,kt−1(cid:1)(cid:3)
(1)
Assume that An,t−1 ∈ RK×K is a diagonal matrix with entries µn,t−1,k.
Taking this into consideration, we can now try to minimize L by performing
gradient descent with respect to the parameters µn,t−1,k. The gradient term is
given in Equation 2,
dL
dµn,t−1,k
=
dµn,t−1,k "log
dE(cid:0)θn,t,kt(cid:1)
E(cid:0)θn,t,kt(cid:1)
E(cid:0)θn,t,kt−1(cid:1)
# + E(cid:0)θn,t,kt(cid:1)" d log E(cid:0)θn,t,kt(cid:1)
dµn,t−1,k
where the individual components can be respectively solved as,
−
d log E(cid:0)θn,t,kt−1(cid:1)
dµn,t−1,k
#
xn,t−1,kt−1 (1′ψn,t + Kα) − 1′xn,t−1t−1 (ψn,t,k + α)
(cid:2)1′(cid:0)An,t−1 · xn,t−1t−1 + ψn,t(cid:1) + Kα(cid:3)2
(2)
(3)
(4)
dE(cid:0)θn,t,kt(cid:1)
dµn,t−1,k
=
dµn,t−1,k
d log E(cid:0)θn,t,kt(cid:1)
d log E(cid:0)θn,t,kt−1(cid:1)
dµn,t−1,k
=
=
1
dE(cid:0)θn,t,kt(cid:1)
dµn,t−1,k
E(cid:0)θn,t,kt(cid:1)
xn,t−1,kt−1
µn,t−1,k · xn,t−1,kt−1 + α
−
1′xn,t−1t−1
1′An,t−1 · xn,t−1t−1 + Kα
(5)
According to Siddiqi et al.
[52], an LDS is Lyapunov (a.k.a. numerically)
stable if the eigenvalues of the dynamics matrix An,t is less than or equal to
one. The eigenvalues of any general matrix are guaranteed to be less than or
equals to one if the sum of each row in the matrix is less than or equals to
one. To ensure stability of LDTM, we enforce µn,t,k to stay within [0, 1]. By
staying within the [0, 1] range, the µn,t,k is also able to represent decay of the
parameters learned in previous time steps.
4.4 Outline of Parameter Estimation
Algorithm 1 summarizes the procedure to estimate all parameters of the LDTM
model depicted in Figure 4. It begins by randomly initializing the latent vari-
ables zn,t,m, followed by Gibbs sampling iterations which consist of several steps.
First, the prior topic distributions are estimated using Kalman Filter. Then
the latent variable zn,t,m is sampled by conditioning on the prior parameters
xn,tt−1, sampled variables ψn,t from previous iterations and the constant pa-
rameters α, β.
p(zn,t,m = kxn,tt−1, ψn,t, ξk, α, β) =(cid:0)xn,t,kt−1 + ψn,t,k + α(cid:1)
ξk,m + β
1′ξk + Kβ
(6)
15
Using the sampled latent variables, we derive the posterior parameters xn,tt
via Kalman Filter. Finally, we estimate the dynamics matrix An,t via gradient
descent of equation (2) for minimizing the KL between the prior and posterior
distributions. We repeat these steps until a maximum number of iterations is
reached.
5 Computing Temporal Social Correlation in Topic
Space using Granger Causality
After obtaining the posterior topic distributions θn,tt, ∀n ∈ U , we can construct
time series of the distributions and calculate the Temporal Social Correlation
(TSC) using Granger causality (GC) [27]. For a pair of users (i, j), T SC can
be measured in two directions, T SC(i → j, τ ) and T SC(j → i, τ ), pivoted at a
specific time step τ . One should appropriately choose τ to indicate the starting
point for information transfer between i and j. Given τ , we could then select a
time window [τ − W, τ + L] to constrain time series used for comparison, where
L is the number of time steps to “lookahead” for measuring T SC and W is the
“width” of past time steps for predicting the future.
For notational simplicity, we denote the topic distributions for users i and j
at t as it and jt respectively. Specifically, given two users i and j who interact
at time τ , T SC(i → j, τ ) is computed as follows:
1. Formulate the two linear regression tasks:
R1 =
τ +L
jt = η0 + W
Xw=1
ηwjt−w!
Xt=τ (cid:0)jt − jt(cid:1)′(cid:0)jt − jt(cid:1)
ηwjt−w + λwit−w!
¯jt = η0 + W
Xw=1
Xt=τ
R2 =
τ +L
(jt − ¯jt)′ (jt − ¯jt)
(7)
(8)
where τ is the time point when i and j begins transferring information
between one another.
2. Estimate for the parameters {η0, . . . , ηW } by minimizing the least squares
error in (7) using coordinate descent [7], and then estimate only for the
parameters {λ1, . . . , λW } by minimizing (8). The first linear regression
given by (7) uses j’s past information to predict j’s future, while the
second linear regression (8) uses additional information from i’s past to
predict y’s future.
16
3. To obtain the T SC(i → j, τ ), we measure how much i’s past improves the
prediction of j’s future by computing the F-statistic (F-stat),
T SC(i → j, τ ) = F-stat =
R1 − R2
R2
·
2L − 1
W
Because the formula (8) uses more parameters than (7), the sum-of-squares
error given by R2 is always smaller than R1, i.e. R2 < R1, which implies
that F-stat is always positive.
4. Repeat the steps for computing T SC(j → i, τ ) and compare whether
T SC(i → j, τ ) > T SC(j → i, τ ) or otherwise.
6 Experiments
To evaluate the effectiveness of LDTM and the T SC calculated for pairs of
users, we require datasets that provide users’ temporal adoptions and the in-
teractions between users that lead to information transfer between them. The
publicly available DBLP [37] and ACM Digital Library (ACMDL) [1] biblio-
graphic datasets provide the information we require. We first describe how we
obtain subsets of the data from DBLP and ACMDL for our evaluation needs.
Then we evaluate the effectiveness of LDTM for several scenarios of the dynam-
ics matrix An,t:
1. LDA: To reduce LDTM to the baseline LDA, we simply set An,t as identity
matrix for every user n and every time step t, i.e. An,t = I.
2. Half Decay: We set An,t as diagonal matrix with constant values of 0.5,
i.e. An,t = 0.5 · I.
3. Full Decay: We set An,t as zero matrix, i.e. An,t = 0.
4. LDTM: We automatically determine the values of the dynamics matrix
An,t.
We show that automatically estimating An,t in the LDTM case gives us
better representations of authors’ temporal adoption behavior than setting con-
stant values for An,t. Using a case study as example, we show how the topic
distributions over time for an author and his co-authors can be used to deter-
mine the information transfer relationship between them. Finally, we compare
and compute the T SC between every pair of authors using topic distributions
from the four scenarios of the dynamics matrix An,t (i.e., LDA, Half Decay, Full
Decay and LDTM).
6.1 Data Set
We used the DBLP and ACMDL data to obtain the required users and items.
The authors who wrote papers together are treated as users, and the words in
17
their papers are seen as adopted items. We used the words in the abstract for
ACMDL, and those in the paper title for DBLP. The co-authorship information
provides a time point where interaction occurred between the two authors.
Given the large number of publications in DBLP and ACMDL, we only used
a subset of papers from DBLP and ACMDL. We sampled a data subset that
covers a wide variety of fields in computer science, with the papers published
in the Journal of ACM (JACM) as a seed set. We then expanded the coverage
by including other non-JACM publications by authors with at least one JACM
publication. The sample set obtained here is termed ego-1. By including the
co-authors of the authors in ego-1 and their papers, we get a larger set called
ego-2. We repeat the process once again to get ego-3.
ACMDL (ego-2)
ACMDL (ego-3)
DBLP (ego-2)
DBLP (ego-3)
#authors #words
33,044
44,308
20,080
40,463
24,569
157,715
52,754
388,092
Table 1: Data Set Sizes
period
1952-2011
1952-2011
1936-2013
1936-2013
Table 1 gives the sizes of the ego-2 and ego-3 datasets. DBLP has more
authors than ACMDL, because DBLP covers a longer history of publications
and has more sources of publications. On the other hand, ACMDL focuses
mainly on ACM-related publications. After pruning the stop-words and non-
frequent (less than ten occurrences) words, the ACMDL sampled dataset have
slightly more words than DBLP, as ACMDL provides words in the abstract
of publications while DBLP only has words in the paper titles. We used the
smaller ego-2 samples for experiments that require repetitions, and the much
larger ego-3 samples for experiments that only require a single run. Because
JACM lists a total of 26 major fields in Computer Science, we used 26 as the
number of topics for training our models in all the subsequent experiments.
6.2 Convergence of Log Likelihood
We first evaluate the convergence of the log likelihood for the case where the
dynamics matrix An,t is automatically computed, and for other cases where An,t
is set to constant values. We used the ego-2 samples for evaluating log likelihood
convergence, because ego-2 will be used later for the predictive evaluations.
Figures 5(a) and 5(b) show how the log likelihood varies with the number
of iterations for ACMDL (ego-2) and DBLP (ego-2). We can see that LDTM
achieves the highest likelihood in DBLP and is able to converge with log likeli-
hood comparable to that of Half Decay and Full Decay.
Figures 5(a) and 5(b) also reveal another interesting observation: the Full
Decay model is able to perform well in ACMDL, but not as well in DBLP.
This can be explained as follows, since ACMDL provide words from papers’
abstract, the information within each time step is sufficient for estimating accu-
18
x 108
−1.7
d
o
o
h
i
l
e
k
L
i
g
o
L
−1.72
−1.74
−1.76
−1.78
−5.6
−5.7
−5.8
−5.9
−6
−6.1
d
o
o
h
i
l
e
k
L
i
g
o
L
LDA
Half Decay
Full Decay
LDTM
x 107
LDA
Half Decay
Full Decay
LDTM
−1.8
0
10
20
30
Iterations
(a) ACMDL
40
50
−6.2
0
10
20
30
Iterations
40
50
(b) DBLP
Figure 5: Log Likelihood vs # of Iterations
rate parameters. But in DBLP, only the words in the paper titles are available,
providing less information for parameter estimation. As a result, decaying the
parameters of previous time steps does not allow Full Decay to leverage on the
previously observed data, which explains the poor likelihood in DBLP. The same
explanation applies to LDA, since LDA shows an opposite performance to Full
Decay.
Based on the ACMDL and DBLP results in Figure 5, we can see that fixing
the decay parameters of the dynamics matrix does not give consistent perfor-
mance in comparison to that of LDTM. This shows that the automatic estima-
tion of dynamics matrix in LDTM can better model the different properties of
the available data.
6.3 Comparison Results on Held-out Test Set
We compared the automatic estimation of dynamics matrix An,t for LDTM
against the fixed values of An,t (i.e., Full Decay, Half Decay, LDA) in a pre-
diction task. We repeated the prediction experiments for five runs and took
the average results. For each run, we generated five sets of training and testing
data by hiding in incremental proportions of 10% from the sampled ACMDL
(ego-2) and DBLP (ego-2) datasets. When creating the test sets, we ensure
that each subsequent test set is a superset of the previous test set. We trained
LDTM and other baseline models on the remaining data sets for 50 iterations,
and evaluated their predictive performances on the held-out test sets. The pre-
dictive performance on the held-out test sets is measured in terms of average
log likelihood for each time step t (ALL@t), defined as,
m log p(wn,t,mθn, φ)
n Mn,t
Essentially, the ALL@t gives us a measure of how well the estimated parame-
ters can predict the test sets. Normalization of the log likelihood (over the total
ALL@t = PN
n PMn,t
PN
19
number of words) in each time step is necessary to avoid over-deflating the log
likelihood at different time steps. For example, larger t would have more words
and hence smaller (more negative) log likelihood as compared to smaller t. The
log likelihood normalization at each t would thus allow for a better compari-
son across different time steps. A higher ALL@t suggests a better predictive
performance for the respective model.
d
o
o
h
i
l
i
e
k
L
g
o
L
e
g
a
r
e
v
A
d
o
o
h
i
l
e
k
L
i
g
o
L
e
g
a
r
e
v
A
−7.55
−7.6
−7.65
−7.7
−7.75
−7.8
−7.85
30
d
o
o
h
i
l
i
e
k
L
g
o
L
e
g
a
r
e
v
A
55
60
LDA
Half Decay
Full Decay
LDTM
45
50
Time
35
40
−7.6
−7.65
−7.7
−7.75
−7.8
−7.85
30
LDA
Half Decay
Full Decay
LDTM
45
50
Time
35
40
(a) Test size=20%
(b) Test size=30%
−7.6
−7.65
−7.7
−7.75
−7.8
−7.85
−7.9
30
d
o
o
h
i
l
e
k
L
i
LDA
Half Decay
Full Decay
LDTM
45
50
Time
35
40
g
o
L
e
g
a
r
e
v
A
55
60
−7.6
−7.65
−7.7
−7.75
−7.8
−7.85
−7.9
30
LDA
Half Decay
Full Decay
LDTM
45
50
Time
35
40
55
60
55
60
(c) Test size=40%
(d) Test size=50%
Figure 6: ACMDL: Log Likelihood over Time for Held-out Test Set
Figures 6(a)-6(d) and 7(a)-7(d) show the ALL@t for every t. All these figures
show that LDTM outperforms all other baseline models in terms of ALL@t,
while Full Decay performs the worst. Although Full Decay gives highest log
likelihood performance in the convergence results as shown in Figure 5(a), the
result in Figure 6 does not show the same correlations, which may be attributed
to the fact that Full Decay overfits the data. Meanwhile, Half Decay shows
that it fits the data relatively well (cf. Figure 5), but it does not perform as
well as LDTM (cf. Figure 6) and it performs worse than LDA (cf. Figure 7).
While LDA performs better than Half Decay and Full Decay in Figure 7, it does
not outperform Half Decay in Figure 6. By contrast, LDTM is able to achieve
consistently good performance in both datasets, winning over Full Decay, Half
Decay and LDA. This suggests that the dynamics matrix estimated using the
20
d
o
o
h
i
l
e
k
L
i
g
o
L
e
g
a
r
e
v
A
d
o
o
h
i
l
e
k
L
i
g
o
L
e
g
a
r
e
v
A
−7.2
−7.3
−7.4
−7.5
−7.6
−7.7
40
−7.3
−7.4
−7.5
−7.6
−7.7
−7.8
40
LDA
Half Decay
Full Decay
LDTM
60
Time
50
(a) Test size=20%
70
80
LDA
Half Decay
Full Decay
LDTM
60
Time
50
70
80
d
o
o
h
i
l
e
k
L
i
g
o
L
e
g
a
r
e
v
A
d
o
o
h
i
l
e
k
L
i
g
o
L
e
g
a
r
e
v
A
−7.2
−7.3
−7.4
−7.5
−7.6
−7.7
40
−7.3
−7.4
−7.5
−7.6
−7.7
−7.8
40
LDA
Half Decay
Full Decay
LDTM
60
Time
50
(b) Test size=30%
70
80
LDA
Half Decay
Full Decay
LDTM
60
Time
50
70
80
(c) Test size=40%
(d) Test size=50%
Figure 7: DBLP: Log Likelihood over Time for Held-out Test Set
algorithm in Section 4.3 can capture the dynamic patterns of each user more
accurately.
6.4 Case Study
This section provides a case study to illustrate Granger causality among au-
thors. We first show how an author’s topic interests change over the years.
Subsequently, we describe how the changes in his co-authors’ topic interests
explain the changes in his own topic interests.
In this study, we focus on the profile of Professor Duminda Wijesekera (D.
Wijesekera), so as to remain consistent with the case study in our earlier work
[17]. For this case study, we performed our analysis on the DBLP (ego-3)
dataset, due to its wider coverage of authors and years. Based on our earlier
results of various temporal topic models on the DBLP dataset, we choose to
analyze the Granger causality based on the topic distributions computed by
LDTM and LDA, as the two yielded the best performance on DBLP. By com-
paring LDTM and LDA, we also show the importance of using the correct latent
factor model for Granger causality analysis.
21
6.4.1 Granger Causality using LDTM
Duminda Wijesekera − Security
Duminda Wijesekera − Data Mining
Duminda Wijesekera − Logic & Computation
Duminda Wijesekera − Distributed Computing
0.35
0.3
0.25
y
t
i
l
i
b
a
b
o
r
P
0.2
0.15
0.1
0.05
Duminda Wijesekera
After: Sushil Jajodia
After: Jaideep Srivastava
Before: Csilla Farkas
Before: Lingyu Wang
Before: Naren Kodali
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
90
92
94
96
98
Year
00
02
04
06
0
90
92
94
96
98
00
02
04
06
(a) Top Four Topics
(b) Co-Authors’ Security Topic Proportion
Figure 8: LDTM Results: Duminda Wijesekera’s and His Co-Authors’ Topic
Interests from 1990 to 2006
Table 2: Topics Derived from LDTM
Security Data Mining Logic & Computation Distributed Computing
security
secure
scheme
efficient
privacy
computing
framework
reasoning
languages
data
mining
fuzzy
verification
programming
databases
query
logic
service
management
grid
Figure 8(a) shows the LDTM-induced topic distribution of D. Wijesekera
from year 1990 to 2006 (top four topics), with the corresponding topic words
shown in Table 2. During this period, the “Security” topic has the largest
area under the curve. For illustration purposes, we show the “Security” topic
proportion of D. Wijesekera’s co-authors for the same time period.
Due to space limitation, we only show five co-authors who collaborated with
D. Wijesekera frequently in Figure 8(b). Among them, Sushil Jajodia’s and
Jaideep Srivastava’s names are placed after D. Wijesekera in the papers they
wrote, while Csilla Farkas’, Lingyu Wang’s and Naren Kodali’s names appear
before D. Wijesekera. From Figure 8(b), we can also see clearly that D. Wije-
sekera’s -o- line follows the trend of Sushil Jajodia’s -*- line.
6.4.2 Granger causality using LDA
Figure 9(a) shows the LDA-induced topic distribution of D. Wijesekera from
year 1990 to 2006 (also the top four topics), and Table 3 shows the corresponding
topic words. Instead of the “Security” topic, the “Computation & Logic” topic
occupies the largest area here.
22
We then analyzed the topic proportions of the “Computation & Logic” topic
for D. Wijesekera’s co-authors, as given in Figure 9(b). Unlike the previous
LDTM case, we could not find any co-authors who have significant correlation
with D. Wijesekera in the “Computation & Logic” topic. This indicates that
the accuracy of the topic distributions are important for us to infer the Granger
causality between the authors.
The LDTM model is able to appropriately decay the importance of other
topics and focus on emergence of new topics such as “Security” in D. Wijesek-
era’s case. Granger causality would then allow us to find co-authors who are
socially correlated to D. Wijesekera in order to explain the emergence or change
of academic interests over time.
Duminda Wijesekera − Computation & Logic
Duminda Wijesekera − Database Systems
Duminda Wijesekera − Distributed Computing
Duminda Wijesekera − Security
0.18
0.16
0.14
0.12
0.1
0.08
0.06
0.04
y
t
i
l
i
b
a
b
o
r
P
Duminda Wijesekera
After: Sushil Jajodia
After: Jaideep Srivastava
Before: Csilla Farkas
Before: Lingyu Wang
Before: Naren Kodali
0.16
0.14
0.12
0.1
0.08
0.06
0.04
0.02
0.02
90
92
94
96
98
Year
00
02
04
06
0
90
92
94
96
98
00
02
04
06
(a) Top Four Topics
(b) Co-Authors’ Computation & Logic Topic
Figure 9: LDA Results: Duminda Wijesekera’s and His Co-Authors’ Topic
Interests from 1990 to 2006
Table 3: Topics Derived from LDA
Security Database Systems Logic & Computation Distributed Computing
security
secure
scheme
efficient
privacy
verification
languages
adaptive
content
computing
mobile
programming
service
management
grid
video
peer
multimedia
logic
formal
6.5 Knowledge Discovery using Temporal Social Correla-
tion
We now show the application of topic distributions as time series for computing
the T SC between two authors i and j at a time point τ . The parameters
“width” and “lookahead” are both set as 4. Using the co-authorship information
in our sampled ego-3 datasets, we choose some pairs of authors and the year
23
of publication at time point τ in order to compute T SC. We formulate the
following three hypotheses:
1. AB: If j is the first author and i is the second author of a publication
written at τ , then i transfers information to j, i.e. T SC(i → j, τ ) >
T SC(j → i, τ ).
2. AZ: If j is the first author and i is the last author of a publication written
at τ , then i transfers information to j, i.e. T SC(i → j, τ ) > T SC(j →
i, τ ).
3. Bf Af : If j and i are authors of a publication written at τ with more
than two authors and j comes before i, then i transfers information to j,
i.e. T SC(i → j, τ ) > T SC(j → i, τ ).
and compute a Ratio metric for each scenario, defined as:
Ratio = P(i,j)∈P I(T SC(i → j, τ ) > T SC(j → i, τ ))
P
where I(.) is the indicator function, and P is the set of all user pairs (i, j)
considered in the evaluation. In other words, the Ratio may be interpreted as
the proportion (or probability) of the T SC from user i to j being greater than
that from j to i.
To prevent confounding factors in our experiments, we excluded the pub-
lications that have the authors’ last name arranged in ascending order. We
removed 41% from ACMDL and 44% from DBLP, although some papers might
have authors last name in ascending order due to coincidence.
o
i
t
a
R
0.18
0.17
0.16
0.15
0.14
0.13
0.12
0.11
1
AB: LDA
AB: Half Decay
AB: Full Decay
AB: LDTM
1.5
2
2.5
3
3.5
Sustained interactions
0.3
0.28
0.26
0.24
0.22
0.2
o
i
t
a
R
4
0.18
0
AB: LDA
AB: Half Decay
AB: Full Decay
AB: LDTM
2
4
6
Sustained interactions
8
(a) ACMDL: Ratio
(b) DBLP: Ratio
Figure 10: AB: Ratio based on Time Series of Various Models
For every i, j author pair who co-authored at least once, we computed the
Ratio for each time step τ . We then analyzed the Ratio values for every pair
with respect to the number of time steps in which they had sustained the co-
author relationship. Figures 10 to 12 show the Ratio values versus the number
24
o
i
t
a
R
o
i
t
a
R
0.22
0.2
0.18
0.16
0.14
0.12
0.1
0.08
1
0.16
0.14
0.12
0.1
0.08
0.06
0.04
0
0.35
0.3
o
i
t
a
R
0.25
0.2
AZ: LDA
AZ: Half Decay
AZ: Full Decay
AZ: LDTM
AZ: LDA
AZ: Half Decay
AZ: Full Decay
AZ: LDTM
1.5
2
2.5
3
3.5
Sustained interactions
4
1
2
3
4
5
Sustained interactions
(a) ACMDL: Ratio
(b) DBLP: Ratio
Figure 11: AZ: Ratio based on Time Series of Various Models
0.25
o
i
t
a
R
0.2
0.15
Bf_Af: LDA
Bf_Af: Half Decay
Bf_Af: Full Decay
Bf_Af: LDTM
2
8
Sustained interactions
4
6
10
0.1
0
Bf_Af: LDA
Bf_Af: Half Decay
Bf_Af: Full Decay
Bf_Af: LDTM
5
Sustained interactions
10
6
7
15
(a) ACMDL: Ratio
(b) DBLP: Ratio
Figure 12: Bf Af: Ratio based on Time Series of Various Models
of time steps the author pairs have sustained their co-authorships. The subplots
(a) of Figures 10 to 12 present the Ratio values for ACMDL, while subplots (b)
of Figures 10 to 12 give the Ratio values for DBLP. Only bins with more than
90 data points are shown in the Figures.
Figures 10 to 12 reveal several interesting phenomena. To describe the phe-
nomena, we use the notation I to denote the set of authors whose names are
placed at the back, and J to denote the set of authors whose names are placed
in front. In general, since we have earlier filtered out the papers with alphabet-
ical ordering, researchers (J) who do the bulk of the research have their names
placed in front of their co-authors (I).
1. All models and hypotheses show that the ratio is always below 0.5. This
indicates I does not necessarily influence J. On the contrary, the results
show a high probability of J influencing I, i.e. Researchers who do the
most work influence their co-authors.
2. The ratio is always on a downtrend which indicates that the influence I
25
has on J decreases over time. As researchers progress in their research
career, the influence their co-authors have on them decreases over time.
3. By comparing between the Ratio of Figures 10 and 12, the second author
i has more influence on the first author j, as compared to the generic case
where j can be any author (e.g. 2nd, 3rd, etc.) and i comes after j.
4. By comparing between the Ratio of Figures 10 and 11, the last author i
influence the first author j, more than the second author.
Based on these results, we can conclude that, for pairs of authors who wrote
a paper together, it is highly likely that the author whose name appears in front
(Granger) causes those whose names appear at the back to change their topic
distributions over time. We therefore reject the earlier hypotheses of AB, AZ
and Bf Af.
7 Conclusion
This paper presents a means for identifying Temporal Social Correlation (TSC)
based on latent topic representation of item adoptions that users perform over
time. We propose a Linear Dynamical Topic Model (LDTM) that synergizes
the merits of probabilistic topic models and Linear Dynamical Systems (LDS)
in order to capture users’ adoption behavior over time. The EM algorithm for
solving the model draws upon Gibbs Sampling and Kalman Filter for inference
in the E-Step, followed by the M-Step which minimizes the Kullback-Leibler
(KL) divergence between the prior and posterior distributions for estimating the
dynamics matrix. By taking into account both the stability and non-negativity
constraints, we derive a dynamics matrix that represents how users decay their
adoption behaviors and preferences over time.
By using the users’ topic distributions at different time steps, we construct
each user’s time series and compare it with their co-authors’ using Granger-
causal tests. Our experiments on bibliographic datasets demonstrate that, by
employing Granger causality on the time series, we can calculate the TSC be-
tween authors of the paper and discover that the ordering of authors’ names
plays a role in how information transfer among them.
Ultimately, all the measurements we made is to further the science of pre-
dicting the future. However, it remains to be seen whether quantifying social
influence through TSC could be used for making recommendations to users on
what items to adopt, and that could be a future direction in our work.
References
[1] ACM. Association for Computing Machinery. ACM Digital Library, 2011.
[2] D. Agarwal, B.-C. Chen, and P. Elango. Fast online learning through
offline initialization for time-sensitive recommendation. In Proceedings of
26
the ACM SIGKDD International Conference on Knowledge Discovery and
Data Mining, KDD ’10, pages 703–712, New York, NY, 2010.
[3] A. Ahmed, Y. Low, M. Aly, V. Josifovski, and A. J. Smola. Scalable
distributed inference of dynamic user interests for behavioral targeting. In
Proceedings of the ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, KDD ’11, pages 114–122, New York, NY, 2011.
[4] A. Anagnostopoulos, R. Kumar, and M. Mahdian. Influence and correlation
In Proceedings of the ACM SIGKDD International
in social networks.
Conference on Knowledge Discovery and Data Mining, KDD ’08, pages
7–15, New York, NY, USA, 2008. ACM.
[5] S. Aral, L. Muchnik, and A. Sundararajan. Distinguishing influence-based
contagion from homophily-driven diffusion in dynamic networks. Proceed-
ings of the National Academy of Sciences, 106(51):21544–21549, 2009.
[6] S. Aral and D. Walker. Identifying social influence in networks using ran-
domized experiments. IEEE Intelligent Systems, 26(5):91–96, 2011.
[7] J. C. Bezdek, R. J. Hathaway, R. E. Howard, C. A. Wilson, and M. P. Wind-
ham. Local convergence analysis of a grouped variable version of coordinate
descent. Journal of Optimization Theory and Applications, 54(3):471–477,
1987.
[8] J. Bilmes. A gentle tutorial of the EM algorithm and its application to pa-
rameter estimation for Gaussian mixture and hidden Markov models. Tech-
nical Report TR-97-021, International Computer Science Institute, 1997.
[9] D. M. Blei and J. D. Lafferty. Dynamic topic models. In Proceedings of the
International Conference on Machine Learning, ICML ’06, pages 113–120,
2006.
[10] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. Journal
of Machine Learning Research, 3:993–1022, 2003.
[11] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. I. Kramer, C. Marlow, J. E.
Settle, and J. H. Fowler. A 61-million-person experiment in social influence
and political mobilization. Nature, 489(7415):295–298, 2012.
[12] S. Brin and L. Page. The anatomy of a large-scale hypertextual web search
engine. Computer Networks and ISDN Systems, 30(17):107–117, 1998.
[13] K. R. Canini, L. Shi, and T. L. Griffiths. Online inference of topics with
latent Dirichlet allocation. In Proceedings of the International Conference
on Artificial Intelligence and Statistics, AISTATS ’09, pages 65–72, 2009.
[14] B. Cao, D. Shen, J.-T. Sun, X. Wang, Q. Yang, and Z. Chen. Detect
and track latent factors with online nonnegative matrix factorization. In
Proceedings of the International Joint Conference on Artifical Intelligence,
27
IJCAI ’07, pages 2689–2694, San Francisco, CA, USA, 2007. Morgan Kauf-
mann Publishers Inc.
[15] C. Cheng, H. Yang, I. King, and M. Lyu. Fused matrix factorization with
geographical and social influence in location-based social networks. In Pro-
ceedings of the AAAI National Conference on Artificial Intelligence, AAAI
’12, pages 17–23, 2012.
[16] F. C. T. Chua, H. W. Lauw, and E.-P. Lim. Predicting item adoption using
social correlation. In Proceedings of the SIAM International Conference on
Data Mining, SDM ’11. SIAM, 2011.
[17] F. C. T. Chua, H. W. Lauw, and E.-P. Lim. Mining social dependencies in
dynamic interaction networks. In Proceedings of the SIAM International
Conference on Data Mining, SDM ’12, pages 720–731, Philadelphia, PA,
2012.
[18] F. C. T. Chua, H. W. Lauw, and E.-P. Lim. Generative models for item
adoptions using social correlation. IEEE Transactions on Knowledge and
Data Engineering, 25(9):2036–2048, 2013.
[19] F. C. T. Chua, R. J. Oentaryo, and E.-P. Lim. Modeling temporal adoptions
using dynamic matrix factorization. In Proceedings of the IEEE Interna-
tional Conference on Data Mining, ICDM ’13, pages 91–100, Dallas, TX,
2013.
[20] P. Cui, F. Wang, S. Liu, M. Ou, S. Yang, and L. Sun. Who should share
what? item-level social influence prediction for users and posts ranking.
In Proceedings of the International ACM SIGIR Conference on Research
and Development in Information Retrieval, SIGIR ’11, pages 185–194, New
York, NY, USA, 2011. ACM.
[21] A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from
incomplete data via the em algorithm. Journal of the Royal Statistical
Society. Series B (Methodological), 39(1):1–38, 1977.
[22] L. Dietz, S. Bickel, and T. Scheffer. Unsupervised prediction of citation in-
fluences. In Proceedings of the International Conference on Machine Learn-
ing, ICML ’07, pages 233–240, New York, NY, USA, 2007. ACM.
[23] N. Friedkin. A structural theory of social influence. Cambridge University
Press, 1998.
[24] S. Gerrish and D. M. Blei. A language-based approach to measuring schol-
arly impact. In J. Frnkranz and T. Joachims, editors, Proceedings of the
International Conference on Machine Learning, ICML ’10, pages 375–382.
Omnipress, 2010.
[25] Z. Ghahramani and G. E. Hinton. Parameter estimation for linear dynam-
ical systems. Technical report, 1996.
28
[26] A. Gohr, A. Hinnerburg, R. Schult, and M. Spiliopoulou. Topic evolution
in a stream of documents. In Proceedings of the SIAM International Con-
ference on Data Mining, SDM ’09, pages 859–870, Sparks, Nevada, 2009.
[27] C. W. J. Granger. Testing for causality: A personal viewpoint. Journal of
Economic Dynamics and Control, 2(0):329 – 352, 1980.
[28] C. W. J. Granger. Essays in econometrics. chapter Investigating causal
relations by econometric models and cross-spectral methods, pages 31–47.
Harvard University Press, Cambridge, MA, USA, 2001.
[29] S. Greenland. Randomization, statistics, and causal inference. Epidemiol-
ogy, 1(6), 1990.
[30] M. D. Hoffman, D. M. Blei, and F. Bach. Online learning for latent dirichlet
allocation. In Proceedings of the Advances in Neural Information Processing
Systems, NIPS’ 10, pages 1–9, 2010.
[31] R. E. Kalman. A new approach to linear filtering and prediction prob-
lems. Transactions of the ASME, Journal of Basic Engineering, 82(1):35–
45, 1960.
[32] D. B. Kandel. Homophily, selection, and socialization in adolescent friend-
ships. American Journal of Sociology, 84(2):427–436, 1978.
[33] Y. Koren. Collaborative filtering with temporal dynamics. In Proceedings
of the ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining, KDD ’09, pages 447–456, New York, NY, USA, 2009.
ACM.
[34] Y. Koren, R. Bell, and C. Volinsky. Matrix factorization techniques for
recommender systems. IEEE Computer, 42(8):30–37, Aug. 2009.
[35] L. F. Kozachenko and N. N. Leonenko. Sample estimate of the entropy of
a random vector. Problemy Peredachi Informatsii, 23(1-2):95–101, 1987.
[36] A. Kraskov, H. Stogbauer, and P. Grassberger. Estimating mutual infor-
mation. Physical Review E, 69:066138, 2004.
[37] M. Ley. DBLP Computer Science Bibliography, 2005.
[38] C. Liu, H.-C. Yang, J. Fan, L.-W. He, and Y.-M. Wang. Distributed non-
negative matrix factorization for web-scale dyadic data analysis on mapre-
duce. In Proceedings of the 19th international conference on World wide
web, WWW ’10, pages 681–690, New York, NY, 2010.
[39] L. Liu, J. Tang, J.-W. Han, M. Jiang, and S. Yang. Mining topic-level
influence in heterogeneous networks. In Proceedings of the ACM Interna-
tional Conference on Information and Knowledge Management, CIKM ’10,
pages 199–208, New York, NY, USA, 2010. ACM.
29
[40] L. Liu, J. Tang, J.-W. Han, and S. Yang. Learning influence from heteroge-
neous social networks. Data Mining and Knowledge Discovery, 25(3):511–
544, 2012.
[41] J. Mairal, F. Bach, J. Ponce, and G. Sapiro. Online learning for matrix
factorization and sparse coding. Journal of Machine Learning Research,
11:19–60, 2010.
[42] L. Muchnik, S. Aral, and S. J. Taylor. Social influence bias: A randomized
experiment. Science, 341(6146):647–651, 2013.
[43] J. Pearl. Causality: Models, reasoning and inference. Cambridge University
Press, 2000.
[44] H. E. Rauch, C. T. Striebel, and F. Tung. Maximum likelihood estimates of
linear dynamic systems. Journal of the American Institute of Aeronautics
and Astronautics, 3(8):1445–1450, 1965.
[45] D. M. Romero, W. Galuba, S. Asur, and B. A. Huberman. Influence and
passivity in social media. In D. Gunopulos, T. Hofmann, D. Malerba, and
M. Vazirgiannis, editors, Machine Learning and Knowledge Discovery in
Databases, volume 6913 of Lecture Notes in Computer Science, pages 18–
33. Springer Berlin Heidelberg, 2011.
[46] S. Roweis and Z. Ghahramani. A unifying review of linear gaussian models.
Neural Computation, 11(2):305–345, 1999.
[47] D. B. Rubin. Bayesian inference for causal effects: The role of randomiza-
tion. The Annals of Statistics, 6(1):34–58, 1978.
[48] A. Saha and V. Sindhwani. Learning evolving and emerging topics in social
media: a dynamic nmf approach with temporal regularization. In Proceed-
ings of the ACM International Conference on Web Search and Data Mining,
WSDM ’12, pages 693–702, New York, NY, USA, 2012. ACM.
[49] R. Salakhutdinov and A. Mnih. Bayesian probabilistic matrix factorization
using markov chain monte carlo. In Proceedings of the International Con-
ference on Machine Learning, ICML ’08, pages 880–887, New York, NY,
USA, 2008. ACM.
[50] R. Salakhutdinov and A. Mnih. Probabilistic matrix factorization.
In
Proceedings of the Advances in Neural Information Processing Systems,
NIPS ’08, pages 1257–1264, Cambridge, MA, 2008. MIT Press.
[51] R. H. Shumway and D. S. Stoffer. Time series analysis and its applications:
With R examples. Springer, 3rd edition, May 2006.
[52] S. Siddiqi, B. Boots, and G. Gordon. A constraint generation approach to
learning stable linear dynamical systems. In Proceedings of the Advances
in Neural Information Processing Systems, NIPS ’07, December 2007.
30
[53] D. Simon. Optimal state estimation: Kalman, H infinity, and nonlinear
approaches. Wiley-Interscience, 2006.
[54] J. Z. Sun, K. R. Varschney, and K. Subbian. Dynamic matrix factorization:
A state space approach. In Proceedings of the IEEE International Confer-
ence on Speech and Signal Processing, ICASSP ’12, pages 1897–1900, 2012.
[55] J. Tang, J.-M. Sun, C. Wang, and Z. Yang. Social influence analysis in
large-scale networks. In Proceedings of the ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, KDD ’09, pages
807–816, New York, NY, USA, 2009. ACM.
[56] J. Tang, S. Wu, and J.-M. Sun. Confluence: Conformity influence in large
social networks. In Proceedings of the ACM SIGKDD International Confer-
ence on Knowledge Discovery and Data Mining, KDD ’13, pages 347–355,
New York, NY, USA, 2013. ACM.
[57] G. Ver Steeg and A. Galstyan.
Information-theoretic measures of influ-
ence based on content dynamics. In Proceedings of the ACM International
Conference on Web Search and Data Mining, WSDM ’13, pages 3–12, New
York, NY, USA, 2013. ACM.
[58] J. D. Victor. Binless strategies for estimation of information from neural
data. Physical Review E, 66:051903, Nov 2002.
[59] F. Wang, P. Li, and C. Konig. Efficient document clustering via online
nonnegative matrix factorization. In Proceedings of the SIAM International
Conference on Data Mining, SDM ’11, pages 908–919, 2011.
[60] X.-R. Wang and A. McCallum. Topics over time: a non-markov continuous-
time model of topical trends. In Proceedings of the ACM SIGKDD Inter-
national Conference on Knowledge Discovery and Data Mining, KDD ’06,
pages 424–433, New York, NY, USA, 2006. ACM.
[61] Z. Wen and C.-Y. Lin. On the quality of inferring interests from social
neighbors. In Proceedings of the ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, KDD ’10, pages 373–382, New
York, NY, USA, 2010. ACM.
[62] J. Weng, E.-P. Lim, J. Jiang, and Q. He. Twitterrank: Finding topic-
sensitive influential twitterers.
In Proceedings of the ACM International
Conference on Web Search and Data Mining, WSDM ’10, pages 261–270,
New York, NY, USA, 2010. ACM.
[63] L. Xiong, X. Chen, T.-K. Huang, J. Schneider, and J. G. Carbonell. Tempo-
ral collaborative filtering with Bayesian probabilistic tensor factorization.
In Proceedings of the SIAM International Conference on Data Mining, SDM
’10, pages 211–222, Columbus, OH, 2010.
31
[64] W. Xu, X. Liu, and Y. Gong. Document clustering based on non-negative
matrix factorization. In Proceedings of the International ACM SIGIR Con-
ference on Research and Development in Information Retrieval, SIGIR ’03,
pages 267–273, New York, NY, USA, 2003. ACM.
32
Algorithm 1 LDTM Inference
1: Input: Adoption data for each user n at each time step t
2: Output: Estimated parameters
3: Define: ψn,t,k is the number of times user n at time t generates topic k.
4: Define: ξk,m is the number of times topic k generates item m.
5: // Initialization
6: for n ← 1 to N do
7:
8:
9:
for m ← 1 to Mn,t do
for t ← 1 to Tn do
10:
11:
12:
k ← unif ormRandom(1, K)
ψn,t,k ← ψn,t,k + 1;
ξk,m ← ξk,m + 1;
zn,t,m ← k;
end for
end for
13:
14:
15: end for
16: // Gibbs sampling iterations
17: repeat
18:
for n ← 1 to N do
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
// Estimating topic distribution parameters: Kalman filter
for t ← 1 to Tn do
xn,tt−1 ← An,t−1 · xn,t−1t−1;
for m ← 1 to Mn,t do
k ← zn,t,m;
ψn,t,k ← ψn,t,k − 1;
ξk,m ← ξk,m − 1;
k ← sample(m, xn,tt−1 + ψn,t, ξk, α, β); // Sample using Equation
(6).
ψn,t,k ← ψn,t,k + 1;
ξk,m ← ξk,m + 1;
zn,t,m ← k;
end for
xn,tt ← xn,tt−1 + ψn,t;
end for
// Estimating decay parameters: KL divergence minimization
for t ← 2 to Tn do
for k ← 1 to K do
Update the diagonal entries µn,t−1,k ∈ An,t−1 using Equation (2)
end for
end for
38:
39:
40: until maximum iterations
end for
33
|
1410.6976 | 4 | 1410 | 2016-01-31T19:09:23 | Distance-Based Influence in Networks: Computation and Maximization | [
"cs.SI"
] | A premise at a heart of network analysis is that entities in a network derive utilities from their connections. The {\em influence} of a seed set $S$ of nodes is defined as the sum over nodes $u$ of the {\em utility} of $S$ to $u$. {\em Distance-based} utility, which is a decreasing function of the distance from $S$ to $u$, was explored in several successful research threads from social network analysis and economics: Network formation games [Bloch andJackson 2007], Reachability-based influence [Richardson and Domingos 2002, Kempe et al. 2003], "threshold" influence [Gomez-Rodriguez et al. 2011], and {\em closeness centrality} [Bavelas 1948].
We formulate a model that unifies and extends this previous work and address the two fundamental computational problems in this domain: {\em Influence oracles} and {\em influence maximization} (IM). An oracle performs some preprocessing, after which influence queries for arbitrary seed sets can be efficiently computed. With IM, we seek a set of nodes of a given size with maximum influence. Since the IM problem is computationally hard, we instead seek a {\em greedy sequence} of nodes, with each prefix having influence that is at least $1-1/e$ of that of the optimal seed set of the same size. We present the first highly scalable algorithms for both problems, providing statistical guarantees on approximation quality and near-linear worst-case bounds on the computation. We perform an experimental evaluation which demonstrates the effectiveness of our designs on networks with hundreds of millions of edges. | cs.SI | cs | Distance-Based Influence in Networks:
Computation and Maximization
Edith Cohen
Tel Aviv University
Google Research
Daniel Delling
Sunnyvale
USA
[email protected] [email protected] [email protected] [email protected]
Thomas Pajor
Cupertino
USA
Renato F. Werneck
San Francisco
USA
6
1
0
2
n
a
J
1
3
]
I
S
.
s
c
[
4
v
6
7
9
6
.
0
1
4
1
:
v
i
X
r
a
ABSTRACT
A premise at a heart of network analysis is that entities in a network
derive utilities from their connections. The influence of a seed set S
of nodes is defined as the sum over nodes u of the utility of S to u.
Distance-based utility, which is a decreasing function of the distance
from S to u, was explored in several successful research threads
from social network analysis and economics: Network formation
games [Bloch and Jackson 2007], Reachability-based influence
[Richardson and Domingos 2002; Kempe et al. 2003]; "threshold"
influence [Gomez-Rodriguez et al. 2011]; and closeness centrality
[Bavelas 1948].
We formulate a model that unifies and extends this previous work
and address the two fundamental computational problems in this
domain: Influence oracles and influence maximization (IM). An
oracle performs some preprocessing, after which influence queries
for arbitrary seed sets can be efficiently computed. With IM, we seek
a set of nodes of a given size with maximum influence. Since the IM
problem is computationally hard, we instead seek a greedy sequence
of nodes, with each prefix having influence that is at least 1− 1/e
of that of the optimal seed set of the same size. We present the first
highly scalable algorithms for both problems, providing statistical
guarantees on approximation quality and near-linear worst-case
bounds on the computation. We perform an experimental evaluation
which demonstrates the effectiveness of our designs on networks
with hundreds of millions of edges.
1.
INTRODUCTION
Structural notions of the influence of a set of entities in a network
which are based on the utility an entity derives from its connectivity
to others, are central to network analysis and were studied in the
context of social and economic models [3, 4, 16, 25, 29, 31, 39, 42]
with applications that include ranking, covering, clustering, and
understanding diffusion and network formation games. More for-
mally, influence is typically defined in terms of utilities ui j between
ordered pairs of entities. The influence of a single entity i, also
known as its centrality, is the sum of utilities Inf(i) = ∑ j ui j over
entities j. The influence of a set S of entities is the sum over entities
of the highest utility match from S:
Inf(S) = ∑
ui j .
max
i∈S
j
One of the simplest and more popular definitions of influence
relies on reachability-based utility [26, 31, 40]. The network here
is a directed graph, where entities correspond to nodes. We have
ui j = 1 when the node j is reachable from node i. Therefore, the
influence of S is the number of entities reachable from S. A powerful
enhancement of this model is to allow for multiple instances, where
each instance is a set of directed edges, or for a distribution over
1
instances, and accordingly, define ui j as the respective average or ex-
pectation. The popular Independent Cascade (IC) model of Kempe
et al. [31] uses a distribution defined by a graph with independent
inclusion probabilities for edges.
More expressive utility is based on shortest-path distances [3, 4,
16, 25, 31, 39, 42]. Specifically, the utility is ui j = α(di j), where
α(d) ≥ 0 is a non-increasing function [4, 16, 20, 41] applied to the
respective shortest-path distance. Reachability-based utility falls
out as a special case, using α(x) = 1 for finite x and α(+∞) =
0. Popular kernels include exponential decay α(x) = exp(−λ x),
polynomial decay α(x) = 1/poly(x), Gaussian α(x) = exp(−λ x2),
and threshold, which is obtained using α(x) = 1 when x ≤ T and
α(x) = 0 otherwise. This variety, used in practice, demonstrates the
value of this modeling flexibility.
A distance-based model for information diffusion in social net-
works was recently proposed by Gomez-Rodriguez et al. [27]. In
their model, the seed set S corresponds to the "infected" nodes and
edge lengths correspond to propagation time. The shortest paths
distance from S to a node v corresponds to the elapsed time until
v is "infected." The decay function models the amount by which
slower propagaing is less valuable. Again, the modelling power is
enhanced by working with multiple instances (each instance is a
set of directed edges with lengths), or with a distribution over such
instances, and defining the utility as the average of α(di j) over in-
stances or as the expectation ui j = E[α(di j)] . In particular, a natural
model associates independent randomized edge lengths (REL) with
live edges [1,14,23,27], using exponential [1,14,27] or Weibull [23]
distributions.
We provide an intuitive explanation to the power of randomiza-
tion to improve the quality of reachability-based and distance-based
utility measures. We expect the utility ui j to be higher when there
is a short path and also to when there are more paths. The deter-
ministic shortest-path distance does not reflect paths multiplicity,
but with REL, a pair connected by more paths will have a shorter
expected distance than another pair, even when distances according
to expected edge lengths are equal [14]. In addition, randomization,
even as introduction of random noise, is a powerful tool in learning,
as it reduces the sensitivity of the results to insignificant variations
in the input and overfitting the data.
We note here that the work of Gomez-Rodriguez et al. and subse-
quent work on distance-based diffusion [23, 27] was focused specifi-
cally on threshold decay functions, where for a threshold parameter
T , ui j = 1 only when the distance is at most T . Distance-based
utility with smooth decay functions, which we study here, naturally
occur in the physical world and was extensively studied also in the
context of data analysis [41] and networks [4, 16, 29, 39]. In par-
ticular, distance-based influence generalizes the distance-decaying
variant [6, 12, 16, 21, 39] of closeness centrality [3], which was
studied with exponential, harmonic, threshold, and general decay
functions.
The two fundamental algorithmic problems in applications of
influence are influence computation and influence maximization
(IM).
Influence computation is the problem of computing the influence
of a specified seed set S of nodes. This can be done using multiple
single-source shortest-paths computations from the seed set, but the
computation does not scale well when there are many queries on very
large networks. Cohen et al. for reachability-based influence [15]
and Du et al. for threshold influence [23] designed influence oracles
which preprocess the input so that influence queries Inf(G ,S) for
a specified seed set S can be approximated quickly. In both cases,
a sketch, based on [11], is computed for each node so that the
influence of a seed set S can be estimated from the sketches of the
nodes in S. For general distance-based influence, we can consider
an oracle designed for a pre-specified function α (say reachability-
based or threshold), or a more powerful oracle which allows α to be
specified at query time.
Influence maximization is the problem of finding a seed set
S ⊂ V with maximum influence, where S = s is given. Since
reachability-based and threshold influence [27, 31] are special cases,
we know that distance-based influence maximization with general
α is NP-complete and hard to approximate to anything better than
1− (1− 1/s)s of the optimum for a seed set of size s (the hardness
result is asymptotic in s) [24]. Fortunately, from monotonicity and
submodularity of these influence functions [27, 31], we obtain that
the greedy algorithm (GREEDY), which iteratively adds to the seed
set the node with maximum marginal influence, is guaranteed to
provide a solution that is at least 1− (1− 1/s)s > 1− 1/e of the op-
timum [37]. This (worst-case) guarantee holds for every prefix size
of the sequence of seeds reported, which means that the GREEDY
sequence approximates the Pareto front of the trade-off of seed set
size versus its influence. The Pareto front provides added value
since it characterizes the influence coverage of the network and can
be used to find bi-criteria sweet spots between the size of the seed
set and its coverage.
In terms of solution quality, also in practice, GREEDY had been
the gold standard for submodular maximization. Scalability, how-
ever, remains an issue for reachability-based influence even with
various optimizations [9, 34], and even when working with a single
instance. As a result, extensive research work on reachability-based
influence maximization proposes scalable heuristics [30], scalabil-
ity with guarantees only for a small number of seeds [7, 46], and,
more recently, SKIM, which computes a full approximate GREEDY
sequence [15] while scaling nearly linearly with input size. For
threshold influence, existing maximization algorithms are by Du et
al. [23] based on sketches [11] and by [45] based on an extension of
the reachability-based algorithm of [46]. These designs, when using
near-linear computation, can only provide approximation guaran-
tees for a small number of seeds, even when edge lengths are not
randomized.1
1Note that SKIM, which is the design we build on here, pro-
vides strong worst-case statistical guarantees on both accuracy and
running time, for producing a full approximate greedy sequence
of seeds. The computation is proportional to the size of the in-
stances and is near-linear when the number of instances is small.
Other existing algorithms, even related ones also based on reverse
searches [7,11,23,46], do not compute a full sequence in near-linear
time: The running time grows with the number of seeds even on a
single instance, which is the same as an IC model with all probabili-
ties being 0 or 1. The inherent issue is the quality of the approximate
greedy solution. The performance of an approximate greedy algo-
rithm on a sample deteriorates quickly with the number of seeds, so
Contributions. Our contributions are as follows. Our distance-
based influence model is presented in Section 2. We define exact
and approximate GREEDY sequences and establish approximation
guarantees of both. We then formulate a representation of a residual
problem with respect to a seed set S, which facilitates the greedy
computation of the next seed. Finally, we establish a probabilistic
bound on residual updates, which magically holds for the approxi-
mate but not for the exact greedy. This bound is a critical component
in obtaining near-linear computation of a full approximate greedy
sequence.
In Section 3 we consider the threshold influence model [23,
27]. We extend the (approximate) influence oracles and the SKIM
reachability-based influence maximization algorithm [15], to obtain
oracles and T -SKIM for threshold influence. The extension itself
replaces reachability searches with pruned Dijkstra computations.
The statistical guarantees on approximation quality are inherited
from SKIM. The worst-case running time analysis, establishing that
T -SKIM computes the full approximate greedy sequence in near-
linear time, required our probabilistic bound on residual updates.
In Section 4, we present distance-based influence oracles, which
take as input a seed set S and (any) decay function α, which can
be specified at query time. As explained earlier, many different
decay/kernel functions are used extensively in practice, which makes
the flexibility of the oracle to handle arbitrary α valuable. Our oracle
computes a novel sketch for each node; the combined All-Distances
sketch (cADS), which generalizes All-Distances Sketches (ADS) [5,
11,12,16,17], used for closeness centrality computation, to multiple
instances or probabilistic models. These per-node sketches have
expected size at most k ln(nmin{k, (cid:96)}) (with good concentration),
where n is the number of nodes, (cid:96) is the number of instances, and k is
a sketch parameter that determines a trade-off between information
and the amounts of computation and space required. We estimate
the distance-based influence of a seed set S from the sketches of the
nodes in S. Our estimator uses HIP probabilities [12] with the L∗
estimator [13], which optimally uses the information in the sketches,
and has worst-case coefficient of variation (CV) ≤ 1/√2k− 2.
In Section 5 we present α-SKIM, the first scalable influence
maximization algorithm that applies with general decay functions α.
Our design is a strong contribution from both theoretical and practi-
cal perspectives, providing a novel near-linear worst-case bound on
the computation, performance guarantees that nearly match those
of exact GREEDY, and a scalable implementation that runs on large
networks. The heart of our design is a novel algorithmic technique
of efficiently maintaining weighted samples from influence sets that
allows us to accurately estimate marginal influences as nodes are
added to the seed set.
Section 6 presents a comprehensive experimental evaluation of
our algorithms. For threshold influence oracles and maximization,
we obtain three orders of magnitude speedups over the algorithms
of Du et al. [23], with no loss in quality. Even though both ap-
proaches apply the sketches of Cohen [11], we are able to obtain
improvements by working with combined sketches, applying better
estimators, and, in our IM algorithm, only computing sketches to
the point needed to determine the next node. We also show that the
a very large sample size, O(sn) in total, may be needed when we are
interested in good approximation with respect to all seed sets of size
s, which is needed in order to correctly identify the maximum one.
The power and novelty of SKIM comes from efficiently maintaining
a residual problem, which allows for samples which provide relative
error guarantees on marginal contributions of new seed candidates.
We also note that SKIM runs in worst-case near-linear time on
inputs specified as a set of (arbitrary) instances. It is not known if
near-linear time algorithms that compute an approximate greedy
sequence exist for the IC model.
2
generalization to arbitrary decay functions α is only slightly slower,
and can easily handle graphs with hundreds of millions of edges.
We conclude in Section 7.
2. DISTANCE-BASED MODEL
For a set of entities V , utility uvu for v,u ∈ V , and a seed set S ⊂ V ,
we define the influence of S as
Inf(S) = ∑
u∈V
min
v∈S
uuv .
Distance-based utility is defined with respect to a non-increasing
function α such that α(∞) ≡ 0 and (a set or distribution over) edge-
weighted graphs G = (V,E,w), where the nodes correspond to enti-
ties and edges e ∈ E have lengths w(e) > 0.
We refer to a single graph G as an instance. We denote by dvu
the shortest-path distance in G from v to u. When there is no path
from v to u in G we define dvu ≡ ∞. For a set of nodes S, we let
dSu = minv∈S dvu be the shortest-path distance in G from S to u.
The utility with respect to a single instance is defined as uvu =
α(dvu), yielding the influence function
Inf(G,S) = ∑
u∈V
α(dSu).
For a set G = {G(i)} of (cid:96) ≥ 1 instances G(i) = (V,E(i),w(i)), we
define the utility as the average uvu = 1
vu ) and accordingly
the influence is the average of the single-instance influence:
i=1 α(d(i)
(cid:96) ∑(cid:96)
Inf(G ,S) = Inf({G(i)},S) =
1
(cid:96) ∑
i∈[(cid:96)]
Inf(G(i),S).
(1)
Our algorithms work with inputs specified as a set of one or more
instances and with respect to the influence function (1).
A set of instances can be derived from traces or generated by
Monte-Carlo simulations of a probabilistic model G . Such a model
defines a distribution over instances G ∼ G which share a set V
of nodes. The respective utility is then uuv = E[α(duv)] and the
influence of G is then the expectation
Inf(G ,S) = EG∼G Inf(G,S).
(2)
When Inf is well concentrated around its expectation, a small num-
ber of simulations suffices to approximate the results.
2.1 The Exact Greedy Sequence
We present the exact greedy algorithm for the distance-based influ-
ence objective Inf({G(i)},S), as defined in Equation (1). GREEDY
starts with an empty seed set S = /0. In each iteration, it adds the
node with maximum marginal gain, that is, the node u that maxi-
mizes the influence of S∪{u}. GREEDY thus produces a sequence
of nodes, providing an approximation guarantee for the seed set
defined by each prefix.
We now elaborate on the computation of the marginal gain of u
given S. To do so efficiently as S grows, we work with a residual
problem. We denote the residual problem of G with respect to seed
set S as GS. The influence of a set of nodes U in the residual
problem is equal to the marginal influence in the original problem:
Inf(GS,U) = Inf(G ,S∪U)− Inf(G ,S).
A residual problem has a slightly more general specification. The
input has the form (G ,δ ), where δ (i)
v ≥ 0 maps node-instance pairs
(v,i) to nonnegative numbers. The δ values we use for the residual
problem GS are the respective distances from the seed set (but can
be truncated without violating correctness at any distance x in which
α(x) = 0):
δ (i)
v = d(i)
Sv ≡ min
u∈S
d(i)
uv .
v = ∞ or any δ (i)
When the seed set is empty or the node v is either not reachable
from S in instance i or has distance d(i)
Sv > supx{α(x) > 0}, we can
use δ (i)
We now extend the influence definition for inputs of the form
(G ,δ ). For a node u, we consider the contribution of each node-
instance pair (v,i) to the influence of u:
∆(i)
uv ≡ max{0,α(d(i)
v > supx{α(x) > 0}, which is equivalent.
uv )− α(δ (i)
v )}.
(3)
The influence of u in the residual problem is the (normalized) sum
of these contributions over all nodes in all instances:
Inf((G ,δ ),u) ≡
It is not hard to verify the following.
1
(cid:96) ∑
i
∆(i)
uv .
∑
v
(4)
LEMMA 2.1. For any set of nodes U, the influence of U in GS
is the same as marginal influence of U with respect to S in G .
Given a residual input (G ,δ ), the influence of a node u (which
is the same as its marginal influence in the original input G ) can
be computed using a pruned application of Dijkstra's algorithm
from u. A pseudocode is provided as the function MargGain(u) in
Appendix D.1. The pruning is performed for efficiency reasons by
avoiding expanding the search in futile directions. In particular, we
can always prune at distance d when α(d) = 0 or when d ≥ δ (i)
v .
The correctness of the pruning follows by observing that all nodes u
Dijkstra could reach from the pruned node have ∆(i)
uv = 0.
At each step, GREEDY selects a node with maximum influence in
the residual input. It then updates the distances δ so that they capture
the residual problem GS∪{u}. A pseudocode for updating δ is
provided as the function AddSeed(u) in Appendix D.1. To update,
we perform a pruned single-source shortest-paths computation in
each instance i from u, as in MargGain(u).
A straightforward implementation of GREEDY will recompute
MargGain(u) for all nodes u after each iteration. A common ac-
celeration is instead to perform lazy evaluations: one keeps older
values of marginal gains, which are upper bounds on the current
values, and updates the current values only for the candidates at the
top of the queue as needed to determine the maximum one. Lazy
evaluations for reachability-based influence were used by Leskovec
et al. [34] in their CELF algorithm. The correctness of lazy eval-
uations follows from the submodularity and monotonicity of the
objective, which imply that the marginal gain of a node can only
decrease as the seed set grows.
2.2 Approximate Greedy Sequences
APPROXIMATE GREEDY is similar to exact GREEDY, but in each
iteration, instead of selecting a seed node with maximum marginal
gain, we select a seed node with marginal contribution that is within
a small relative error ε of the maximum with high probability. It
also suffices to require that the relative error is bounded by ε in
expectation and is concentrated, that is, ∀a > 1, the probability of
error exceeding aε decreases exponentially in a. It turns out that the
approximation ratio of APPROXIMATE GREEDY is 1− (1− 1/s)s −
O(ε) with corresponding guarantees [15].
The SKIM algorithm applies approximate greedy to reachability-
based influence.
It works with partial sketches (samples) from
"influence sets" of nodes to determine a node with approximately
3
maximum marginal gain. These partial sketches need to be updated
very efficiently after each seed is selected. A critical component
for the scalability and accuracy of SKIM is sampling with respect
to the residual problem. This is because the marginal influence of
a node can be much smaller than its initial influence and we can
get good accuracy with a small sample only if we use the residual
problem.
The residual problem (and current samples) are updated after
each seed selection, both with exact and approximate GREEDY. We
now consider the total number of edge traversals used in these up-
dates. With reachability-based influence, with exact or approximate
GREEDY, the number of traversals is linear in input size: This is
because there can be at most one search which progresses through a
node in each instance. Once a node is reachable from the seed set
in that instance, it is influenced, and everything reachable from the
node in the same instance is reachable, and influenced, as well. So
these nodes never need to be visited again and can be removed.
This is not true, however, for distance-based influence: For each
node-instance pair (v,i), the distance δ (i)
v can be updated many times.
Moreover, when the distance to the seed set decreases, as a result
of adding a new seed node, the node v and its outgoing edges in the
instance i are traversed. Therefore, to bound the number of edge
traversals we must bound the number of updates of δ (i)
v .
For exact GREEDY, there are pathological inputs with Ω(sn)
updates, which roughly translates to Ω(sE) edge traversals, even
on a single instance and threshold influence. 2 On realistic inputs,
however, we expect the number of updates to be no more than lns per
node. This is because even if seed nodes are added in random order,
the expected number of times the distance to the seed set decreases
is well concentrated around lns. Therefore, since selected seeds
should typically be closer than other nodes, we would expect a small
number of updates. Remarkably, we show that our APPROXIMATE
GREEDY selection circumvents this worst-case behavior of the exact
algorithm and guarantees a near-linear number of updates :
THEOREM 2.1. Suppose that the approximate greedy selection
has the property that for some ε, the next seed is selected in a near
uniform way from all nodes with marginal influence that is at least
(1− ε) of the maximum. Then the expected total number of updates
of δ (i)
v at a node-instance pair (v,i) is bounded by O(ε−1 log2 n).
PROOF. Consider the candidate next seeds S(cid:48) (those with marginal
influence that is within (1− ε) of the maximum). For a node in-
stance pair (v,i), consider all nodes u ∈ S(cid:48) with duv < δ (i)
v . Then
the probability that the jth selected node from this group would
be closer than all previously selected ones is 1/ j. We obtain that
the expected number of updates to δ (i)
from nodes in this group
v
is at most lnn. We now consider, for the sake of analysis only,
partitioning the greedy selection to steps, according to a decrease
by a factor of (1− ε) of the maximum marginal influence of a node.
We showed that the expected number of selections in a step is at
most lnn. Also note that the marginal influence of a node can only
decrease after another node is selected, so it is possible that it moves
to the next step. We now bound the number of steps. Because we
2Consider a deterministic instance (directed graph) and threshold
influence with T > 1. The nodes {ai} have edges to all nodes in
a set M with length T (1− i/(2A)) and special nodes {b1, . . . ,bi}
with distance 1. The greedy selection, and in fact also the optimal
one, selects the nodes {ai} by decreasing index. But each selection
updates the δ for all nodes in M. We can choose number of a nodes
M and number of b nodes roughly M. Obtaining that
each of the first √n seeds (where n is the total number of nodes)
results in δ updates for Ω(n) nodes.
roughly(cid:112)
4
are interested in ε approximation, we can stop the greedy algorithm
once the maximum marginal influence is below ε/n of the initial
one. Therefore, there are at most ε−1 logn steps.
3. THRESHOLD INFLUENCE
We present both an oracle and an approximate greedy IM al-
gorithm for threshold influence [23, 27]. In this model, a node is
considered influenced by S in an instance if it is within distance
at most T from the seed set. Formally, α(x) = 1 when x ≤ T and
α(x) = 0 otherwise. The simpler structure of the kernel allows for
simpler algorithms, intuitively, because the contributions to influ-
ence ∆(i)
3.1 Threshold-Influence Oracle
uv are in {0,1}, as with reachability-based influence.
Our influence oracle for a prespecified threshold T generalizes
the reachability-based influence oracle of Cohen et al. [15]. The
reachability-based influence oracle preprocesses the input to com-
pute a combined reachability sketch for each node. Each node-
instance pair is assigned a random permutation rank (a number in
[n(cid:96)]) and the combined reachability sketch of a node u is a set con-
sisting of the k smallest ranks amongst node-instance pairs (v,i)
such that v is reachable from u in instance i. This is also called a
bottom-k sketch of reachable pairs. The oracle uses the sketches of
the nodes in S to estimate their influence by applying the union size
estimator for bottom-k sketches [18]. The combined reachability
sketches are built by first computing a set of reachability sketches
(one for each node) [11] in each instance and then combining, for
each node, the sketches obtained in different instances to obtain
one size-k sketch. In turn, the computation for each instance uses
reverse (backward) reachability computations. The algorithm of
Cohen [11] initiates these reversed reachability searches from all
nodes in a random permutation order. These searches are pruned at
nodes already visited k times.
For threshold influence, we instead consider a pair (v,i) reachable
from u if d(i)
uv ≤ T . We then compute for each node the bottom-k
sketch of these "reachable" pairs under the modified definition. The
oracle estimator [18] is the same one used for the reachability-based
case; the estimate has (worst-case) CV that is at most 1/√k− 2
with good concentration. The computation of the sketches is nearly
as efficient as for the reachability-based case. Instead of using re-
verse reachability searches, for threshold influence we use reverse
Dijkstra computations (single-source shortest-path searches on the
graph with reversed edges). These computations are pruned both
at distance T and (as with reachability sketches) at nodes already
visited k times. The sets of sketches obtained for the different in-
stances are combined as in [15] to obtain a set of combined sketches
(one combined sketch with k entries for each node).
The running time is dominated by the computation of the sketches.
i=1E(i)logn), the sketch
The preprocessing computation is O(k∑(cid:96)
representation is O(kn), and each influence query for a set S takes
O(Sk logS) time.
Oracle for a distance-based IC model.
A distance-based Independent Cascade (IC) model G is specified
by associating an independent random length w(e) ∈ [0, +∞] with
each edge e according to a distribution that is associated with the
edge. The probability that e is live is pe = Pr[w(e) < ∞] and its
length if it is live is w(e). We use the convention that an edge e that
is not explicitly specified has w(e) ≡ ∞ (is never live).
As with the IC model for reachability-based influence [15, 36],
we can compute oracles based on sketches that have the same size,
query time, and approximation guarantees, but with respect to a
distance-based IC model (where the exact influence is defined as
the expectation over the model instead of the average of (cid:96) determin-
istic instances). The worst-case computation involved, however, is
higher. The algorithm performs up to k = O(ε−2 logn) reverse Di-
jkstra searches (pruned to distance T ) from each node. Each search
randomly instantiates incoming edges of scanned nodes according
to the model. Pseudocode is provided as Algorithm 1. Note that in
contrast to sketching instances, the searches are not pruned at nodes
that already have a size-k sketch. Therefore we can not bound the
total number of node scans by as we did with instances, and have a
worst-case bound of O(kn2). On the positive size, we do maintain
the property that the sketch sizes are k. The correctness arguments
of the approximation guarantees with respect to the expectation of
the IC model carry over from [15].
// Initialize sketches
nodes V
Algorithm 1: Build sketches S(v), v ∈ V for an IC model
foreach v ∈ V do S(v) ← /0;
// Iterate over k random permutations of the
for j = 0, . . . ,k− 1 do
Draw a random permutation of the nodes π : [n] → V
for i = 1, . . . ,n do
Perform a reverse Dijkstra search from node π(i)
pruned to distance T
foreach scanned node u do
if S(u) < k then
S(u) ← S(u)∪{n∗ j + i}
if all nodes z have S(z) = k then
Instantiate and process length and presence of
incoming edges of u
exit
return S(v) for all v ∈ V
3.2 Threshold-Influence Maximization
Our algorithm for threshold influence maximization, which we
call T -SKIM, generalizes SKIM [15], which was designed for
reachability-based influence. A pseudocode for T -SKIM is pro-
vided as Algorithm 3 in Appendix D.2.
Our algorithm T -SKIM builds sketches, but only to the point of
determining the node with maximum estimated influence. We then
compute a residual problem which updates the sketches. T -SKIM
build sketches using reverse single-source shortest path computa-
tions that are pruned at distance T (depth-T Dijkstra). As with exact
greedy for distance-based influence (Section 2), T -SKIM maintains
a residual problem. This requires updating the distances δ [v,i] = d(i)
Sv
from the current seed set S, as in AddSeed(u), and also updating
the sketches to remove the contributions of pairs that are already
covered by the seed set.
The (worst-case) estimation quality guarantee of T -SKIM is
similar to that of SKIM. When using k = O(ε−2 logn) we obtain
that, with high probability (greater than 1−1/poly(n)), for all s ≥ 1,
the influence of the first s selected nodes is at least 1− (1−1/s)s−ε
of the maximum influence of a seed set of size s. The computation
time analysis of T -SKIM is deferred to Appendix A.
set S of nodes and any function α, can be approximated from the
sketches of the query seed nodes.
Note that the same set of sketches can be used to estimate distance-
based influence with respect to any non-increasing function α. That
is, α can be specified on the fly, after the sketches are computed.
When we are only interested in a specific α, such as a threshold
function with a given T (Section 3) or reachability-based influence
[15], the sketch size and construction time can be reduced.
In the following we present in detail the three components of our
oracle: the definition of the sketches, estimation of influence from
sketches (queries), and building the sketches (preprocessing).
The sketches are defined in Section 4.1 and we show that for an
input specified as either a set of instances or as a distance-based
IC model, each sketch Xv has a (well concentrated) expected size
that is at most k ln(nk). The total storage of our oracle is therefore
O(nk log(nk)).
The sketch-based influence estimator is presented in Section 4.2.
We establish the following worst-case bounds on estimation quality.
THEOREM 4.1. Influence queries Inf(G ,S), specified by a set S
of seed nodes and a function α, can be estimated in O(Sk logn)
time from the sketches {Xu u ∈ S}. The estimate is nonnegative and
unbiased, has CV ≤ 1/√2k− 2, and is well concentrated (the prob-
ability that the relative error exceeds a/√k decreases exponentially
with a > 1).
We also show that our estimators are designed to fully exploit the
information in the sketches in an instance-optimal manner. The
preprocessing is discussed in Section 4.3. We show that for a set of
(cid:96) instances G = {G(i)}, the preprocessing is performed in expected
time O(k∑(cid:96)
4.1 Combined ADS
i=1E(i)logn).
Our combined All-Distances Sketches (cADS) are a multi-instance
generalization of All-Distances Sketches (ADS) [11, 12, 17] and
build on the related combined reachability sketches [15] used for
reachability-based influence.
The cADS sketches are randomized structures defined with re-
spect to random rank values r(i)
u ∼ U[0,1] associated with each
node-instance pair (u,i). To improve estimation quality in practice,
we restrict ourselves to a particular form of structured permuta-
tion ranks [15]: For a set of instances, the ranks are a permutation
of 1, . . . ,nmin{(cid:96),k}, where each block of positions of the form
in, (i + 1)n− 1 (for integral i) corresponds to an independent ran-
dom permutation of the nodes. For each node u, the instances i j
in r(i j)
, when ordered by increasing rank, are a uniform random
u
selection (without replacement).
u ,d(i)
For each node v, cADS(v) is a set of rank-distance pairs of the
form (r(i)
vu ) which includes min{(cid:96),k} pairs of distance 0, that is,
all such pairs if (cid:96) ≤ k and the k smallest rank values otherwise. It
also includes pairs with positive distance when the rank value is at
most the kth smallest amongst closer nodes (across all instances).
Formally,
cADS(v) =
(cid:8)(r(i)
(cid:8)(r(i)
v ,0) r(i)
u ,d(i)
vu ) r(i)
v ∈ BOTTOM-k{r( j)
u < kth
vy <d(i)
vu
(y, j)d( j)
(cid:9)
(cid:9)
v j ∈ [(cid:96)]}
r( j)
y
. (5)
4.
INFLUENCE ORACLE
We now present our oracle for distance-based influence, as defined
in Equation (1). We preprocess the input G to compute a sketch Xv
for each node v. Influence queries, which are specified by a seed
Here BOTTOM-k refers to the smallest k elements in the set and
kth denotes the kth smallest element in the set. When there are
fewer than k elements, we define kth as the domain maximum. For
the purpose of sketch definition, we treat all positive distances
across instances as unique; we apply some arbitrary tie-breaking,
5
for example according to node-instance index, when this is not the
case.
The size of cADS sketches is a random variable, but we can bound
its expectation. Moreover, cADS(u) is well concentrated around
the expectation. The proof resembles that for the basic ADS [11].
LEMMA 4.1. ∀u, E[cADS(u)] ≤ k ln(nmin{k, (cid:96)}).
PROOF. We consider all node-instance pairs (v,i) such that r(i)
v ∈
BOTTOM-k{r( j)
v j ∈ [(cid:96)]} by increasing distance from u. The prob-
ability that the jth item contributes to cADS(u) is the probability
that its rank is amongst the k smallest in the first j nodes, which is
min{1,k/ j}. Summing over i ≤ Ru we obtain the bound.
Note that we can also define cADS sketches with respect to a
probabilistic model. The definition emulates working with an infi-
nite set of instances generated according to the model. Since there
are at most nk distinct rank values in the sketches, and they are all
from the first nk structured permutation ranks, the entries in the
sketches are integers in [nk].
4.2 Estimating Influence
Our estimators use the HIP threshold, τv(x), defined with respect
to a node v and a positive distance value x > 0 [12]:
τv(x) = kth
r( j)
u
(u, j)d( j)
vu <x
= kth{r (r,d) ∈ cADS(v) and d < x}.
(6)
The value τv(x) is the kth smallest rank value amongst pairs (y, j)
whose distance d( j)
vy is smaller than x. If there are fewer than k pairs
with distance smaller than x, then the threshold is defined to be the
maximum value in the rank domain. Note that, since the cADS
contains the k smallest ranks within each distance, τv(x) is also the
kth smallest amongst such pairs that are in cADS(v). Therefore, the
threshold values τv(x) can be computed from cADS(v) for all x.
vu ) is the largest rank value r(i)
The HIP threshold has the following interpretation. For a node-
instance pair (u,i), τv(d(i)
u that would
allow the (rank of the) pair to be included in cADS(v), conditioned
on fixing the ranks of all other pairs. We now can consider the
probability that the pair (y, j) is included in cADS(v), fixing the
ranks of all pairs other than (y, j). This is exactly the probability
that a random rank value is smaller than the HIP threshold τv(x). In
particular, if τv(x) is the domain maximum, the inclusion probably
is 1. We refer to this probability as the HIP inclusion probability.
When ranks are uniformly drawn from [0,1] the HIP inclusion
probability is equal to the HIP threshold τv(x) and we use the same
notation. When we work with integral structured ranks, we divide
them by n(cid:96) to obtain values in [0,1].
We now present the estimator for the influence
Inf({G(i)},S) =
=
1
(cid:96) ∑
(v,i)
α(min
u∈S
max
u∈S
1
(cid:96) ∑
(v,i)
d(i)
uv ) =
α(d(i)
uv )
1
(cid:96) ∑
(v,i)
α(d(i)
Sv )
(7)
from {cADS(u) u ∈ S}. We first discuss S = 1. We use the HIP
estimator [12](cid:99)Inf({G(i)},u) = α(0) +
1
(cid:96)
∑
(r,d)∈cADS(u)d>0
α(d)
τu(d)
,
(8)
which is the sum over "sampled" pairs (r,d) (those included in
cADS(u)) of the contribution α(d)/(cid:96) of the pair to the influence of
u, divided by the HIP inclusion probability of the pair.
LEMMA 4.2. The estimator (8) is unbiased and has CV that is
at most 1/√2k− 2.
PROOF. A node always influences itself (the only node of dis-
tance 0 from it), and the estimate for that contribution is α(0). We
apply the HIP estimator of [12] to estimate the contribution of nodes
with positive distance from u. For a pair (v,i), the HIP estimate
is 0 for pairs not in cADS(u). When the pair is in cADS(u), we
can compute the HIP probability τu(d(i)
uv ) and obtain the estimate
α(d(i)
uv ). Since we are considering node-instance pairs, we
divide by the number of instances (cid:96). The variance analysis is very
similar to [12].
uv )/τu(d(i)
We now consider a seed set S with multiple nodes. The simplest
way to handle such a set is to generate the union cADS, which
is a cADS computed with respect to the minimum distances from
any node in S. The union cADS can be computed by merging the
cADS of the seed nodes using a similar procedure to Algorithm 6
(in Appendix D.3) which will be presented in Section 4.3. We then
estimate the contribution of the nodes in S by Sα(0) and estimate
the contribution of all nodes that have a positive distance from S by
applying the HIP estimator to the entries in the union cADS. This
estimator has the worst-case bounds on estimation quality claimed
in Theorem 4.1, but discards a lot of information in the union of the
sketches which could be used to tighten the estimate.
4.2.1 Optimal Oracle Estimator
The estimator we propose and implement uses the information
in the sketches of nodes in S in an optimal way. This means the
variance can be smaller, up to a factor of S, than that of the union es-
timator. A pseudocode is provided as Algorithm 4 in Appendix D.3.
The estimator first computes the set Z of rank values r that appear
with distance 0 in at least one sketch. These ranks correspond to
node-instance pairs involving a seed node. For each rank value r that
appears in at least one sketch in S and is not in Z (has positive dis-
tance in all sketches), we build the set Tr of threshold-contribution
pairs that correspond to occurrences of r in sketches of S. We then
compute from Tr the sorted skyline (Pareto set) skylines[r] of Tr. The
skyline skylines[r] includes a pair (τ,α) ∈ Tr if and only if the pair
is not dominated by any other pair. That is, any pair with a larger τ
value must have a smaller α value. We compute skylines[r] from Tr
as follows. We first sort Tr lexicographically, first by decreasing τ,
and then if there are multiple entries with same τ, by decreasing α.
We then obtain skylines[r] by a linear scan of the sorted Tr which
removes pairs with a lower α value than the maximum α value
seen so far. The entries of the computed skylines[r] are sorted by
decreasing τ j (and increasing α j).
For each r for which we computed a skyline (appears in at least
one sketch of a node in S and is not in Z), we apply the L∗ estimator
[13] to the sorted skylines(r) = {(τ j,α j)}. The pseudocode for
L∗ tailored to our application is in Algorithm 5 in Section D.3,
and details on the derivation and applicability of the estimator are
provided in Appendix B.
Finally, the influence estimate (cid:99)Inf({G(i)},S) returned by Algo-
rithm 4 has two components. The first summand (Sα(0)) is the
contribution of the seed nodes themselves. The second component
is the sum, over all node-instance pairs of positive distance from
S, of their estimated contribution to the influence (normalized by
the number of instances (cid:96)). We estimate this by the sum of the L∗
estimates applied to skylines(r).
4.3 Computing the Set of cADS
We compute a set of cADS sketches by computing a set of ADS
sketches ADS(i)(v) for each instance i [11, 12]. The computation
6
of sketches for all nodes v in a single instance can be done us-
ing PRUNED DIJKSTRAs [11, 17] or the node-centric LOCAL UP-
DATES [12].
An ADS is a cADS of a single instance and has the same basic
form: a list of rank-distance pairs sorted by increasing distance. It
can have, however, at most one entry of distance 0.
For each node v, we compute cADS(v) by combining ADS(i)(v)
for all instances i.A pseudocode for combining two rank-distance
lists to a cADS format list is provided as Algorithm 6. The algorithm
can be applied repeatedly to ADS(i)(v) and the current cADS(v), or
in any combination order of rank-distance lists to obtain the same
end result.
The computation of the set of cADS sketches is dominated by
computing a set of All-Distances Sketches [11, 12, 17] in each in-
stance. The computation for instance i takes O(kE(i)logn) time.
Algorithm 2: Distance-based IM (α-SKIM)
Input: Directed graphs {G(i)(V,E (i),w(i))}, α
Output: Sequence of node and marginal influence pairs
// Initialization
// List of (u,d(i)
uv )
rank ← map node-instance pairs (v,i) to j/(n(cid:96)) where j ∈ [n(cid:96)];
forall the node-instance pairs (v,i) do index[v,i] ←⊥;
scanned by reverse Dijkstra (v,i)
forall the pairs (u,i) do δ [u,i] ← ∞;
// Distance from S
forall the nodes v do Est.H[v] ← 0; Est.M[v] ← 0 seedlist ←⊥ // List of
seeds & marg. influences
forall the node-instance pairs (v,i) do Insert (v,i) to Qpairs with priority
α(0)/rank[v,i];
s ← 0; τ ← α(0)n(cid:96)/(2k); coverage ← 0
set
while coverage < n(cid:96)α(0) do
// Initialize Qpairs
// coverage of current seed
// Build PPS samples of marginal influence sets until
confidence in next seed
while ((x, Ix) ← NextSeed()) =⊥ do
τ ← τλ ; MoveUp()
forall the pairs (v,i) in Qpairs with priority ≥ τ do
// Update est. components
Remove (v,i) from Qpairs
Resume reverse Dijkstra from (v,i). foreach scanned node u of
distance d do
c ← α(d)− α(δ [v,i]);
if c ≤ 0 then Terminate rev. Dijkstra from (v,i) if
c/rank[v,i] < τ then
place (v,i) with priority c/rank[v,i] in Qpairs; Pause
reverse Dijkstra from (v,i)
else
append (u,d) to index[v,i]
if c ≥ τ then Est.H[u] +←c;
else
Est.M[u] +←1
if HM[v,i] =⊥ then
// c/rank[v,i] ≥ τ
// H entry
// M entry
HM[v,i] ← index[v,i]; Insert (v,i) with priority
c to Qhml
Update the priority of u in Qcands to
Est.H[u] + τEst.M[u]
// Process new seed node x
Ix ← 0
foreach instance i do
// Exact marginal influence
Perform a forward Dijkstra from x in G(i). foreach visited node v at
distance d do
if d ≥ δ [v,i] then Pruneelse
;
rank[v,i]
priority(v,i) in Qpairs −← α(d)−α(δ [v,i])
if priority of (v,i) in Qpairs ≤ 0 then terminate rev.
Dijkstra (v,i) and remove (v,i) from Qpairs
MoveDown((v,i),δ [v,i],d);
+←α(d)− α(δ [v,i]); δ [v,i] ← d
Ix
s +←1; coverage +←Ix; seedlist.append(x, Ix/(cid:96),Ix/(cid:96))
return seedlist
5.
INFLUENCE MAXIMIZATION
We present α-SKIM (pseudocode in Algorithm 2), which com-
putes an approximate greedy sequence for distance-based influence
with respect to an arbitrary non-increasing α. The input to α-SKIM
is a set of instances G and a decay function α. The output is a
sequence of nodes, so that each prefix approximates the maximum
influence seed set of the same size.
Like exact greedy (Section 2) and T -SKIM (Section 3), α-SKIM
maintains a residual problem, specified by the original input G
and distances δ (i)
v . It also maintains, for each node, a sample of
its influence set, weighted by the respective contribution of each
element. The sampling is governed by a global sampling threshold τ,
which inversely determines the inclusion probability in the sample
(the lower τ is, the larger is the sample). The weighted sample has
the same role as the partial sketches maintained in T -SKIM, as it
allow us to estimate the influence of nodes.
At a high level, α-SKIM alternates between two subroutines.
The first subroutine examines the influence estimates of nodes. We
pause if we have sufficient confidence that the node with the maxi-
mum estimated influence (in the current residual problem) has actual
influence that is sufficiently close to the maximum influence. Other-
wise, we decrease τ, by multiplying it by a (fixed) λ < 1 (we used
λ = 0.5 in our implementation), extend the samples, and update the
estimates on the influence of nodes to be with respect to the new
threshold τ. We pause only when we are happy with the node with
maximum estimated influence.
The second subroutine is invoked when a new node x is selected
to be added to the seed set; α-SKIM updates the residual problem,
that is, the distances δ and the samples.
We provide an overview of our presentation of the components of
α-SKIM. In Section 5.1 we precisely define the weighted samples
we use. In Section 5.2 we present our main data structure, index,
which stores the (inverted) samples. The building of index, which
dominates the computation, is done using applications of pruned
reverse Dijkstra, discussed in Section 5.3. The selection of the next
seed node is detailed in Section 5.4. The samples are defined with
respect to the current residual problem and the sampling threshold
τ. Therefore, they need to be updated when τ is decreased or when
a new seed node is selected. While the new estimates can always be
computed by simply scanning index, this is inefficient. In Section
5.5 we present additional structures which support efficient updates
of samples and estimates. Finally, Section 5.6 includes a worst-case
analysis.
5.1 PPS Samples of Influence Sets
We start by specifying the sampling scheme, which is the core
of our approach. The sample we maintain for each node u is a
Probability Proportional to Size (PPS) sample of all node-instance
pairs (v,i), where the weighting is with respect to the contribution
values ∆(i)
uv , as defined in Equation (3). Recall from Equation (4)
that the influence, which we are estimating from the sample, is
the sum of these contributions. PPS sampling can be equivalently
defined with respect to a threshold τ [43]: Each entry (v,i) has an
independent r(i)
v ∼ U[0,1] and it is included in the sample of u if
∆(i)
uv
v ≥ τ.
r(i)
(9)
From the PPS sample we can unbiasedly estimate the influence
of u, using the classic inverse-probability estimator [28]. We denote
by Hu the set of all pairs (v,i) such that ∆(i)
uv ≥ τ and by Mu the set
of all other sampled pairs, that is, those where ∆(i)
v τ,τ). Note
uv ∈ [r(i)
7
τ
that pairs in Hu are sampled with probability 1, whereas pairs in Mu
are sampled with probability ∆(i)(u)
(this is the probability of having
(cid:32)
a rank value so that (9) is satisfied). The estimate is the sum of the
ratio of contribution to inclusion probability:
τMu + ∑
(v,i)∈Hu
(cid:99)Inf((G ,δ ),u) =
(cid:33)
∆(i)
uv
(10)
1
(cid:96)
With PPS sampling, when τ is low enough so that the estimate is at
least kτ, which always happens when we have k samples, the CV is
at most 1/√k. The estimate is also well concentrated according to
the Chernoff bound.
.
We note that our use of PPS sampling, rather than uniform sam-
pling, is critical to performance with general α. When using (for
example) exponential or polynomial decay, the positive contribu-
tions of different pairs to the influence of a node can vary by orders
of magnitude. Therefore, we must use weighted sampling, where
heavier contributions are more likely to be sampled, to obtain good
accuracy with a small sample size. With threshold influence, in con-
trast, contributions were either 0 or 1, which meant that we could
get good performance with uniform sampling.
The PPS samples we will maintain for different nodes are com-
puted with respect to the same threshold τ. The samples are also
coordinated, meaning that the same values r(i)
v are used in the sam-
ples of all nodes. Coordination also helps us to maintain the samples
when the contribution values ∆ are modified, since the sample itself
minimally changes to reflect the new values [8, 19, 38]. In our im-
plementation, node-instance pairs are assigned structured random
permutation ranks, which are integers in [n(cid:96)], and for permutation
rank h we use rank[v,i] ≡ r(i)
5.2 The Index Structure
v = h/(n(cid:96)).
The main structure we maintain is index, which can be viewed as
an inverted index of the PPS samples (but technically can include
entries that used to be included in the PPS sample and may still
be relevant). For each node-instance pair (v,i), index[v,i] is an
ordered list of node-distance pairs (u,d(i)
uv ). Note that typically
the lists are empty or very small for most pairs (v,i). The list is
ordered by increasing d(i)
uv , which is the order in which a reverse
Dijkstra algorithm performed from v on the graph G(i) (with all
edges reversed) scans new nodes. List index[v,i] always stores (a
prefix) of the scanned nodes, in scanning order. It always includes
all nodes u for which the pair (v,i) is included in the PPS sample
of u, that is, nodes u that satisfy (9). Each list index[v,i] is trimmed
from its tail so that it only contains entries (u,d) where ∆(i)
uv > 0,
that is, α(d)− α(δ (i)
v ) > 0. This is because other entries have no
contribution to the marginal influence of u. Note that the lists are
always a prefix of the Dijkstra scan order, and once they are trimmed
(from the end), they do not grow, and the respective reverse Dijkstra
computation never resumed, even if τ decreases.
Each list index[v,i] is logically viewed as having three consecutive
parts (that could be empty). The H part of the list are all entries
(u,d) with α(d)− α(δ (i)
v ) ≥ τ. These are the nodes u for which
the pair (v,i) contributes to the Hu part of the PPS sample. The M
part of the list are all entries with α(d)− α(δ (i)
v ) ∈ [r(i)
v τ,τ), which
include nodes u for which (v,i) contributes to Mu. Finally, the L part
of the list includes nodes for which 0 < α(d)−α(δ (i)
v τ. The
L nodes do not currently include (v,i) in the PPS sample of their
influence sets, but are still relevant, since this may change when τ
decreases.
v ) < r(i)
To support efficient updates of this classification, we maintain
HM[v,i] and ML[v,i], which contain the positions in the list index[v,i]
of the first M and the first L items (and are empty if there are no M
or L items, respectively).
To efficiently compute the influence estimates, we maintain for
each node u the values
Est.H[u] =
∆(i)
uv
∑
(v,i)∆(i)
uv≥τ
uv ∈ [r(i)
The PPS estimate (10) on the influence of u is
Est.M[u] = {(v,i) ∆(i)
v τ,τ)}
1
(cid:96)
(Est.H[u] + τEst.M[u]) .
(11)
5.3 Reverse Dijkstra Computations
We build the samples using reverse Dijkstra computations starting
at node-instance pairs (v,i). The computation is from source v in
the transpose graph of G(i) and reveals all nodes u for which the
pair (v,i) is included in the PPS sample for u as defined in (9). The
nodes scanned by the reverse Dijkstra on [v,i] are maintained as
index[v,i], in the same order. The computation for (v,i) is paused
once the distance d from the source satisfies
v ) < r(i)
v τ.
(12)
α(d)− α(δ (i)
The computation may resume when τ is decreased and the pause
rule (12) no longer holds. It is not hard to verify that this pause rule
suffices to obtain all entries of (v,i) in the PPS samples of nodes.
When the depth d satisfies α(d)− α(δ (i)
v ) ≤ 0, the computation of
the reverse Dijkstra (v,i) is (permanently) terminated, releasing all
auxiliary data structures. Note that the reverse Dijkstra computations
for different pairs are paused and resumed according to the global
threshold τ, and can be performed concurrently.
The algorithm maintains "state" for all active Dijkstras. We use
the notation µ(v,i) = d for the next distance the reverse Dijkstra
from (v,i) would process when resumed. Initially, µ(v,i) = 0. In or-
der to efficiently determine the pairs (v,i) for which reverse Dijkstra
needs to be resumed, we maintain a max priority queue Qpairs over
node-instance pairs (v,i), prioritized by
α(µ(v,i))− α(δ (i)
v )
(13)
.
r(i)(v)
This priority is the sampling threshold that is required to get (v,i)
into the PPS sample of the next node to be scanned by the reverse
Dijkstra of (v,i). We only need to resume the reverse Dijkstra (v,i)
when its priority (13) is at least τ. Note that the priority of a pair
(v,i) can only decrease over time, when δ (i)
v decreases or when the
reverse Dijkstra progresses and µ(v,i) increases. This allows us to
maintain Qpairs with lazy updates.
In order to determine, after we decrease τ, all the pairs for which
the reverse Dijkstra computation should resume (or start), we simply
extract all the top elements of the queue Qpairs which have priority
at least τ. These top elements are removed from Qpairs. The reverse
Dijkstra is resumed on each removed pair (v,i) until the pause rule
holds again, that is, we reach a distance d such that α(d)−α(δ (i)
v ) <
r(i)
v τ. At this point the reverse Dijkstra is terminated or paused. If it
is paused, we set µ(v,i) ← d, and the pair (v,i) is placed in Qpairs
with the new priority (13).
Note that the resume and pause rules of the reverse Dijkstras
are consistent with identifying all sampled pairs according to (9),
ensuring correctness.
8
Table 1: Performance of TSKIM using k = 64, (cid:96) = 64, and exponentially distributed edge weights. We evaluate the influence on
512 (different) sampled instances for thresholds 0.1 and 0.01.
instance
AstroPh
Epinions
Slashdot
Gowalla
TwitterF's
LiveJournal
Orkut
# nodes
14,845
75,888
77,360
196,591
456,631
4,847,571
3,072,627
# edges
239,304
508,837
828,161
1,900,654
14,855,852
68,475,391
234,370,166
INFLUENCE [%]
RUNNING TIME [SEC]
50 seeds
0.01
1.02
0.53
0.72
0.62
0.20
0.07
2.82
0.1
19.17
8.52
19.97
14.13
19.38
9.16
74.44
1000 seeds
0.1
0.01
9.96
39.25
12.68
2.88
25.04
3.90
17.61
1.93
24.26
1.64
13.81
0.33
4.61
77.47
50 seeds
0.01
0.9
2.0
1.9
4.4
9.9
34.6
779.7
0.1
2.0
5.2
14.6
21.8
133.4
606.0
5,490.5
1000 seeds
0.01
2.0
6.3
7.6
14.8
36.4
117.5
1,788.7
0.1
4.0
11.1
27.9
36.9
269.6
1,244.4
11,060.7
n seeds
0.01
3.7
14.1
18.9
47.6
269.9
1,983.4
7,360.9
0.1
6.6
21.3
40.5
81.7
648.4
4,553.9
24,520.3
Figure 1: Evaluating influence permutations (left) and running times (right) on several instances for threshold decays 0.01 and 0.1.
The legend applies to all plots.
5.4 Selecting the Next Seed Node
The algorithm decreases τ until we have sufficient confidence in
the node with maximum estimated marginal influence. The selec-
tion of the next node into the seed set is given in the pseudocode
NextSeed in Appendix D.4.
We first discuss how we determine when we are happy with the
maximum estimate. When looking at a particular node, and the
value of the estimate is at least τk, we know that the value is well
concentrated with CV that is 1/√k. We are, however, looking at the
maximum estimate among n nodes. To ensure an expected relative
error of ε in the worst case, we need to apply a union bound and
use k = O(ε−2 logn). The union bound ensures that the estimates
for all nodes have a well concentrated maximum error of ε times
the maximum influence. In particular, the estimated maximum has
a relative error of ε with good concentration.
In practice, however, the influence distribution is skewed and
therefore the union bound is too pessimistic [15]. Instead, we pro-
pose the following adaptive approach which yields tighter bounds
for realistic instances. Consider the node u with maximum estimated
marginal influence Iu and let Iu be its exact marginal influence Iu.
The exact marginal influence can be compute, using MargGain(u)
(Section 2), and is also computed anyway when u is added to the
seed set.
The key to the adaptive approach is the following observation.
When working with a parameter k = ε−2 and the maximum estimate
is at least kτ, then under-estimates of the true maximum are still well
concentrated but over-estimates can be large. Fortunately, however,
over-estimates are easy to test for by comparing Iu and Iu(1− ε).
We can use this as follows. In our experiments we run the al-
gorithm with a fixed k, always selecting the node with maximum
estimate when the estimate exceeds kτ. We obtain, however, much
tighter confidence interval than through the worst case bound. In
particular, for the sequence of computed seeds, we track the sum
9
Er = ∑u max{0, (1− ε) Iu − Iu}. This sum is added as a fixed com-
ponent to the confidence bound, which means that with high prob-
ability the error for any prefix size is Er plus a well concentrated
value around ε times the estimate. In particular, the approxima-
tion ratio we obtain with good probability for a prefix s is at least
1− (1− 1/s)s − ε − Er/(cid:99)Inf.
Alternatively, (this is in the pseudocode) we can perform seed
selection with respect to a specified accuracy ε. Thus obtaining
approximation ratio of 1 − (1 − 1/s)s − ε with good probability.
We use k that is ε−2 but when we have a candidate (a node with
maximum estimated marginal gain which exceeds kτ) we apply
MargGain(u) to compute its exact marginal influence Iu. If we find
that Iu ≥ (1− ε)Iu, we do not select u and instead decrease τ which
returns to sampling. Otherwise, we select u into the seed set.
We now consider tracking the node with maximum estimated
influence. To do that efficiently, we work with a max priority queue
Qcands, which contains nodes prioritized by their estimated influ-
ence, or more precisely, by Est.H[u] + τEst.M[u]. For efficiency,
we use lazy updates, which allows priorities not to be promptly
updated when the estimate changes and instead, updated only for
elements which are the current maximum in the queue.
The function NextSeed repeats the following until a node is
selected or ⊥ is returned. If the maximum estimated priority in
Qcands is less than τk, we return ⊥. Otherwise, we remove from
Qcands the node u with maximum priority, compute Iu ← Est.H[u]+
τEst.M[u], and check if Iu is at lest the current maximum entry on
the queue and is larger than τk. When using the first option, we sim-
ply return (u, Iu). When working with a specified error, we further
test u as follows. We compute the actual marginal gain Iu of u. If it
is lower than (1− ε) Iu, we place u back in Qcands with priority Iu
and return ⊥. Otherwise, we return u.
We now consider maintaining Qcands. Priorities are promptly up-
dated to estimate values only when there is a possibility of increase
0.1110100050100T=0.01:seedsetsize[%]influence[%],AstroPh,Epinions,Slashdot,Gowalla,TwitterF's,LiveJournal,Orkut0.111010020406080100T=0.1:seedsetsize[%]0.11101000255075100T=0.01:seedsetsize[%]runningtime[%]0.11101000255075100T=0.1:seedsetsize[%]in the estimate. This is necessary for correctness of the priority
queue when using lazy updates. The estimated influence of a node
u can only decrease when δ decreases for an element in the sample
of u (as a result of adding a new seed) or when τ decreases and no
new entries are added to the sample. Therefore, in these cases, we
do not update the priorities promptly. The priority of u in Qcands is
promptly updates when (as a result of decreasing τ) a new entry is
added to the sample of u.
Note that our algorithm always maintains the estimation compo-
nents Est.H[u] and Est.M[u] updated for all nodes u, so the current
estimate for a node u can at any time be quickly computed from
these two values and the current τ.
Lastly, as in the pseudocode, Algorithm 2 is executed to exhaus-
tion, until the seed set influences all nodes. The algorithm can be
stopped also when the seed set S is of certain desired size or when a
desired coverage ∑u∈S Iu/(n(cid:96)α(0)) is achieved.
5.5 Updating PPS Estimate Components
The positions HM[v,i] and ML[v,i], and accordingly the classifi-
cation of entries (u,d) as H,M, or L, can be updated both when τ
or δ (i)
v decreases. When τ decreases, entries can only "move up:"
L entries can become M or H entries and M entries can become H
entries. New entries can also be generated by a reverse Dijkstra on
(v,i). Newly generated entries are always H or M entries. When
δ (i)
v decreases, entries can "move down." In addition, entries at the
tail of index[v,i], those with α(d) ≤ α(δ (i)
When an entry (u,d) changes its classification, or when a new
entry is generated by a reverse Dijkstra, we may need to update the
estimate components Est.H[u] and Est.M[u].
v ), get removed.
Initial Updates When τ Decreases
5.5.1
When τ decreases, we first (before resuming the reverse Dijk-
stra's) need to update the classification of existing entries and the
implied changes on Est. The pseudocode for this update is provided
as the function MoveUp() in Appendix D.4.
To efficiently identify the index lists that have entries that change
their classification, we maintain a max priority queues Qhml. It
contains node-instance pairs with priority equal to the reclassifica-
tion threshold, the highest τ that would require reclassification of at
least one entry in the list. The procedure UpdateReclassThresh
computes the reclassification threshold for a pair (v,i) and places
the pair with this priority in Qhml. When τ is decreased, we only
need to process lists of pairs that are at the top of the queue Qhml.
Lastly, we discuss the processing of a list (v,i) which requires
reclassification. The reclassification, the updates of the estimation
components Est, and the update of the reclassification threshold us-
ing UpdateReclassThresh(v,i), are all performed in computation
that is proportional to the number of reclassified entries. In particu-
lar, processing does not require scanning the full list index[v,i]. This
is enabled by the pointers HM[v,i] and ML[v,i].
5.5.2 New Scanned Node
The estimation components also need to be updated when a new
entry is appended to the index[v,i] list when running a reverse Di-
jkstra for (v,i). The pseudocode for this update is included in Al-
gorithm 2. The new scanned node u with distance d creates a new
entry (u,d) which is appended to the end of index[v,i]. A new en-
try is always an H or M entry (otherwise the pause rule applies).
If HM[v,i] (cid:54)=⊥, that is, there is at least one M entry in index[v,i],
the new entry must also be an M entry. In this case, we increase
Est.M[u] by 1. If HM[v,i] =⊥, we check if (c ← α(d)−α(δ (i)
v )) ≥
τ. If so, the new entry is an H entry and we increase Est.H[u] by c.
Otherwise, it is the first M entry. We set HM[v,i] ← index[v,i]− 1,
Est.M[u] = 1, and insert the pair (v,i) to the queue Qhml with pri-
ority c. After updates are completed, we recompute the estimated
influence Est.H[u] + τEst.M[u] of the node u and update accord-
ingly the priority of u in Qcands.
5.5.3 New Seed Node
When a new seed node u is selected, we perform a forward
Dijkstra from the seed in each instance i. We update δ (i)
at visited
v
nodes v and compute the exact marginal influence of the new seed.
The forward Dijkstra is pruned at nodes v with δ (i)
that is smaller
v
or equal to their distance from u. When we update δ (i)
v , we also
may need to reclassify entries in index[v,i], update the positions
HM[v,i] and ML[v,i] and update estimation components Est.H[u]
and Est.M[u] of reclassified entries (u,d) . A pseudocode for this
update is provided as the function MoveDown() in Appendix D.4.
We also update the priority of the pair (v,i) in Qhml and decrease
its priority in Qpairs to (α(µ(v,i))− α(δ (i)
(since we do not
track µ(v,i) explicitly in the pseudocode, we instead decrease the
priority to reflect the decrease in δ (i)
v ). If the updated priority in
Qpairs is ≤ 0, the reverse Dijkstra of (v,i) is terminated and it is
removed from Qpairs. Note that in this update, entries can only be
reclassified "down:" E.g. an entry (u,d) that was in H can move to
M, L, or be purged, if α(d) ≤ α(δ (i)
v ).
5.6 Analysis
v ))/r(i)
v
When we run the algorithm with fixed k = O(ε−2 logn) or use
the adaptive approach in seed selection (as detailed in Section 5.4),
we have the following guarantee on the approximation quality:
THEOREM 5.1. α-SKIM returns a sequence of seeds so that
for each prefix S of size s, with high probability,
Inf(G ,S) ≥ (1− (1− 1/s)s − ε) max
UU=s
Inf(G ,U).
(14)
PROOF. The algorithm, with very high probability, selects a
node with marginal influence that is at least 1− ε of the maximum
one. This follows from a union bound over all steps and nodes of
the quality of the estimate obtained from a PPS sample. We then
apply an approximate variant (e.g., [15]) of the classic proof [37]
of the approximation ratio of GREEDY for monotone submodular
problems.
The worst-case bound on the (expected) running time of α-
SKIMis as follows.The proof is provided in Appendix C. We
note that our design exploits properties of real instances and the
poly-logarithmic overheads are not observed in experiments.
THEOREM 5.2. α-SKIM runs in expected time
O
log3 n
(cid:96)∑
i=1E(i) +
providing the guarantee (14).
ε
log3 n
ε3 n +
logn
ε2
(cid:32)
(cid:33)
E(i)
(cid:96)(cid:91)
i=1
6. EXPERIMENTS
Our algorithms were implemented in C++ and compiled using
Visual Studio 2013 with full optimization. Our test machine runs
Windows 2008R2 Server and has two Intel Xeon E5-2690 CPUs and
384 GiB of DDR3-1066 RAM. Each CPU has 8 cores (2.90 GHz,
8× 64 kiB L1, 8 × 256 kiB, and 20 MiB L3 cache). For consistency,
all runs are sequential.
10
The datasets in our experiments are obtained from the SNAP [44]
project and represent social (Epinions, Slashdot [35], Gowalla [10],
TwitterFollowers [22], LiveJournal [2], Orkut [47]) and collabora-
tion (AstroPh [33]) networks. All these graphs are unweighted.
Unless otherwise mentioned, we test our algorithms using (cid:96) = 64
independent instances generated from the graph by assigning inde-
pendent random length to every edge according to an exponential
distribution with expected value 1 [1, 14, 27]. To do so, we sample a
value x uniformly at random from the range (0,1], then set the edge
length to −lnx. We use ADS parameter k = 64.
6.1 Distance-Based Influence Maximization
We start with the Influence Maximization problem. Recall that
we consider two variants of this problem: threshold influence and
general distance-based influence. We discuss each in turn.
6.1.1 Threshold Influence
Our first experiment considers the performance of T -SKIM (Al-
gorithm 3, Section 3), which finds a sequence of seed nodes such
that each prefix of the sequence approximately maximizes the influ-
ence. Our results are summarized in Table 1. For each dataset, we
first report its total numbers of nodes and edges. This is followed
by the total influence (as a percentage of the total number of nodes
of the graph) of the seed set found by our algorithm. We report
figures for 50 and 1000 seeds and for threshold values T = 0.01 and
T = 0.1. Finally, we show the total running time of our algorithm
when it is stopped after computing an approximate greedy sequence
of 50, 1000, or all n nodes. Note that we omit the respective influ-
ence figure for the seed set that contains all nodes, since it is 100%
by definition.
The table shows that, unsurprisingly, the higher threshold has
higher influence values. This is because the coverage function is
monotone non-decreasing in T . The running time of our algorithm
depends on that influence (since its graph searches must run for
longer), but it is still practical even for fairly large thresholds and
even if we compute the entire permutation. For the largest graph we
test (Orkut), with hundreds of millions of edges, we can compute
the top 50 seeds in less than 15 minutes, and order all nodes in a
few hours using a single CPU core.
Figure 1 presents a more detailed perspective on the same ex-
periment. It shows, for T = 0.01 and T = 0.1, how total influence
and the running times depend on the size of the seed set. We note
that the first few seeds contribute with a disproportionate fraction
of the total influence, particularly with T = 0.1, and an even higher
percentage of the total running time. The overall shape of the curves
is quite similar, with Orkut as a noticeable outlier: its first few
seeds contribute relatively more to the overall influence than in other
instances. Note that Orkut is also the densest instance in our testbed.
We now compare T -SKIM to ConTinEst, the algorithm by Du
et al. [23]. Although their sequential implementation is publicly
available, we were unable to run it on our inputs within reasonable
time. (A preliminary test on AstroPh, our smallest instance, did
not produce any output within five hours.) Note that to evaluate
graphs with more than 1024 vertices, they actually use a distributed
implementation, which they run on a cluster with 192 cores. Unfor-
tunately, we had access neither to such a cluster nor to the distributed
implementation of their algorithm.
In order to still be able to make some comparison, we generated
the same instances as they used in their evaluation: core-periphery
Kronecker networks [44] (parameter matrix: [0.9 0.5; 0.5 0.3]) of
varying size, using the Weibull distribution
e−(x/λ )β
11
(cid:17)β−1
(cid:16) x
λ
f (x,λ ,β ) =
β
λ
Figure 2: Left: Comparing T -SKIM to ConTinEst. Right: Er-
ror of T -SKIM and α-SKIM.
for the edge lengths [32]. (Note that λ controls scale and β shape.)
For each edge we chose λ and β uniformly at random from (0,10].
We ran the same experiment as they did, setting S = 10, and T = 10.
Figure 2 (left) shows the running times for Kronecker networks of
varying size. We observe that our approach run on a single CPU
core is consistently about 3 orders of magnitude faster than their
algorithm run on a cluster. Unfortunately, we were not able to
compare the computed influence, as those figures are not reported
in [23].
6.1.2 General Distance-Based Influence
We now evaluate α-SKIM, a more general version of our IM algo-
rithm that can handle arbitrary decay functions. For this experiment,
we consider both harmonic and exponential decay functions, the
most commonly used in the literature. To test harmonic decay, we
use α(x) = 1/(10x + 1); for exponential decay, we use α = e−10x.
These functions turn out to give interesting influence profiles. In
α-SKIM we initialize τ to n(cid:96)/k and set λ to 0.5.
Table 2 shows, for both functions, the influence values (in per-
cent) obtained by α-SKIM for 50 and 1000 seeds, as well as the
corresponding running times.
Table 2: Performance of α-SKIM using k = 64, (cid:96) = 64,
and exponentially distributed edge weights for 50 and 1000
seeds. We use exponential (exp.: α : x (cid:55)→ e−10x) and har-
monic (harm.: α : x (cid:55)→ 1/(10x + 1)) decay functions.
INFLUENCE [%]
RUNNING TIME [SEC]
50 seeds
1000 seeds
exp. harm.
exp. harm. exp. harm.
harm.
15
44.9
17.6
40
AstroPh
40
18.2
7.6
99
Epinions
88
32.8
16.9
224
Slashdot
28.2
13.1
213
455
Gowalla
29.2 1,500 1,387
16.0
2,816
TwitterF's
25.8 5,637 7,765 11,906 13,016
LiveJournal 10.6
1000 seeds
exp.
43
93
238
323
2,459
31.4 33.5
14.9 11.2
29.1 21.3
25.9 15.9
26.3 19.7
23.5 13.4
15
35
104
166
50 seeds
instance
The table shows that α-SKIM is slower than T -SKIM by up
to an order of magnitude for comparable influence. In fact, if we
ran α-SKIM with a threshold function (not shown in the table), it
would be about three times as slow as T -SKIM, while producing the
exact same results. However, this is to be expected, since α-SKIM
is a much more sophisticated (and flexible) algorithm, which, unlike
T -SKIM, can handle smooth decay functions with guarantees.
Even though α-SKIM is slower, it is still practical. It scales well
with the number of seeds (increasing from 50 to 1000 barely doubles
the total running time) and can still handle very large graphs.
10210310410510610−2100102104≈numberofverticesrunningtime[sec]ConTinEstT-SKIM1500100001234seedsetsizeerrorwrt.GREEDY[%]thresh.exp.harm.Figure 3: Evaluating influence permutations (left) and running time (right) on several instances for exponential (exp.: α : x (cid:55)→ e−10x)
and harmonic (harm.: α : x (cid:55)→: 1/(10x + 1)) decays. The legend applies to all plots.
Figure 4: Evaluating different numbers of simulations ((cid:96)-values) for different decay functions on AstroPh.
Solution Quality
Figure 3 presents a more detailed view of the same experiment
(for a few graphs), with up to n seeds. It shows that computing a
full permutation (with n seeds) is not much more expensive than
computing n/1000 (a few dozen) seeds. An interesting difference
between these results and those for T -SKIM (reported in Figure 1)
is that for α-SKIM the running time grows less smoothly with the
number of seeds. The discontinuities correspond to decreases in the
sampling threshold τ, causing additional sampling.
6.1.3
Figure 2 (right) compares the quality of the seed sets found by T -
SKIM (for threshold decay) and α-SKIM (for exponential and
harmonic decays) with those found by exact GREEDY on AstroPh
((cid:96) = 64 simulations). We consider sets of size 1 to 103 and the
same decay functions as above. Each point of the curve represents
the error (in percent) of our algorithm when compared to GREEDY.
We observe that the error is very low in general (less than 1% for
exponential and harmonic decay, and less than 4% for threshold).
Considering the fact that SKIM is many orders of magnitude faster
than GREEDY (while still providing strong guarantees), these errors
are acceptable. Note that the error of the first seed vertex is very low
in all cases (close to 0%), indicating that SKIM does very well in
finding the most influential node.
The quality of the solutions provided by the algorithm with re-
spect to the probabilistic input (graph distribution) depends on the
number of instances (simulations) (cid:96). Our experiments so far have
used (cid:96) = 64. We now compare this with other choices of (cid:96). Figure 4
compares the quality of the seed sets found by GREEDY for AstroPh
for (cid:96) = 4,16,64,128 with those found by (cid:96) = 256. We consider sets
of size 1 to 50 and three different decay functions: exponential,
harmonic, and threshold (with T = 0.01). Each point in the curve
represents the error (in percent) relative to the solution with (cid:96) = 256.
Although the error is consistently high for the threshold IM when (cid:96)
is very small, it becomes negligible for (cid:96) ≥ 64, justifying our choice
of parameters. For smoother (exponential or harmonic) decay, all
errors are significantly smaller, and even smaller values of (cid:96) would
be acceptable.
6.2 Distance-Based Influence Oracle
We now evaluate our influence oracles. Recall that this setting
has two stages. The preprocessing stage takes as input only the
graph and computes sketches. The query stage takes a set S of seeds
and a function α and uses the sketches to estimate the influence
of S with respect to α. Note that same preprocessing stage can be
used to answer queries for any decay function α. For this experi-
ment, we consider three such functions: exponential (α(x) = e−10x),
harmonic (α(x) = 1/(10x + 1)), and threshold (with T = 0.01).
Table 3 summarizes our results in this setting. For each dataset
tested, it first shows the preprocessing time and the total space
required to store all sketches. Then, for each decay function, we
report the query time (in microseconds) and the estimation error
for random sets S of sizes 1, 50, and 1000. (Note that measuring
the error requires computing exact influence of each seed set with
multiple Dijkstra searches; this time is not included in the table.)
Each entry in the table is the average of 100 random seed sets.
The table shows that, as predicted, query times are almost inde-
pendent of the α function, the size of the influenced set, and the
size of the graph. Moreover, they have a slightly superlinear depen-
dence on the number of seeds. Queries are somewhat slower than
for reachability-based IC (as reported in [15]), since sketches are
bigger and the estimator is more involved. Our oracles are much
more flexible, however, and still practical. For 50 seeds, one can
answer queries in a few milliseconds, whereas an exact computation
could take minutes or more on large graphs. Moreover, its error is
consistently low, regardless of the number of seeds.
7. CONCLUSION
12
0.111010020406080100exp.:seedsetsize[%]influence[%],AstroPh,Epinions,Slashdot,Gowalla0.111010020406080100harm.:seedsetsize[%]0.11101000255075100exp.:seedsetsize[%]runningtime[%]0.11101000255075100harm.:seedsetsize[%]0204000.20.40.6α:x7→e−x:seedsetsizeerrorwrt.'=256[%]416641280204000.20.4α:x7→1/(x+1):seedsetsizeerrorwrt.'=256[%]416641280204001020T=0.01:seedsetsizeerrorwrt.'=256[%]41664128We formulate and study a model of distance-based influence
which captures decay of relevance with distance, and unifies and
extends several established research threads. We design novel near-
linear algorithms for greedy influence maximization and a construc-
tion of influence oracles. In future, we hope to apply our novel
weighted-sampling approach for approximate greedy influence max-
imization to scale up other submodular maximization problems.
Acknowledgements. We would like to thank the authors of [23]
for helping us reproduce their inputs and pointing us to their imple-
mentation of ConTinEst.
8. REFERENCES
[1] B. D. Abrahao, F. Chierichetti, R. Kleinberg, and A. Panconesi. Trace
complexity of network inference. In KDD, 2013.
[2] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group
formation in large social networks: Membership, growth, and
evolution. In KDD. ACM, 2006.
[3] A. Bavelas. A mathematical model for small group structures. Human
Organization, 7:16 -- 30, 1948.
[4] F. Bloch and M. O. Jackson. The formation of networks with transfers
among players. Journal of Economic Theory, 133(1):83 -- 110, 2007.
[5] P. Boldi and S. Vigna. In-core computation of geometric centralities
with hyperball: A hundred billion nodes and beyond. In ICDM
workshops, 2013. http://arxiv.org/abs/1308.2144.
[6] P. Boldi and S. Vigna. Axioms for centrality. Internet Mathematics,
2014.
[7] C. Borg, M. Brautbar, J. Chayes, and B. Lucier. Maximizing social
influence in nearly optimal time. In SODA, 2014.
[8] K. R. W. Brewer, L. J. Early, and S. F. Joyce. Selecting several
samples from a single population. Australian Journal of Statistics,
14(3):231 -- 239, 1972.
[9] W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in
social networks. In KDD. ACM, 2009.
[10] E. Cho, S. A. Myers, and J. Leskovec. Friendship and mobility: user
movement in location-based social networks. In SIGKDD. ACM,
2011.
[11] E. Cohen. Size-estimation framework with applications to transitive
closure and reachability. J. Comput. System Sci., 55:441 -- 453, 1997.
[12] E. Cohen. All-distances sketches, revisited: HIP estimators for
massive graphs analysis. In PODS. ACM, 2014.
[13] E. Cohen. Estimation for monotone sampling: Competitiveness and
customization. In PODC. ACM, 2014. full version
http://arxiv.org/abs/1212.0243.
[14] E. Cohen, D. Delling, F. Fuchs, A. Goldberg, M. Goldszmidt, and
R. Werneck. Scalable similarity estimation in social networks:
Closeness, node labels, and random edge lengths. In COSN. ACM,
2013.
[15] E. Cohen, D. Delling, T. Pajor, and R. F. Werneck. Sketch-based
influence maximization and computation: Scaling up with guarantees.
In CIKM. ACM, 2014.
[16] E. Cohen and H. Kaplan. Spatially-decaying aggregation over a
network: Model and algorithms. J. Comput. System Sci., 73:265 -- 288,
2007. Full version of a SIGMOD 2004 paper.
[17] E. Cohen and H. Kaplan. Summarizing data using bottom-k sketches.
In ACM PODC, 2007.
[18] E. Cohen and H. Kaplan. Leveraging discarded samples for tighter
estimation of multiple-set aggregates. In ACM SIGMETRICS, 2009.
[24] U. Feige. A threshold of lnn for approximating set cover. J. Assoc.
Comput. Mach., 45:634 -- 652, 1998.
[25] L. C. Freeman. Centrality in social networks: Conceptual clarification.
Social Networks, 1, 1979.
[26] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A
complex systems look at the underlying process of word-of-mouth.
Marketing Letters, 12(3), 2001.
[27] M. Gomez-Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the
temporal dynamics of diffusion networks. In ICML, 2011.
[28] D. G. Horvitz and D. J. Thompson. A generalization of sampling
without replacement from a finite universe. Journal of the American
Statistical Association, 47(260):663 -- 685, 1952.
[29] M. O. Jackson. Social and economic networks. Princeton University
Press, 2010.
[30] K. Jung, W. Heo, and W. Chen. Irie: Scalable and robust influence
maximization in social networks. In ICDM. ACM, 2012.
[31] D. Kempe, J. M. Kleinberg, and É. Tardos. Maximizing the spread of
influence through a social network. In KDD. ACM, 2003.
[32] J. F. Lawless. Statistical models and methods for lifetime data, volume
362. John Wiley & Sons, 2011.
[33] J. Leskovec, J. M. Kleinberg, and C. Faloutsos. Graph evolution:
Densification and shrinking diameters. TKDD, 1, 2007.
[34] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and
Glance N. Cost-effective outbreak detection in networks. In KDD.
ACM, 2007.
[35] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney.
Community structure in large networks: Natural cluster sizes and the
absence of large well-defined clusters. Internet Mathematics,
6(1):29 -- 123, 2009.
[36] B. Lucier, J. Oren, and Y. Singer. Influence at scale: Distributed
computation of complex contagion in networks. In KDD, 2015.
[37] G. Nemhauser, L. Wolsey, and M. Fisher. An analysis of the
approximations of maximizing submodular set functions.
Mathematical Programming, 14, 1978.
[38] E. Ohlsson. Coordination of pps samples over time. In The 2nd
International Conference on Establishment Surveys, pages 255 -- 264.
American Statistical Association, 2000.
[39] T. Opsahl, F. Agneessens, and J. Skvoretz. Node centrality in weighted
networks: Generalizing degree and shortest paths. Social Networks,
32, 2010. http://toreopsahl.com/2010/03/20/.
[40] M. Richardson and P. Domingos. Mining knowledge-sharing sites for
viral marketing. In KDD. ACM, 2002.
[41] M. Rosenblatt. Remarks on some nonparametric estimates of a density
function. The Annals of Mathematical Statistics, 27(3):832, 1956.
[42] G. Sabidussi. The centrality index of a graph. Psychometrika,
31(4):581 -- 603, 1966.
[43] C-E. Särndal, B. Swensson, and J. Wretman. Model Assisted Survey
Sampling. Springer, 1992.
[44] Stanford network analysis project.
http://snap.stanford.edu.
[45] Y. Tang, Y. Shi, and X. Xiao. Influence maximization in near-linear
time: A martingale approach. In SIGMOD, 2015.
[46] Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Near-optimal
time complexity meets practical efficiency. In SIGMOD, 2014.
[47] J. Yang and J. Leskovec. Defining and evaluating network
communities based on ground-truth. In ICDM, 2012.
[19] E. Cohen, H. Kaplan, and S. Sen. Coordinated weighted sampling for
estimating aggregates over multiple weight assignments. VLDB,
2(1 -- 2), 2009. full: http://arxiv.org/abs/0906.4560.
[20] E. Cohen and M. Strauss. Maintaining time-decaying stream
aggregates. J. Algorithms, 59:19 -- 36, 2006.
[21] Ch. Dangalchev. Residual closeness in networks. Phisica A, 365, 2006.
[22] M. De Domenico, A. Lima, P. Mougel, and M. Musolesi. The anatomy
of a scientific rumor. Scientific Reports, 3, 2013.
[23] N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. Scalable influence
estimation in continuous-time diffusion networks. In NIPS. Curran
Associates, Inc., 2013.
13
PREPROCESSING
Table 3: Evaluating the distance-based influence oracle with (cid:96) = 64.
QUERIES WITH α : x (cid:55)→ e−10x
QUERIES WITH T = 0.01
50 seeds
time err.
[µs] [%]
1 seed
1000 seeds
time err.
time err.
[µs] [%]
[µs] [%]
8,855 0.4 204,551 2.8
27 1.1
22 0.5
8,267 0.3 191,709 0.6
73 0.6 13,768 0.4 247,509 0.6
61 1.2 16,092 0.6 329,976 0.3
39 2.3 13,912 0.7 360,766 0.2
instance
time
[h:m]
0:10
AstroPh
0:46
Epinions
1:10
Slashdot
3:55
Gowalla
TwitterF's 19:33
1 seed
50 seeds
time err.
[µs] [%]
1000 seeds
time err.
space time err.
[µs] [%]
[µs] [%]
[MiB]
9,695 1.2 229,340 0.5
38 7.2
149.2
32 3.2
674.0
8,552 1.1 222,470 1.0
46 5.6 11,884 1.5 310,170 0.4
851.4
2,558.6
52 3.8 17,109 1.0 356,818 0.4
51 3.8 13,816 1.4 365,366 0.7
6,165.1
50 seeds
time err.
[µs] [%]
QUERIES WITH α : x (cid:55)→ 1/(10x + 1)
1000 seeds
1 seed
time err.
time err.
[µs] [%]
[µs] [%]
9,152 4.1 227,943 0.5
31 4.4
26 2.2
9,203 1.2 196,717 0.5
38 3.2 10,970 1.9 291,185 1.2
47 2.9 14,151 2.2 289,318 0.8
42 2.6 13,166 1.5 379,296 0.9
14
APPENDIX
A. RUNNING TIME ANALYSIS FOR T -SKIM
The computation is dominated by two components. The first
is the reversed pruned Dijkstra searches which build the inverted
sketches. The second is the forward pruned Dijkstra searches that
we use to compute and update the residual problem after a new
seed node is selected. In both components we use pruned shortest-
paths computations (whereas SKIM for reachability-based influence
uses generic searches). The bound on the number of reversed edge
traversals performed for sketch building and the analysis deriving
this bound are essentially the same as with reachability-based SKIM
[15]: We bound the total number of increments to the entries in the
array size. Each entry in that array corresponds to a node and the
size (number of entries) in the partial sketch. Recall that the sketches
themselves are maintained in an inverted structure.
The number of forward traversals from u in instance i corresponds
to the number of times the distance δ [u,i] of node u in instance i
from the seed set is updated. As we discussed in Section 2.2 the
worst-case number of updates can depend on the number of seeds
with exact distance-based greedy. The approximate selection of T -
SKIM, however, is such that all seed nodes with marginal influence
that is close to the maximum one (within k−0.5) have approximately
the same probability of being selected. This means that we can
invoke Theorem 2.1 to obtain an expected O(ε−1 log2 n) bound.
We therefore obtain the following time bound for an exhaustive
execution of T -SKIM (until influence of S approaches n):
THEOREM A.1. T -SKIM guarantees with high probability, for
all s, that the first s selected seeds have influence that is at least
1− (1− 1/s)s − ε times the maximum influence of a seed set of size
s, and runs in expected time
O(ε−1∑
i E(i)log3 n + mε−2 log3 n) ,
(cid:83)
i E(i) is the sum over nodes of the maximum in-degree
(15)
where m ≤
over instances.
We note that this upper bounds the worst-case behavior. Our
experiments verify that typically the computation is dominated by
the reverse searches and the number of edge traversals is much
smaller. We propose another solution of theoretical interest which
provides worst-case robustness of the number of forward traversals
at the cost of a slight softening of the sharp threshold. This design
was not implemented.
We first formalize the notion of a softened threshold T in the
influence function: For a parameter ν ∈ (0,1), we only require
approximation with respect to the maximum influence of a seed set
of size s when the threshold is (1− ν)T . Since we expect the value
of the threshold used in an application not be precise anyway, this
relaxation approximates the intended semantics of using a threshold
of T .
We next outline a slight modification of T -SKIM which provides
a bound on the running time and approximation quality with respect
to the soft threshold.
THEOREM A.2. Our modified T -SKIM, guarantees with high
probability, for all s that the first s selected seeds have influence
for threshold function α(x) = x ≤ T ?1 : 0 that is at least 1− (1−
1/s)s − ε times the maximum influence of a seed set of size s with
respect to a threshold function α(x) = x ≤ (1− ν)T ?1 : 0. The
algorithm runs in time
O(ν−1∑
i E(i)logn + mε−2 log3 n) ,
(16)
(cid:83)
i E(i) is the sum over nodes of the maximum in-degree
where m ≤
over instances.
PROOF. We outline the modifications needed to support the soft
threshold.
Sv ≤ (1− νT ) then δ [v,i] ∈ [d(i)
In the forward searches, we only propagate updates to δ [v,i] when
the decrease in distance is at least νT . In particular, the reversed
Dijkstras are always pruned at distance T (1− ν) and the forward
Dijkstras are pruned when d ≤ T or d > δ [v,i]− νT . This means
that at any given time, if d(i)
Sv ,d(i)
Sv +
νT ]. That is, node-instance pairs of distance at most (1 − ν)T
are counted as influenced and pairs of distance greater than T are
not influenced, but other pairs can be counted either way and our
estimation guarantee is with respect to a threshold of (1− ν)T .
When discretizing to νT , we obtain a worst-case guarantee of
1/ν on the number of updates of δ [v,i] in each node-instance pair.
In total, we obtain the claimed worst-case bound on the running
time.
B. OPTIMAL ORACLE ESTIMATOR
We show that the distance-based influence estimator presented in
Algorithm 4 is an instance of the L∗ estimator of [13].
We first explain the derivation of the estimator. Similarly to the
single node, this is a sum estimator applied to each summand (v,i)
in Equation (7) to obtain an unbiased estimate of α(minu∈S d(i)
uv ).
Rank values r that belong to pairs (v,i) where v ∈ S can be iden-
tified because they must appear as (r,0) in cADS(v) when we use
structured permutation ranks. For these pairs, we do not compute
an estimate but simply add an exact contribution of Sα(0) to the
estimated influence.
The remaining rank values are those associated with pairs that
have a positive distance from S. That is, a pair (v,i) so that d(i)
Sv > 0.
We would like to estimate α(minu∈S d(i)
uv ) for each such pair (v,i).
We apply the L∗ estimator of Cohen [13], which is applicable to any
monotone estimation problem (MEP) and is the unique admissible
(nonnegative unbiased) monotone estimator. We first show that
our estimation problem is a MEP. To represent the problem as a
MEP, we fix the rank values of all pairs, and consider the outcome
(presence in cADS(u) for u ∈ S) as a function of the "random seed"
r(i)
v . Clearly, the lower r(i)
is, the more information we have (a
v
tighter upper bound) on α(d(i)
Sv ). Therefore, the problem is a MEP.
The information in the outcome is actually contained in the sky-
v ] derived from the set of occurrences of the rank r(i)
line skylines[r(i)
v
in the sketches of S. When the skyline for a pair (v,i) is empty (r(i)
v
is not included in any of the sketches of nodes in S), the L∗ estimate
is 0 and is not explicitly computed.
(cid:112)2(k− 1). Note that
Note that the estimator is applied to each rank value r(i)
v
(cid:54)∈ Z (and
does not require explicit knowledge of the corresponding pair (v,i)).
Since the L∗ estimator is admissible, it dominates the union es-
expect the estimate quality to be up to a factor of(cid:112)
timator and in particular has CV at most 1/
this is an upper bound on the CV; the worst case is S = 1 or when
sketches are very similar. As with reachability sketches, we can
S smaller
when the "coverage" of different seed nodes are sufficiently dif-
ferent. Similarly, Chernoff concentration bounds apply here: If
we use k = ε−2clnn, the relative error exceeds ε with probability
≤ 1/nc. Therefore, with high probability, we can be accurate on
polynomially many queries.
C. RUNNING TIME OF α-SKIM
15
This section provides the proof of Theorem 5.2. We also provide
a slightly tighter worst-case bound on the (expected) running time
for (i) the important cases of polynomial or exponential decay (both
are instances of α with nonpositive relative rate of change) and
(ii) general decay functions when we consider approximation with
respect to relaxed influence computed with slight perturbations in
distances:
THEOREM C.1. A modified Algorithm α-SKIM runs in expected
providing the guarantee (14) when (lnα(x))(cid:48) ≤ 0 (α has nonpos-
itive relative rate of change). For a general decay function α,
we obtain with high probability approximation with respect to
maxUU=s Inf(G ,U), where Inf(G ,S) ≡ ∑u∈V α((1 + ε)dSu).
We first list the main components of the α-SKIM computation,
the bounds we obtain on the computation of each component, and
pointers to the proofs in the sequel. The analysis assumes that
λ = 0.5.
• The reversed Dijkstra runs when building the sketches, includ-
ing updating the sample and estimation data structures as new
entries are inserted. Since we use efficient structures to identify
which runs need to be resumed and to update estimates and
samples, this component is dominated by the Dijkstra compu-
tations. We obtain a bound of O(k log2 n∑v maxi∈[(cid:96)] deg(i)(v))
on the number of operations (see Lemma C.5).
• The forward Dijkstra runs which update the residual prob-
lem after a seed node is selected. We express the bound
in terms of the maximum number of times, which we de-
note by X, that δ (i)
is decreased for a pair (i,v). We con-
v
sider both bounding X and its impact on the time bound In
Section C.3. We show that the forward Dijkstra runs take
O(X ∑i∈[(cid:96)]E(i)logn) operations (see Lemma C.6). We ob-
tain a bound of X = O(ε−1 log2 n) using Theorem 2.1. We
also obtain a slightly tighter bound of X = O(ε−1 logn) for a
slightly modified algorithm. The modified algorithm has the
same approximation guarantee (as in Theorem 5.1) when α
has nonpositive relative rate of change. For general α, the
guarantee is with respect to a relaxed condition. In practice
on realistic inputs, however, we expect X to be small and we
observed good running times even without the modifications.
• Updating the sample and estimation structures when entries are
reclassified down. This happens after a seed is added when the
forward Dijkstra run from the seed in instance i updates δ (i)
v .
This means all samples which include a (v,i) entry need to be
updated. Expressed in terms of X, this cost is O(Xnk logn)
(see Lemma C.7).
• Updating the sampling and estimation structures when entries
are reclassified up. This can happen after τ is decreased. We
obtain a bound of O(nk log2 n) (in Section C.1).
C.1 The threshold τ
An immediate upper bound on the maximum influence of a node
is nα(0). This means that we can safely initialize our algorithm
with τ = (nα(0)(cid:96))/k and have an expected initial sample sizes O(k)
for each node.
We next observe that we can safely terminate the algorithm when
τ decreases to below τ ≤ εα(0)(cid:96)/k and incur at most O(ε) contribu-
tion to the error. To establish that, first observe that the threshold τ
time
O(
log2 n
ε
(cid:96)∑
i=1E(i)+
log2 n
ε3 n+
logn
ε2
E(i)) = O(ε−3
(cid:96)∑
i=1E(i)log2 n)
(cid:96)(cid:91)
i=1
is decreased only when the maximum estimated marginal influence,
over all nodes, is less than τk. Therefore, when τ ≤ εα(0)(cid:96)/kl,
the maximum marginal influence of all nodes is at most εα(0).
Now observe that at this point, for all s(cid:48) ≥ 0, if we add s(cid:48) addi-
tional seed nodes, the relative contribution of these nodes is at most
≤ (s(cid:48)εα(0)/((s + s(cid:48))α(0)) ≤ ε (The denominator (s + s(cid:48))α(0) is a
lower bound on the total influence of any seed set of size s + s(cid:48)).
Combining the start and end values of τ, we obtain the following
bound on the total number of times τ is decreased:
LEMMA C.1. τ can decrease at most log1/λ (n/ε) = O(logn)
times.
When τ decreases, we have the property that the PPS samples of
all nodes are of size smaller than k (otherwise we have an estimate
that exceeds kτ).
After τ is decreased, we extend the samples to be with respect to
the new τ. We show that the expected sample size remains O(k):
LEMMA C.2. For every node, the expected number of entries
after a threshold decrease τ ← λτ is at most k/λ , with good con-
centration.
PROOF. Equivalently, we consider the size of a PPS sample with
threshold λτ when the total weight of the set is at most kτ.
We are now ready to bound the total number of reclassification of
sample entries.
LEMMA C.3. The total number of reclassifications of entries in
the sample is O(nk logn)
PROOF. An entry in index[v,i] can only be reclassified down
3 times before it is removed from the sample (from H to M, M
to L, or L to removal), unless it is reclassified up. An entry can
be reclassified up only when τ decreases, which happens at most
O(logn) times. Each decrease "resets" at most kn entries to class
H: Either existing entries reclassified up or at most new entries
(since by Lemma C.2 expected sample sizes remain O(k)). These
entries can then be reclassified down at most 3 times before they are
eliminated from the sample. So the total number is O(nk logn).
We are now ready to bound the total work performed by updating
the sample and estimation components by entries being reclassified
up as a result of a τ decrease (MoveUp calls). The cost of each such
call is proportional to the number of reclassified entries. It also
requires a call to the priority queue to efficiently find all inverted
samples with at least one reclassified element. In the worst case,
the cost is O(log(n(cid:96)) = O(logn) times the number of reclassifica-
tions. In total using Lemma C.3, we obtain a worst case bound of
O(nk log2 n) on the reclassification-up component of the computa-
tion.
C.2 Bounding the reversed Dijkstra computa-
tions
We bound the expected total number of distinct entries (pairs
(v,i)) that were included in the PPS sample of a node u at any point
during the execution of the algorithm.
LEMMA C.4. For a node v, the number of distinct entries in the
sample of v during the execution of the algorithm is O(k logn) with
good concentration (of the upper bound).
PROOF. Each decrease of τ introduces in expectation O(k) new
entries, and there are O(logn) such decreases (Lemma C.1).
We can now bound the work of the reverse Dijkstra runs used to
construct the sketches
16
PROOF. The requirement (lnα(x))(cid:48) ≥ 0 implies that for all x ≥ 0,
d ≥ 0, and ∆ ≥ 0,
α(d − ∆)− α(d)
α(d)
α(x + d − ∆)− α(d)
α(x + d)
.
≥
This means that when we apply the following prune rules on forward
updates of δ (i)
v : We prune at nodes where
α(d − ∆)− α(d)
≤ ε ,
(17)
α(d)
where d is the current value of δ (i)
and d − ∆ is the updated value,
v
the condition (17) would actually hold for all nodes in instance i
reachable from v via the Dijkstra search (since all these nodes have
larger δ (i)
v .
The prune condition implies that for (v,i) and all nodes Dijkstra
would have reached from the pruned one, the updated influence
contribution by the better (closer) coverage is at most ε times the
previous value. So with this pruning, the influence of the seed set is
captured with relative error of at most ε.
We also observe that we can also always prune the Dijkstra com-
putations when the distance satisfies α(d) ≤ α(0)/n2 ≤ εα(0)/n.
Combining, it means that with the prune rules, the total number
of updates of δ (i)
v per node-instance pair is O(ε−1 logn).
LEMMA C.9. We can modify the algorithm so that for any gen-
eral decay function α, X = O(ε−1 logn). With the modification, we
obtain that with high probability,
Inf(G ,S) ≥ (1− (1− 1/s)s − ε) max
UU=S
Inf(G ,U) ,
where Inf(G ,S) ≡ ∑u∈V α((1 + ε)dSu).
PROOF. We can apply a similar prune rule in the forward Dijkstra
runs which updates only when the decrease to distance is at least
ε times the current distance. This would give us a bound on the
number of updates, but a weaker approximation guarantee that
holds with respect to a softened influence function ∑u∈V α((1 +
ε)dSu).
D. PSEUDOCODE
D.1 Functions for Distance-Based GREEDY
This appendix contains the pseudocode of functions for our
distance-based version of GREEDY from Section 2.
// sum of marginal contributions
Function MargGain(u): Marginal influence of u
Input: Residual instance (G ,δ ) and node u
Output: Inf((G ,δ ),u)
Iu ← 0 ;
foreach instance i do
Run Dijkstra from u in G(i), during which
foreach visited node v at distance d do
if α(d) = 0 or d ≥ δ [v,i] then Pruneelse
+←α(d)− α(δ [v,i])
Iu
return Iu/(cid:96)
LEMMA C.5. The number of operations performed by the re-
verse Dijkstra runs is O(k log2 n∑v maxi∈[(cid:96)] deg(i)(v))
PROOF. Each productive scan of a node u by a reverse Dijkstra
sourced at (v,i) (productive means that the node was next on the
Dijkstra state priority queue) means that the entry (v,i) is inserted
into a PPS sample of u, updating the estimation structure accordingly.
This involves O(logn) operations in updating priority queues in the
state of the Dijkstra run, structures maintaining the samples, and
looking at all outgoing edges of the node in the transposed instance
G(i).
Each such scan can be charged to an entry inserted into a PPS
sample. From Lemma C.4, we obtain that each node, in expectation,
can have O(k logn) such entries. Therefore, the node is scanned
O(k logn) times.
We remark that if the instances are generated by an IC model, we
can replace maxi∈[(cid:96)] deg(i)(v) by the expected degree E[deg(v)] and
accordingly obtain the bound O(k log2 nE[E]).
C.3 Bounding the expected number of times
v decreases for a certain pair (v,i)
δ (i)
We now bound the n umber of updates of δ (i)
are added when maintaining the residual problem.
v performed as seed
If we have a bound of X on the number of updates per node-
instance pair, then
LEMMA C.6. The computation of the forward Dijkstra runs is
O(X ∑i∈[(cid:96)]E(i)logn).
PROOF. Each node-instance scan can be charged to a decrease
of δ (i)
v .
We also can express the total cost of the MoveDown() calls by X.
LEMMA C.7. The total computation of all MoveDown calls is
O(Xnk logn) .
PROOF. Each call to MoveDown for (v,i) updates a value for
(v,i) in a priority queue (at O(logn) cost), which is of the order
of the forward Dijkstra computation that generated the update of
δ (i)
v . Otherwise, the MoveDown call performs a number of operations
that is linear in the number of active entries in index[v,i] (entries
that are in a sample of some node). In addition, MoveDown may
also permanently discard entries at the tail of the index[v,i], but the
removal of these entries is charged to their insertion.
It remains to bound the computation of MoveDown when process-
ing active entries of index[v,i]. Using Lemma C.4, there is a total of
O(nk logn) entries that were active in a sample at any point during
the execution. Each such entry can be affected at most X times.
We now bound X. As argued in Section 3, we expect X = O(logn)
on realistic instances. Now noting that our sampled-based greedy
selection satisfies the condition of Theorem 2.1, we obtain a bound
of X = O(ε−2 log2 n).
Here we propose modifications of the algorithm that allow us
to obtain a slightly tighter bound on X in interesting cases. The
first case covers all smooth decay functions that are exponential or
slower:
LEMMA C.8. We can modify α-SKIM so that when α(x) has a
nonpositive relative rate of change, that is, (lnα(x))(cid:48) ≥ 0, then
X = O(ε−1 logn) .
The modification preserves the approximation ratio stated in Theo-
rem 5.1.
17
Function AddSeed(u): Update δ according to u
Input: Residual instance (G ,δ ) and node u
foreach instance i do
Run Dijkstra from u in G(i), during which
foreach visited node v at distance d do
if α(d) = 0 or d ≥ δ [v,i] then Pruneelse δ [v,i] ← d
D.2 Algorithms for Threshold Model
This appendix contains the pseudocode of algorithms for thresh-
old influence maximization (Section 3)
Algorithm 3: Threshold IM (T -SKIM)
Input: Directed graphs {G(i)}, threshold T , parameter k
Output: Sequence of node and marginal influence pairs
// Initialization
forall the node/instance pairs (u,i) do δ [u,i] ← ∞ forall the
nodes v do size[v] ← 0 index ← hash map of node-instance
pairs to nodes
seedlist ←⊥
rank ← 0
shuffle the n(cid:96) node-instance pairs (u,i)
// List of seeds & marg. influences
// Compute seed nodes
while seedlist < n do
while rank < n(cid:96) do
rank ← rank + 1
(u,i) ← rank-th pair in shuffled sequence
if δ [u,i] < ∞ then skip; // Pair (u,i) is covered
run Dijkstra from u in reverse graph G(i), during which
foreach scanned node v in distance d do
// Build sketches
// Prune at depth T
if d > T then prune;
size[v] ← size[v] + 1
index[u,i] ← index[u,i]∪{v}
if size[v] = k then
x ← v
abort sketch building
// Next seed node
D.3 Algorithms for Distance-Based Influence
Oracle
This appendix contains the pseudocode for our distance-based
influence oracle (Section 4).
Algorithm 4: Distance-Based Influence Oracle
Input: Seed set S, function α, sketches cADS(u) for u ∈ S
Output: Estimated influence for S
// Remember ranks who have distance zero in at
least one sketch with respect to S
Z ← empty set (e.g. hash map) of ranks
forall the nodes u ∈ S do
foreach entry (r,d) ∈ cADS(u) with d = 0 do
Z.insert(r)
// Build for each appearing rank a set of
threshold rank/influence pairs
skylines ← new hash map from rank to array of pairs
forall the nodes u ∈ S do
Q ← new max-heap of k smallest rank values
foreach entry (r,d) ∈ cADS(u) do
if Q < k then
if r (cid:54)∈ Z then skylines[r].append((1.0,α(d))
Q.insert(r)
else
skylines[r].append((Q.max_element(),α(d))
if r (cid:54)∈ Z then
Q.insert(r)
Q.delete_max(r)
// Eliminate dominated entries
forall the ranks r ∈ skylines do
// Sort by threshold rank in decreasing
order. Break ties by decreasing α
sort(skylines[r])
α∗ ← 0
forall the thresh. rank/infl. pairs (τ,α) ∈ skylines[r] do
if α < α∗ then skylines[r].erase((τ,α)) else
α∗ ← α
if all nodes u have size[u] < k then
x ← argmaxu∈V size[u]
// This calls the L* estimator for each skyline
return S· α(0) + (1/(cid:96))· ∑r∈skylines L*(skylines[r])
Ix ← 0
forall the instances i do
// The coverage of x
// Residual problem
run Dijkstra from x in forward graph G(i), during which
foreach scanned node v in distance d do
if δ [v,i] ≤ d or d > T then prune if δ [v,i] = ∞
then Ix ← Ix + 1 δ [v,i] ← d
forall the nodes w in index[v,i] do
size[w] ← size[w]− 1
// Erase (v,i) from index
index[v,i] ← ⊥
seedlist.append(x, Ix/(cid:96))
return seedlist
18
Algorithm 5: L∗estimator applied to a sorted skyline
Input: A sorted skyline skylines[r] = {(τ j,α j)}
Output: L∗(skylines[r])
S ← 0; x ← 0
for i = 1, . . . ,skylines[r] do
x ← (αi − S)/τi
if i < skylines[r] then S ← S + x· (τi − τi+1)
return x
// Note that x is overwritten
Algorithm 6: Combine rank-distance lists
Input: Two rank-distance lists A1 and A2
Output: Combined all-distance sketch ADSc
ADSc ← new (empty) ADS
// Merge sketches by increasing distance,
breaking ties by increasing rank
// Handle entries with distance 0
tempsketch ← merge(A1, A2)
numzero ← 0
Q ← new max-heap of k smallest rank values
foreach entry (r,d) ∈ tempsketch with d = 0 do
if numzero < k then ADSc(u).append((r,d))
Q.insert(r)
if Q > k then Q.delete_max()
numzero ← numzero + 1
// Handle the rest of the entries
foreach entry (r,d) ∈ tempsketch with d > 0 do
if Q < k or r < Q.max_element() then
ADSc(u).append((r,d))
Q.insert(r)
if Q > k then Q.delete_max()
return ADSc
19
D.4 Functions for α-SKIM
This appendix contains the subroutines of Algorithm 2 (α-SKIM),
our fast algorithm for distance-based influence maximization.
Function NextSeed
Output: The node u which maximizes Est.H[u] + τEst.M[u],
if happy with estimate. Otherwise ⊥.
while true do
if max priority in Qcands < kτ then return ⊥ else
Remove maximum priority u from Qcands;
Iu ← Est.H[u] + τEst.M[u];
if Iu ≥ kτ and Iu ≥ max in Qcands then
Iu ← MargGain(u);
if Iu ≥ (1− 1/√k) Iu then return (u, Iu)else
Place u with priority Iu in Qcands;
return ⊥
else
Place u with priority Iu in Qcands
Function MoveUp Update estimates after decrreasing τ
foreach (v,i) in Qhml with priority ≥ τ do
delete (v,i) from Qhml
// Process index[v,i]
if HM[v,i] (cid:54)=⊥ then // move entries from M/L to H
while HM[v,i] < index[v,i] and
(u,d) ← index[v,i][HM[v,i]] satisfies
(c ← α(d)− α(δ (i)
v )) ≥ τ do
+←c
Est.H[u]
if ML[v,i] =⊥ or ML[v,i] > HM[v,i] then
// Entry was M
Est.M[u] −←1
HM[v,i]
+←1
if ML[v,i] (cid:54)=⊥ then
if ML[v,i] (cid:54)=⊥ and ML[v,i] < HM[v,i] then
ML[v,i] ← HM[v,i]
if HM[v,i] ≥ index[v,i] then
HM[v,i] ←⊥; ML[v,i] ←⊥
while ML[v,i] < index[v,i] and
(u,d) ← index[v,i][ML[v,i]] satisfies
α(d)− α(δ (i)
ML[v,i]
if ML[v,i] ≥ index[v,i] then ML[v,i] ←⊥
v ) ≥ r(i)
v τ do
+←1; Est.M[u]
UpdateReclassThresh(v,i)
+←1
// Move from L to M
// update Qhml
Function UpdateReclassThresh(v,i)
Output: Update priority of (v,i) in Qhml
c ← 0;
if HM[v,i] (cid:54)=⊥ then
if ML[v,i] (cid:54)=⊥ then
(u,d) ← index[v,i][HM[v,i]]; c ← α(d)− α(δ (i)
v )
(u,d) ← index[v,i][ML[v,i]];
v ))/r(i)
c ← max{c, (α(d)− α(δ (i)
v }
update priority of (v,i) in Qhml to c
if c > 0 then
Function MoveDown ((v,i),δ0,δt )
Output: Update estimation components for (v,i) when δ (i)
v
decreases from δ0 to δt
j ← 0; t ←⊥; HM[v,i] ←⊥;
z ← index[v,i]− 1; if ML[v,i] (cid:54)=⊥ then z ← ML[v,i]
ML[v,i] ←⊥
while j ≤ z do
(u,d) ← index[v,i][ j];
if α(d)− α(δ0) ≥ τ then
+←1; if HM[v,i] =⊥ then HM[v,i] = j
// truncate
+←α(d)− α(δt )
Est.H[u]
Est.H[u] −←α(d)− α(δ0);
if α(d)− α(δt ) ≥ τ then
else if α(d)− α(δt ) ≥ r(i)
else if α(d) ≤ α(δt ) then
else
Est.M[u]
if t =⊥ then t = j
if ML[v,i] =⊥ then ML[v,i] ← j
v τ then
else if α(d)− α(δ0) ≥ r(i)
if α(d)− α(δt ) ≥ r(i)
else
v τ then
v τ then
if HM[v,i] =⊥ then HM[v,i] ← j
Est.M[u] −←1;
if α(d) ≤ α(δt ) then
if t =⊥ then t = j
else
if ML[v,i] =⊥ then ML[v,i] ← j
// entry was H
// is H
// is M
// is L
// entry was M
// is M
// is not M
// truncate
// is L
// clean
j +←1
if t (cid:54)=⊥ then truncate index[v,i] from t on. else
tail
t ← index[v,i]− 1;
while t ≥ 0 and (u,d) ← index[v,i][t] has α(d) ≤ α(δt ) do
truncate index[v,i] at position t + 1 on
t −←1
Remove pair (v,i) from Qhml
UpdateReclassThresh(v,i)
// Update Qhml
20
|
1909.01087 | 1 | 1909 | 2019-08-20T04:35:10 | AHINE: Adaptive Heterogeneous Information Network Embedding | [
"cs.SI",
"cs.LG"
] | Network embedding is an effective way to solve the network analytics problems such as node classification, link prediction, etc. It represents network elements using low dimensional vectors such that the graph structural information and properties are maximumly preserved. Many prior works focused on embeddings for networks with the same type of edges or vertices, while some works tried to generate embeddings for heterogeneous network using mechanisms like specially designed meta paths. In this paper, we propose two novel algorithms, GHINE (General Heterogeneous Information Network Embedding) and AHINE (Adaptive Heterogeneous Information Network Embedding), to compute distributed representations for elements in heterogeneous networks. Specially, AHINE uses an adaptive deep model to learn network embeddings that maximizes the likelihood of preserving the relationship chains between non-adjacent nodes. We apply our embeddings to a large network of points of interest (POIs) and achieve superior accuracy on some prediction problems on a ride-hailing platform. In addition, we show that AHINE outperforms state-of-the-art methods on a set of learning tasks on public datasets, including node labelling and similarity ranking in bibliographic networks. | cs.SI | cs | AHINE: Adaptive Heterogeneous Information
Network Embedding
Yucheng Lin
AI Labs, Didi Chuxing
Xiaoqing Yang
AI Labs, Didi Chuxing
[email protected]
[email protected]
Zang Li
Jieping Ye
AI Labs, Didi Chuxing
[email protected]
AI Labs, Didi Chuxing
[email protected]
9
1
0
2
g
u
A
0
2
]
I
S
.
s
c
[
1
v
7
8
0
1
0
.
9
0
9
1
:
v
i
X
r
a
Abstract -- Network embedding is an effective way to solve
the network analytics problems such as node classification,
link prediction, etc. It represents network elements using low
dimensional vectors such that the graph structural information
and properties are maximumly preserved. Many prior works
focused on embeddings for networks with the same type of edges
or vertices, while some works tried to generate embeddings for
heterogeneous network using mechanisms like specially designed
meta paths. In this paper, we propose two novel algorithms,
GHINE (General Heterogeneous Information Network Embed-
ding) and AHINE (Adaptive Heterogeneous Information Network
Embedding), to compute distributed representations for elements
in heterogeneous networks. Specially, AHINE uses an adaptive
deep model to learn network embeddings that maximizes the
likelihood of preserving the relationship chains between non-
adjacent nodes. We apply our embeddings to a large network of
points of interest (POIs) and achieve superior accuracy on some
prediction problems on a ride-hailing platform. In addition, we
show that AHINE outperforms state-of-the-art methods on a set
of learning tasks on public datasets, including node labelling and
similarity ranking in bibliographic networks.
Index Terms -- Network embedding, heterogeneous information
network, deep learning
I. INTRODUCTION
Understanding and encoding interconnected relationships
between the various elements in a network is important for
solving many real-world problems, such as fraud detection
[1], ride-hailing demand forecasting [2], search ranking [3].
To learn feature representations for nodes and edges, many
approaches such as [4], [5], [6], [7] were proposed in the
past few years, aiming to embed network elements into a low-
dimensional space. A graph embedding system can be viewed
as a mapping system, where the input is a graph with a set of
vertices and edges, and the output are vectors for vertices.
However, most existing methods such as [4], [5], [6], [7],
[8], [9] are for embedding homogeneous network, i.e., they can
deal only with networks containing nodes and edges of one
type. As there are many different types of nodes and relations
in heterogeneous information networks (HINs) such as DBLP
[10], YAGO [11], DBpedia [12] and Freebase [13], network
embedding algorithms that capture these semantics become
more important. HINs are also widely used in industries, such
as ride-hailing [2], accommodation [3], etc. Previous homoge-
neous methods are not applicable for generating embeddings
for heterogeneous networks.
Relations between nodes in a HIN are much more complex
than those in homogeneous networks. The proximity among
nodes is not just a measure of closeness or distance, but also
some other semantics (e.g., type of relations between author
and paper, type of relations between co-authors in DBLP).
Thus embedding models based on node closeness are not
suitable for HINs. There are several meta path based methods
that try to explore and maintain the rich semantic and structural
information in HINs, such as [14], [15], [16], [17], [18], [19],
[20], [21], [22]. The meta path based methods often require
experts to specify the meta paths or provide supervision to
select meta paths. Furthermore, the set of meta paths often
reflects part of the semantic meanings in the HINs as experts
only supply part of patterns of relationships in the HINs. Other
kinds of semantic relations which are not in the set of meta
paths cannot be captured by these methods.
There are other methods that deal with HIN embeddings
without the usage of meta paths, such as network partition
based methods [23] [24], neural network based methods [25]
[26] [27]. These methods are usually only applicable to
specific tasks or networks and are not well suited for use in
general scenarios.
To cope with the challenges of HIN embedding, we pro-
pose two novel methods, General Heterogeneous Information
Network Embedding (GHINE) and Adaptive Heterogeneous
Information Network Embedding (AHINE). By modeling re-
lation types as deep neural layers, the two algorithms are
able to transform nodes in a heterogeneous network into
distributed representations while preserving the semantic prox-
imities between nodes. We summarize our major contributions
as follows:
(1) We propose two unsupervised learning algorithms, GH-
INE and AHINE, for generating HIN embeddings that preserve
complex relationships between nodes without any knowledge
about meta paths or predefined rules.
(2) The edge-based algorithm (GHINE) and chain-based
algorithm (AHINE) are presented to encode first order and
higher order semantic relations among nodes. Different types
of edges are modeled by different deep neural networks .
(3) Experiments based on HIN datasets demonstrate the
effectiveness of AHINE and GHINE. They outperform state-
of-the-art methods in tasks on two public HINs. We also
apply AHINE on a real-world large-scale ride-hailing dataset
collected in Beijing to get embeddings for POI grid cells.
paths to capture different graph semantics. This makes these
methods difficult to apply widely.
In addiction to meta path based methods, some methods
such as HERec [23] and EOE [24] decompose the HIN into
sub-networks and optimize node proximity within each sub-
network. Some other works are inspired by deep learning
technology and learn non-linear mapping functions for HIN
embedding by training neural networks, such as HNE [25],
BL-MNE [26], SHINE [27], etc. These methods usually target
at some specific tasks and are hard to handle general cases.
III. PRELIMINARIES
Definition 3.1: An information network is a directed
graph G = (V, E) with a node type mapping function φ :
V → Γ and an edge type mapping ψ : E → Ω, where each
node v ∈ V belongs to a node type φ(v) ∈ Γ, and each edge
r ∈ E belongs to an edge type ψ(r) ∈ Ω.
Definition 3.2: An information network G = (V, E) is a
heterogeneous information network (HIN) if φ(v1) (cid:54)=
φ(v2), ∃ v1, v2 ∈ V or ψ(r1) (cid:54)= ψ(r2), ∃ r1, r2 ∈ E.
Fig. 1 shows the schema of DBLP HIN, where nodes A, T,
P, V correspond to author, topic, paper and venue, respectively.
There are also different kinds of relations between nodes, such
as "publish", "write", "cited by", etc.
The embeddings help greatly improve the ride-hailing activity
prediction service.
II. RELATED WORK
A. Homogeneous Network Embedding
Network embedding has attracted extensive attention re-
cently. Inspired by word2vec [28], DeepWalk proposed in [5]
generates truncated random walks and treats these walks as
the equivalent of sentences. By applying Skip-gram model
to the "sentences", latent representations of nodes are well
extracted. Node2vec [7] further extended DeepWalk by de-
signing a flexible objective function and providing parameters
p, q to tune the explored search space. LINE [6] is another
widely used network embedding model, which learns feature
representations in two separate phases. In the first phase, it
learns first-order embedding by simulation over immediate
neighbors of nodes. In the second phase, it learns second-
order embedding by sampling nodes at a 2-hop distance.
Struc2vec [29] focuses on capturing structural equivalence
between nodes.
Over the last few years, there has been a surge of Graph
Neural Networks (GNNs) studies [30], which operate deep
learning based methods on graph domain, such as Graph
Convolutional Networks (GCNs) [31], GraphSage [32], Graph
Attention Networks (GATs) [33], etc. Though they show high
interpretability and achieve convincing performance, most
GNNs still seem to have serveral limitations: (1) only focus
on homogeneous networks (2) supervised labels are required
(3) hard to deal with large-scale graphs due to high memory
requirement.
B. Heterogeneous Network Embedding
The aforementioned methods focus on homogeneous infor-
mation networks, where all the nodes are of the same type
and all the edges share the same relation. In recent years, a
few works have been done to learn latent representations from
heterogeneous information networks (HINs).
A main class of embedding studies for HINs are based
on meta paths proximities. Take bibliographic datasets for
example. Meta paths like "Author-Paper-Author" ("APA") or
"Author-Paper-Venue-Paper-Author" ("APVPA") are generated
first, which preserve the information of coauthor or similar
research field. ESim [34] accepts user-defined meta paths as
guidance to learn vertex vectors in a user-preferred embedding
space. Metapath2vec [16] formalizes random walks on a meta
path scheme like "APVPA", and performs the Skip-gram model
on it for HIN embedding. Metapath2vec++ [16] proposes
an advanced Skip-gram framework,
in which the softmax
function is normalized with respect to the node type of the
context. HIN2Vec [35] learns HIN embeddings by conducting
multiple prediction training tasks jointly to learn representation
from meta paths. HHNE [22] measures the node proximity in
hyperbolic spaces instead of Euclidean.
However, most of these models show poor generality, as
meta paths are required to be ready in advance. In many
practical applications, users have to design different meta
Fig. 1. Schemas of DBLP Heterogeneous Information Network
Definition 3.3: A meta path P is an ordered list of node
types γ1, γ2, ..., γn connected by edge types e1, e2, ..., en−1
as follows:
P = γ1
e1−→ γ2 ··· γn−1
en−1−→ γn.
An instance of the meta path P is a real path in the HIN
with the pattern of P . Fig. 2 illustrates two examples of meta
paths for DBLP HIN shown in Fig. 1.
Fig. 2. Meta path examples for DBLP HIN in Fig. 1
Definition 3.4: Heterogeneous Information Network
Embedding: Given a heterogeneous information network G,
find a d-dimensional representation Φ ∈ RV ∗d, d << V
that is able to explore and maintain the semantic and structural
relations among them.
IV. METHODOLOGY
In this section, we introduce our methodology for embed-
ding HINs. We first discuss how to model the heterogeneous
information network embedding problem in a general way in
Section IV-A. Then, we introduce an adaptive version which is
called AHINE in Section IV-B. Finally, we present an example
from the ride-hailing application in Section IV-C.
A. General HINE
An effective embedding learning method should con-
sider the differences between different relationships. GH-
INE (General Heterogenous Information Network
Embedding) treats each relationship as a non-linear function
which is formulated by a deep learning model. For example,
if there exists an edge type e from node v1 to node v2, we
would like to formulate it as follows:
fe(Φ(v1)) = Φ(v2),
(1)
where fe is the function for edge type e, Φ(v1) is GHINE
for v1 and Φ(v2) is GHINE for v2.
Like DeepWalk [5] does, our algorithms extend Skip-gram
[28] architecture to networks. In DeepWalk, it constrains a
nodes embedding to be similar to its context nodes in random
walk by calculating their similarities. However such method
only encodes network closeness but does not take into account
relation information. Thus, we define the similarity between
adjacent nodes by considering the relation types. If there is
an edge type e from node vi to vj, we define the similarity
between vi and vj via relation e as
se(vi, vj) = fe(Φ(vi))T · Φ(vj),
(2)
where Φ(vi) (or Φ(vj)) ∈ Rd is the embedding of node
vi (or vj). The probability of P r(vjvi, e) is modeled via
softmax:
(cid:80)
.
(3)
P r(vjvi, e) =
To learn node embeddings,
ese(vi,vj )
v(cid:48)∈V ese(vi,v(cid:48))
the GHINE algorithm first
generates a set of triples (vi, e, vj) by random edge sampling
on HIN. After that, stochastic gradient descent is used to learn
the parameters of Φ and fe. At each iteration, a set of triples
with the same edge type as a mini batch is processed to update
the gradients to minimize the following objective:
Lij = −logP r(vjvi, e).
(4)
We use negative sampling to approximate the objective
function in order to speed up training process. Formally,
parameters of Φ and fe are updated as follows:
Φ = Φ − η
∂Lij
∂Φ
,
(5)
fe = fe − η
∂Lij
∂fe
,
(6)
where η is the learning rate.
Algorithm 1 THE GHINE ALGORITHM
Input: (1) A heterogeneous information network: G =
(V, E);
(2) Maximum number of iterations: MaxIterations;
(3) mini batch size: b;
(4) learning rate: η;
(5) Edge type list: L.
Output: Node embedding Φ(·) for each v ∈ V
1: Initialize L neural networks with the same input / output
dimension
2: S ← generate a set of triples (vi, ek, vj) according to G
where ek ∈ L
3: Iterations ← 0
4: repeat
5:
get a mini batch of size b of (vi, ek, vj) from S with
the same edge type ek;
update parameters of Φ and fek by Eq. 5 and Eq. 6
Iterations ← Iterations + 1
6:
7:
8: until Iterations (cid:62) MaxIterations or convergence
9: return Φ
In GHINE, the layers of embedding and softmax share the
same weights. Each type of edge has a different deep network
layer to represent. The only constraint for these layers is that
the number of dimensions of the input and output layers of the
deep networks must be the same as the number of dimensions
of node embeddings. During the training process, it selects the
proper DNN layers for the specific relation.
e2−→ v1), p3 (v4
e4−→ v5), and p4 (v1
The key steps of GHINE are described in Algorithm 1.
e1−→
Fig. 3 gives an example of GHINE. Four triples p1 (v3
e1−→ v2) are
v4), p2 (v4
sampled from a HIN. e1, e2, e4 are types of edges. Different
types of edges are colored differently. GHINE models each
edge type using a distinct DNN. When processing the training
samples p1 or p4, the weights of the embedding/softmax layers
and DNN layers corresponding to type e1 will be updated.
B. Adaptive HINE
Furthermore, we have proposed a more flexible model,
called Adaptive Heterogenous Information Network
Embedding (AHINE). AHINE tries to encode the rela-
tionships between nodes with distance > 1 in the HIN.
In order to achieve this, relation chains (of length ≥ 1)
are generated as training examples by random walks or by
designing meta paths. These training samples preserve the
relationship between both adjacent and non-adjacent nodes.
In this sense, GHINE is a special case of AHINE, i.e., the
length of each relation chain is always 1.
In this method, as each input training example may have
different lengths and different types of relations, the computa-
tion graph will change accordingly. For every input chain, the
algorithm tries to predict the last node based on the first node
fek = fek − η
∂L(cid:48)
ij
∂fek
, k ∈ [1, m].
(12)
In practice, we use the samples where the length of edges
is 1 to initialize dense layers and embeddings for nodes first.
In other words, GHINE is used to initialize dense layers and
embeddings for node. And then, the samples where the length
of edges is more than 1 are then used to optimize the total
network weights.
e2−→ v1
e1−→ v2
e4−→ v5) and c2 (v4
Fig. 4 follows the same example as above. Two chains c1
e3−→ v6) are
e1−→ v4
(v3
sampled from the HIN by random walks. For training example
c1, AHINE tries to predict v5 by giving v3's node embedding.
When processing c1, the weights of the embedding/softmax
layers and DNN layers corresponding to type e1 and e4 will
be updated.
Fig. 3. General Heterogeneous Information Network Embedding
and the information carried by the relation chains between
them.
em−→ vj,
AHINE tries to predict vj's embedding by a neural network
fem (...(fe1 )...) as
Suppose there is a relation chain vi
e1−→ ...
fem(fem−1(....fe1 (Φ(vi))...)) = Φ(vj).
(7)
The proximity between vi and vj via a relation chain (e1,
e2, ... em) can be modeled as:
se1,e2,...em (vi, vj) = fem(fem−1(...fe1(Φ(vi))...))T · Φ(vj).
(8)
Then the probability P r(vjvi, e1, e2, ..., em) is:
P r(vjvi, e1, e2, ..., em) =
(cid:80)
ese1 ,e2 ,...em (vi,vj )
v(cid:48)∈V ese1,e2,...em (vi,v(cid:48))
.
(9)
The AHINE algorithm generates samples like (vi, e1, ...em,
vj) by random walks or meta path patterns. During the training
process, the structure of network model is determined by the
relation chain between vi and vj. This mechanism allows us to
feed any kind of meta paths into the model. Stochastic gradient
descent is used to learn the parameters of Φ and fe . At each
iteration, a set of samples with the same relation chains is
processed as a mini batch to update the gradients to minimize
the following objective,
ij = −logP r(vjvi, e1, e2, ...., em).
L(cid:48)
(10)
Same as GHINE, negative sampling is used to speed up
training process. Parameters Φ and fek , k ∈ [1, m] are updated
as follows:
Φ = Φ − η
∂L(cid:48)
ij
∂Φ
,
(11)
Fig. 4. Adaptive Heterogeneous Information Network Embedding
Algorithm 2 describes the details of how to construct
dynamic computation graph for each relation chain. The main
steps of AHINE are shown in Algorithm 3.
C. AHINE in Ride-hailing Platform
We carry out experiments in a large-scale ride-hailing
platform. We built a large graph where each node represents
one of the 28, 929 square grid cells in Beijing. We aim to learn
a low-dimensional representation for each grid cell, capturing
intuitive aspects of locations such as residential areas which
have different characteristics from office buildings. In addition,
we constrain areas with similar functions to have similar
features, and adjacent areas to be close in embedding space.
These aspects will allow us to improve other machine learning
tasks involving POIs.
Our data consists of passenger ride orders. Each order is
a triple (P OIi, relt, P OIj), where P OIi is the source cell,
P OIj is the destination cell, and relt is one of 10 discrete
time values. Time values are members of the cross-product:
Algorithm 2 CONSTRUCTION FOR DYNAMIC COMPU-
TATION GRAPH ALGORITHM
Input: (1) Edge type list: L;
(2) Max chain length: c;
(3) L neural networks: one neural network for each edge
type
Output: dynamic computation graph set S
1: Computation graph set S ← φ
2: chain length ← 1
3: repeat
4:
5:
6:
7:
P ← get all relation chains with length chain length
pind ← 0
repeat
g ← construct computation graph according to the
sequence of P [pind]
add g to S
pind ← pind + 1
8:
9:
10:
11:
12: until chain length > c
13: return S
until pind (cid:62) P
chain length ← chain length + 1
Algorithm 3 THE AHINE ALGORITHM
Input: (1) A heterogeneous information network: G =
(V, E);
(2) Maximum number of iterations: MaxIterations;
(3) mini batch size: b;
(4) learning rate: η;
(5) Edge list: L;
(6) Max chain length: c.
Output: Node embedding Φ(·) for each v ∈ V
1: Initialize L neural networks and Φ by GHINE described
in Algorithm 1
2: construct a dynamic computation graph set by L neural
networks with chain length (cid:54) c as described in Algo-
rithm 2
3: S ← generate a set of samples (vi, e1...ek...em, vj)
according to G where ek ∈ L, 1 (cid:54) k (cid:54) c and m (cid:54) c
4: Iterations ← 0
5: repeat
6:
get a mini batch of size b of (vi, e1, ...ek, ...em, vj)
from S with the same relation list [e1, ...ek, ...em];
update parameters of Φ and fek by Eq. 11 and Eq. 12
Iterations ← Iterations + 1
7:
8:
9: until Iterations (cid:62) MaxIterations or convergence
10: return Φ
∗
peak morning
day time
peak evening
dusk to midnight
midnight to morning
(cid:40)
(cid:41)
weekday
weekend
.
(13)
For each order (P OIi, relt, P OIj), we add to our graph G
an edge of type relt from vi to vj. We then run AHINE on this
graph, which contains 14, 804, 324 edges. Fig. 5 illustrates an
example for ride-hailing POI grid heterogeneous information
network. In this example, some passenger calls a taxi from
POI grid cell A to POI grid cell B in the peak morning of
weekday, while another person generates an order from POI
grid cell B to POI grid cell A in the peak evening of weekday.
We generate samples such as "POI grid cell A rel1−→ POI grid
cell B", "POI grid cell B rel2−→ POI grid cell A" where rel1
means peak morning in weekday and rel2 means peak evening
in weekday. These kinds of samples can be used in GHINE
to obtain embeddings for each POI grid cell.
If we would like to emphasize a continuous trip by the
same passenger, we propose to use training samples such as
"POI grid cell A rel1−→ POI grid cell B rel2−→ POI grid cell C
rel3−→ POI grid cell A" where rel1 means peak morning in
weekday, rel2 means daytime in weekday and rel3 means
peak evening in weekday. To capture the information contained
in this example, the training model selects the dense layers
for relation "peak morning-weekday", "daytime-weekday" and
"peak evening-weekday" in sequence with both the input and
output as POI grid cell A.
Fig. 5. Ride-hailing POI Grid Heterogeneous Information Network
V. EXPERIMENTS
In this section, we demonstrate the effectiveness of the
presented AHINE frameworks for HIN representation learning.
We first
introduce three heterogenous network datasets in
Section V-A. Then, in Section V-B, we introduce the exper-
imental setup and competing algorithms. In Section V-C and
Section V-D, experimental results and analysis are presented.
A. Datasets
Three heterogenous network datasets are used in our ex-
periments, including a ride-hailing dataset from a real-world
platform and two public bibliographic datasets.
RH Ride-Hailing (RH) dataset is a large, directed, multi-
edged HIN, generated from ride-hailing records in Beijing.
This graph is composed of 28, 929 nodes and 14, 804, 324
edges of 10 types in total. Each node represents a POI grid
cell and each edge represents a ride-hailing record. Detailed
information can be found in Section IV-C.
DBIS and AMINER We also conduct our experiments
on two public bibliographic datasets, including the Database
and Information Systems (DBIS) dataset [36] and the Aminer
Computer Science (AMINER) dataset [37]. DBIS, a sub-
set of DBLP dataset [10], was constructed by Sun et al.
[36]. It contains all 464 venues in DBLP and corresponding
60, 694 authors and 72, 902 publications. AMINER consists
of 1, 693, 531 computer scientists and 3, 194, 405 papers from
3, 883 computer science venues. Both datasets are HINs
with three types of nodes (Author, Paper, Venue) and four
corresponding relationships ("write", "written by", "publish",
"published by") among them.
B. Experimental Setup
Traveling graphs and bibliographic graphs share significant
distinctions in many aspects. For example, it's difficult to
design meta paths for the RH data. Thus, we compare GHINE
and AHINE with distinct baseline methods and settings.
On RH dataset, DailyWalk, DeepWalk [5], LINE [6],
xNetMF [38], struc2vec [29] are implemented for the purpose
of comparison. All embeddings are in the same dimension of
dim = 30.
It is worth noting that the main idea of our DailyWalk model
is that there are some hidden connections in all places that
a person has been to for a period of time. Instead of using
random walks or meta paths, DailyWalk generates walks by
sequentially connecting the POIs appeared in real-world daily
ride-hailing records. For example, suppose a passenger travels
from P OI1 to P OI2, and then moves to P OI3 from P OI2
in the same day, we get a walk "P OI1→P OI2→P OI3".
Similar to DeepWalk, we learned embedded representations
by applying Skip-gram to the generated daily walks.
On DBIS and AMINER data, DeepWalk, LINE, struc2vec,
metapath2vec, metapath2vec++ [16], HHNE [22] are included
for comparison. All the embeddings share the same dimension
of dim = 50.
For all
the walk based models (DeepWalk, struc2vec,
metapath2vec, metapath2vec++, HHNE), we use the same
parameters:
(1) The number of walks per node w = 100;
(2) The max length for each walk l = 50;
(3) The context neighborhood size win = 3;
(4) The size of negative samples neg = 5.
(5) The lower bound of node frequency min count = 5
··· , reli, nodelast" se-
AHINE takes "nodef irst, rel1,
quences as input, with max chain length c and 1 ≤ i ≤ c.
GHINE is a special case of AHINE that all chain lengths are
always 1. It takes "node1, rel1, node2" sequences as input.
For RH data, Fig. 6 gives an instruction of generating the
training samples of AHINE. We first extract daily walks of
POI grid cells from passengers' daily travel trajectories. The
walks are represented in the form of a sequence in which
each element of the sequence represents a POI grid cell. We
then insert relations between adjacent POIs according to the
order time. After that, we extracted the subsequence according
to the set length. Intermediate nodes are removed for each
subsequence, leaving only the edges and the first and last
nodes.
Fig. 6. Generate the training samples of AHINE.
Max chain length c is set to 3 in this experiment. From
a daily walk including n (n ≥ 2) POI nodes, we form
max(0, n − 3) samples of chain length 3, max(0, n − 2)
samples of chain length 2 and n − 1 samples of chain length
1 in total.
Then, we construct 10 neural network modules for 10 time-
based relations, with the same structure and the identical
input/output size, which is 30, equal to the length of rep-
resentation. There are numerous ways to construct a neural
network module, where the simplest is to construct a two-layer
network, without any hidden layer. Deep neural networks are
worthwhile trying with adequate hardware supports.
In our experiments, we build a 4-layer network module for
each relation, with an input layer of length 30, an output layer
of length 30 and two hidden layer of length 200. ReLU is
used as the activation function between layers and between
connected neural network modules.
We take advantage of dynamic computation graph in Tensor-
Flow [39] to combine these neural network modules dynami-
cally. By using dynamic computation graph, it is equivalent to
construct 10 types of AHINE structure with single NN module,
100 types of AHINE structure with double NN modules and
1, 000 types of AHINE structure with triple NN modules in
total.
With training samples prepared and the AHINE model con-
structed, we start the training process based on Algorithm 3.
Training data is organized in a batch size of 32 and average
negative sampling size for each training sample is set as
neg = 5. The maximum number of iterations is set as 200.
So, we end the training process until
the convergence or
epoch ≥ 200.
For the bibliographic datasets,
in the similar way, we
generate sequences by adding corresponding relations between
adjacent nodes in random walks (or meta paths) and then erase
all the nodes except for the first and the last. The walks are
generated with the same parameters listed above, namely the
number of walks per node w = 100 and walk length l = 50.
Same parameters are used to construct the model, except for
that relation number is 4 and the length of input/output layer
is 50.
There are several useful tips for training AHINE. (1) Pre-
training is recommended. In our tasks, we pre-train a GHINE,
equal to AHINE with max chain length c = 1, with samples
containing single relation as training input. (2) The "under-
flow" error happens occasionally, aborting the training process
directly. This is due to that the parameters of embedding layer
(input layer and softmax layer) change slowly, and the weights
of hidden layers change rapidly. We recommend you to give a
high learning rate for the embedding layer and give a relatively
low rate for the other weights. By doing so, the learning
procedure of AHINE will be significantly accelerated and the
annoying "underflow" error will be fixed.
C. Results in RH
Node embeddings are learned using the above algorithm
and RH graph, in which each node represents a POI grid
cell. To evaluate the quality of POI embeddings learned by
different methods, several experiments are presented in the
following sections. First, we apply them to a real ride-hailing
activity prediction in Section V-C1 as there are several
kinds of activity predictions, such as demand forecasting [2],
destination prediction [40], etc. Then in Section V-C2, we
introduce our POI embedding visualization tool on map and
show some interesting results.
1) Activity Prediction: We perform one activity prediction
experiment on another ride-hailing dataset, which includes
19, 280, 562 historical orders in Beijing. 246, 955 of these
orders are labeled as positive and the rest are labeled as
negative.
For each ride-hailing order, we collect a series of related
features, including calling time, weather condition, hotel den-
sity for departure or destination POI, etc. We call them "base
features". At the same time, for the POI grid cells where
the start and end points are located, we mapped them to
the embeddings generated by different models. Finally, we
concatenated the features of these two parts together into
"merged features".
We randomly divide the ride-hailing orders into a training
set containing 80% of orders and a test set of 20%. With base
features or merged features prepared, we train XGBoost [41]
classifiers on the training set and make prediction on the test
set. The area under the curve (AUC) is used to measure the
performance of final prediction.
We design two sub tasks of the activity prediction and the
results are presented in Table I. "Base" shows the classifier's
performance trained on the base features without POI em-
beddings. As illustrated in the left part of Table I, we use
merged features for classification. As shown in the right part
of Table I, we make classification directly on POI embeddings
without base features. The top 2 results in each comparison
are underlined and the best is marked in bold.
As shown in Table I, among all the models, our proposed
method AHINE achieved the best results, while GHINE
achieved the second best performance. Moreover, experimental
result shows the effectiveness of POI embeddings in the
activity prediction, as all the embedding methods are superior
than Base.
2) Visualization: We build our POI embedding visual-
ization tool based on Baidu Map APIs called "mapv"
(https://mapv.baidu.com/). We plotted the POIs corresponding
to the trained embeddings on the map. In addition, many useful
functions are also implemented to explore POIs on the map,
such as address-POI translation, POI clustering, similar POI
filtering, etc.
We perform the POI clustering experiment in the first place.
By applying K-means (K = 20) [42], we divide the POIs into
20 groups and then mark these points in different colors on
the Beijings map.
Fig. 7 shows the POI clustering result of AHINE on
Beijing's map. Physically closed POIs are usually in the same
cluster. It illustrates ability of the model to automatically learn
implicitly the geographical proximity relationships between
POIs, as during the training process we did not provide any
supervised information about geographical location.
However, location information does not need to be learned
because they are usually available, other POI characteristics,
such as POI category (e.g., bars, residential areas, business dis-
tricts, etc.), convenience of transportation facilities, difficulty
of parking cars, are much harder to get and represent in form
of features. To evaluate if these characteristics are captured by
embeddings we can examine top k most similar POI grid cells
of unique POI grid cell in the embedding space.
Fig. 8 shows the top 30 most similar POIs to Beijing
Railway Station. The red point represents the target POI and
the blue ones represent
the similar POIs. From the map,
it is obvious that neighbor POIs do show good similarity.
Besides, we surprisingly found other railway stations and
airports are also found quite similar to Beijing Railway Station,
despite that they are physically far in distance. The result
shows that our embeddings are able to capture some semantic
relationships (such as type similarity, location proximity, etc.)
between nodes in HINs.
D. Results in DBIS & AMINER
To label nodes in DBIS and AMINER, we adopt the same
third-party labels used in metapath2vec's experiments [16].
8 categories of venues in Google Scholar are matched with
DBIS and AMINER data and we use them to label
the
corresponding author nodes. In general, we get a valid set with
26, 469 labeled authors and 10 labeled venues for DBIS. For
AMINER, we get 241, 235 labeled authors and 133 labeled
venues. As the number of matched venues is limited, we
design three tasks on author including node clustering, node
classification and similarity ranking.
• Node Clustering
The learned node embeddings are inputed to a K-means
(K = 8) clustering model. We use normalized mutual
information (NMI) [43] to evaluate the clustering results.
ACTIVITY PREDICTION RESULTS (AUC) IN RH DATA.
TABLE I
AUC (with base) Gain over base
AUC (without base) Gain over DailyWalk
Method
Base
DailyWalk
LINE
DeepWalk
xNetMF
struc2vec
GHINE
AHINE
0.6884
0.7285
0.7484
0.7526
0.7480
0.7401
0.7594
0.7616
-
5.82%
8.72%
9.32%
8.66%
7.51%
10.31%
10.64%
-
0.6801
0.7169
0.7245
0.7134
0.7007
0.7316
0.7327
-
-
5.41%
6.53%
4.90%
3.03%
7.57%
7.73%
Fig. 7. AHINE POI clustering by K-means (K=20) on Beijing's map.
• Node Classification
In this task, with the embeddings of labeled nodes as
input, we try to predict the categories of target authors.
A logistic classifier is trained for this eight-class clas-
sification task. 80% of the nodes are used for training
and the rest 20% for testing. We report the classification
performance in terms of both Micro-F1 and Macro-F1
scores [16].
• Similarity Ranking
Given a query and returning a ranked item list is one of
the main tasks in learning to rank problem [44]. Mean
average precision at K (MAP@K) [15] is widely used
for evaluating whether a returned list is well ranked or
not. In our task, intuitively, a node ought to show high
similarities to nodes with the same label and show low
similarity to nodes with different labels. We treat a target
node as the "query" and obtain a returned list by ranking
the rest nodes according to their similarity with node
"query". In the returned list, we define the nodes with the
same label as positive samples and the rest are negatives.
Thus, we apply the metric MAP@K to our similarity
ranking task.
RESULTS OF THREE TASKS IN DBIS DATA.
TABLE II
Method
LINE
DeepWalk
struc2vec
metapath2vec
metapath2vec++
HHNE
GHINE
AHINE
NMI Macro-F1 Micro-F1 MAP@100
0.0918
0.0923
0.0561
0.0880
0.0802
0.0753
0.1104
0.1100
0.2935
0.2687
0.1212
0.3367
0.3123
0.2564
0.3096
0.3351
0.5278
0.5523
0.4749
0.5602
0.5416
0.5270
0.5489
0.5735
0.4023
0.4093
0.3530
0.4081
0.3987
0.3875
0.3921
0.4144
The results of author nodes in DBIS dataset is summarized
in Table II. Same as above, we underline the top 2 results for
each metric and mark the best in bold. As we can observe, the
proposed AHINE achieves the best Micro-F1 score in node
classification and the best MAP@100 in similarity ranking
task. In node clustering task, GHINE and AHINE show similar
performance and outperform all baselines significantly. And
from GHINE to AHINE, by adding relationship chains, both
Macro-F1 and Micro-F1 scores improve greatly.
Table III shows the results of author nodes in AMINER data.
AHINE outperforms all the baseline methods in terms of three
Fig. 8. Top 30 similar POIs to Beijing Railway Station.
RESULTS OF THREE TASKS IN AMINER DATA.
TABLE III
Method
LINE
DeepWalk
metapath2vec
metapath2vec++
HHNE
GHINE
AHINE
NMI Macro-F1 Micro-F1 MAP@100
0.5385
0.5306
0.6624
0.5328
0.5330
0.6908
0.6816
0.8191
0.8356
0.8763
0.8617
0.8198
0.8846
0.8892
0.8016
0.8181
0.8655
0.8497
0.8049
0.8738
0.8786
0.6976
0.7188
0.7615
0.7544
0.7319
0.7356
0.7825
metrics, and achieves the second best in node clustering task
by metric NMI. GHINE also shows satisfactory performance
in all tasks except similarity ranking.
Overall, plenty of experiments are performed in the ride-
hailling and bibliograhic datasets. Their results demonstrate
the efficiency of proposed GHINE and AHINE models for
large-scale HIN embedding.
VI. CONCLUSION
In this paper, we propose a general and an adaptive method
for the unsupervised embedding learning of heterogeneous
information networks. We evaluate the effectiveness of the
proposed methods on public datasets. GHINE and AHINE are
also applied in a real-world ride-hailing platform to catch the
semantic and structure information and help greatly improve
the ride-hailing activity prediction service.
REFERENCES
[1] D. Zhou, J. He, H. Yang, and W. Fan, "SPARC: self-paced network
representation for few-shot rare category characterization," in Proceed-
ings of the 24th ACM SIGKDD International Conference on Knowledge
Discovery & Data Mining, KDD 2018, London, UK, August 19-23, 2018,
pp. 2807 -- 2816, 2018.
[2] G. Xu, L. Yaguang, W. Leye, Z. Lingyu, Y. Qiang, Y. Jieping, and
L. Yan, "Spatiotemporal multi-graph convolution network for ride-
hailing demand forecasting," in Association for the Advancement of
Artificial Intelligence, 2019.
[3] M. Grbovic and H. Cheng, "Real-time personalization using embeddings
for search ranking at airbnb," in Proceedings of the 24th ACM SIGKDD
International Conference on Knowledge Discovery & Data Mining,
pp. 311 -- 320, ACM, 2018.
[4] S. Cao, W. Lu, and Q. Xu, "Grarep: Learning graph representations with
global structural information," in Proceedings of the 24th ACM Inter-
national on Conference on Information and Knowledge Management,
pp. 891 -- 900, ACM, 2015.
[5] B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning
of social representations," in Proceedings of the 20th ACM SIGKDD
international conference on Knowledge discovery and data mining,
pp. 701 -- 710, ACM, 2014.
[6] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, "Line:
Large-scale information network embedding," in Proceedings of the
24th International Conference on World Wide Web, pp. 1067 -- 1077,
International World Wide Web Conferences Steering Committee, 2015.
[7] A. Grover and J. Leskovec, "node2vec: Scalable feature learning for
networks," in Proceedings of the 22nd ACM SIGKDD international
conference on Knowledge discovery and data mining, pp. 855 -- 864,
ACM, 2016.
[8] D. Wang, P. Cui, and W. Zhu, "Structural deep network embedding,"
in Proceedings of the 22nd ACM SIGKDD international conference on
Knowledge discovery and data mining, pp. 1225 -- 1234, ACM, 2016.
[9] D. Zhang, J. Yin, X. Zhu, and C. Zhang, "Homophily, structure, and
content augmented network representation learning," in Data Mining
(ICDM), 2016 IEEE 16th International Conference on, pp. 609 -- 618,
IEEE, 2016.
[10] M. Ley, "The dblp computer science bibliography: Evolution, research
issues, perspectives," in International symposium on string processing
and information retrieval, pp. 1 -- 10, Springer, 2002.
[11] F. M. Suchanek, G. Kasneci, and G. Weikum, "Yago: a core of semantic
knowledge," in Proceedings of the 16th international conference on
World Wide Web, pp. 697 -- 706, ACM, 2007.
[12] S. Auer, C. Bizer, G. Kobilarov, J. Lehmann, R. Cyganiak, and Z. Ives,
[33] P. Velickovi´c, G. Cucurull, A. Casanova, A. Romero, P. Lio, and
Y. Bengio, "Graph attention networks," in International Conference on
Learning Representations (ICLR), 2018.
[34] J. Shang, M. Qu, J. Liu, L. M. Kaplan, J. Han, and J. Peng, "Meta-
path guided embedding for similarity search in large-scale heterogeneous
information networks," arXiv preprint arXiv:1610.09769, 2016.
[35] T.-y. Fu, W.-C. Lee, and Z. Lei, "Hin2vec: Explore meta-paths in
heterogeneous information networks for representation learning," in
Proceedings of
the 2017 ACM on Conference on Information and
Knowledge Management, pp. 1797 -- 1806, ACM, 2017.
[36] Y. Sun, J. Han, X. Yan, P. S. Yu, and T. Wu, "Pathsim: Meta path-
based top-k similarity search in heterogeneous information networks,"
Proceedings of the VLDB Endowment, vol. 4, no. 11, pp. 992 -- 1003,
2011.
[37] J. Tang, J. Zhang, L. Yao, J. Li, L. Zhang, and Z. Su, "Arnetminer:
extraction and mining of academic social networks," in Proceedings
of
the 14th ACM SIGKDD international conference on Knowledge
discovery and data mining, pp. 990 -- 998, ACM, 2008.
[38] M. Heimann, H. Shen, T. Safavi, and D. Koutra, "Regal: Representation
learning-based graph alignment," in Proceedings of
the 27th ACM
International Conference on Information and Knowledge Management,
pp. 117 -- 126, ACM, 2018.
[39] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin,
S. Ghemawat, G. Irving, M. Isard, et al., "Tensorflow: a system for
large-scale machine learning.," in OSDI, vol. 16, pp. 265 -- 283, 2016.
[40] L. Zhang, T. Hu, Y. Min, G. Wu, J. Zhang, P. Feng, P. Gong, and J. Ye,
"A taxi order dispatch model based on combinatorial optimization," in
Proceedings of the 23rd ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, pp. 2151 -- 2159, ACM, 2017.
[41] T. Chen and C. Guestrin, "Xgboost: A scalable tree boosting system,"
in Proceedings of the 22nd acm sigkdd international conference on
knowledge discovery and data mining, pp. 785 -- 794, ACM, 2016.
[42] J. A. Hartigan and M. A. Wong, "Algorithm as 136: A k-means
clustering algorithm," Journal of the Royal Statistical Society. Series
C (Applied Statistics), vol. 28, no. 1, pp. 100 -- 108, 1979.
[43] T. M. Cover and J. A. Thomas, Elements of information theory. John
Wiley & Sons, 2012.
[44] T.-Y. Liu et al., "Learning to rank for information retrieval," Foundations
and Trends® in Information Retrieval, vol. 3, no. 3, pp. 225 -- 331, 2009.
"Dbpedia: A nucleus for a web of open data," Semantic Web, vol. 4825,
pp. 11 -- 15, 2007.
[13] K. Bollacker, C. Evans, P. Paritosh, T. Sturge, and J. Taylor, "Freebase:a
collaboratively created graph database for structuring human knowl-
edge," in ACM SIGMOD International Conference on Management of
Data, pp. 1247 -- 1250, 2008.
[14] H. Ji, C. Shi, and B. Wang, "Attention based meta path fusion for hetero-
geneous information network embedding," in Pacific Rim International
Conference on Artificial Intelligence, pp. 348 -- 360, Springer, 2018.
[15] T. Chen and Y. Sun, "Task-guided and path-augmented heterogeneous
network embedding for author identification," in Proceedings of the
Tenth ACM International Conference on Web Search and Data Mining,
pp. 295 -- 304, ACM, 2017.
[16] Y. Dong, N. V. Chawla, and A. Swami, "metapath2vec: Scalable rep-
resentation learning for heterogeneous networks," in Proceedings of the
23rd ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining, pp. 135 -- 144, ACM, 2017.
[17] C. Wang, Y. Song, H. Li, Z. Ming, and J. Han, "Unsupervised meta-path
selection for text similarity measure based on heterogeneous information
networks," Data Mining & Knowledge Discovery, pp. 1 -- 33, 2018.
[18] W. Shen, J. Han, J. Wang, X. Yuan, and Z. Yang, "Shine+: A gen-
eral framework for domain-specific entity linking with heterogeneous
information networks," IEEE Transactions on Knowledge and Data
Engineering, vol. 30, no. 2, pp. 353 -- 366, 2018.
[19] C. Wang, Y. Song, H. Li, Y. Sun, M. Zhang, and J. Han, "Distant meta-
path similarities for text-based heterogeneous information networks,"
in Proceedings of the 2017 ACM on Conference on Information and
Knowledge Management, pp. 1629 -- 1638, ACM, 2017.
[20] Y. Shi, P.-W. Chan, H. Zhuang, H. Gui, and J. Han, "Prep: Path-based
relevance from a probabilistic perspective in heterogeneous information
networks," in Proceedings of the 23rd ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, pp. 425 -- 434,
ACM, 2017.
[21] C. Wang, Y. Song, H. Li, M. Zhang, and J. Han, "Text classification with
heterogeneous information network kernels.," in AAAI, pp. 2130 -- 2136,
2016.
[22] X. Wang, Y. Zhang, and C. Shi, "Hyperbolic heterogeneous information
network embedding," in AAAI, 2019.
[23] W. X. Z. Chuan Shi, Binbin Hu and P. S. Yu., "Heterogeneous infor-
mation network embedding for recommendation," in IEEE Transactions
on Knowledge and Data Engineering (TKDE), IEEE, 2018.
[24] L. Xu, X. Wei, J. Cao, and P. S. Yu, "Embedding of embedding (eoe):
Joint embedding for coupled heterogeneous networks," in Proceedings
of the Tenth ACM International Conference on Web Search and Data
Mining, pp. 741 -- 749, ACM, 2017.
[25] S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, and T. S.
Huang, "Heterogeneous network embedding via deep architectures," in
Proceedings of the 21th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, pp. 119 -- 128, ACM, 2015.
[26] J. Zhang, C. Xia, C. Zhang, L. Cui, Y. Fu, and S. Y. Philip, "Bl-mne:
emerging heterogeneous social network embedding through broad learn-
ing with aligned autoencoder," in 2017 IEEE International Conference
on Data Mining (ICDM), pp. 605 -- 614, IEEE, 2017.
[27] H. Wang, F. Zhang, M. Hou, X. Xie, M. Guo, and Q. Liu, "Shine:
Signed heterogeneous information network embedding for sentiment
link prediction," in Proceedings of the Eleventh ACM International
Conference on Web Search and Data Mining, pp. 592 -- 600, ACM, 2018.
[28] T. Mikolov, I. Sutskever, C. Kai, G. Corrado, and J. Dean, "Distributed
representations of words and phrases and their compositionality," Ad-
vances in Neural Information Processing Systems, vol. 26, pp. 3111 --
3119, 2013.
[29] L. F. Ribeiro, P. H. Saverese, and D. R. Figueiredo, "struc2vec: Learning
node representations from structural identity," in Proceedings of the 23rd
ACM SIGKDD International Conference on Knowledge Discovery and
Data Mining, pp. 385 -- 394, ACM, 2017.
[30] J. Zhou, G. Cui, Z. Zhang, C. Yang, Z. Liu, L. Wang, C. Li, and M. Sun,
"Graph neural networks: A review of methods and applications," arXiv
preprint arXiv:1812.08434, 2018.
[31] T. N. Kipf and M. Welling, "Semi-supervised classification with graph
convolutional networks," in International Conference on Learning Rep-
resentations (ICLR), 2017.
[32] W. L. Hamilton, R. Ying, and J. Leskovec, "Inductive representation
learning on large graphs," in NIPS, 2017.
|
1703.09315 | 1 | 1703 | 2017-03-27T21:30:59 | Tracing the Use of Practices through Networks of Collaboration | [
"cs.SI",
"physics.soc-ph"
] | An active line of research has used on-line data to study the ways in which discrete units of information---including messages, photos, product recommendations, group invitations---spread through social networks. There is relatively little understanding, however, of how on-line data might help in studying the diffusion of more complex {\em practices}---roughly, routines or styles of work that are generally handed down from one person to another through collaboration or mentorship. In this work, we propose a framework together with a novel type of data analysis that seeks to study the spread of such practices by tracking their syntactic signatures in large document collections. Central to this framework is the notion of an "inheritance graph" that represents how people pass the practice on to others through collaboration. Our analysis of these inheritance graphs demonstrates that we can trace a significant number of practices over long time-spans, and we show that the structure of these graphs can help in predicting the longevity of collaborations within a field, as well as the fitness of the practices themselves. | cs.SI | cs | Tracing the Use of Practices through Networks of Collaboration
Rahmtin Rotabi
Department of Computer Science
Cristian Danescu-Niculescu-Mizil
Department of Information Science
Cornell University
Ithaca, NY, 14853
Cornell University
Ithaca, NY, 14853
[email protected]
[email protected]
[email protected]
Department of Computer Science
Jon Kleinberg
Cornell University
Ithaca, NY, 14853
7
1
0
2
r
a
M
7
2
]
I
S
.
s
c
[
1
v
5
1
3
9
0
.
3
0
7
1
:
v
i
X
r
a
Abstract
An active line of research has used on-line data to study the
ways in which discrete units of information-including mes-
sages, photos, product recommendations, group invitations-
spread through social networks. There is relatively little un-
derstanding, however, of how on-line data might help in
studying the diffusion of more complex practices-roughly,
routines or styles of work that are generally handed down
from one person to another through collaboration or mentor-
ship. In this work, we propose a framework together with a
novel type of data analysis that seeks to study the spread of
such practices by tracking their syntactic signatures in large
document collections. Central to this framework is the no-
tion of an inheritance graph that represents how people pass
the practice on to others through collaboration. Our analysis
of these inheritance graphs demonstrates that we can trace a
significant number of practices over long time-spans, and we
show that the structure of these graphs can help in predicting
the longevity of collaborations within a field, as well as the
fitness of the practices themselves.
Introduction
On-line domains have provided a rich collection of settings
in which to observe how new ideas and innovations spread
through social networks. A growing line of research has dis-
covered principles for both the local mechanisms and global
properties involved in the spread of pieces of information
such as messages, quotes, links, news stories, and photos
[2, 9, 13, 14, 12, 1, 6, 8, 5], the diffusion of new products
through viral marketing [11], and the cascading recruitment
to on-line groups [4, 3].
A common feature in these approaches has been to trace
some discrete "unit of transmission" that can be feasibly
tracked through the underlying system: a piece of text, a
link, a product, or membership in a group. This is natural:
the power of on-line data for analyzing diffusion comes in
part through the large scale and fine-grained resolution with
which we can observe things flowing through a network;
therefore, to harness this power it is crucial for those things
to be algorithmically recognizable and trackable. As a result,
certain types of social diffusion have been particularly dif-
ficult to approach using on-line data-notably, a broad set
Copyright c(cid:13) 2017, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
of cascading behaviors that we could refer to as practices,
which are a collection of styles or routines within a commu-
nity that are passed down between people over many years,
often through direct collaboration, mentorship or instruc-
tion. Particular stylistic elements involved in writing soft-
ware, or performing music, or playing football, might all be
examples of such practices in their respective fields. While
complex practices are one of the primary modes studied by
qualitative research in diffusion [19], the challenge for large-
scale quantitative analysis has been both to recognize when
someone has begun to adopt a practice, and also to identify
how it was transmitted to them.
Tracking the Spread of Practices. A natural approach to
tracking the spread of a practice is to find a concretely rec-
ognizable "tag" that tends to travel with the practice as it
is handed down from one person to another, rendering its
use and transmission easily visible. A beautiful instance of
this strategy was carried out by David Kaiser in his analysis
of the use of Feynman diagrams in physics [10]. Feynman
diagrams were proposed by Richard Feynman as a way to
organize complex physics calculations, and due to the tech-
nical sophistication involved in their use, the initial spread
of Feynman diagrams within the physics community pro-
ceeded in much the style described above, with young re-
searchers adopting the practice through collaboration with
colleagues who had already used it. In contrast to many
comparable practices, Feynman diagrams had a distinctive
syntactic format that made it easy to tell when they were
being used. As a result, their spread could be very accu-
rately tracked through the physics literature of the mid-20th-
century. The result, in Kaiser's analysis, was a detailed map
of how an idea spread through the field via networks of men-
torship. As he writes:
The story of the spread of Feynman diagrams reveals the work
required to craft both research tools and the tool users who
will put them to work. The great majority of physicists who
used the diagrams during the decade after their introduction
did so only after working closely with a member of the dia-
grammatic network. Postdocs circulated through the Institute
for Advanced Study, participating in intense study sessions
and collaborative calculations while there. Then they took
jobs throughout the United States (and elsewhere) and be-
gan to drill their own students in how to use the diagrams.
To an overwhelming degree, physicists who remained outside
this rapidly expanding network did not pick up the diagrams
for their research. Personal contact and individual mentor-
ing remained the diagrams' predominant means of circula-
tion even years after explicit instructions for the diagrams'
use had been in print. [10]
The Feynman diagram thus functions in two roles in this
analysis: as an important technical innovation, and as a
"tracking device" for mapping pathways of mentorship and
collaboration. If we want to bring this idea to a setting with
large-scale data, we must deal with the following question:
where can we find a rich collection of such tracking devices
with which to perform this type of analysis? We do not ex-
pect most objects in this collection to be technical advances
comparable to the Feynman diagram, but we need a large
supply of them, and we need to be able to mechanically rec-
ognize both their use and their spread.
The present work: Diffusion of practices in academic
writing.
In this paper, we describe a framework for track-
ing the spread of practices as they are passed down through
networks of collaboration, and we demonstrate a number of
ways in which our analysis has predictive value for the un-
derlying system. We make use of a setting where practices
have the recognizability that we need-a novel dataset of la-
tex macros in the e-print arXiv recently developed by Rotabi
et al [16]. While the earlier work that developed this dataset
used macros for other purposes (specifically, treating macros
names as instances of naming conventions), macros in our
context have a number of the key properties we need. First,
a latex macro is something whose presence can be tracked
as it spreads through the papers in the arXiv collection; we
can thus see when an author first uses it, and when their co-
authors use it. Second, while an arbitrary macro clearly does
not correspond in general to an important technical innova-
tion, a sufficiently complex macro often does encode some
non-trivial technical shorthand within a concrete sub-field,
and hence its use signifies the corresponding use of some
technical practice within the field. And finally, there are sev-
eral hundred thousand latex macros in papers on the arXiv,
and so we have the ability to track a huge number of such
diffusion events, and to make comparative statements about
their properties.
If we want to use macros to trace the diffusion of practices
between collaborators, we first need to establish whether
macros indeed spread via "inheritance" from co-authors: as
with the Feynman diagram, can most of the initial set of uses
of a macro trace a path back to a single early use through a
chain of co-authorship? We find that this is true for a signif-
icant fraction of macros, by using an inheritance graph for
each macro that records how each author's first use can be
imputed to a co-authorship with an earlier user of the macro.
Specifically, for each macro we can build a graph on the set
of authors who have used it, and we include a directed in-
heritance edge from author u to author v if (i) u used the
macro before v did, and (ii) v's first use of the macro is in a
paper with u. We find that many of these inheritance graphs
contain giant directed subtrees rooted at a single early use of
the macro, indicating that a significant fraction of the users
of the macro can indeed trace a direct path back to a single
shared early ancestor under this inheritance relation.
These structures represent interesting instances of diffu-
sion for several reasons. First, they are "organic" in a way
that the spread of many on-line memes are not: when we
study on-line diffusion in settings where a user's exposure
to content is governed by a recommendation system or rank-
ing algorithm, there is the added complexity that part of the
diffusion process is being guided by the internals of the algo-
rithms underlying the system. With macros in arXiv papers,
on the other hand, while authors may use automated tools
to format the source of their papers, there is relatively little
influence from automated recommendations or rankings in
the actual decisions to include specific macros. Second, we
are studying processes here that play out over years and even
decades; among other findings about the structure of our in-
heritance graphs, we observe that their diameters can take
multiple years to increase even by one hop. We are thus ob-
serving effects that are taking place over multiple academic
generations.
The present work: Estimating fitness.
If these inheri-
tance graphs-obtaining by tracing simple syntactic signa-
tures in the source files of papers-are telling us something
about the spread of practices through the underlying com-
munity, then their structural properties may contain latent
signals about the outcomes of authors, topics, and relation-
ships. In the latter part of the paper, we show that this is the
case, by identifying such signals built from the inheritance
structures, and showing that they have predictive value.
As one instance, suppose we wish to estimate the future
longevity of a collaboration between two authors u and v-
that is, controlling for the number of papers they have writ-
ten thus far, we ask how many papers they will write in the
future. If (u, v) is an edge of the inheritance graph for some
macro, does this help in performing such an estimate? One
might posit that since this edge represents something con-
crete that u passed on to v in their collaboration, we should
increase our estimate of the strength of the relationship and
hence its future longevity. This intuition turns out not to be
correct on its own: the existence of a (u, v) edge by itself
doesn't significantly modify the estimate. However, we find
that something close to this intuition does apply. First, we
note that since a (u, v) edge only means that a macro used by
u showed up subsequently in a paper that u co-authored with
v, it is providing only very weak information about v's role
in the interaction. We would have a stronger signal if (u, v)
were an internal edge of some inheritance graph, meaning
that v has at least one outgoing edge; in this case, v was part
of a paper that subsequently passed the macro on to a third
party w. We find that if (u, v) is an internal edge of an inheri-
tance graph, this does in fact provide a non-trivial predictive
signal for increased longevity of the u-v collaboration; in-
formally, it is not enough that u passed something on to v,
but that v subsequently was part of the process of passing it
on to a third party w. In fact, we find something more: when
(u, v) is an edge that is not internal (so that u's passing on
(a) \hbox{$\rm\thinspace L {\odot}$}
(b) \mbox{\boldmath $Y$}
(c) \mathrel{\mathpalette\@versim>}
Figure 1: Sample subsets of BFS trees for three different macros. At each depth we show the date when the highlighted author
(node) uses the macro for the first time; the highlighted edge is a paper in which an author passes on the macro to an author
(node) in the next level of the tree.
of the macro "ends" at v), it in fact provides a weak predic-
tive signal that the collaboration will actually have slightly
lower longevity than an arbitrary collaboration between two
co-authors (again controlling for the number of joint papers
up to the point of observation).
In what follows, we formalize this analysis and its conclu-
sion. We also develop analyses through which macro inher-
itance can be used to help estimate the future longevity of
an author-how many papers will they write in the future?
-and the fitness of an individual macro itself-how many
authors will use it in the future?
The remainder of the paper is organized into three main
sections. We first briefly describe the structure of the data
and how it is used in our analyses. We then formally define
the inheritance graphs and survey some of their basic prop-
erties. Finally, we analyze the relation between these inheri-
tance structures and the longevity of co-authorships, authors,
and macros.
Data Description
The dataset we study contains the macros used in over one
million papers submitted to the e-print arXiv from its incep-
tion in 1991 through November 2015. The arXiv is a reposi-
tory of scientific pre-prints in different formats, primarily in
LATEX. Macros have two major components, the name and
the body. Whenever the author uses \name the LATEX com-
piler replaces it with the body and compiles the text. In our
study the body serves as the "tracking device" discussed
in the introduction, for studying how a macro is passed be-
tween collaborators over time. In general, when we refer to
a "macro", we mean a macro body unless specified other-
wise. For our study we use macro bodies that have length
greater than 20 characters, and which have been used by at
least 30 different authors. We apply the length filter so that
we can focus on macros that are distinctive enough that we
expect them to move primarily through copying and trans-
mission, rather than independent invention. Further informa-
tion can be found in [16], which introduces this dataset.
Method
Inheritance Graphs
Defining inheritance graphs. We begin by formally
defining the inheritance graphs described in the introduc-
tion. For each macro m we create a graph (Vm, Em) where
Vm is the set of authors who have used macro m in at least
one of their papers. We add a directed edge (u, v) to the
edge set Em if there is a paper that uses m with u and v as
co-authors, such that (i) this is v's first use of m, but (ii) u
has used m in at least one previous paper. This is the formal
sense in which m is being passed from u to v: v's first use
of m occurs in collaboration with u, a prior user of m. Note
that there can be multiple edges leading into a single node.
(a)
(b)
(c)
Figure 2: (a) The CDF for the ratio of the largest reachable set to the number of nodes in the graph. (b) The average number of
months that pass from the date of appearance of the root paper to the date of appearance of nodes at a given depth, grouped by
the maximum depth of the tree. (c) The average number of nodes in each depth, for the largest reachable set for each macro.
For instance take a paper with authors u, v and z that uses
macro m, and assume that u and v have used m before but
z is using it for the first time; then both the edges (u, z) and
(v, z) are in the graph.
Now, if all authors of a paper p are using m for the first
time, then the nodes corresponding to these authors will not
have any incoming edges. (Nodes of this form are the only
ones with no incoming edges.) For each such paper p, we
replace the nodes corresponding to the authors of p with a
single supernode corresponding to p. We will refer to this
as a source node, and to the authors of p as source authors.
The resulting graph, with supernodes for papers where no
author has used the macro before, and with author nodes
for all others, is the inheritance graph Gm for the macro m.
Because the process of inheritance, as defined, goes forward
in time, Gm is necessarily a directed acyclic graph (DAG).
Using these graphs we should be able to trace back a
macro's life to its inception and to the authors who first
used it. Note that there might be multiple source papers,
and hence several groups of co-authors who independently
serve as "origins" for the macro. For portions of the analysis
where we are interested in looking at the number of authors
who all follow from a single source paper, we will identify
the source paper that has directed paths to the largest num-
ber of nodes in the graph Gm. We will refer to this as the
seed paper, and to the set of authors of this paper as the seed
authors. (Note that the seed paper might not be the chrono-
logically earliest paper to use the macro m; it is simply the
one that can reach the most other nodes.)
Analyzing the inheritance graphs. Our dataset contains
several hundred thousand different macros, and as a first
step we analyze the properties of the graphs Gm that
they produce. In Figure 1 we take three sample macros
and show subsets of the breadth-first search (BFS) trees
that are obtained starting from the seed paper. For ex-
ample in Figure 1(a) the graph is created on the macro,
\hbox{$\rm\thinspace L {\odot}$} and the seed
node is the paper astroph/9405052 with authors Xavier Bar-
cons and Maria Teresa Ceballos. The seed paper used this
macro in 1994, and some of the nodes at depth 6 in the BFS
tree are from 2014-a 20-year time span to reach a depth
of 6 in the cascading adoption of the macro. This reinforces
the sense in which we are studying cascades that play out on
a multi-generational time scale of decades, rather than the
time scale of minutes or hours that characterizes many on-
line cascades. The seed node of Figure 1(b) is the paper hep-
th/0106008 with authors Selena Ng and Malcolm Perry, and
the seed node of Figure 1(c) is the paper hep-ph/9302234
with authors Jose R Lopez et al. Since all other nodes in
these BFS trees have incoming edges, they all correspond to
individual authors who enter the graph at their first adoption
of the macro, whereas the root node corresponds to a single
paper and to the contracted set of authors of this paper.
We now consider some of the basic properties of these in-
heritance graphs. First, each source paper has a reachable set
in Gm-the set of nodes it can reach by directed paths-and
recall that we defined the seed paper to be the source paper
with the largest reachable set. In Figure 2(a) we observe that
a non-trivial fraction of the macros have a seed paper whose
reachable set is a large fraction of all the authors who even-
tually adopt the macro. This provides a first concrete sense
in which the inheritance patterns contained in Gm represent
a global structure that spans much of the use of the macro
m.
In Figure 2(b) and 2(c) we show the properties of the
graphs and nodes grouped based on the maximum depth of
the BFS tree and the depth of the individual nodes. Figure
2(b) shows the average time it takes for the macro to get from
the root to the nodes in each depth grouped by the maxi-
mum depth of the tree. This figure shows how these cascades
can take multiple years to add a single level of depth to the
tree, and a decade or more to reach their eventual maximum
depth. In Figure 2(c) we show the median width (number of
nodes) of trees at each depth, again grouped by the maxi-
mum depth of the tree. Based on this plot we see that most
of these trees have are narrow in their top and bottom layers,
with fewer nodes, and are wider in the middle.
The plots thus far have been concerned with the global
structure of the inheritance graph and its shortest paths as
represented by breadth-first search trees. Now we take a
deeper look at the properties of individual edges in the
graph. For this we will first define the notions of local and
global experience, and we will use these two terms through-
out the paper. At time t the global experience of an author
is the number of papers the respective author has written. At
time t the local experience of an author is defined with re-
spect to a macro m and is the number of papers up to time t
in which the author has used m. This is a version of the no-
tion of local experience relative to an arbitrary term, as used
in [17].
Figure 3: The Cumulative Distribution Function of the
global experience difference between the source and desti-
nation of an edge.
Consider an edge (u, v) in the inheritance graph for a
macro m. At the moment when the macro is passed from
u to v, the local experience of v with respect to m is 0 by
definition, and the local experience of u with respect to m
is greater than 0. What do we expect about the global expe-
rience of these two nodes? To the extent that passing on a
macro is a form of "teaching" from one person to another,
we may expect the global experience of u (the "teacher")
to be higher than the global experience of v (the "learner").
On the other hand, there is a history of sociological work in
the diffusion of innovations suggesting that innovations of-
ten originate with outsiders who come from the periphery of
the system [7, 15, 18, 20], which would be consistent with v
having higher global experience than u. Figure 3 addresses
this question by showing the cumulative distribution of the
global experience difference between u and v. The median
experience difference is clearly shifted in the positive direc-
tion, consistent with the "teacher" node u having the higher
global experience in general.
Fitness
Now that we have some insight into how the information dif-
fusion process unfolds in our data, we investigate whether
these inheritance structures can provide predictive signal for
the outcomes of co-authorships, authors, and the macros
themselves. In all cases we will think in terms of the fitness
of the object in question-the extent to which it survives for
a long period of time and/or produces many descendants.
Fitness of collaborations
We start by considering the fitness of collaborations-given
two authors u and v who have written a certain number of
papers up to a given point in time, or perhaps who have
not yet collaborated, can we use anything in the structure
of macro inheritance to help predict how many more papers
they will write in the future?
A natural hypothesis is that if v inherits macros from u,
then this indicates a certain strength to the relationship (fol-
lowing the teacher-learner intuition above), and this may be
predictive of a longer future history of collaboration. To ex-
amine this hypothesis, we perform the following computa-
tional test as a controlled paired comparison. We find pairs
of co-authorships u-v and u(cid:48)-v(cid:48) with properties that (i) nei-
ther pair has collaborated before, (ii) their first co-authorship
happens in the same month, (iii) (u, v) is an edge in an in-
heritance graph, and (iv) (u(cid:48), v(cid:48)) is not. (Note that since we
are looking at pairs of co-authorships, we are looking at four
authors in total for each instance: u, v, u(cid:48), and v(cid:48).) Now we
can ask, aggregating over many such pairs of co-authorships,
whether there is a significant difference in the future number
of papers that these pairs of authors write together. (Since
their initial co-authorships took place in the same month,
they have a comparable future time span in which to write
further papers.)
In fact, we find that there isn't a significant difference,
at odds with our initial hypothesis about macro inheritance.
However, there is more going on in the inheritance struc-
ture that we can take advantage of. We divide the edges of
the inheritance graphs into two sets: internal edges (u, v),
where the node v has at least one outgoing edge, and ter-
minal edges (u, v), where the node v has no outgoing edge.
Internal edges add extra structural information, since they
indicate that not only u passed the macro m to v, but that v
was then part of the process of passing m in a collaboration
subsequent to the one in which they originally inherited it.
We find that the fitness of u-v co-authorships is signif-
icantly higher when (u, v) forms an internal edge, in con-
trast to the lack of effect when (u, v) is an arbitrary edge.
We evaluate this using an extension of our previous paired
comparison: in conditions (i)-(iv) above for forming pairs of
co-authorships, we replace conditions (iii) and (iv) with the
following:
• Internal edge vs. arbitrary co-authorship: (iii) (u, v) is an
• Internal edge vs. terminal edge: (iii) (u, v) is an internal
• Terminal edge vs. arbitrary co-authorship: (iii) (u, v) is a
internal edge and (iv) (u(cid:48), v(cid:48)) is not an edge.
edge and (iv) (u(cid:48), v(cid:48)) is a terminal edge.
terminal edge and (iv) (u(cid:48), v(cid:48)) is not an edge.
In each of these three settings, we look at the fraction of
times that one of the categories produced the co-authorship
with more future papers. In our paired setting, if we were to
draw two co-authorships uniformly at random over all pos-
sible co-authorships (without regard to the type of the edge),
ticular author a, we say they change the name of macro m
on paper p if the previous time they used m's macro body,
the name was different. Then, for a set of authors A and a set
of macros M, we define f (A, M, x) to be the probability of
an author in A changing the name of a macro in M the xth
time they use it. We consider this name-change probability,
f (A, M, x) for x ∈ [0, 40] and different groups of authors
and macros. In particular we look at groups of authors that
have more than θ papers in the entire corpus. We set θ to be
40, 50, . . . , 130 and we let M range over three possible sets:
the set of all macros; the set of wide-spread macros (more
than 250 authors use the macro body); and the set of narrow-
spread macros (at least 20 authors used it and at most 250).
One source of variability in this analysis is that even once
we fix the minimum number of papers θ written by an au-
thor a, as well as the usage number x of the macro m that we
are considering, it is still possible that author a's xth use of
the macro might come toward the end of their professional
lifetime or early in their professional lifetime. (It must come
at the xth paper they write or later, since they need time to
have used the macro m a total of x times, but this is all we
know.) It is easy to believe that authors who use a macro
in their early life stages might exhibit different phenomena
from those who use it in a later life stage. Therefore, in addi-
tion to the measures defined so far, we also consider analyses
involving only the set of macro uses that come early in the
authors' professional lifetime-specifically only macro uses
that happen in the author's first 40 papers.
The results for all these settings are shown in Figure 5: the
three sets of macros (all macros, wide-spread macros, and
narrow-spread macros); for each of these sets, we consider
both the authors' full lifetimes and just their early life stages.
In each case, the x-axis shows the number of macro uses (i.e.
the authors' local experience with respect to the macro), and
the different curves represent authors grouped by different
values of the minimum number of papers θ.
This suggests that overtime authors build a certain "loy-
alty" to the names they have used consistently; this is con-
sistent with our previous findings regarding the competition
between macro-naming conventions[16].
But we also find something else: that (eventually) more
prolific authors (larger θ) have a lower name-change prob-
ability (compare ordering of curves in each subplot of Fig-
ure 5. This suggests that the macro name change probabil-
ity might be a signal with predictive value for author fitness
(which, again, we define as the number of papers the author
will eventually write).
To test this idea, we set up an author fitness prediction
task as follows. For a given minimum number of papers θ
we consider the low-fitness authors to be the ones with fit-
ness below the 20th percentile and high-fitness authors to be
those above the 80th percentile. We then see whether simply
using the frequency with which an author changes macro
names in the first θ papers can serve as a predictor for this
two-class problem: whether an author's fitness is below the
20th percentile or above the 80th percentile.
By using the probability of macro name changes, we are
able to predict which of these two classes an author belongs
to with a performance that exceeds the random baseline of
Figure 4: Comparison of three different co-authorship set-
tings through different years in the data. The bars show the
win percentage of the first of the two listed categories; e.g.,
the red bar indicates the percentage of times co-authors with
internal edges end up writing more papers than the matched
co-authors with terminal edges. The horizontal red line indi-
cates the 50% baseline.
there is a 50% chance that the first would produce the higher
number of future papers. Thus, we can calibrate each of the
three comparisons listed above using this 50% baseline. Fig-
ure 4 shows these results, grouped into two-year bins: we
find that internal edges win a large fraction of the compar-
isons against each of the other two categories, whereas there
is little difference between terminal edges and arbitrary co-
authorships.
Fitness of authors
We now consider the fitness of the authors themselves; we
will show that the way authors use macros can provide a
weak but non-trivial signal about how many papers they will
eventually write, a quantity that we refer to as the fitness of
the author.
The particular property we consider is a type of "stabil-
ity" in the usage of the macro. For a given macro body,
there are many possible names that can be used for it, and
authors differ in the extent to which their papers preserve a
relatively stable choice of names for the same macro body:
some almost always use the same name, while for other au-
thors the name changes frequently. (For example, an author
who almost always uses the name \vbar for the macro
body $\overline{v}$, versus an author whose papers al-
ternate between using \vbar, \barv, \vb, \vbarsymb,
and others, all for this same macro body.) We could think
of the first type of author as exerting more control over the
source of her papers than the second type of author, and this
distinction between the two types of authors-based on their
behavior with respect to macros-naturally raises the ques-
tion whether the stability of macro names could provide pre-
dictive value for author fitness.
Here is how we formally define this measure. For a par-
(a)
(c)
(e)
(b)
(d)
(f)
Figure 5: Each panel shows the probability an author
changes the name of a macro on their xth use of it. A sin-
gle curve in each plot shows the set of all authors with at
least θ papers, for θ equal to 40, 50, . . . , 130. Each row of
panels corresponds to a different set of macros: the first row
shows results for the set of all macros; the second for the
set of narrow-spread macros; and the third for the set of
wide-spread macros (as defined in the text). The left col-
umn of panels shows the analysis for each of these three
sets over the authors' full professional lifetimes. The right
column of panels shows the analysis for each of these three
sets restricted to the authors' early life stages (first 40 pa-
pers only). Thus, the panels are (a) full lifetimes, all macros;
(b) early life stages, all macros; (c) full lifetimes, narrow-
spread macros; (d) early life stages, narrow-spread macros;
(e) full lifetimes, wide-spread macros; (f) early life stages,
wide-spread macros.
50% by a small but statistically significant amount. Figure
6 shows the performance for different values of θ. We em-
phasize that predicting an author's fitness is a challenging
task for which one doesn't expect strong performance even
from rich feature sets; this makes it all the more striking that
one can obtain non-trivial performance from the frequency
of macro name changes, a very low-level property about the
production of the papers themselves.
Moreover, for settings involving large values of θ the
name-change probability is more predictive than an arguably
more natural structural feature: the author's total number
Papers revealed (θ)
20'th Percentile
80'th Percentile
10
20
30
40
50
13
25
36
47
58
38
58
73
87
99
Table 1: Global experience thresholds used in defining the
author fitness classes for each number θ of papers revealed.
of co-authors (Figure 6). We also note that in such settings
the name-change feature also outperforms other more direct
macro-based features, such as the total number of macros
used, or total number of distinct macro bodies used.
Figure 6: The accuracy of predicting the number of publi-
cations of an author given her first few papers, θ. We com-
pare the performance of the name-change probability fea-
tures with the features based on number of co-authors.
Fitness of macros
Finally, we consider the fitness of the macros themselves.
We define the fitness of a macro to be the total number of
authors who eventually use the macro body, and investigate
which features are predictive of this variable.
We set up a prediction task as follows. We first find all
macros that get adopted by at least k authors. Each of these
macros has a fitness (of at least k), and we define σ(k) to be
the median of this multiset of fitness values: of all macros
that reach at least k authors, half of them have a fitness of at
most σ(k), and half of them have a fitness of at least σ(k).
In table 2 we report σ(k) and the number of macro instances
for different values of k.
We can thus use σ(k) to construct a balanced prediction
task, in the style of the cascade prediction analyses from [6].
For a given macro that reaches at least k authors, we observe
all the information on the papers and authors up to the point
at which the kth author adopts the macro, and the task is then
to predict if this macro will eventually reach σ(k) authors.
k
40
80
120
160
200
σ(k)
98
156
242
340
437
Instances
49,415
30,107
20,119
14,662
11,794
Table 2: Summary of the macro fitness prediction dataset:
For a macro that reaches at least k authors, the task is to
predict whether it will eventually reach σ(k) authors (the
median fitness of such macros).
We learn a logistic regression model for different values of
k and report the accuracy in Figure 7 on an 80-20 train-test
split.1
In Figure 7 we show the prediction performance for dif-
ferent subsets of these features, as a function of k; note
that performance increases with increasing k. As observed
above, predicting macro fitness is a problem whose syntac-
tic form is closely analogous to the prediction of cascade
size for memes in social media [6]; given this, and the fact
that the spread of macros plays out over so much longer
time scales, and without the role of ranking or recommenda-
tion algorithms, it is interesting to note the similarities and
contrasts in the prediction results. One of the most intrigu-
ing contrasts is in the role of diffusion speed features: for
cascade prediction in social media, the speed features alone
yielded performance almost matching that of the full fea-
ture set, and significantly outperforming the set of all non-
speed features[6]. For our domain, on the other hand, the
speed features perform 5-10% worse than the full feature set;
they also perform worse for most values of k than the set of
all non-speed features. This suggests that for macro fitness,
the speed features are considerably less powerful than they
are in the social media context, indicating that there may be
more to be gained from the synthesis of a much broader set
of features.
Conclusions
The spread of practices between collaborators is a challeng-
ing form of diffusion to track, since one needs to be able
to recognize when someone has begun using a practice, and
how it was conveyed to them. Motivated by work that used
the Feynman diagram as an easily recognizable "tracer" of
a complex practice [10], we track the spread of several hun-
dred thousand macros through the papers of the e-print arXiv
over a 25-year period. Long macros often serve as technical
shorthand within a defined sub-field, and their syntactic pre-
cision makes it easy to follow their flow through the collab-
oration network. We construct inheritance graphs showing
how the macro spread between collaborators, and we find
that many macros have a clear "seed set" of authors with
the property that a large fraction of the subsequent users of
the macro can trace a direct inheritance path back to this
seed set. The resulting diffusion patterns are intriguing, in
that they span multiple academic generations and several
decades, and unlike cascades in social media, the spread of
these macros takes place with very little influence from rank-
ing or recommendation algorithms.
We also find that properties of macro inheritance provide
signals that are predictive for larger-scale properties that
have nothing to do with macros. These include predictions
about the longevity of collaborations and the number of pa-
pers that an author will write over their professional lifetime
on the arXiv.
Our work suggests a number of directions for future re-
search. First, it would be interesting to develop a compara-
tive analysis between the structure of our inheritance graphs
and the corresponding structures for the diffusion of on-line
memes. Are there systematic ways in which the two types
of diffusion patterns differ, and can these be connected to
differences in the underlying mechanisms? Second, we be-
lieve that there may well be additional links between inheri-
tance structures and prediction problems for the trajectory of
Figure 7: The accuracy of predicting how widely a macro
spreads, using different subsets of features.
We use the following features.
• Features related to the diffusion speed of the macro: the
number of papers that the macro needs in order to reach k
2
and k distinct authors; and the number of months that the
macro needs in order to reach k
2 and k distinct authors.
• Experience of the macro users: the average usage experi-
ence of the first k authors who adopted it.
• Structural features of the macro users: the local and global
clustering coefficients of the co-authorship graph on the
first k authors to use the macro.
• Structural features of the macro body: the length of the
macro body, the number of dollar signs in the macro
(generally used for mathematical notation), the number of
non-alphanumerical characters, and the maximum depth
of nested curly brackets.
1We can achieve a 1% to 4% better accuracy by using a non-
linear classifier such as decision trees, but we opt to use the more
interpretable model.
[10] D. Kaiser. Physics and Feynmans diagrams. American
Scientist, 93:156–165, Mar-Apr 2005.
[11] J. Leskovec, L. Adamic, and B. Huberman. The dy-
namics of viral marketing. ACM Transactions on the
Web, 2007.
[12] J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-
tracking and the dynamics of the news cycle.
In
Proc. 15th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, 2009.
[13] J. Leskovec, M. McGlohon, C. Faloutsos, N. Glance,
and M. Hurst. Cascading behavior in large blog graphs.
In Proc. SIAM International Conference on Data Min-
ing, 2007.
[14] D. Liben-Nowell and J. Kleinberg. Tracing informa-
tion flow on a global scale using Internet chain-letter
data. Proc. Natl. Acad. Sci. USA, Mar. 2008.
[15] M. W. McLaughlin. The Rand change agent study re-
visited: Macro perspectives and micro realities. Edu-
cational Researcher, 19(9), 1990.
[16] R. Rotabi, C. Danescu-Niculescu-Mizil, and J. Klein-
berg. Competition and selection among conventions.
In Proc. 26th International World Wide Web Confer-
ence, 2017.
[17] R. Rotabi and J. Kleinberg. The status gradient of
In Proc. 10th International
trends in social media.
Conference on Weblogs and Social Media, pages 319–
328, 2016.
[18] G. Simmel. The Sociology of Georg Simmel. Free Press
(translated by Kurt H. Wolf), 1908.
[19] D. Strang and S. Soule. Diffusion in organizations and
social movements: From hybrid corn to poison pills.
Annual Review of Sociology, 24:265–290, 1998.
[20] T. Valente. Network interventions. Science, 337(49),
2012.
the overall system; for example, can we evaluate the future
course of larger sub-areas based on the inheritance patterns
that exhibit? And finally, identifying "tracers" for complex
practices is a style of analysis that can applied in other do-
mains as well; as we broaden the set of contexts in which we
can perform this type of analysis, we may better understand
the ways in which the flow of practices helps reinforce and
illuminate our understanding of large collaborative commu-
nities.
Acknowledgments We are grateful to Paul Ginsparg for
his valuable advice and for his help with the arXiv dataset.
We would like to thank Peter Lepage for introducing us to
David Kaiser's analysis of the diffusion of Feynman dia-
grams, which formed the basis for our thinking about the
approach in this paper. This work was supported in part by
ARO, Facebook, Google, the Simons Foundation, and a Dis-
covery and Innovation Research Seed Award from Cornell's
OVPR.
References
[1] L. A. Adamic, T. M. Lento, and A. T. Fiore. How you
met me. In Proc. 6th International Conference on We-
blogs and Social Media, 2012.
[2] E. Adar, L. Zhang, L. A. Adamic, and R. M. Lukose.
Implicit structure and the dynamics of blogspace. In
Workshop on the Weblogging Ecosystem, 2004.
[3] A. Anderson, D. P. Huttenlocher, J. M. Kleinberg,
J. Leskovec, and M. Tiwari. Global diffusion via cas-
cading invitations: Structure, growth, and homophily.
In Proc. 24th International World Wide Web Confer-
ence, pages 66–76, 2015.
[4] L. Backstrom, D. Huttenlocher, J. Kleinberg, and
X. Lan. Group formation in large social networks:
In Proc. 12th
Membership, growth, and evolution.
ACM SIGKDD International Conference on Knowl-
edge Discovery and Data Mining, 2006.
[5] N. Barbieri, F. Bonchi, and G. Manco. Topic-aware
social influence propagation models. Knowledge and
information systems, 37(3):555–584, 2013.
[6] J. Cheng, L. A. Adamic, P. A. Dow, J. M. Kleinberg,
and J. Leskovec. Can cascades be predicted? In Proc.
23rd International World Wide Web Conference, pages
925–936, 2014.
[7] C. Danescu-Niculescu-Mizil, R. West, D. Jurafsky,
J. Leskovec, and C. Potts. No country for old members:
User lifecycle and linguistic change in online commu-
In Proc. 22nd International World Wide Web
nities.
Conference, 2013.
[8] S. Goel, A. Anderson, J. M. Hofman, and D. J. Watts.
The structural virality of online diffusion. Management
Science, 62(1):180–196, 2016.
[9] D. Gruhl, R. V. Guha, D. Liben-Nowell, and
A. Tomkins. Information diffusion through blogspace.
In Proc. 13th International World Wide Web Confer-
ence, 2004.
|
1503.00477 | 1 | 1503 | 2015-03-02T10:40:12 | Behavioral Aspects of Social Network Analysis | [
"cs.SI",
"cs.CY"
] | Contrary to the structural aspect of conventional social network analysis, a new method in behavioral analysis is proposed. We define behavioral measures including self-loops and multiple links and illustrate the behavioral analysis with the networks of Wikipedia editing. Behavioral social network analysis provides an explanation of human behavior that may be further extended to the explanation of culture through social phenomena. | cs.SI | cs | PROCEEDINGS COINs15
BEHAVIORAL ASPECTS OF SOCIAL NETWORK ANALYSIS
Sung Joo Park1*, Jong Woo Kim2, Hong Joo Lee3, Hyun Jung Park4,
Peter Gloor5
1KAIST Business School, 2School of Business, Hanyang University, 3Department of Business Administration, The
Catholic University of Korea, 4Department of Business Administration, Ewha Woman’s University, Korea
4MIT Center for Collective Intelligence, U.S.A.
*Corresponding Author: [email protected]
ABSTRACT
Contrary to the structural aspect of conventional
social network analysis, a new method in behavioral
analysis is proposed. We define behavioral measures
including self-loops and multiple links and illustrate
the networks of
the behavioral analysis with
Wikipedia editing. Behavioral
social network
analysis provides an explanation of human behavior
that may be further extended to the explanation of
culture through social phenomena.
INTRODUCTION
Although social network analysis methods have
been progressing remarkably in the last decade, there
are methodological issues still remaining to be solved,
including the analysis of reflexive and multiple
relations. In conventional social network analysis, the
main focus has been on the structural aspect of
networks1, while the reflexive feature of self-loops
(dialog with the self) and multiple dyadic relations
(extended dialog with alters) are largely ignored.
Self-loops and multiple links can be observed,
however, by monitoring networks of naturally
emerging human behavior such as the networks in
Wikipedia editing. Taking the English Wikipedia as
an example, we found that the number of self-loops is
more than half of the total edits and the number of
multiple dyadic edits is more than 14% of the total
edits. Hence, network analysis excluding this big
portion of data will grossly distort the editing
behavior of Wikipedians, easily amounting to up to
80% of the total interaction.
BEHAVIORAL NETWORK ANALYSIS
In this study, we focus on the behavioral aspects
of social network analysis that may provide insights
into the activities of actors in the network. The
behavioral networks are prevalent in precedence
relationships such as teamwork, group discussion,
decision making, blogs, Wikipedia, and even team
links. Likewise,
sports such as soccer for example. In teamwork, the
repeated work of a person consists of self-loops, and
repeated dyadic collaboration between two persons
illustrates multiple
in group
discussion, repeated talk of a single person is an
example of self-loops and repeated
interaction
between two persons is a multiple link. In the case of
soccer, repeated dribbling by a player corresponds to
self-loops and repeatedly passing the ball between
two players corresponds
links. In
collaborative editing of Wikipedia, we observe many
self-loop and multiple link edits. Because of the data
availability and reliability, the Wikipedia editing
network is chosen to illustrate the behavioral analysis
in this study.
to multiple
For the behavioral analysis of the network, we
defined measures to extract the behavioral pattern of
actors including self-loop ratio, multiple-link ratio,
speed, active ratio, anonymity ratio, Gini coefficient
and Pareto ratio, as given in Table 1. Since most of
the networks emerging in a natural context follow the
power law with the scale-free property, ordinary
scale measures are meaningless. As an illustration,
the speed of editing is not measured by the ordinary
measure of average editing intervals but by the ratio
of the number of edits in a certain time frame.
Behavioral Measures
A self-loop is a circling reflexive link, which, in
Wikipedia’s case, is repeated circular editing by a
single person before anyone else edits; the self-loop
ratio is defined as the ratio of the number of self-
loops to the total number of links. The reasons for
self-loop editing may be multi-faceted; some people
may do it without deliberate thinking before posting
an idea, some may prefer to just post fast small
increments, while some may find the article too
interesting to pause for refinement. Overall, the act of
self-loop editing may reflect the behavioral pattern of
outgoingness,
imprecision. The
multiple-link ratio is the ratio of the number of
repeated link pairs between the nodes to the total
number of links, which implies dyadic collaboration.
impatience and
DISCUSSION
is
the
least collective or
The most collective country is Korea then China, and
Japan
the most
individualistic. Korea is the most extraverted then
China, and Japan. Again, Korea is the boldest then
China, and Japan. Japan showed the least bold or
highly deliberate. Japan exhibited
the highest
egalitarianism, and Korea and China showed the low
egalitarianism.
Behavioral network analysis can be a powerful tool
for the analysis of human behavior related to
performance. For teamwork as an example, structural
aspects of degree, density and centrality may not be
sufficient to explain the success or failure of a team
but the behavior of team members involving traits
such as patience, collaboration, speed, active
participation, openness and equality may be a better
indicator to explain the performance of a team.
REFERENCES
S. P. Borgatti, A. Mehra, D. J. Brass and G. Labianca,
Network Analysis in the Social Sciences, Science 323
892 (2009).
S. Wasserman and K. Faust, Social Network Analysis:
Methods and Applications (Cambridge University
Press, 1994).
A. L. Barabasi, Linked: The New Science of
Networks (Perseus Books Group, 2002).
G. Hopfstede and R. R. McRae, Personality and
Culture Revisited: Linking Traits and Dimensions of
Culture, Cross-Cultural Research 38:1 52 (2004).
Acknowledgements: Supported by a Korea Research
Foundation Grant, funded by the Korean Government
(MEST)(KRF-2008-220-B00007).
As explained previously, speed is defined as the ratio
of the number of edits in a certain time interval, e.g.
one hour, to the total number of edits, which may
express the behavior of quickness. The active ratio is
defined as the ratio of the number of editors with
more than a certain number of edits, e.g. 10, to the
total number of editors, which may represent the
behavior of active participation or voluntary
contribution. The anonymity ratio is the ratio of the
number of anonymous editors without registration to
the total number of editors, which may express the
behavior of self-concealment and closedness. The
Gini coefficient is a measure of the inequality of a
distribution of the number of edits among the editors.
CULTURAL INTERPRETATIONS
Using the newly defined behavioral measures, we
analyzed the behaviors of Wikipedia editors. For the
analysis, we collected editing data of Wikipedia in 3
languages; Japanese, Chinese and Korean.
In order to further explore online culture, cultural
dimensions are explored and postulated
from
behavioral patterns which are extracted by combining
the structural and behavioral measures. Also,
grouping is performed on the cultural dimensions
based on Ward’s minimum-variance cluster analysis,
a hierarchical cluster analysis to show the proximity,
and
the
maximum width indicates the optimal number of
clusters.
the Silhouette width criterion where
studies,
explored
Considering the diverse cultural dimensions from the
the online cultural
previous culture
dimensions
are
and postulated by
combining structural and behavioral measures as
follows; collectivism vs. individualism, extraversion
vs.
introversion, boldness vs. deliberation, and
egalitarianism vs. inegalitarianism. Collectivism is
explored by a structural measure of the clustering
coefficient complemented by
the collaborative
behavior observed by the multiple link ratio, i.e.
dyadic collaboration. Extraversion is assumed to be
manifested by the combination of outgoing and
revealing behavior, i.e. as represented by the self-
loop ratio and (opposite) anonymity ratio. Boldness
may be partially related with extraversion and is
postulated from outgoing and fastness behavior, i.e.
as represented by the combined the self-loop ratio
and speed. Egalitarianism
to be
manifested by the combination of equal and non-
concentrated
as
represented by the Gini coefficient and the Pareto
ratio.
is assumed
i.e.
contribution
behavior,
|
1803.10738 | 1 | 1803 | 2018-03-28T17:23:37 | Self-Representation on Twitter Using Emoji Skin Color Modifiers | [
"cs.SI"
] | Since 2015, it has been possible to modify certain emoji with a skin tone. The five different skin tones were introduced with the aim of representing more human diversity, but some commentators feared they might be used as a way to negatively represent other users/groups. This paper presents a quantitative analysis of the use of skin tone modifiers on emoji on Twitter, showing that users with darker-skinned profile photos employ them more often than users with lighter-skinned profile photos, and the vast majority of skin tone usage matches the color of a user's profile photo - i.e., tones represent the self, rather than the other. In the few cases where users do use opposite-toned emoji, we find no evidence of negative racial sentiment. Thus, the introduction of skin tones seems to have met the goal of better representing human diversity. | cs.SI | cs | Self-Representation on Twitter Using Emoji Skin Color Modifiers
Alexander Robertson, Walid Magdy, Sharon Goldwater
Institute for Language, Computation and Cognition
School of Informatics, University of Edinburgh
[email protected], {wmagdy, sgwater}@inf.ed.ac.uk
8
1
0
2
r
a
M
8
2
]
I
S
.
s
c
[
1
v
8
3
7
0
1
.
3
0
8
1
:
v
i
X
r
a
Abstract
Since 2015, it has been possible to modify certain emoji with
a skin tone. The five different skin tones were introduced
with the aim of representing more human diversity, but some
commentators feared they might be used as a way to negatively
represent other users/groups. This paper presents a quantitative
analysis of the use of skin tone modifiers on emoji on Twitter,
showing that users with darker-skinned profile photos employ
them more often than users with lighter-skinned profile photos,
and the vast majority of skin tone usage matches the color of a
user's profile photo-i.e., tones represent the self, rather than
the other. In the few cases where users do use opposite-toned
emoji, we find no evidence of negative racial sentiment. Thus,
the introduction of skin tones seems to have met the goal of
better representing human diversity.
Introduction
Emoji-icons used to represent emotions, ideas, or objects-
became a formally recognized component of the Unicode
Standard in 2010. At that time, all emoji depicting humans
were rendered with the same yellow skin tone. However, in
2015, special modifier codes were introduced to allow users
to change the skin tone of certain emoji. Unicode Technical
Standard #51 (Davis and Edberg 2014), justified this on the
grounds that "people all over the world want to have emoji
that reflect more human diversity." Nevertheless, the change
was not uncontroversial. Although skin tone modifiers can be
used to make emoji more personal to reflect the identity of
the user, in principle they can also be used to represent oth-
ers. This possibility sparked fears in the mainstream media
that users might engage in "digital blackface", negatively us-
ing dark emoji for entertainment purposes (Princewill 2017;
Dickey 2017)-if people would even use them at all (Zim-
merman 2015). But despite this media and popular attention,
and considerable academic investigation of emoji in general,
we are not aware of any quantitative studies of how people
actually use skin tone modifiers.
In this paper, we present an analysis of how skin tone mod-
ifiers are used in emoji on Twitter. In a sample of 0.6 billion
tweets, we find that 42% of the 13 million tone-modifiable
emoji (TME) tweeted in 2017 included skin tone modifiers
(henceforth, we refer to these modified TME as TME+, in
contrast to unmodified TME-) and the majority of these
Figure 1: The current 102 tone-modifiable emoji. The first
five rows are modified by a skin tone (shown in the left-most
column), and the final row contains unmodified emoji.
TME+ were light colors. By annotating the profile photos
of 4,099 users and analyzing their tweet histories, we show
that the overall prevalence of lighter skin tone modifiers is
likely due to the prevalence of lighter-skinned users. Indeed,
users with darker-skinned profile photos are more likely to
use TME, and more likely to modify them. Moreover, the
vast majority of TME+ are similar in tone to the user's profile
photo, suggesting that TME+ are used overwhelmingly for
self-representation. Finally, we analyze the sentiment of the
small proportion of tweets containing opposite-toned emoji,
and find that positive tweets outweigh negative. Overall, our
findings suggest that the Unicode Consortium has success-
fully met a real demand for diversity within emoji, with few
negative consequences.
Emoji and Skin Tones
Recent years have seen significant academic interest in emoji.
Studies show that emotional interpretation of some emoji
is subject to ambiguity (Miller et al. 2017), that addition
of emoji to messages (particularly neutral ones) can convey
positive/negative tone and sentiment (Hu et al. 2017), and
that popularity differences between emoji may be due to
their relation to popular words (Ai et al. 2017). Resources
commonly available for traditional language such as sense
inventories have been compiled (Wijeratne et al. 2017) and
emoji usage has been linked to personality traits (Marengo,
Giannotta, and Settanni 2017). But despite three years since
their introduction, TME have been unstudied until now.
Not all emoji can have a skin tone. The traditional emoji
Figure 2: Proportion of TME+ using each skin tone, by geographic region.
faces (e.g.
) cannot be modified. The current Unicode Stan-
dard defines 102 TME, some of which can be combined to
create compound emoji (e.g.
) which can also be modified
for skin color. Five skin tones, based on the six tones of the
Fitzpatrick phototyping scale (Fitzpatrick 1988), are avail-
able. We will refer to the five-scale tones as T1 (the lightest)
to T5 (the darkest). Figure 1 illustrates the 102 available
TME, showing how the tones affect them.
Emoji are rendered differently across platforms, which
can cause ambiguity in semantic interpretation-e.g., writ-
ers/readers may perceive the expressed action or emotion
differently (Miller et al. 2017). Since we are only concerned
with skin color, we do not expect these ambiguities to be an
issue in our study. However, there is slight variation in the
rendering of specific skin tones across platforms. We there-
fore cannot be sure of the precise tonal values observed by a
user, although all platforms have exactly 5-scale tones, where
T1 is lighter than T2, T2 lighter than T3, and so forth.
Skin Tone Usage, Overall and By Region
For our initial analysis we used the Twitter API (1% sample)
to create Dataset A, from 1.04 billion tweets made between
February and December 2017. This dataset contains 595m
original (non-retweet) tweets made by 769m unique users.
Of these, 83.3m (14%) contain at least one emoji and 13.1m
(2.2%) contain at least one TME. 5.5m (42%) of TME were
TME+. Lighter tones dominate: T1 and T2 account for 68%
of all TME+.
To gain a global view of TME usage by location, we used
the Google Maps API to validate the location field of the
authors of the 5.5m TME+ tweets 1. We located 169k users,
then grouped them on the basis of broad geographic region
(figure 2). Most regions follow the overall trend of using far
more light tones. The exception is North America, where the
distribution of tones is more uniform-though T5 still has
relatively little usage, and is the least common tone world-
wide. This raises the question of why lighter TME+ are used
so much more than darker ones in all regions outside North
America. These results would seem to contradict the hypoth-
esis that TME+ are used for self-representation, since we
might naıvely expect more dark-skinned users in Africa and
Asia, whereas the TME+ being used are mainly light. How-
1Though this field is not necessarily reliable (users may travel
or give a false location), our aim was to get a broad overview before
the main analysis.
ever, many countries (particularly in Africa) have lower levels
of internet access compared to highly developed countries
(such as those in North America)2, and access to the inter-
net or modern devices can be even more limited for some
ethnic groups due to political oppression (Weidmann et al.
2016) or poverty. So, it could simply be that in most regions,
lighter-skinned internet users predominate.
Another possible hypothesis for North America's more
uniform TME+ distribution (although the demographics do
not have similar distributions) is that people use TME+ to
refer to both others and themselves. We investigate this hy-
pothesis in the next section, looking more closely at TME
usage on Twitter by comparing users' actual skin tone to that
seen in their TME+.
Skin Tone Modifiers for Self-Identification
Since our goal is to better understand how TME relate to
user identity, we randomly selected 10k users from Dataset
A, subject to the condition that they had used at least one
TME. Although we cannot perfectly determine the skin color
of these users, we estimate it from their profile photos. We
assume that photos of a single individual are self-portraits of
the user. This might not be true in all cases, since users can
use photos of others. We assume this practice is rare, with
a negligible effect on our analysis. However, our annotation
process was designed with this possibility in mind.
We collected the Twitter profile pictures of the selected
10k users. These pictures were then annotated using Crowd-
flower3. We instructed annotators to label as "invalid" images
that might not represent the Twitter user. "Invalid" images
include: non-human (e.g. animals, nature), celebrities, group
photos, gray-scale images. Instructions were given before-
hand, with examples of valid/invalid photos provided. If a
picture was annotated as "valid", annotators compared it to
an array of five TME+, as shown in Figure 3. We selected the
example emoji for its overall lack of distracting features (e.g.
little hair covering the face) and consistent appearance (all
versions have the same hair/eye color).
Each photo was annotated by at least three annotators.
A set of 50 pre-annotated pictures was used to control the
quality of the annotators. Only workers achieving over 90%
accuracy on the screening pictures were accepted.
2World Bank, World Telecommunication Report, http://
data.worldbank.org/indicator/IT.NET.BBND.P2
3www.crowdflower.com
TotalAfricaAsiaEuropeN.AmericaS.America0.00.10.20.30.40.50.6Proportionn = 168,869n = 8334n = 41,059n = 33,975n = 41,684n = 43,817Figure 3: Example of Crowdflower annotation task.
After the annotation process, we retained only those pic-
tures annotated as valid where at least two annotators agreed
on the same skin tone. The result was 4,099 annotated pic-
tures. The inter-annotator agreements for these pictures were
98% for validity, 88% for user skin tone.
Figure 4: Number of users (y-axis, log scale) who use TME+
a given proportion (x-axis) of the time.
TME Usage Analysis
We collected the historical tweets of the 4,099 annotated
users using the Twitter API, to create Dataset B. This contains
the tweets of these users from January 2018 back to April
2015-the time when TME were enabled. 5.86m original
(non-retweet) tweets were collected in total. 2.46m tweets
contained emoji, of which 479k contained TME.
Before looking at the relationship between a user's skin
tone and their use of TME, we first examined the overall
usage of TME by user. The histogram in Figure 4 shows that,
of the Dataset B users, roughly a quarter only ever use TME-,
with about the same proportion always using TME+. The
remaining users tend towards one end or the other.
Next, we looked at how TME+ usage varies across users
according to their annotated skin color. Figure 5 shows the
proportion of users in each of the five skin color groups who
tweeted at least one TME+. A clear trend is visible, where
users with darker skin are more likely to use TME+ than those
with lighter skin. In fact, 80+% of users with skin tone 4 and
5 use TME+ in their tweets, which shows the importance of
this feature to them.
However, not all TME are TME+. Thus, we examined
users who use TME and computed the proportion of those
tweets which are TME+. Figure 6 shows the percentage of
TME+ vs TME- for each user group. Again, the same trend
appears: darker skinned users tend to modify the skin tone
of TME in their tweets much more than users with lighter
skin. For instance, 82% of TME tweets by users with T4 skin
change the skin tone of the emoji compared to only 52% of
the white (T1 skin) users. This emphasizes how users with
darker skin are keen to modify the appearance of their emoji,
presumably in order to better reflect their own identity.
TME+ for Self-Reference vs Referencing Others
Finally, we looked at whether users' choice of modifiers
reflects their own skin color or others. For each tone user,
we determined the TME+ tone used most often by that user.
Figure 7 shows a heatmap of the distribution of the most com-
mon skin tones used by each user group in Dataset B. Overall,
our results suggest that by far the most common scenario is
Figure 5: Percentage of users in each skin tone group (1=light-
est, 5=darkest) who used TME+ at least once. Black line
(right-hand axis): number of users per group.
Figure 6: Percentage of tweets with TME+ made by users in
each skin tone group, out of all tweets with TME. Black line
(right-hand axis): number of tweets per group.
for users to choose skin tone modifiers that roughly match
their own complexion, accounting for the variability in ren-
dering of these tones across different platforms. There seems
to be some tendency for users to choose modifiers towards
the lighter end of the available spectrum; for example, users
with skin tone 2 mostly select skin tone 1 in their emoji, and
users of skin tone 5 mostly select skin tone 4 in their emoji.
The (Non)-Prevalence of Digital Blackface
The previous analysis shows that for nearly all users, their
most common choice of skin tone matches their own skin.
However, it still may be the case that users occasionally
choose emoji of a different tone. We looked at how often
this occurs, and whether there is any noticeable negative
sentiment associated with this behavior. For this analysis,
we aggregated Dataset B users into two groups based on
skin tone: tones 4/5 (dark) and tones 1/2 (light). First, we
analysed the tweets of each group that use TME+ with the
skin tone of the other group. These comprise 1229 tweets for
the dark-skinned users and 1,729 tweets for the light-skinned
05001,0001,5002,0002,5000%20%40%60%80%100%12345% users used applied TME+ for each user groupUsed TME+Never used TME+Users population050,000100,000150,000200,000250,0000%20%40%60%80%100%12345% tweets with TME+ among all tweets with TME% TME+% TME-Tweets volumepicture is one where users take advantage of emoji skin tone
modifiers to represent an important aspect of their identity,
and do so differentially depending on their own skin tone:
compared to light-skinned users (the majority on Twitter), a
higher proportion of dark-skinned users use skin tone modi-
fiers, and they use them more frequently. Here we grouped all
geographic regions together in looking at user skin tone, but
an interesting question for future work will be to examine the
relationship between a user's majority/minority status within
their real-life community (i.e., their geographic region) and
their use of skin tone modifiers.
Acknowledgements
This work was supported in part by the EPSRC Centre for
Doctoral Training in Data Science, funded by the UK En-
gineering and Physical Sciences Research Council (grant
EP/L016427/1) and the University of Edinburgh.
References
[Ai et al. 2017] Ai, W.; Lu, X.; Liu, X.; Wang, N.; Huang, G.;
and Mei, Q. 2017. Untangling emoji popularity through
semantic embeddings. AAAI press.
[Davis and Edberg 2014] Davis, M., and Edberg, P. 2014.
Proposed Draft Unicode Technical Report: Unicode Emoji.
Technical Report 51, Unicode Consortium.
[Dickey 2017] Dickey, M. 2017. Thoughts on white people
using dark-skinned emoji. TechCrunch.
[Fitzpatrick 1988] Fitzpatrick, T. 1988. The validity and
practicality of sun-reactive skin types I through VI. Archives
of Dermatology 124(6):869–871.
[Hu et al. 2017] Hu, T.; Guo, H.; Sun, H.; Nguyen, T. T.; and
Luo, J. 2017. Spice up your chat: The intentions and senti-
ment effects of using emoji. CoRR abs/1703.02860.
[Marengo, Giannotta, and Settanni 2017] Marengo, D.; Gian-
notta, F.; and Settanni, M. 2017. Assessing personality using
emoji: An exploratory study. Personality and Individual
Differences 112:74 – 78.
[Miller et al. 2017] Miller, H.; Kluver, D.; Thebault-Spieker,
J.; Terveen, L.; and Hecht, B. 2017. Understanding emoji
ambiguity in context: The role of text in emoji-related mis-
communication. AAAI Press. 152–161.
[Princewill 2017] Princewill, V. 2017. Is it OK to use black
emojis and gifs? BBC News.
[Thelwall, Buckley, and Paltoglou 2012] Thelwall, M.; Buck-
ley, K.; and Paltoglou, G. 2012. Sentiment strength detection
for the social web. Journal of the Association for Information
Science and Technology 63(1):163–173.
[Weidmann et al. 2016] Weidmann, N. B.; Benitez-Baleato,
S.; Hunziker, P.; Glatz, E.; and Dimitropoulos, X. 2016. Dig-
ital discrimination: Political bias in internet service provision
across ethnic groups. Science 353(6304):1151–1155.
[Wijeratne et al. 2017] Wijeratne, S.; Balasuriya, L.; Sheth,
A. P.; and Doran, D. 2017. EmojiNet: An open service and
API for emoji sense discovery. In ICWSM, 437–447.
Figure 7: Most common emoji skin tone used vs perceived
user skin tone, normalized by row sum.
Figure 8: Distribution of non-neutral sentiment for English
tweets containing lighter/darker TME+ but written by users
having darker/lighter skin.
users-a very small proportion of each group's tweets: 0.14%
(light group) and 0.24% (dark group). Next, we examined the
opposite-tone tweets in English and computed their sentiment
using Sentistrength (Thelwall, Buckley, and Paltoglou 2012),
which is designed specifically for analyzing short online
messages such as Twitter posts. The majority of these tweets
were neutral (almost 50% of the tweets of both groups). The
distribution of the non-neutral sentiment of tweets for both
groups are shown in Figure 8, where 4 is the most positive
and -4 is the most negative4. As shown, the distributions
for both groups are almost the same, and positive tweets
outnumber negative ones. Inspection of tweets with negative
sentiment revealed tweets on generally negative topics, rather
than anything specifically about race. Overall, we find no
evidence to justify fears of widespread "digital blackface" or
its black-against-white counterpart.
Conclusion
In this paper we presented the first quantitative study on
the usage of tone-modifiable emoji (TME) on Twitter. We
showed that although lighter-toned emoji are more common
overall, different populations of users (based on the skin color
of their profile picture) show markedly different character-
istics in how they use TME and to what extent. The overall
4Sentiment was rated on a -5:+5 scale but no tweets at the ex-
tremes of this range were found in this subset of the data.
1234510.60.30.080.010.0071234520.50.20.20.030.008123453Skin tone of user0.20.10.50.20.021234540.030.010.30.60.0412345Emoji tone most often used50.030.0090.20.70.1-4.0-3.0-2.0-1.01.02.03.04.0Sentiment of tweet0.00.20.40.6Proportion1/2 using 4/54/5 using 1/2[Zimmerman 2015] Zimmerman, J. 2015. Racially diverse
emoji are a nice idea. But will anyone use them? The
Guardian.
|
1811.12157 | 1 | 1811 | 2018-09-26T13:43:01 | Universal Network Representation for Heterogeneous Information Networks | [
"cs.SI",
"cs.AI",
"cs.CL"
] | Network representation aims to represent the nodes in a network as continuous and compact vectors, and has attracted much attention in recent years due to its ability to capture complex structure relationships inside networks. However, existing network representation methods are commonly designed for homogeneous information networks where all the nodes (entities) of a network are of the same type, e.g., papers in a citation network. In this paper, we propose a universal network representation approach (UNRA), that represents different types of nodes in heterogeneous information networks in a continuous and common vector space. The UNRA is built on our latest mutually updated neural language module, which simultaneously captures inter-relationship among homogeneous nodes and node-content correlation. Relationships between different types of nodes are also assembled and learned in a unified framework. Experiments validate that the UNRA achieves outstanding performance, compared to six other state-of-the-art algorithms, in node representation, node classification, and network visualization. In node classification, the UNRA achieves a 3\% to 132\% performance improvement in terms of accuracy. | cs.SI | cs | Universal Network Representation for
Heterogeneous Information Networks
Ruiqi Hu†, Celina Ping Yu∗, Sai-Fu Fung(cid:63), Shirui Pan†, Haishuai Wang†, Guodong Long†
† CAI, Faculty of Engineering & Info. Tech., University of Technology Sydney, Australia
∗ Global Business College of Australia, Australia
{ruiqi.hu, haishuai.wang@student., shirui.pan, guodong.long}@uts.edu.au; [email protected]; [email protected]
(cid:63) City University of Hong Kong, China
8
1
0
2
p
e
S
6
2
]
I
S
.
s
c
[
1
v
7
5
1
2
1
.
1
1
8
1
:
v
i
X
r
a
Abstract -- Network representation aims to represent the nodes
in a network as continuous and compact vectors, and has
attracted much attention in recent years due to its ability to
capture complex structure relationships inside networks. How-
ever, existing network representation methods are commonly
designed for homogeneous information networks where all the
nodes (entities) of a network are of the same type, e.g., papers in
a citation network. In this paper, we propose a universal network
representation approach (UNRA), that represents different types
of nodes in heterogeneous information networks in a continuous
and common vector space. The UNRA is built on our latest
mutually updated neural language module, which simultaneously
captures inter-relationship among homogeneous nodes and node-
content correlation. Relationships between different types of
nodes are also assembled and learned in a unified framework.
Experiments validate that the UNRA achieves outstanding perfor-
mance, compared to six other state-of-the-art algorithms, in node
representation, node classification, and network visualization.
In node classification,
the UNRA achieves a 3% to 132%
performance improvement in terms of accuracy.
I. INTRODUCTION
Information networks are ubiquitous in many areas, like
medicine (protein-protein and neural networks) [10], [20],
[29], social media (social network) [8], [24], [28] and aca-
demic engines (paper citation and author connection net-
works) [14], [19] and have a variety of applications, such
as identifying protein residues [1], social media marketing
[23], academic search engines and etc. To implement these
applications, network representation of homogeneous informa-
tion networks has been widely researched and employed. This
research, aims to embed and represent homogeneous nodes
with low-dimensional and unified vectors, while preserving
the contextual information between nodes, and, as a result,
classical machine learning methods can be directly applied.
However, the majority of real world information networks
are heterogeneous and multi-relational, with many examples in
same areas mentioned above, such as DNA-protein interaction
networks [15] in medicine or complete publication networks
[9], [25], [27] in academic engines. The sources of nodes
in these information networks vary but are interrelated. For
instance, one example of a DNA-protein interaction network
consists of two sources of nodes, DNA and proteins, and each
source of homogeneous nodes is profiled by an independent
network structure based on their inner reactions, say, a DNA
network structure and a protein network structure. Further-
more, the interactions between the heterogeneous nodes (DNA
and protein) provide a more comprehensive, but complex,
multi-relational heterogeneous network, with different sources
of nodes, network structures and node contents. Publication
networks have the same characteristics: two different sources
of nodes (papers and authors) with two independent network
expressions (paper citation networks and author collaboration
networks) respectively according to their inner-reactions, while
papers and authors are naturally connected by a heterogeneous
network because of their inherent publication correlations.
The obvious variety and complexity of multi-relational
heterogeneous information networks (MHIN) limit existing
network representation methods in two ways: (1) They can
only leverage one perspective of data - either the network
structure or the node content - which simply abandons the
integrity of the network. (2) The final learned representation
can only represent one of the sources of information - either
the DNA or the protein in DNA-protein interaction networks;
or the papers or the authors in publication networks. Most
previous efforts have concentrated on persevering either the
network structure or the node content. Network structure
analysis-based methods are the more prevalent. Two very
popular neural network language models were proposed in
[12], [16], where deep learning techniques revealed advantages
in natural language processing applications. Illuminated by
that, a DeepWalk algorithm was proposed in [2] that learns
latent representations of vertices from a corpus of generated
random walks in network data. These algorithms only input
network structures, without considering any content informa-
tion affiliated with each node.
Early content-based algorithms employ approaches like,
topic model and bag-of-words, to encode each content docu-
ment into a vector without considering contextual information
(i.e.,
the order of documents or the order of words), or
sub-optimizing the representations. To acquire the contextual
information, features are modeled using context-preserving
algorithms [4] -- [6], [16], [22] with a certain amount of con-
secutive words to represent a document. Obviously, an ex-
ponentially increasing number of content features for these
algorithms will dramatically increase the training time and
weaken performance.
Within neural network architectures, alternative algorithms
like skip-gram [16] input a certain window of consecutive
Fig. 1. An illustrated example of a heterogeneous publication network. The network consists of three different sources of nodes(authors, papers and venues)
with two independent network expressions(a paper citation network and an author collaboration network) according to their inner-reactions. Papers, authors and
venues are naturally connected within a heterogeneous network because of their inherent publication correlations. We also leverage the content information of
the nodes (the title and abstracts of the papers).The network representation is learned from the complete heterogeneous publication network and it simultaneously
represents all the sources of the nodes. We then input an author into the network representation, which returns several authors, papers and venues that are
most related to the given author. Any source of node can be input to return content from any node source.
words in the sentences of a document to learn the repre-
sentation of words. Recurrent neural network-based models,
say, long short term memory(LSTM) [7] and gated recurrent
unit(GRU) [11] are able to capture long term dependencies
using internal memory to process arbitrary sequences of text
input.
Whether network structure exploration approaches or text
analysis based ones with three obvious drawbacks identified
in the mentioned algorithms: (1) only one source of the en-
tire networked information has been leveraged, which lowers
representation accuracy; (2) learned representations from these
algorithms can only represent one type of network data (i.e.,
representations from a citation network only represent papers,
but ignore authors and venues); and (3) the algorithms are
unsupervised. No labeled data are even available to use, which
misses the opportunity to enhance performance in tasks like
classification.
Recently, some methods have attempted to simultaneously
consider network structures and node content
information.
TADW [30] proves that DeepWalk [2] can be processed by
factorizing an approximate probability matrix where one node
randomly walks to another in certain steps, and incorporates
with feature vectors by factorizing a word-association matrix.
However, this algorithm is not capable of processing large-
scale data because matrix factorization is computationally
expensive. It also ignores the contextual information in nodes.
TriDNR [21] smoothly solves this problem simultaneously by
learning the network structure and node contents in a neural
network architecture. However, TriDNR only leverages one
source of the network structure and the output only represents
one type of network data. The challenges facing complete net-
work data input into universal network representation learning
are listed below:
1) Comprehensively integrate and feed the complete net-
work data with heterogeneous but multi-relational node
network structures, node contents and labels;
2) Generate a universal representation for all source of
information in heterogeneous network data.
In this paper, we propose a UNRA, a universal representa-
tion model in heterogeneous networks, which uses mutually
enhanced neural network architectures to learn representa-
tions for all sources of nodes (DNA and proteins in DNA-
protein interaction networks; papers and authors in publica-
tion networks) for input heterogeneous networks. From the
perspective of network structures, the UNRA jointly learns the
relationship among homogeneous nodes and the connections
among heterogeneous nodes by maximizing the probability of
discovering neighboring nodes given a node in random walks.
From the perspective of node content, the UNRA captures the
correlations between nodes and content by exploiting the co-
occurrence of word sequences given a node.
To summarize, our contributions are as follows:
1) We propose a novel network representation model that
simultaneously leverages different sources of network
structures, node contents and labels in one heteroge-
neous network; We propose a novel network representa-
tion algorithm that simultaneously generates representa-
tions for different sources of nodes in a heterogeneous
given authoroutput authorsoutput papersoutput venuesNetwork Representationcontentsvenueauthorpapernetwork;
2) We conduct a suite of experiments from different per-
spectives on real world data sets. The results of accuracy
tests prove the effectiveness of our proposed UNRA, and
a case study practically shows the implementation of the
UNRA in a real world setting.
An example demonstrating how the UNRA works in a multi-
relational information network is shown in Fig.1.
2) The neural network model training inputs the com-
plete multi-relational information network, and embeds
the different types of nodes into one continuous vec-
tor space. The information network consists of (1) all
random walks of the network structures(the node rela-
tionships); (2) the text node content corpus (the node-
content correlation; (3)the label information to enhance
performance in tasks like classification.
II. PROBLEM DEFINITION
A. Framework Architecture
Given a multi-relational
A multi-relational information network is defined as N =
{Vk, Ek, Dk, S},where Vk = {vki}i=1,··· ,n consists of a set
of nodes in the kth source of a network (i.e., V1 denotes the
nodes in a citation network, which represents papers while
V2 denotes the nodes in an authors network, which represents
authors) and ek(i,j) =< vki, vkj >∈ Ek indicates an edge
encoding the edge relationship between the nodes. dki ∈ Dki
is a text document associated with each node vki and S =
L ∪ U is the label information in the network data, where L
denotes labeled nodes and U denotes unlabeled ones. Different
sources of the network structures and the node contents are
associated by an unique index according to their correlations.
For example, all cited papers paperA, all authors of paperA,
its title and abstract information, have the same unique index.
information network defined as
N = {Vk, Ek, Dk, S}, the purpose of network representation
is to learn a low dimensional vector vvki ∈ Rr (r is a smaller
number) for each node vki in kth source of networks. In this
way, the nodes sharing connections, or with similar contents,
stay closer to each other in the representation space. We as-
sume that the network data are partially labeled, but the UNRA
is still valid if the set of label S = ∅. An example of the type
of heterogeneous information network used in this paper is
illustrated in Fig.1. Specifically, each source of a node network
structure, with its nodes and edges({Vk, Ek}), is independently
extracted from the given heterogeneous information network to
generate random walks {vk1, vk2, vk5,··· , vkn}. All sources
of the text content associated with one node are integrated
into one line to generate a text document {dki ∈ Dki}.
Different sources of information are trained independently and
multi-updated in the UNRA framework. The details will be
explained in the following section.
III. THE UNRA ALGORITHM
In this section, we demonstrate the details of the algorithm
for generating universal network representation for different
types of nodes in multi-relational information networks by
leveraging different sources of network structures, text node
contents and label information. The essence of the UNRA
algorithm is two-fold:
1) The random walk path generator inputs each source
of network structure, and generates a succession of steps
over the nodes. Each walk starts at a node vki and then
randomly passes by other nodes each time. The node
relationship is captured and stored in a random walk
corpus.
Since the number of node sources varies from network to
network, we use a publication network with two sources of
node (papers and authors) as an example to explain how the
UNRA works. The general architecture is demonstrated in
Fig2. Specifically, the UNRA has five steps in this publication
network. The source of the paper nodes are denoted as k = 1,
and the source of the author nodes are denoted as k = 2:
1) Papers(Nodes) Relationship Modeling
Inspired by the idea of DeepWalk [2], we construct a
random walk corpus S on all sources of the network
structures. To treat each random walk path (v11 →
v12 → v15 → ··· → v1n) as a sentence and each
node v1n as a word, we use DeepWalk to train skip-
gram models with a generated random walk corpus,
obtaining a distributed vector representation for each
node. The objective function maximizes the likelihood of
the neighboring nodes, given a node v1i for the random
walk corpus s ∈ S:
L1 =
log P(v1(i−b) : v1(i+b) v1i)
i=1
s∈S
(cid:88)N
(cid:88)N
(cid:88)
(cid:88)
=
i=1
s∈S
−b≤j≤b,j(cid:54)=0
log P(v1(i+j) v1i).
(1)
where N is the total number of nodes in 1th network.
With a soft-max function, the probability of capturing
the surrounding papers v1i−b : v1i+b given a paper v1i
is calculated by
(cid:88)
P1(v1(i+j) vi) =
(cid:80)N
exp(v(cid:62)
v=1 exp(v(cid:62)
vv1(i+j) )
v1v )
v1i
v1i
(2)
where vv1 is the output representation of the node v1 in
the first source (the paper nodes) of the network.
2) Authors(Nodes) Relationship Modeling
Following a very similar operation, the probability of
finding the surrounding authors v2i−b : v2i+b given a
author v2i is calculated by:
P2(v2(i+j) vi) =
exp(v(cid:62)
v=1 exp(v(cid:62)
vv2(i+j))
v2v )
(cid:80)N
(3)
v2i
v2i
where v2v represents the output representation of the
author node v2 in the second source (the author nodes)
of the network.
3) Paper-Contents Correlation Modeling
We assemble all the text content associated with one
node in one line. For example, in the citation data sets,
the title and abstract information of the same paper are
assembled into one line in the original order of words.
Based on Mikolov's work [12], we aim to exploit the
neighboring words(context information) within a certain
window size, given a particular word. The objective
function is achieved by maximizing the below log-
likelihood:
L2 =
logP(wt−b : wt+b wt)
(4)
(cid:88)T
t=1
where b is the window size and wt−b : wt+b is a
sequence of words which wt is in the middle of. The
conditional probability of sequence wt−b : wt+b given
wt is calculated by:
P(wt−b : wt+b wt) =
P(wt+j wt)
(cid:89)
(5)
which assumes contextual sequence is independent given
word wt. The conditional probability of wt+j given wt
is calculated:
−b≤j≤b,j(cid:54)=0
P(wt+j wt) =
(cid:80)W
wtvwt+j )
exp(v(cid:62)
w=1 exp(v(cid:62)
wtvw)
where vw and vw are the input and output word vectors
of the given word w. Further, given a node vki, the
conditional probability of capturing consecutive words
wt−b : wt+b is:
P(wj vt) =
(cid:80)W
exp(v(cid:62)
vwj )
w=1 exp(v(cid:62)
vki
vki
vw)
(6)
(7)
where W is the total number of words in the entire
network and Vwj is the representation of the word wj.
4) Label Information Correspondence Modeling
We experimentally prove that label information, which
is not
leveraged in the majority of current relevant
algorithms, could enhance the performance of network
representation in tasks like classification. These results
are shown in the next section. We input the label of
each document with its corresponding text content to
simultaneously learn the label and word vectors. The
objective function to discover the document and label
information can be calculated by:
(cid:88)L
(cid:88)N
t=1
i=1
L3 =
+
logP(wi−b : wi+b si)
logP(wi−b : wi+b vi)
(8)
where L is the set of label information and si is the
label of node vi. Following a similar manipulation, the
probability of capturing a word sequence given a label
si is:
P(wj si) =
(cid:80)W
exp(v(cid:62)
vwj )
w=1 exp(v(cid:62)
vsi
si
vw)
(9)
5) Model Assembly
The k node relationship models for k sources of each
network structure, one node-content correlation model
and one label-words correspondence model are assem-
bled and mutual-influenced according to their unique
correlation index. The final model inputs a complete
multi-relational information network with the different
sources of the network structures, node contents and
label information, defined as N = {Vk, Ek, Dk, S}. The
objective of the UNRA model is to maximize the log
likelihood function:
L = (1 − α)
+ (1 − α)
logP(wi−b : wi+b vi)
logP(wi−b : wi+b si)
i=1
(cid:88)N
(cid:88)L
(cid:88)N
t=1
(cid:88)K
(cid:88)
(cid:88)
+ α
k=1
i=1
s∈S
−b≤j≤b,j(cid:54)=0
(10)
where α is the weight for balancing network structures,
text contents and label information, and b is the window
size of word sequence. The first term is used to calculate
the conditional probability of capturing a sequence of
consecutive words {wi−b : wi+b} given a word wj to
model the correlation between a paper and its content,
while the second is to model the label information cor-
respondence by computing the probability of capturing
a sequence of words given a label si. Finally differ-
ent sources of the node relationships are modeled by
calculating the sum of the probabilities of the captured
neighboring nodes vki−b : vki+b in the kth source of
node network given a node vk.
log P(vk(i+j) vki).
B. Algorithm Explanation
Given a heterogeneous information network, the first three
steps are corpus-generation work for different sources of
information in the network. Step 1 generates corpus of random
walks for each source of the node networks. Steps 2 and 3
generate Huffman binary trees for content and label corpus
to significantly save computation costs when computing soft-
max equations in Steps 9 to 11(the details are described in the
Optimization section). Steps 3 to 6 initialize the vectors for k
sources of the nodes, contents and labels respectively. After
this preparation work is done, Steps 9 to 11 iteratively optimize
the objective functions explained in Eq.(10) to model the
relationship between the different sources of the information.
Step 9, in particular, discovers the inter-relationship between
homogeneous nodes by fixing the word representation vwj and
the label representation vci while solving Eq.(10) to update the
node representation. Through a similar manipulation, Steps
10 and 11 find the node-content relationships and the label
correlations by separately solving the hierarchical soft-max
function using a stochastic gradient method.
C. Optimization
Stochastic gradient descent (SGD) [3] is used to model
the relationships between different sources of information
(homogeneous and heterogeneous nodes, and the correlations
between nodes and contents)Eq.(10),
the UNRA performs
many expensive computations for conditional probabilities
(Eq.(2),Eq.(3),Eq.(7),Eq.(9)). To solve this problem, we took
Fig. 2. The CiteSeerX-Avs data set result comparison. From left to right: network graphs from Deepwalk, the Doc2Vec, Deepwalk + Doc2Vec, Tridnr and
UNRA. Each color represents a group. The purer the color of a group, the better the performance.
ENTERPRISE SOCIAL NETWORK DATASETS USED IN THE PAPER
TABLE I
Data Set
DBLP
CiteSeerX-Avs
CiteSeerX-M10
#Paper Nodes
#Author Nodes
#Paper Edges
#Author Edges
#Content words
56,503
18,720
10,310
58,279
40,139
21,289
106,752
54,601
77,218
142,581
41,458
21,966
3,262,885
2,649,720
1,516,893
#Labela
4
5
10
Fig. 3. Average performance on different percentage of training data of UNRA and six baselines.
the advantage of hierarchical soft-max [17], [18] which builds
Huffman trees instead of nodes vectors (authors, papers and
words).The path to the leaf node vvki can then be represented
with a sequence of vertices passing through (s0 → s1 → s2 →
··· → send), where s0 is the root of the tree and send is the
target node vvki. This can be computed by the following:
P(v = vvki ) =
(11)
We can further model P(st vvki ) with a binary classifier
as a sigmoid function, and the time complexity reduces from
O(V ) to O(n log n).
t=1
P(st vvki )
(cid:89)end
IV. EXPERIMENTAL STUDY
The experiments are based on three real world publication
data sets. The reported results show (1) the UNRA outperforms
the state-of-the-art network representation algorithms based
on different techniques in machine learning tasks like node
classification; (2) network representation by the UNRA can
represent different sources of nodes in heterogeneous networks
and this unique characteristic can be very effective and useful
in real world applications. TableI provides summarized details
of data sets.
Algorithm 1 UNRA: Universal Network Representation for
Multi-relational Information Networks
Require:
N = {Vk, Ek, Dk, S}: A heterogeneous information network;
n: Expected Number of Dimension;
b: Size of Windows;
T : Number of Iterations;
K: Number of sources of network structure;
len: Walk Length of Random Walk
each node vki ∈ Vk
1: Generate Random Walk Corpus Sk from kth source of network
2: Generate a Vocabulary Binary Tree Tw
3: Generate Node Binary Trees Tvk
4: Initial input vector vvki ∈ Rr and output vector vvki ∈ Rr for
5: Initial output vector vwj ∈ Rr for each word wj ∈ W
6: Initial input vector vci ∈ Rr for each label class ci
7: for iterator = 1,2,3, ······ , T do
8:
9:
for k = 1,2, ······ , K do
Fix vwj and vci, solve Eq.(10) to update vvki and vvki;
//inter-node relationship
Fix vvki and vci, solve Eq.(10) to update vvki and vwj ; //
node content correlation
Fix all k vvki and vvki, solve Eq.(10) to update vci and
vwj ; // label and content correlation
10:
11:
end for
12:
13: end for
14: return vvi ∈ Rr,vk ∈ V ,∀vi ∈ V
A. Experimental Settings
Datesets: We built multi-relational heterogeneous informa-
tion networks from three real world publication data sets [13],
[14] which each consist of two sources of nodes (authors and
papers), two sources of node contents (titles and abstracts),
each containing natural label information within the data sets.
Different sources of network structure and node content were
associated by a unique index according to their correlations.
For example, all cited papers paperA, all authors of paperA
and its title and abstract information have the same unique
index. Further, we combined two sources of the node content
(title and abstract) into one line associated with the same
index, for simplicity, as both sources of contents were text
in this case. However, the different sources of content can be
separately in the UNRA model.
1) Baselines:
The UNRA was
compared
to
the
for paper
following network representation algorithms
node classification:
(1)Network exploration methods:
LINE [26]: The state-of-the-art network representation
method, designed for embedding very large information
networks into low-dimensional vector spaces.
DeepWalk [2]: A novel approach for
learning latent
representations of vertices
in a network. These latent
representations encode social relations in a continuous vector
space
(2)Text modeling methods:
Doc2Vec [12]: An unsupervised algorithm that learns fixed
length feature representations from variable-length pieces of
texts, such as sentences, paragraphs, and documents.
(3)Methods that consider both network structure and content:
TriDNR [21]: A deep network representation model
that
simultaneously considers network structure and node content
within a neural network architecture
DeepWalk + Doc2Vec: An approach that simply links
different
and
Doc2Vec
TADW [30]: An approach that incorporates the text features
of vertices into network representation and learns in a matrix
factorization framework.
from DeepWalk
representations
learned
2) Evaluation: We conducted paper node classification
and employed Macro F1 and Micro F1 [31] to evaluate the
performance of the UNRA with all baselines. We varied the
percentages(from 10% to 50%) of the random nodes with
labels and the rest will be unlabeled. The complete multi-
relational information network will be fed to learn network
representation while getting node vectors from baseline al-
gorithms. A linear SVM classifier was applied to perform the
classification on learned vectors. We repeated each experiment
20 times under the same parameter setting and used the mean
value as the final score for each algorithm.
3) Parameter Settings: Training sizes impacted the perfor-
mance significantly. We varied the training size from 10% to
50% for the UNRA and the baselines to learn the accuracy
trends. The updated weights for the models for different
sources of information were practically set to 0.8.
B. Experimental Results
These experiments compare network representation algo-
rithms that independently consider network structure [2], [26],
node content [12] and both structure and content [21], [30], by
varying the training size from 10% to 50% with three different
complete publication information network in a paper nodes
classification task. UNRA achieved outstanding performance,
increasing the accuracy from 3% compared to TriDNR, 14.6%
compared to Doc2Vec, 69.8% compared to LINE to 132%
compared to DeepWalk on the DBLP data set. The Macro F1
and Micro F1 scores are illustrated in Tables II and III, and
the average performance on the CiteSeerX-M10 data set is
demonstrated via the bar charts in Fig.3. The visualization
for the paper nodes classification on CiteSeerX-Avs data set
(see Fig. 2) intuitively indicates similar results. Each color
represents a group and it is obvious that nodes in different
groups mix significantly in term of DeepWalk, while the colors
in each group are relatively clearer for tridnr, Doc2Vec, but
not as clear as the result from UNRA.
These results clearly indicate that methods that only con-
sider one view of heterogeneous information networks, or a
simple combination of the methods (Doc2Vec + DeepWalk)
are sub-optimal for multi-relational information networks. The
strategy UNRA employs by training different sources of in-
formation and using theor inner relations to update each other,
dramatically improves performance in node classification.
C. Case Study
The generated UNRA representation has been tested for
its ability to detect the most related heterogeneous nodes in
multi-relational networks, whatever the source of given a node.
This is achieved by computing the cosine similarity between
a simple mean of the projection weight vectors of the given
node and the vectors for each node in the model. Given the
similarity scores, we can directly capture the heterogeneous
nodes that are most related to given node regardless of the
source. As our experiments were based on publication data
sets, we derived three tests for our UNRA representation: (1)
given a paper, return the most related authors and other papers;
(2) given an author, return the most related papers and other
authors; and (3) given more than one nodes, returns the most
other related heterogeneous nodes.
First, we input a paper into the representation, Boolean
functions and artificial neural networks published by Martin
Anthony in CDAM 2003. The most related papers are other
versions of this paper which has been slightly renamed, Con-
nections between Neural Networks and Boolean Functions,
also first-authored by M. Anthony. The similarity score was
around 0.961%. The most related author is, with no surprise,
M. Anthony with a 0.939% similarity. Despite the paper's
other versions and co-authors of the paper, the output included
a paper by the same author: Probabilistic Analysis of Learning
in Artificial Neural Networks: The PAC Model and its Variants
TABLE II
MACRO F1 DBLP
Training size
10%
20%
30%
40%
50%
UNRA
0.732
0.732
0.736
0.739
0.742
TriDNR
0.715
0.727
0.730
0.736
0.738
Doc2Vec(DV)
0.638
0.644
0.643
0.643
0.650
DeepWalk(DW)
0.385
0.320
0.317
0.308
0.320
DV+DW LINE
0.431
0.439
0.445
0.446
0.446
0.659
0.669
0.668
0.668
0.675
TADW
0.670
0.698
0.709
0.711
0.712
TABLE III
MICRO F1 DBLP
Training size
10%
20%
30%
40%
50%
UNRA
0.791
0.792
0.795
0.797
0.798
TriDNR
0.777
0.787
0.788
0.793
0.798
Doc2Vec(DV)
0.717
0.722
0.722
0.722
0.724
DeepWalk(DW)
0.455
0.478
0.478
0.479
0.482
DV+DW LINE
0.488
0.494
0.498
0.499
0.511
0.728
0.737
0.736
0.739
0.740
TADW
0.662
0.670
0.711
0.705
0.716
and other authors with same research direction like Dr. Simone
Fiori who published Topics in Blind Signal Processing by
Neural Networks.
We also input the author Dr. Steve Lawrence and the most
related author nodes were three of his co-authors Sandiway
Fong(0.960% similarity), A. C. Tsoi(0.885% similarity) and
C. Lee Giles (0.895% similarity). Together they have pub-
lished papers like On the applicability of neural network and
machine learning methodologies to natural language process-
ing (0.879% similarity) and Natural language grammatical
inference with recurrent neural networks (0.813% similarity)),
which were also included in the outputs.
Despite the citation and co-author relationship, papers and
authors with very similar research direction but no direct
citation or co-work relationships were also output. For ex-
ample, a paper, Unsupervised Learning in Recurrent Neural
Networks, was input to return the author Felix A. Gers who
published the paper Kalman filters improve LSTM network
performance in problems unsolvable by traditional recurrent
nets. The output author was not in the author list of the given
paper, meanwhile the papers from the given and output had
a very similar research direction - recurrent neural network -
with no citation relationship to one another. Through checking
these two papers, we found they both specifically focus on long
short term memory (LSTM).
The most interesting results came when we simultaneously
input more than one node into the UNRA representation. Two
papers were input: Unsupervised Learning in Recurrent Neural
Networks with no mention of natural language processing in
its title or the abstract; and Empirical Learning of Natural
Language Processing Tasks again not related to neural net-
works. The top returned authors were the authors of given
two papers : Walter Daelemans, Magdalena Klapper-Rybicka,
Nicol N. Schraudolph, Antal Van Den Bosch, Ton Weijters. In
terms of the most related papers, beyond the other versions of
the given papers, the results returned were papers that use
neural network approaches for natural language processing
OUTPUTS FROM REPRESENTATIONS. THE MATCHED IS MARKED WITH (cid:12)
TABLE IV
Input: Learning in Neural Networks
URHN:
1. Adjoint-Functions and Temporal Learning Algorithms in Neural Net-
works (cid:12)
2. Bit-Serial Neural Networks (cid:12)
3. An Information-theoretic Learning Algorithm for Neural Network Clas-
sification (cid:12)
4. Polynomial Time Algorithms for Learning Neural Nets (cid:12)
5. Training of Large-Scale Feed-Forward Neural Networks (cid:12)
Doc2Vec:
1. Non-Cumulative Learning in METAXA.3
2. Learning Filaments
3. Learning of Kernel Functions in Support Vector Machines
4. Incremental Learning in SwiftFile
5. Learning While Searching in Constraint-Satisfaction-Problems
DeepWalk:
1. Estimating image motion from smear: a sensor system and extensions
2. Inferring 3D Volumetric Shape of Both Moving Objects and Static
Background Observed by a Moving Camera
3. Secure face biometric verification in the randomized Radon space
4. An Ensemble Prior of Image Structure for Cross-Modal Inference
5. Closed Non-derivable Itemsets
like Natural
networks.
language processing with subsymbolic neural
We also compared the results from the UNRA with the
baseline algorithms. The results are listed in TableIV. We input
a paper, Learning in Neural Networks (published by Dr. J.
Stephen Judd), into each representation and selected the top
five most related papers. The results from the UNRA were
all relevant to learning in neural networks, while the resulting
papers from Doc2Vec and DeepWalk were not really related
to the input paper.
All tests were conducted on the same UNRA representation.
[15] N. M. Luscombe, R. A. Laskowski, and J. M. Thornton. Amino acid --
base interactions: a three-dimensional analysis of protein -- dna interac-
tions at an atomic level. Nucleic acids research, 29(13):2860 -- 2874,
2001.
[16] T. Mikolov, K. Chen, G. Corrado, and J. Dean. Efficient estimation of
word representations in vector space. arXiv preprint arXiv:1301.3781,
2013.
[17] T. Mikolov, A. Joulin, S. Chopra, M. Mathieu, and M. Ranzato.
Learning longer memory in recurrent neural networks. arXiv preprint
arXiv:1412.7753, 2014.
[18] F. Morin and Y. Bengio. Hierarchical probabilistic neural network
language model. In Aistats, volume 5, pages 246 -- 252. Citeseer, 2005.
[19] S. Pan, J. Wu, X. Zhu, and C. Zhang. Graph ensemble boosting for
IEEE transactions on
imbalanced noisy graph stream classification.
cybernetics, 45(5):954 -- 968, 2015.
[20] S. Pan, J. Wu, X. Zhu, C. Zhang, and S. Y. Philip.
Joint structure
feature exploration and regularization for multi-task graph classification.
IEEE Transactions on Knowledge and Data Engineering, 28(3):715 --
728, 2016.
[21] S. Pan, J. Wu, X. Zhu, C. Zhang, and Y. Wang. Tri-party deep network
representation. Network, 11(9):12, 2016.
[22] S. Pan and X. Zhu. Graph classification with imbalanced class distribu-
tions and noise. In Proceedings of the Twenty-Third international joint
conference on Artificial Intelligence, pages 1586 -- 1592. AAAI Press,
2013.
[23] S. Papadopoulos, Y. Kompatsiaris, A. Vakali, and P. Spyridonos. Com-
munity detection in social media. Data Mining and Knowledge Discov-
ery, 24(3):515 -- 554, 2012.
[24] S. Parthasarathy, Y. Ruan, and V. Satuluri. Community discovery in
social networks: Applications, methods and emerging trends. In Social
network data analytics, pages 79 -- 113. Springer, 2011.
[25] R. E. Rice, C. L. Borgman, and B. Reeves. Citation networks of com-
munication journals, 1977 -- 1985 cliques and positions, citations made
and citations received. Human communication research, 15(2):256 -- 283,
1988.
[26] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei. Line:
Large-scale information network embedding. In Proceedings of the 24th
International Conference on World Wide Web, pages 1067 -- 1077. ACM,
2015.
[27] B. Verspagen. Mapping technological trajectories as patent citation
networks: A study on the history of fuel cell research. Advances in
Complex Systems, 10(01):93 -- 115, 2007.
[28] H. Wang, J. Wu, S. Pan, P. Zhang, and L. Chen. Towards large-scale
social networks with online diffusion provenance detection. Computer
Networks, 2016.
[29] H. Wang, P. Zhang, X. Zhu, I. W.-H. Tsang, L. Chen, C. Zhang, and
X. Wu. Incremental subgraph feature selection for graph classification.
IEEE Transactions on Knowledge and Data Engineering, 29(1):128 --
142, 2017.
[30] C. Yang, Z. Liu, D. Zhao, M. Sun, and E. Y. Chang. Network
representation learning with rich text information. In Proceedings of the
24th International Joint Conference on Artificial Intelligence, Buenos
Aires, Argentina, pages 2111 -- 2117, 2015.
[31] Y. Yang. An evaluation of statistical approaches to text categorization.
Information retrieval, 1(1-2):69 -- 90, 1999.
V. CONCLUSION
In this paper, we proposed a UNRA, a novel network
representation algorithm leveraging multiple-sources of infor-
mation in multi-relational heterogeneous network data. Our
survey shows current network representation works normally
only consider one aspect of the information - network struc-
ture or node content - within a whole network, while the
learned representation only represents one source of the nodes.
The network representation from the UNRA learned from
all sources of information in a network, and represents all
sources of nodes in the network. Experimental results prac-
tically show that the UNRA outperforms the state-of-the-art
peer algorithms, and that the characteristic of representing
all sources of heterogeneous nodes can be very effective
and useful
in real applications. Our key contributions are
summarized by three points:(1) We propose a novel network
representation model that simultaneously leverages different
sources of network structures, node contents and labels in
one heterogeneous network; (2) We propose a novel network
representation algorithm that simultaneously generates a repre-
sentation for all sources of nodes in a heterogeneous network;
and (3) We conduct a thorough suite of experiments from
different perspectives on real world data sets. The results of our
accuracy tests prove the effectiveness of our proposed UNRA
and a case study practically shown the implementation of our
UNRA in a real world setting.
REFERENCES
[1] G. Amitai, A. Shemesh, E. Sitbon, M. Shklar, D. Netanely, I. Venger,
and S. Pietrokovski. Network analysis of protein structures identifies
functional residues. Journal of molecular biology, 344(4):1135 -- 1146,
2004.
[2] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation.
Journal of machine Learning research, 3(Jan):993 -- 1022, 2003.
[3] L. Bottou. Stochastic gradient learning in neural networks. Proceedings
of Neuro-Nımes, 91(8), 1991.
[4] L. Chi, B. Li, and X. Zhu. Context-preserving hashing for fast text
classification. In SDM, pages 100 -- 108. SIAM, 2014.
[5] H. Chim and X. Deng. Efficient phrase-based document similarity for
IEEE Transactions on Knowledge and Data Engineering,
clustering.
20(9):1217 -- 1229, 2008.
[6] M. Damashek. Gauging similarity with n-grams: Language-independent
categorization of text. Science, 267(5199):843, 1995.
[7] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural
computation, 9(8):1735 -- 1780, 1997.
[8] R. Hu, S. Pan, G. Long, X. Zhu, J. Jiang, and C. Zhang. Co-
clustering enterprise social networks. In Neural Networks (IJCNN), 2016
International Joint Conference on, pages 107 -- 114. IEEE, 2016.
[9] N. P. Hummon and P. Dereian. Connectivity in a citation network: The
development of dna theory. Social networks, 11(1):39 -- 63, 1989.
[10] H. Jeong, S. P. Mason, A.-L. Barab´asi, and Z. N. Oltvai. Lethality and
centrality in protein networks. Nature, 411(6833):41 -- 42, 2001.
[11] R. Kiros, Y. Zhu, R. R. Salakhutdinov, R. Zemel, R. Urtasun, A. Tor-
In Advances in neural
ralba, and S. Fidler. Skip-thought vectors.
information processing systems, pages 3294 -- 3302, 2015.
[12] Q. V. Le and T. Mikolov. Distributed representations of sentences and
documents. In ICML, volume 14, pages 1188 -- 1196, 2014.
[13] M. Ley. The dblp computer science bibliography: Evolution, research
issues, perspectives. In International Symposium on String Processing
and Information Retrieval, pages 1 -- 10. Springer, 2002.
[14] H. Li, I. Councill, W.-C. Lee, and C. L. Giles. Citeseerx: an architecture
and web service design for an academic document search engine.
In
Proceedings of the 15th international conference on World Wide Web,
pages 883 -- 884. ACM, 2006.
|
1904.08139 | 1 | 1904 | 2019-04-17T08:50:28 | Understanding the Signature of Controversial Wikipedia Articles through Motifs in Editor Revision Networks | [
"cs.SI"
] | Wikipedia serves as a good example of how editors collaborate to form and maintain an article. The relationship between editors, derived from their sequence of editing activity, results in a directed network structure called the revision network, that potentially holds valuable insights into editing activity. In this paper we create revision networks to assess differences between controversial and non-controversial articles, as labelled by Wikipedia. Originating from complex networks, we apply motif analysis, which determines the under or over-representation of induced sub-structures, in this case triads of editors. We analyse 21,631 Wikipedia articles in this way, and use principal component analysis to consider the relationship between their motif subgraph ratio profiles. Results show that a small number of induced triads play an important role in characterising relationships between editors, with controversial articles having a tendency to cluster. This provides useful insight into editing behaviour and interaction capturing counter-narratives, without recourse to semantic analysis. It also provides a potentially useful feature for future prediction of controversial Wikipedia articles. | cs.SI | cs | James R. Ashford
[email protected]
School of Computer Science and
Informatics, Cardiff University,
UK
Alun Preece
[email protected]
Crime and Security Research Institute,
Cardiff University,
UK
Networks
Liam D. Turner
[email protected]
School of Computer Science and
Informatics, Cardiff University,
Diane Felmlee
[email protected]
UK
USA
Roger M. Whitaker
[email protected]
School of Computer Science and
Informatics, Cardiff University,
UK
Don Towsley
[email protected]
Understanding the Signature of Controversial
Wikipedia Articles through Motifs in Editor Revision
9
1
0
2
r
p
A
7
1
]
I
S
.
s
c
[
1
v
9
3
1
8
0
.
4
0
9
1
:
v
i
X
r
a
Dept. of Sociology & Criminology,
Pennsylvania State University,
College of Information and Computer
Sciences, University of Massachusetts
Amherst, USA
ABSTRACT
Wikipedia serves as a good example of how editors collab-
orate to form and maintain an article. The relationship be-
tween editors, derived from their sequence of editing activity,
results in a directed network structure called the revision
network, that potentially holds valuable insights into editing
activity. In this paper we create revision networks to assess
differences between controversial and non-controversial ar-
ticles, as labelled by Wikipedia. Originating from complex
networks, we apply motif analysis, which determines the un-
der or over-representation of induced sub-structures, in this
case triads of editors. We analyse 21,631 Wikipedia articles in
this way, and use principal component analysis to consider
the relationship between their motif subgraph ratio profiles.
Results show that a small number of induced triads play an
important role in characterising relationships between edi-
tors, with controversial articles having a tendency to cluster.
This provides useful insight into editing behaviour and in-
teraction capturing counter-narratives, without recourse to
semantic analysis. It also provides a potentially useful feature
for future prediction of controversial Wikipedia articles.
KEYWORDS
Network Motifs, Wikipedia, Controversy, Complex Networks
This paper is published under the Creative Commons Attribution 4.0 Inter-
national (CC-BY 4.0) license. Authors reserve their rights to disseminate
the work on their personal and corporate Web sites with the appropriate
attribution.
WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA
© 2019 IW3C2 (International World Wide Web Conference Committee),
published under Creative Commons CC-BY 4.0 License.
ACM ISBN 978-1-4503-6675-5/19/05.
https://doi.org/10.1145/3308560.3316754
ACM Reference Format:
James R. Ashford, Liam D. Turner, Roger M. Whitaker, Alun Preece,
Diane Felmlee, and Don Towsley. 2019. Understanding the Signa-
ture of Controversial Wikipedia Articles through Motifs in Editor
Revision Networks. In Companion Proceedings of the 2019 World
Wide Web Conference (WWW '19 Companion), May 13 -- 17, 2019,
San Francisco, CA, USA. ACM, New York, NY, USA, 8 pages. https:
//doi.org/10.1145/3308560.3316754
1 INTRODUCTION
Wikipedia has become a tremendous platform for crowd-
sourcing knowledge, representing a cornerstone of the World
Wide Web [7]. It allows the "wisdom of the crowd" [24] to
potentially emerge, providing intelligence on a vast range
of topics [4]. However, complex dynamics support the emer-
gence of content, since the formation of Wikipedia articles
involves both human cooperation and human conflict, based
on the extent of convergent and divergent views. Narrative
and counter-narrative frequently jostle for presence in a ar-
ticles, representing a source of friction that is seen through
editor interaction [22] and in the semantics of article content
[20]. Wikipedia conveniently provides a list of controver-
sial content that are labelled by the Wikipedia community
themselves1.
In an age of misinformation [1, 17, 26], understanding
characteristics of controversial articles has increased in im-
portance. Because of the controversial nature of some topics,
the narrative in a Wikipedia article may contain misleading
information that stops a neutral consensus emerging. Prior
work in this area has established insights such as the pre-
dictability of controversy from editor behaviour [20], such
as deletions, reversions, and statistics from the collabora-
tion network, prediction of article quality taking insights
1https://en.wikipedia.org/wiki/Wikipedia:List_of_controversial_issues
WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA
Ashford et al.
Editor A
Editor B
Editor C
Editor D
Figure 1: A network generated using the editor order
A, B, D, A, C, A, from newest edit to oldest. Each editor is char-
acterised by a letter A to D, and each occurrence in the list
marks a single revision of the article by the corresponding
author. An edge is formed between the current editor and
its adjacent neighbour in the sequence, forming the directed
edges (A, B),(B, D),(D, A),(A, C),(C, A).
from multiple models [29], and interactions between users,
bots, admin and pages [9]. There has also been a number of
different types of network developed to assess Wikipedia
articles, including collaboration networks [6] that capture
the positive or negative relationship between editors, edit
networks that capture "undoing" of edits by a third party
[12] and affiliation networks [10].
Our focus in this paper is to further understand the rela-
tionship between small groups of editors, as induced by their
editing sequences, by using a revision network. This does not
require information on the nature of the editing undertaken
- it simply captures the ordering in which editing occurs and
is therefore a simple metric to infer. Editors are represented
by nodes and a directed edge from node A to B indicates that
"Editor A edits the article after Editor B" (see Figure 1). From
this, we seek to determine the extent to which controversial
articles exhibit a distinctive signature relative to those that
are deemed non-controversial.
There has already been some consideration of revision
networks in the literature [8, 11], where more recently the
emphasis [27] has been to combine them with other network
representations. However, given the fundamental nature of
revision networks, it is interesting to question the extent
to which they hold sufficient information to characterise
controversial Wikipedia articles. Currently this is not well-
understood, and motivates our work.
Hypotheses
We hypothesise that interaction differences between small sub-
groups of Wikipedia editors is sufficient to distinguish between
controversial articles and non-controversial articles. To ad-
dress this we consider the extent to which revision networks
of Wikipedia articles have different local induced substruc-
tures based on their having controversial classifications. Our
approach is based on techniques from complex networks
[15, 16], that have been successful in classifying diverse and
complex biological networks based on their latent induced
subgraphs.
To achieve this at scale, and in contrast to previous lit-
erature [9, 20, 22], we assess a relatively large sample of
Wikipedia articles, involving over 21,000 Wikipedia articles,
by determining their subgraph ratio profiles. Each such pro-
file represents the under and over representation of induced
triads in the revision network of a Wikipedia article using
13 dimensions of connected triads, while also normalising
for differences in network size.
Understanding the relationship between Wikipedia arti-
cles is important, as it allows us to determine the extent
to which they may cluster. The sample we are considering
represents 21,631 articles each represented in 13 dimensions.
Therefore we perform dimensionality reduction, and project
the subgraph ratio profiles into lower dimensional spaces.
This allows us to examine the relationship both within and
between controversial and non-controversial articles.
The results draw attention to distinctive clustering pat-
terns concerning controversial Wikipedia articles. We further
assess the results by examining the correlation with a range
of variables, allowing to understand the role of substructures.
The findings reaffirm that the sequence of editing provides
an important mechanism to understand Wikipedia articles,
independent of an article's topic and without recourse to
semantic analysis.
2 RELATED WORK
Understanding the content of crowd-sourced platforms such
as Wikipedia and the behaviour of their contributors is of
wide research interest [24]. Wikipedia represents a dynamic
network of articles with a structure resembling that of the
World Wide Web [30], whereby dominant articles act as
connectivity hubs. Dynamics also exist within the formation
and maintenance of individual Wikipedia articles, through
open and collaborative editing.
Interactions between editors range from positive to neg-
ative, where debates and arguments lead to different pat-
terns of revision (e.g., [14, 20]), capturing behaviours such as
vandalism [19] and the propagation of disinformation [13].
Characterising articles and contributors through revisions
provides a means for Wikipedia to manage and review its
Understanding Wikipedia Articles through Motifs
WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA
Figure 2: 13 possible combinations of connected triads in directed networks.
content. This is potentially labour intensive and has led to
interest in creating and exploiting methods to detect issues
(e.g.,[2, 23]).
Controversial articles have become an increasing point of
focus, and characterised as such by Wikipedia. Automated
methods for classifying articles have received much attention
(e.g., [21, 27, 29]. The associated revision log for Wikipedia ar-
ticles has been shown to provide a basis to examine potential
controversy through examining the collaborative behaviour
of individual editors within an article [23] or across multiple
articles [28]. An article's revision log identifies the structure
underlying temporal interactions [27], and provides insight
into how articles and contributors' habits may evolve over
time [9]. Features from the aggregation of this, such as num-
ber of edits, revision, and previous version restorations have
been shown to correlate (e.g., [23]).
Treating the revision log as a network between editors
[22] has been shown to provide additional useful features
using graph theory and social network analysis techniques
(e.g., [21]). This has ranged from global features such as the
degree distribution (e.g., [23]), through to analysis of local
sub-structures concerning the articles with which editors
interact (e.g., [28]).
However, there has been little investigation of controver-
sial articles based on the under or over representation of
local-substructures. Called network motif analysis, this ap-
proach originated from biology [5, 15], and has been used
to good effect in characterising other complex networks, in-
cluding technology (e.g., [18]). In terms of Wikipedia, motif
analysis has been used to determine how articles point to
each other [30] and in assessing interactions between edi-
tors and different Wikipedia articles [28]. Our contribution
is two-fold: firstly to use motif analysis to understand the
fundamental revision networks, and secondly to consider
the role of motifs in differentiating between controversial
and non-controversial articles.
3 METHODS
Dataset
We collected revision history logs and article meta-data
of a sample of Wikipedia articles (N = 21, 631) through
Wikipedia's web API2. The revision logs contain time-series
2https://en.wikipedia.org/w/api.php
events and meta-data attributing the revision to a particu-
lar user at a given time. Within this set of articles, a subset
(N = 2, 661) are considered to be 'controversial' as they are
listed in Wikipedia's "List of controversial issues"1. The re-
maining articles (N = 18, 970) are random articles that are
not contained in the controversial issue list to serve as a
basis for comparison. These were taken from an original
sample of 23,000 articles (20,000 non-controversial and 3,000
controversial), from which articles were removed if they did
not contain sufficient information for motif analysis.
Network Construction
For each article, we construct a revision network (in the same
manner as [11, 27]) where nodes represent unique editors
and directed edges show that an editor added a revision
after another editor. We traverse the revision log list to build
a network that spans the article's lifetime, adding nodes
and edges as they appear in each event. Specifically let the
revision network of a Wikipedia article be defined by G =
(V , E), where each editor is represented by a node v ∈ V .
An edge (vi , vj) ∈ V indicates that editor vi edits the article
after editor vj. This excludes self-loops and editor vi editing
after editor vj multiple times does not result in a multi-edge.
A simple example can be found in Figure 1, which de-
scribes how the network is constructed. Two extreme ex-
amples from the dataset shown in Figures 3a and 3b. This
form of representation is potentially useful as large articles
do not typically follow a linear or incremental structure. For
example, it is highly likely that users will restore work back
to an earlier revision should a revision become vandalised
or irrelevant. Editors are likely to refer back to previous edi-
tor's work. These behaviours result in complex sequential
patterns that are captured through revision networks.
Network Motif Analysis
Network motif analysis focuses on determining the under
or over representation of induced subgraphs [5, 16], as com-
pared to an alternative sample of graphs (i.e., a null-model
that acts a relevant baseline for comparison). Dyads, triads
and tetrads are often considered as induced subgraphs such
over and under-represented induced subgraphs are called
network motifs or anti-motifs. In this analysis, we examine
each article's revision network using triads, representing
how all possible triples of editors may sequentially interact.
Triads are sufficiently large enough to capture both direct
WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA
Ashford et al.
(a) A revision network taken from the non-
controversial The Web Conference Wikipedia
article.
(b) A revision network taken from the contro-
versial Brexit Wikipedia article. The large vol-
ume of editors produces a highly dense clus-
ter of interactions.
Figure 3: Revision network of two articles - one non controversial and one controversial.
and indirect reciprocity between editors, while not being of
a scale that is impeded by combinatorial complexity - there
are 13 possible connected triads, shown in Figure 2. The
coded names listed in Figure 2 are provided as part of the
convention used in the triad census algorithm [3].
For each article, we calculate the subgraph ratio profile
(SRP) as defined by Milo et al [15]. This accounts for varia-
tions in network size. This is achieved by determining the
relative abundance of each type of triad compared to random
graphs generated by the null-model. For each type of triad i,
we firstly calculate ∆i:
∆i =
(Nreali− < Nrandi >)
(Nreali + < Nrandi >) + ϵ
(1)
where Nreali is the number of such triads observed in the
graph under observation, and Nrandi is the average fre-
quency of such triads seen across the sample of networks
composed by the null model. In this case the null model
uses 100 random graphs with the same number of nodes
and edges as the graph under observation. The value of ϵ
is set to 4 [15, 25] to prevent the result from being mislead-
ingly large when a subgraph rarely appears. This process
is repeated for each triad i and normalised across triads to
form the subgraph ratio profile (SRP) for a given network.
The ith SRP, denoted SRPi, denotes the extent of under or
over representation of the triad i, and is defined by:
SRPi = ∆i/(
i )1/2.
∆2
(2)
Article comparison and dimensionality reduction
The SRP composed for each article provides a 13-dimensional
vector whose components indicate the extent of triad rep-
resentation relative to networks in the null model. To as-
sess these collectively, we use principal component analysis
(PCA) that allows the SRPs to be considered in a lower di-
mensional space. We apply three and two dimensional PCA.
Finally, we make comparison with a number of external vari-
ables (number of editors/nodes, age of article, and revision
rate) to understand potential correlations with motifs.
4 RESULTS
Subgraph Ratio Profiles
We first examine the SRPs that arise from both controversial
and non-controversial articles in isolation (Figures 4 and 5
respectively). To find significant triads, we use a cutoff value
of +0.3 and -0.3. We determine that controversial articles are
strongly represented by triads 111D, 111U and 201, which
attain average SRP scores of 0.382, 0.375, 0.372, with relatively
low dispersion (SDs of 0.136, 0.149 and 0.124 respectively).
Interestingly, together these represent a chain of three nodes,
where one edge is reciprocated, with the other edge covering
all possible directional types (i.e., reciprocated, directed in,
directed out).
In contrast, the results for the non-controversial articles
provide a different profile. Here 021D and 021U are signif-
icantly under represented (average SRP scores of -0.511, -
0.485), albeit with higher standard deviations present (SDs
Understanding Wikipedia Articles through Motifs
WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA
Figure 4: Subgraph ratio profiles of all controversial articles.
Average displayed in red.
Figure 5: Subgraph ratio profiles of all non-controversial ar-
ticles. Average displayed in red.
Figure 7: PCA scatter plot repression of the 13-point feature
vector in 3D clustering space.
Figure 6: Subgraph ratio profiles of all articles, with con-
troversial articles displayed in red and non-controversial in
black.
of 0.192, 0.2). Interestingly these anti-motifs (021D and 021U)
relate to a lack of subgraphs where directed edges either
emanate from or are received by a single node in the triad.
Such configurations relate to the role of a mediating editor
that may be presented with or respond to the editing of oth-
ers. In other words, such mediators have a reduced role in
non-controversial articles.
The comparison between these subgraph ratio profiles is
shown in Figure 6. These profiles are quite distinct. We also
calculate the Pearson correlation coefficient for each distinct
pair of articles in three groups - controversial articles, non-
controversial articles and all articles. Controversial articles
provide the greatest correlation to each other (M=0.41193,
SD=0.41262). Non-controversial articles have a lower mean
correlation (M=0.37498, SD=0.36749) which is similar to the
result when considering all articles together (M=0.37569,
SD=0.36844).
Principal Component Analysis
We analyse the 21,631 subgraph ratio profiles to determine
the relationship in terms of relative clustering. We apply
PCA in order to reduce the 13 dimensions of the SRPs down
to a more manageable form. We initially project the SRPs
into 3-dimensional space for clarity, as seen in Figure 7. This
presents a distinctive region where controversial articles are
dominant. This provides evidence for a distinction between
the controversial and non-controversial articles, consistent
with the variation in motifs identified in the previous section.
The PCA coefficients (Table 1) that define the three di-
mensions reveals that principal component one (x axis in
Figure 7) primarily depends on triads 111D and 111U. Princi-
pal component two (y axis in Figure 7) primarily depends on
triad 021C. The third principal component primarily depends
on triads 021C and 030C. However, we also note that when
represented in the three dimensional space, the revision net-
works have limited dispersion in the third dimension (i.e.,
vertical dimension as plotted).
Calculating the percentage of explained variance by prin-
cipal component confirms that the first principal component
produces 53.7% of the shared variance, the second produces
22.3% and the third produces the least with 6.7%. This con-
firms that the third principal component provides a limited
contribution to representation of the total variance across
the significant ratio profiles. This supports representation
through two principal components, as plotted in Figure 8,
with the relative composition of each principal component
being near identical to PC-1 and PC-2 in Table 1. As antic-
ipated, this is similar dependency on the first and second
primary components in the three dimensional representa-
tion.
Representation in two dimensions further clarifies the dis-
tinction between controversial and non-controversial revi-
sion networks. In particular, from Figure 8 we note that both
classes of article exhibit a similar maximum and minimum
range against principal component two, which is primar-
ily defined by the linear path between three nodes (021C).
However, it is the variation in the first principal component,
dominated by 111D and 111U, which represent linear paths
WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA
Ashford et al.
Table 1: PCA coefficients displaying the strongest triads
021D 021U 021C 111D 111U 030T 030C
0.332
0.205
0.104
0.427
0.074
0.441
0.509
-0.278
-0.398
0.522
-0.242
-0.332
-0.126
0.643
-0.609
0.145
0.207
0.136
PC-1
PC-2
PC-3
0.321
0.438
0.127
201
0.318
-0.052
0.115
120D 120U 120C 210
0.078
0.117
0.074
0.059
0.131
0.167
0.204
0.047
0.19
0.079
0.06
0.130
300
0.065
0.06
0.112
Figure 9: Scatter plot of each principal component combined
with node count for both non-controversial and controver-
sial articles.
Figure 8: PCA scatter plot repression of the 13-point feature
vectors in 2D clustering space.
with reciprocation on one edge, that differentiate the non-
controversial from controversial. High values in principal
component one correlate with controversial articles - in other
words, controversial articles exhibit more reciprocation on
top of possible linear paths.
Additional Metrics
We examine the relationship between revision networks and
primary external variables (number of editors/nodes, age of
article, and revision rate) using motifs. Specifically, using the
dimensions of two-dimensional PCA analysis, we examine
the correlation with the external variables, and how this
differs between controversial and non-controversial articles.
The results are shown in Figures 9, 10 and 11.
The greatest differences between controversial and non-
controversial articles occur with respect to article age (Figure
10). Here, controversial articles with high age cluster against
high values of principal component one, and to some ex-
tent this occurs for principal component two. This contrasts
against the clustering seen for non-controversial articles.
Figure 10 also shows that controversial articles have a ten-
dency to be older. The high values in principal component
Figure 10: Scatter plot of each principal component com-
bined with article age for both non-controversial and con-
troversial articles.
one and two which align with dense clustering of contro-
versial articles show that while such articles accumulate the
linear revision path between authors (021C which dominates
principal component two), controversial articles also accumu-
late instances of linear paths where one edge is reciprocated
(i.e., 111D and 111U which dominate principal component
one).
Understanding Wikipedia Articles through Motifs
WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA
listed above, correspond to linear paths, i.e., open triads
which represent sequences of editing without indirect reci-
procity. The extent and format of reciprocated (i.e., bidirec-
tional) edges on these open triads is sufficient to define the
two principal components. The dominant triads in the first
principal component each involve reciprocation on one edge,
where as interestingly, in the second principal component,
the dominant triads are open triads with no reciprocated
edges. From this we deduce that short paths, rather than
short loops of editing that represent indirect reciprocity, are
important features in characterising Wikipedia revision net-
works.
We also observe through two-dimensional principal com-
ponent analysis that it is the first principal component that
strongly distinguishes between the revision networks of con-
troversial and non-controversial articles. The dominant tri-
ads defining this capture the extent of direct reciprocation
being present. Finally, through consideration of the prin-
cipal components against additional external variables, we
find in particular that article age plays a role in distinguish-
ing the controversial articles. High values in both principal
components aligns with strongest clustering of controversial
articles, which is not the case for non-controversial articles.
6 CONCLUSION
The analysis has given insights into the structure underlying
revision networks from Wikipedia articles, and has shown
that a relatively small number of features, in terms of sub-
structures in revision networks, characterise controversial
Wikipedia articles. The results have identified key clusters
of editorial interactions to this effect, in support of the hy-
pothesis. These are distinctive and indicate that the revision
networks for controversial and non-controversial Wikipedia
articles have differentiated subgraph ratio profiles. Our study
gives understanding as to how prediction or classification of
articles can be enhanced using the latent structures relating
to editor behaviour. This also reaffirms the importance of
the revision network as a simple but useful representation
for assessment of Wikipedia articles.
ACKNOWLEDGEMENTS
This research was sponsored by the U.S. Army Research Labora-
tory and the U.K. Ministry of Defence under Agreement Number
W911NF-16-3-0001. The views and conclusions contained in this
document are those of the authors and should not be interpreted
as representing the official policies, either expressed or implied,
of the U.S. Army Research Laboratory, the U.S. Government, the
U.K. Ministry of Defence or the U.K. Government. The U.S. and U.K.
Governments are authorized to reproduce and distribute reprints
for Government purposes notwithstanding any copyright notation
hereon.
Figure 11: Scatter plot of each principal component com-
bined with edit rate (mean number of edits per month) for
both non-controversial and controversial articles.
5 DISCUSSION
Motif analysis of revision networks gives insight into how
the temporal editing relationship between small groups of
Wikipedia authors create signatures that allow controversial
articles to be distinguished. In contrast to previous work,
we have investigated this using a relatively large sample
of Wikipedia articles, where distinct patterns emerge. This
provides strong support for our hypothesis, and reaffirms
the importance of the revision network as a simple but fun-
damental element in editing Wikipedia.
Through motif analysis, we identify that reciprocation on
linear paths among triads of editors in the revision network
is over represented in controversial Wikipedia articles. These
motifs are defined by the triads 111D, 111U and 201. In con-
trast, the revision networks from non-controversial articles
exhibit two anti-motifs, involving the under representation
of triads involving two directed edges either arriving at or
emanating from a mediating node (triads 021D and 021U).
These motifs and the underlying subgraph ratio profiles rep-
resent an unusual and distinctive profile that we believe
represent distinctive "super-families" beyond those seen in
other technologically related networks, such as the world
wide web [30].
Performing dimensionality reduction upon the subgraph
ratio profiles from each revision network allows us to fur-
ther understand the relationships between Wikipedia articles.
Our analysis shows that the structure of the data is amenable
to reduction to two dimensions, where the principal com-
ponents are dominated by triads 111D and 111U in the first
component, and mainly 021C in the second component, but
with lesser contributions from triads 021D and 021U.
The results from two-dimensional principal analysis are il-
luminating - the dominant triads in both components, as
WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA
Ashford et al.
REFERENCES
[1] Daron Acemoglu, Asuman Ozdaglar, and Ali ParandehGheibi. 2010.
Spread of (mis)information in social networks. Games and Economic
Behavior 70, 2 (2010), 194 -- 227.
[2] B Thomas Adler, Luca De Alfaro, Santiago M Mola-Velasco, Paolo
Rosso, and Andrew G West. 2011. Wikipedia vandalism detection:
Combining natural language, metadata, and reputation features. In In-
ternational Conference on Intelligent Text Processing and Computational
Linguistics. Springer, 277 -- 288.
[3] Vladimir Batagelj and Andrej Mrvar. 2001. A subquadratic triad cen-
sus algorithm for large sparse networks with small maximum de-
gree. Social Networks 23, 3 (2001), 237 -- 243. https://doi.org/10.1016/
S0378-8733(01)00035-1
[4] Daren C Brabham. 2008. Crowdsourcing as a Model for Problem
Solving: An Introduction and Cases. Convergence 14, 1 (2008), 75 -- 90.
[5] Dave Braines, Diane Felmlee, Don Towsley, Kun Tu, Roger M Whitaker,
and Liam D Turner. 2018. The role of motifs in understanding behavior
in social and engineered networks. In Next-Generation Analyst VI,
Vol. 10653. International Society for Optics and Photonics, 106530W.
[6] Ulrik Brandes, Patrick Kenis, Jürgen Lerner, and Denise Van Raaij.
2009. Network analysis of collaboration structure in Wikipedia. In
Proceedings of the 18th international conference on World wide web.
ACM, 731 -- 740.
[7] Anhai Doan, Raghu Ramakrishnan, and Alon Y. Halevy. 2011. Crowd-
sourcing Systems on the World-Wide Web. Commun. ACM 54, 4 (April
2011), 86 -- 96.
[8] Takashi Iba, Keiichi Nemoto, Bernd Peters, and Peter A Gloor. 2010.
Analyzing the creative editing behavior of Wikipedia editors: Through
dynamic social network analysis. Procedia-Social and Behavioral Sci-
ences 2, 4 (2010), 6441 -- 6456.
[9] David Jurgens and Tsai-Ching Lu. 2012. Temporal Motifs Reveal the
Dynamics of Editor Interactions in Wikipedia.
[10] Gerald C Kane and Sam Ransbotham. 2016. Research noteâĂŤcontent
and collaboration: an affiliation network approach to information
quality in online peer production communities. Information Systems
Research 27, 2 (2016), 424 -- 439.
[11] Brian Keegan, Darren Gergle, and Noshir Contractor. 2012. Staying in
the loop: structure and dynamics of Wikipedia's breaking news collab-
orations. In Proceedings of the Eighth Annual International Symposium
on Wikis and Open Collaboration. ACM, 1.
[12] Aniket Kittur, Bongwon Suh, Bryan A Pendleton, and Ed H Chi. 2007.
He says, she says: conflict and coordination in Wikipedia. In Proceed-
ings of the SIGCHI conference on Human factors in computing systems.
ACM, 453 -- 462.
[13] Srijan Kumar, Robert West, and Jure Leskovec. 2016. Disinformation
on the web: Impact, characteristics, and detection of wikipedia hoaxes.
In Proceedings of the 25th international conference on World Wide Web.
International World Wide Web Conferences Steering Committee, 591 --
602.
[14] David Laniado, Riccardo Tasso, Yana Volkovich, and Andreas
Kaltenbrunner. 2011. When the wikipedians talk: Network and tree
structure of wikipedia discussion pages.. In Sixth International AAAI
Conference on Weblogs and Social Media. 177 -- 184.
[15] Ron Milo, Shalev Itzkovitz, Nadav Kashtan, Reuven Levitt, Shai Shen-
Orr, Inbal Ayzenshtat, Michal Sheffer, and Uri Alon. 2004. Superfamilies
of evolved and designed networks. Science 303, 5663 (2004), 1538 -- 1542.
[16] Ron Milo, Shai Shen-Orr, Shalev Itzkovitz, Nadav Kashtan, Dmitri
Chklovskii, and Uri Alon. 2002. Network motifs: simple building
blocks of complex networks. Science 298, 5594 (2002), 824 -- 827.
[17] Delia Mocanu, Luca Rossi, Qian Zhang, Marton Karsai, and Wal-
Collective attention in the age of
ter Quattrociocchi. 2015.
(mis)information. Computers in Human Behavior 51 (2015), 1198 -- 1204.
[18] Derek O'Callaghan, Martin Harrigan, Joe Carthy, and Pádraig Cunning-
ham. 2012. Network Analysis of Recurring YouTube Spam Campaigns.
In Sixth International AAAI Conference on Weblogs and Social Media.
[19] Martin Potthast, Benno Stein, and Robert Gerling. 2008. Automatic van-
dalism detection in Wikipedia. In European conference on information
retrieval. Springer, 663 -- 668.
[20] Hoda Sepehri Rad and Denilson Barbosa. 2012. Identifying Controver-
sial Articles in Wikipedia: A Comparative Study. In Proceedings of the
Eighth Annual International Symposium on Wikis and Open Collabora-
tion (WikiSym '12). ACM, New York, NY, USA, Article 7, 10 pages.
[21] Hoda Sepehri Rad and Denilson Barbosa. 2012. Identifying controver-
sial articles in Wikipedia: A comparative study. In Proceedings of the
eighth annual international symposium on wikis and open collaboration.
ACM, 7.
[22] Hoda Sepehri-Rad and Denilson Barbosa. 2015. Identifying Controver-
sial Wikipedia Articles Using Editor Collaboration Networks. ACM
Trans. Intell. Syst. Technol. 6, 1, Article 5 (March 2015), 24 pages.
[23] Hoda Sepehri-Rad and Denilson Barbosa. 2015. Identifying contro-
versial Wikipedia articles using editor collaboration networks. ACM
Transactions on Intelligent Systems and Technology (TIST) 6, 1 (2015), 5.
[24] James Surowiecki and James. 2005. The wisdom of crowds. Anchor
Books. 306 pages. https://dl.acm.org/citation.cfm?id=1095645
[25] Kun Tu, Jian Li, Don Towsley, Dave Braines, and Liam D. Turner.
2018. Network classification in temporal networks using motifs. In
Proceedings of the 3rd ECML/PKDD Workshop on Advanced Analytics
and Learning on Temporal Data.
[26] M Del Vicario, A Bessi, F Zollo, F Petroni, A Scala, and G Caldarelli.
2016. The spreading of misinformation online. Proc National Academy
of Sciences 113, 3 (2016).
[27] Guangyu Wu and Pádraig Cunningham. 2015. Integration of multiple
network views in Wikipedia. Knowledge and Information Systems 45,
2 (2015), 473 -- 490.
[28] Guangyu Wu, Martin Harrigan, and Pádraig Cunningham. 2011. Char-
acterizing Wikipedia pages using edit network motif profiles. In Pro-
ceedings of the 3rd international workshop on Search and mining user-
generated contents. ACM, 45 -- 52.
[29] Guangyu Wu, Martin Harrigan, and Pádraig Cunningham. 2012. Clas-
sifying Wikipedia articles using network motif counts and ratios. In
Proceedings of the Eighth Annual International Symposium on Wikis
and Open Collaboration - WikiSym '12.
[30] Vinko Zlatić, Miran Božičević, Hrvoje Štefančić, and Mladen Domazet.
2006. Wikipedias: Collaborative web-based encyclopedias as complex
networks. Physical Review E 74, 1 (2006), 016115.
|
1705.02399 | 1 | 1705 | 2017-05-05T21:13:44 | Temporal Analysis of Influence to Predict Users' Adoption in Online Social Networks | [
"cs.SI"
] | Different measures have been proposed to predict whether individuals will adopt a new behavior in online social networks, given the influence produced by their neighbors. In this paper, we show one can achieve significant improvement over these standard measures, extending them to consider a pair of time constraints. These constraints provide a better proxy for social influence, showing a stronger correlation to the probability of influence as well as the ability to predict influence. | cs.SI | cs |
Temporal Analysis of Influence to Predict Users'
Adoption in Online Social Networks
Ericsson Marin1, Ruocheng Guo1, and Paulo Shakarian1
Arizona State University, Tempe, Arizona, USA
Abstract. Different measures have been proposed to predict whether
individuals will adopt a new behavior in online social networks, given the
influence produced by their neighbors. In this paper, we show one can
achieve significant improvement over these standard measures, extending
them to consider a pair of time constraints. These constraints provide a
better proxy for social influence, showing a stronger correlation to the
probability of influence as well as the ability to predict influence.
Introduction
1
Research has shown that measures which leverage the people's ego network cor-
relate with influence - the confidence at which their neighbors adopt a new
behavior [1]. In this paper, we introduce two time constraints to improve these
measures: Susceptible Span and Forgettable Span. Susceptible Span (τsus) refers
to the interval when people receive social signals from their neighbors (possi-
ble influencing actions), blinding individuals to no more interesting connections.
Forgettable Span (τf os) refers to the interval before an influencer's action is for-
gotten by his neighbors, due to human brain limitation. These constraints define
evolving graphs where influence is better measured, as illustrated in Figure 1.
Fig. 1. At time t, the ego node 0 has no neighbors. At t + 1, he has 1 neighbor (node 1
at the bottom). From this moment, node 0 will be aware about node 1' actions. At t+2,
node 0 has 2 neighbors, nodes 1, 2. This cumulative process continues until t + 5 when
node 1 is no more a neighbor of node 0, since τsus was defined as 4. After this time
limit, node 0 cannot visualize actions of node 1 anymore. The illustration also shows
the node 0's memory inside the balloons. As we made τf os = 2, node 2 (activated at
t + 2) fades away from node 0's memory after t + 4, when node 0 is no longer influenced
by him. Therefore, at t + 7, node 0 is activated only by nodes 3, 4 and 5.
The contributions of this paper are: we introduce a framework to consider τsus
and τf os in social influence; we examine the correlation of 10 social network mea-
sures to influence under different conditions; we compare the adoption prediction
performance of our method with others [1,2,3], showing relevant improvements.
For instance, we obtained up to 92.31% gain in correlation of a simple count of
the "active" neighbors with the probability of influence. Considering adoption
prediction, F1 score improves from 0.606 (using the state-of-the-art [1]) to 0.689
for active neighbors. Similar results are found for the other measures analysed.
22112123tt + 1t + 2t + 3123t + 4345234t + 55345t + 6642000000034456t + 7702Inactive User (Non Adopter)Active User (Adopter)-sus= 4fos= 22
This paper is structured as follows: Section II presents the related work. Sec-
tion III formalizes a framework to consider the time constraints in our networks.
Section IV presents the experimental setup to produce samples. Section V intro-
duces the social influence measures and their corresponding gains in correlation
coefficient. Section VI details the classification experiments and results for the
adoption prediction problem. Finally, section VII concludes the paper.
2 Related Work
Many works have been proposed to measure social influence and predict users'
adoption. For instance, the seminal work of Kempe et al. [4] describes two pop-
ular models for diffusion in social networks that were generalized to the General
Threshold Model. In this model, the collective influence from a node's infected
neighbors will trigger his infection once his threshold is exceeded. Later, Goyal
et al. [3] leveraged a variety of models based on pair-wise influence probabil-
ity, finding the probability of adoption increases with more adopters amongst
friends. With an alternative approach, Zhang et al. [1] proposed the influence
locality, developing two instantiated functions based on pair-wise influence but
also on structural diversity to predict adoptions. Comparing two different per-
spectives, Fink et al. [2] proposed probabilistic contagion models for simple and
complex contagion, with the later producing a superior fit for themed hashtags.
In these works, the authors slightly explored the dynamic aspect of social
influence. Here, we take the next steps to apply a pair of time constraints to our
networks, finding that influence is better measured and predicted dynamically.
3 Framework for Consideration of Time Constraints
In this section, we describe the notations of this work. We denote a set of users
V , as the nodes in a directed network G = (V, E), a set of topics (hashtags) Θ,
and a set of discrete time points T . We will use the symbols v, θ, t to represent a
specific node, topic and time point. With nodes being active or inactive w.r.t θ,
an active node (adopter) is a user who retweeted a tweet with θ. We denote an
activity log A (containing all retweets) as a set of tuples of the form (cid:104)v1, v2, θ, t(cid:105),
where v1, v2 ∈ V . It describes that "v1 adopted θ retweeting v2 at time t",
creating a directed edge (v1, v2) ∈ E. The intuition behind this edge is that v1
can be influenced by v2 with respect to θ(cid:48), if v2 eventually adopts θ(cid:48) after t.
Finally, we integrate into our model the two proposed time constraints τsus
and τf os. Due to them, the neighborhood of a user can change over time, affecting
the social influence measures that result in his decision to adopt a topic. This
way, we define the set of neighbors of a node v at time t as:
ηv,t = {v(cid:48) ∃(cid:104)v, v(cid:48), θ, t(cid:48)(cid:105) ∈ A, s.t. t(cid:48) ≤ t and t − t(cid:48) ≤ τsus}
ηv,t is the set of users whose adoptions since t − τsus until t will be presented to
v. After t(cid:48) + τsus, the adoptions of v(cid:48) will not influence v. Then, we introduce
ηθ
v,t as the set of users that can influence v to adopt θ at time t as:
v,t = {v(cid:48) ∈ ηv,t(cid:48) ∃(cid:104)v(cid:48), v(cid:48)(cid:48), θ, t(cid:48)(cid:48)(cid:105) ∈ A, s.t. t(cid:48) ≤ t(cid:48)(cid:48), t(cid:48)(cid:48) − t(cid:48) ≤ τsus, t(cid:48)(cid:48) ≤ t and t − t(cid:48)(cid:48) ≤ τf os}
ηθ
Consequently, after t(cid:48)(cid:48) +τf os, the fact that v(cid:48) adopted θ is forgotten by v, with
v(cid:48) no more influencing v in terms of θ. Using these generated dynamic networks,
we want to measure the influence produced by the individuals' active neighbors.
4 Experimental Setup
This section details our dataset, how we collect samples using different values
for the time constraints, which filters of users' activity are applied, and how we
measure correlation of our features with probability of adoption.
3
Dataset description. The dataset we use is provided by [5]. It contains 1,687,700
retweets (k), made by 314,756 users (the histogram fits a power-law with pk ≈
k−1.8), about 226,488 hashtags on Twitter, from March 24 to April 25, 2012.
Sampling. Following previous works [1], we create balanced sets of samples
for our experiments. For a given activity (cid:104)v, v(cid:48)(cid:48), θ, t(cid:105) which corresponds to a
positive sample, we create a negative sample uniformly getting a user v(cid:48) from the
(cid:9). This set includes all users under
set:(cid:8)v(cid:48)v ∈ ηθ
v(cid:48),t ∧ (cid:104)v(cid:48), u, θ, t(cid:48)(cid:105) (cid:54)∈ A,∀u ∈ ηθ
v(cid:48),t
influence of v w.r.t θ at t, who did not adopted θ in our dataset. Then, we
create (cid:104)v(cid:48), v, θ, t(cid:105) as the related negative sample for (cid:104)v, v(cid:48)(cid:48), θ, t(cid:105), keeping the same
timestamp for both users to have similar intervals to accumulate influence.
Filters. In addition, we apply 4 filters to exclude users with less actions than a
given threshold, as their behaviors are hardly explainable by influence measure-
ments [2]. We label R30, R60 for users who retweeted at least 30 or 60 times, and
H20, H40 for users who retweeted at least 20 or 40 hashtags respectively. This
also enables us to test the robustness of τsus, τf os under a variety of conditions.
Correlation between measures and adoption probability. Here, we study
how each time constraint correlates with probability of adoption using the Pear-
son correlation coefficient. The idea is to identify the values for τsus and τf os ∈
{8, 16, 24, 48, 72, 96, 120, 144, 168, 336, 504, 720} (hours), that produce high qual-
ity influence measurements (high positive correlation with adoption probability).
Influence Measures
5
Table 1 describes the 10 measures (in 7 categories), which we use to estimate
the influence in users' active neighborhood. We define the measures based on
the activity a = (cid:104)v, v(cid:48), θ, t(cid:105) by which we create samples. Then, we show the gain
(or loss) of correlation coefficient by heat maps, plotting the 144 combinations
of τsus and τf os. Cells in the right lower corner have values = 0, as (τsus, τf os) =
(720, 720) equals to applying no time constraints (data comprises of 720 hours).
Figure 2(a) shows the heat maps for filters R60 and H40 with the gain (or
loss) of correlation coefficients between Number of Active Neighbors (NAN) and
probability of adoption. Previous work with no time constraints [3,2] argue that
a positive correlation is expected here. Even so, many cells present gains for both
filters, where combinations of τsus and τf os boost NAN 's ability to explain users'
behaviors under influence. Moreover, hot red cells dominate the left lower region
of both heat maps where τsus and τf os are relatively high and low respectively,
especially when τsus ≥ 168 and τf os ≤ 48, with gains in [9.84%, 92.31%]. Figure
2(b) presents the heat maps for Personal Network Exposure (PNE). Similar to
NAN, hot red cells are mainly distributed where τsus >= 168 and τf os <= 24.
Although the gains are smaller, in [1.18%, 11.76%], we show how PNE obtains
high gains in classification performance. From this moment on, we plot the heat
maps only for filter R60, since we get similar results for H40.
4
Table 1. Categories of Features.
Category
Connectivity Number of Active Neighbors [3] N AN θ
Feature
Formula
v,t
Personal Network Exposure [6]
P N Eθ
v,t
Temporal
Continuous Decay of Influence [3] CDIθ
v,t
=
Recorrence Previous Reposts [7]
Transitivity Closed Triads [7]
CLT θ
v,t
Clustering Coefficient [7]
CLCθ
v,t
Centrality
Hubs [7]
HU Bθ
v,t
where tl is the time when the latest neighbor in ηθ
and σ is the globally longest identified time-delay for adoption.
(cid:104)v, u, θ(cid:48) , t(cid:48)(cid:105)
P RRθ
adopted θ,
v,t
v,t
v,t
v,t
exp(
σ
)
v,t
v,t
u∈ηθ
u∈ηθ
{u,z}∈ηθ
v,t
,u(cid:54)=z
−(tl−tu )
(cid:80)
t(cid:48)≤t
f ((u, z)θ
t
= ηθ
ηθ
ηv,t
=(cid:80)
=(cid:80)
θ(cid:48)(cid:80)
=(cid:80)
) =(cid:8) 1, if (cid:104)u, z, θ, t(cid:48)(cid:105) ∈ A ∧ t(cid:48) ≤ t
=(cid:80)
) =(cid:8) 1, if (cid:104)u, z, θ, tz(cid:105) ∈ A ∧ tz ≤ t
=(cid:80)
(cid:110) 1, if(cid:80)
θ(cid:48)(cid:80)
=(cid:80)
0, otherwise
u∈ηθ
g((u,z)θ
t
2
ηθ
(cid:80)
{u,z}∈ηθ
0, otherwise
0, otherwise
t(cid:48)≤t
,u(cid:54)=z
x∈V
h(u, t)
v,t
v,t
v,t
)
and
)
and
f ((u, z)θ
t
g((u, z)θ
t
h(u, t) =
where γ being the minimal number of messages retweeted. Upon
some analysis, we made γ = 104, corresponding to 0.042% of all
retweets. To reach this value, users should be retweeted at least.
M U Rθ
i(u, t) =(cid:8) 1, if (cid:104)u, v(cid:48) , θ, t(cid:48)(cid:105) ∈ A ∧ t(cid:48) ≤ t
u∈ηθ
i(u, t)
and
v,t
v,t
0, otherwise
= P (ηθ
)
ACCθ
where the function P (V (cid:48) ) : V (cid:48) → C maps the set of nodes V (cid:48)
v,t
v,t
to the set of strongly connected components C.
and
(cid:104)x, u, θ(cid:48) , t(cid:48)(cid:105) >= γ
Reciprocity Mutual Reposts [7]
Structural
Active Strong Connected
Diversity
Components Count [8]
Active Strongly Connected
Components Ratio [8]
ACRθ
v,t
=
P (ηθ
)
P (ηv,t)
v,t
Figure 2(c) shows the heat map for Continuous Decay of Influence (CDI).
Highest gains in [1.72% 60.34%] are observed when τsus ≥ 168 and τf os ≤ 96.
Fig. 2. Gains (red) or losses (blue) of correlation between each social influence measure
and adoption probability when the time constraints are applied.
Figure 2(d) shows the heat map for Previous Reposts (PRR). There is a
slight tendency that higher values to τf os and lower values τsus result in higher
when compared to the previous features, with gains in [4.76%, 156%].
5
Figure 2(e) presents the heat map for Closed Triads (CLT). Higher gains in
[3.33%, 233.33%] are spread through the majority of cells. However, we can still
observe best gains distributed over the area where high values of τsus and low
values of τf os are found, specially when τsus >= 144 and τf os <= 48. Figure
2(f) shows the heat map for Clustering coefficient (CLC). Small values for both
time constraints produce higher correlation gains in [4.84%, 66.67%].
Figure 2(g) presents the heat map for Hubs (HUB). We again observe the
hot spots where τsus and τf os are relatively high and low respectively, with
τsus >= 96 and τf os <= 48. Gains in [21.05%, 488.24%] are the highest.
Figure 2(h) presents the heat map for Mutual Reposts (MUR), another cu-
mulative measurement whose correlation increases with both time constraints.
However, we can observe higher gains in [1.61%, 35.48%] found in the area where
the values of τsus are relatively high and the values of τf os are intermediate.
Figure 2(i) shows the heat map for Active Strong Connected Components
Count (ACC). Hot cells are found where τsus and τf os are relatively high and
low respectively, mainly when τsus >= 168 and τf os <= 24, with gains in
[9.09%, 300%]. Figure 2(j) presents the heat map for Active Strong Connected
Components Ratio (ACR). The gains in [1.47%, 45.59%] are spread through the
cells, mainly where values of τsus and τf os are both relatively small.
6 Classification Experiments
This section presents our classification experiments and results for the adoption
prediction task, detailing training and testing sets and baselines comparisons.
Training and testing. Our 10 social influence measures are treated here as fea-
tures in a machine learning task, such that we can measure their performance for
adoption prediction individually and combined. We sort our samples chronolog-
ically, using the first 90% for training and the rest for testing (obeying causality
which is neglected by some works). We use 2 classifiers, Logistic Regression [9]
and Random Forest [9], but only report F1 score for Random Forest under the
R60 filter, since Logistic Regression and other filters produce comparable results.
Baselines. We compare our model with 3 baselines (Influence Locality (LRC-Q)
[1], Static Bernoulli (SB) [3], Complex Probability Model (CPM) [2]), to check
if our method outperforms them and if the baselines improve with τsus and τf os.
Individual Feature Analysis. Table 2 presents the individual classification
performance of our 10 features. As done in the previous section, we run an
experiment for each combination of τsus and τf os, sorting this table by the
performance gain. The time constraints boosted the performance in all cases,
with gains in F1 score in [7.22% and 23.2%]. In the great majority of cases, τsus
shows values greater than τf os, repeating the correlation gain pattern.
Combined Feature Analysis. In Table 2, we also present the classification
performance results when the 10 features are combined as "All", showing an
improvement of 10.54% when applying time constraints. The observed pattern
for the individual features (social influence is better measured by the measures
when τsus > τf os) is found again for the features combined, with performance
achieving the best improvements when τsus = 336, while τf os = 48.
6
Table 2. Baselines, Individual and Combined Feature Performances.
PNE w/ time constraints PNE w/o time constraints CLC w/ time constraints
CLC w/o time constraints
τsus τf os F1 score Improv.
23.2%
168
0.658
24
F1 score
0.534
τsus τf os F1 score Improv.
22.0%
0.652
72
16
F1 score
0.534
ACR w/ time constraints ACR w/o time constraints CLT w/ time constraints
CLT w/o time constraints
τsus τf os F1 score Impro.
336
18.7%
0.632
120
F1 score
0.532
τsus τf os F1 score Impro.
144
17.3%
0.657
8
F1 score
0.560
NAN w/ time constraints NAN w/o time constraints CDI w/ time constraints
CDI w/o time constraints
τsus τf os F1 score Impro.
144
15.6%
τsus τf os F1 score Impro.
144
13.5%
ACC w/ time constraints ACC w/o time constraints HUB w/ time constraints
F1 score
0.689
0.677
0.596
72
16
τsus τf os F1 score Impro.
13.2%
144
0.675
16
F1 score
0.596
τsus τf os F1 score Impro.
9.99%
120
0.630
16
F1 score
0.596
HUB w/o time constraints
F1 score
0.573
PRR w/ time constraints PRR w/o time constraints MUR w/ time constraints MUR w/o time constraints
τsus τf os F1 score Impro.
9.82%
0.672
72
8
F1 score
0.612
τsus τf os F1 score Impro.
336
7.23%
0.712
72
F1 score
0.664
All w/ time constraints
All w/o time constraints LRC-Q w/ time constraints LRC-Q w/o time constraints
τsus τf os F1 score Impro.
336
10.54%
0.755
48
F1 score
0.683
SB w/ time constraints
SB w/o time constraints
τsus τf os F1 score Impro.
8.69%
0.675
72
8
F1 score
0.621
16
τsus τf os F1 score Impro.
72
8.41%
CPM w/ time constraints
τsus τf os F1 score Impro.
12.58%
0.657
0.689
72
8
F1 score
0.606
CPM w/o time constraints
F1 score
0.612
We interpret these results as: 1). users will start losing attention of their
neighbors after 2 weeks, if they do not retweet them anymore; 2). users will no
more remember the activations of their neighbors after approximately 2 days.
Performance of Baseline Methods. Finally, Table 2 includes the results of
baselines. The time constraints boost all performances, with gains of 8.41% for
LRC-Q, 8.69% for SB and 12.58% for CPM. These results highlight the effective-
ness of τsus and τf os, also consolidating the pattern detected before: τsus > τf os.
In addition, our model outperforms the baselines in both situations: when we use
only an individual feature such as MUR, and when we use all features combined,
with improvements in [3.33%, to 9.6%] (compared with CPM).
7 Conclusion
In this paper, we introduce a pair of time constraints to show how the dynamic
graphs produced by them better capture the influence between users over time
(specially when τsus and τf os are relatively high and low respectively). We vali-
date our model under diverse conditions, detailing how it outperforms the state-
of-the-art methods that aim to predict users' adoption. We also demonstrate how
these constraints can be used to improve the performance of other approaches,
enabling practical usage of the concepts for social influence prediction.
Acknowledgments
Some of the authors of this paper are supported by CNPq-Brazil, AFOSR Young Investigator Pro-
gram (YIP) grant FA9550-15-1-0159, ARO grant W911NF-15-1-0282, and the DoD Minerva program.
References
1. Zhang, J.; Liu, B.; Tang, J.; Chen, T.; and Li, J. 2013. Social influence locality for modeling
retweeting behaviors. In Proceedings of 13th IJCAI '13, 2761-2767. AAAI Press.
2. Fink, C.; Schmidt, A.; Barash, V.; Kelly, J.; Cameron, C.; and Macy, M. 2016. Investigating the
observability of complex contagion in empirical social networks. In Proceedings of 10th ICWSM.
3. Goyal, A.; Bonchi, F.; and Lakshmanan, L. 2010. Learning influence probabilities in social net-
works. 3rd ACM international conference on Web search and data mining (WSDM '10) 241-250.
4. Kempe, D.; Kleinberg, J.; and Tardos, E. 2003. Maximizing the spread of influence through a
social network. In Proceedings of 9th ACM SIGKDD, 137146. New York, NY, USA: ACM.
5. Weng, L.; Menczer, F.; and Ahn, Y. 2013. Virality prediction and community structure in social
networks. Scientific Reports 3(2522).
6. Valente, T. W. 1995. Network models of the diffusion of innovations, ser. quantitative methods
in communication. Cresskill, N.J.: Hampton Press 153-163.
7. Zafarani, R.; Abbasi, M.; and Liu, H. 2014. Social Media Mining. Cambridge University Press.
8. Ugander, J.; Backstrom, L.; Marlow, C.; and Kleinberg, J. 2012. Structural diversity in social
contagion. Proceedings of the National Academy of Sciences 109(16):5962-5966.
9. Attewell, P., David M., and Darren K. Data Mining for the Social Sciences. UC Press, 2015.
|
1901.06648 | 1 | 1901 | 2019-01-20T09:15:10 | Unsupervised User Identity Linkage via Factoid Embedding | [
"cs.SI"
] | User identity linkage (UIL), the problem of matching user account across multiple online social networks (OSNs), is widely studied and important to many real-world applications. Most existing UIL solutions adopt a supervised or semi-supervised approach which generally suffer from scarcity of labeled data. In this paper, we propose Factoid Embedding, a novel framework that adopts an unsupervised approach. It is designed to cope with different profile attributes, content types and network links of different OSNs. The key idea is that each piece of information about a user identity describes the real identity owner, and thus distinguishes the owner from other users. We represent such a piece of information by a factoid and model it as a triplet consisting of user identity, predicate, and an object or another user identity. By embedding these factoids, we learn the user identity latent representations and link two user identities from different OSNs if they are close to each other in the user embedding space. Our Factoid Embedding algorithm is designed such that as we learn the embedding space, each embedded factoid is "translated" into a motion in the user embedding space to bring similar user identities closer, and different user identities further apart. Extensive experiments are conducted to evaluate Factoid Embedding on two real-world OSNs data sets. The experiment results show that Factoid Embedding outperforms the state-of-the-art methods even without training data. | cs.SI | cs | Unsupervised User Identity Linkage via
Factoid Embedding
Wei Xie∗, Xin Mu†, Roy Ka-Wei Lee∗, Feida Zhu∗ and Ee-Peng Lim∗
∗Living Analytics Research Centre
Singapore Management University, Singapore
Email: {weixie,roylee.2013,fdzhu,eplim}@smu.edu.sg
†National Key Laboratory for Novel Software Technology
Nanjing University, China
Email: [email protected]
9
1
0
2
n
a
J
0
2
]
I
S
.
s
c
[
1
v
8
4
6
6
0
.
1
0
9
1
:
v
i
X
r
a
Abstract -- User identity linkage (UIL), the problem of match-
ing user account across multiple online social networks (OSNs),
is widely studied and important to many real-world applica-
tions. Most existing UIL solutions adopt a supervised or semi-
supervised approach which generally suffer from scarcity of
labeled data. In this paper, we propose Factoid Embedding,
a novel framework that adopts an unsupervised approach. It is
designed to cope with different profile attributes, content types
and network links of different OSNs. The key idea is that each
piece of information about a user identity describes the real
identity owner, and thus distinguishes the owner from other
users. We represent such a piece of information by a factoid
and model it as a triplet consisting of user identity, predicate, and
an object or another user identity. By embedding these factoids,
we learn the user identity latent representations and link two
user identities from different OSNs if they are close to each
other in the user embedding space. Our Factoid Embedding
algorithm is designed such that as we learn the embedding
space, each embedded factoid is "translated" into a motion
in the user embedding space to bring similar user identities
closer, and different user identities further apart. Extensive
experiments are conducted to evaluate Factoid Embedding on
two real-world OSNs data sets. The experiment results show that
Factoid Embedding outperforms the state-of-the-art methods
even without training data.
Index Terms -- user identity linkage,factoid embedding,network
embedding
I. INTRODUCTION
Motivation. Increasingly, people are using multiple online
social networks (OSNs) to meet
their communication and
relationship needs1. The rise of users using multiple OSNs
motivates researchers to study User Identity Linkage (UIL),
the problem of linking user accounts from different OSNs
belonging to the same person. Tackling UIL is imperative
to many applications, particularly user profiling and recom-
mender systems.
User Identity Linkage Problem. The UIL problem has
been widely studied and is usually formulated as a classifica-
tion problem, i.e. to predict whether a pair of user identities
from different OSNs belong to the same real person [1]. There
are many supervised and semi-supervised methods proposed
to address UIL but they could not perform well when there is
1www.si.umich.edu/news/more-adults-using-multiple-social-platforms-
survey-finds
a scarcity of labeled data. One possible way to obtain labeled
matching user accounts is to recruit users to manually identify
them. Such an approach is very costly and time consuming.
In this research, we therefore aim to solve the UIL problem
using an unsupervised approach.
User Identity Linkage Problem in Unsupervised Setting.
We formulate the UIL problem in unsupervised setting as
follows. Let u be a user identity in an OSN which belongs to
a real person p. Let ou = [ou,1, ..., ou,d] denote a set of data
objects associated with u. These objects include username,
screen name, profile image, profile description, posts, etc.. We
denote an OSN as G = (U,O,E), where U = {u1, ..., uN}
is the set of user identities, O = {ou1 , ..., ouN} is the set of
corresponding data objects, and E ⊆ U × U is the set of links
in the network. Thus, given two OSNs Gs = (U s,Os,E s)
(source) and Gt = (U t,Ot,E t) (target), without any known
matched user pairs between Gs and Gt, the objective is to
return a user ut in target OSN, for every user us in the source
OSN, such that the user pair (us, ut) most likely belongs to
the same real person p.
Research Objectives and Contributions. In this paper, we
propose Factoid Embedding, a novel framework that links
user identities across multiple OSNs through the use of a
network embedding approach. The key idea behind Factoid
Embedding is that despite the heterogeneity in information
from multiple OSNs, each piece of information about a user
identity describes the person who owns it, and thus help to
distinguish the person from others. The more information
we have, the closer we get to know about the real person.
Specifically, we model each piece of information as a factoid,
which is a triplet consisting of user identity, predicate and
an object or another user identity (as shown in Table I).
Embedding these factoids provides the unifying structure to
represent the heterogeneous information and data types. Figure
1 shows the framework of Factoid Embedding. Firstly, we
generate the factoids from information gathered from different
OSNs. Next, we embed heterogeneous objects (e.g. names,
texts, and images) into their respective embedding spaces (e.g.,
names will be embedded into the name embedding space,
etc.) incorporating the similarity measures that contribute
to matching user identities. Note that when embedding the
Fig. 1: Framework of Factoid Embedding
heterogeneous objects, we leverage on external and prior
knowledge such that if two objects are similar, their embedding
vectors will be close to each other in the object embedding
space. For example, the user names Desmond and Desmond
Ng are similar and therefore, the embedding vectors of the
two names will be close to each other in the name embedding
space. Finally, leveraging the factoids' triplet structure, we
project the various object embeddings into the user embedding
space. Essentially, the vectors in the user embedding space
represent the user identities, and through iterations of object
embedding projections, the user identities that share many
similar factoids will be "pushed" closer to one another in the
user embedding space.
Overall, this paper improves the state-of-the-art by making
the following contributions:
• We propose a novel unsupervised method called Factoid
Embedding to link user identities from different OSNs.
Our proposed method is able to integrate heterogeneous
information using the triplet structure of factoids and
object embeddings. To the best of our knowledge, this is
the first work which embeds heterogeneous information
to address the UIL problem in an unsupervised manner.
• We conduct extensive experiments on three real-world
to
OSNs, namely, Twitter, Facebook and Foursquare,
evaluate our proposed model. The experiment results
show that Factoid Embedding outperforms the state-
of-the-art methods. It can even outperform some of the
existing supervised methods which are given labeled
matching user pairs for training.
II. PROPOSED SOLUTION
We propose an integrated three-step solution which is illus-
trated in Figure 1. In the first step, we use the information
from Gs and Gt to generate a set of factoids. Next, we embed
the heterogeneous data objects (e.g. names, text and images)
into their respective embedding spaces. Finally, we learn and
project the user identities and their links into user embedding
space using factoid embedding, a process where we integrate
the object embeddings and factoids.
TABLE I: Examples of Generated Factoids
Twitter
(cid:104)1, has name, Amy Tan(cid:105)
(cid:104)2, has name, Desmond(cid:105)
(cid:104)3, has name, C L(cid:105)
(cid:104)4, has name, Joey Lim(cid:105)
(cid:104)5, has name, Nicole Tan(cid:105)
(cid:104)1, follows, 2(cid:105)
(cid:104)2, follows, 1(cid:105)
(cid:104)1, follows, 3(cid:105)
(cid:104)3, follows, 1(cid:105)
(cid:104)3, follows, 2(cid:105)
(cid:104)4, follows, 3(cid:105)
(cid:104)5, follows, 3(cid:105)
Facebook
(cid:104)6, has name, Amy Tan(cid:105)
(cid:104)7, has name, Desmond Ng(cid:105)
(cid:104)8, has name, Cindy Lim(cid:105)
(cid:104)9, has name, Joey L(cid:105)
(cid:104)6, follows, 7(cid:105)
(cid:104)7, follows, 6(cid:105)
(cid:104)6, follows, 8(cid:105)
(cid:104)8, follows, 6(cid:105)
(cid:104)7, follows, 8(cid:105)
(cid:104)8, follows, 7(cid:105)
(cid:104)8, follows, 9(cid:105)
(cid:104)9, follows, 8(cid:105)
A. Factoid Generation
To integrate the heterogeneous user attribute/content objects
and their user-user link information in Gs and Gt, we first
combine and represent the information in an unified network.
In this unified network, every user identity ui (from source
or target network) is represented as a new user node with a
unique ID and every data object is represented as a data node
(as illustrated in the step 1 in Figure 1). We then represent
a user-object association and a user-user link as an user-
object factoid and an user-user factoid respectively. A user-
object factoid (cid:104)ui, pred, o(cid:105) has pred denoting the associated
attribute predicate, and o denoting a data object. Each user-
object factoid provides us a description about ui. For example
in Figure 1, factoid (cid:104)1, has name, Amy Tan(cid:105) conveys the
information that the u1 has name "Amy Tan". Next, we use
another set of predicates to represent user-user links. For
example, for Twitter, an user identity may "follows" another
user identity. As such, we represent f ollows as a predicate
and let (cid:104)ui, f ollows, uj(cid:105) denote a user-user factoid with the
predicate "follows". For instance, factoid (cid:104)1, follows, 3(cid:105) tells
us u1 follows u3. Table I presents all the factoids generated
from the two OSNs in Figure 1. In the following, we shall
elaborate the embeddings of objects followed by that of user-
object and user-user factoids.
2
359User Embedding Space123456789Amy TanDesmond NgDesmondC LJoey LimJoey LNicole TanCindy LimName Embedding SpaceUnified NetworkAmy TanAmy TanDesmond NgDesmond NgDesmondC LJoey LimNicole TanJoey LCindy LimTwitterFacebookStep 1: Factoid GenerationStep 2: ObjectEmbeddingStep 3: FactoidEmbedding176482B. Object Embedding
Although the factoids generated in the previous step is able
to represent the different information types in a unified net-
work, it still has to address the issue of comparing data objects
of attributes used for linking user identities. For example, the
factoids in row 2 of Table I do not explicitly tell us that
"Desmond" and "Desmond Ng" are similar names. Instead, it
only tell us that they are non-identical. Therefore, in this step
we embed these heterogeneous objects taking advantage of
similarity knowledge about the objects. For example, suppose
two user identities sharing similar attribute objects are more
likely to belong to the same person. We will then embed
the objects such that similar objects are closer in the object
embedding space (see step two in Figure 1, where similar
names are closer in the name embedding space).
We first let Opred denote all the data objects for certain
predicate pred, i.e. Opred = {o ∈ Fpred}. For instance in
Figure 1, Ohas name = {"Amy Tan", "Desmond", "C L",
"Joey Lim", "Nicole Tan", "Desmond Ng", "Cindy Lim",
"Joey L"}. For each user-object predicate pred, we construct a
i,j ∈ [−1, 1]
similarity matrix Spred in which each element Spred
measures the similarity between two objects oi, oj ∈ Opred.
i,j = 1 when oi and oj are identical , and = −1 when
Spred
oi and oj are completely different. There are a few ways
to measure similarities between objects. For example, Jaro-
Winkler distance [2] has been used to measure the similarity
between two names, and deep learning techniques can help us
measure how similar two profile images are. In the experiment
section, we will elaborate the similarities between different
types of data objects in more details.
For each data object o, we define vo to be the embedding
vector of o. To learn object embeddings, we define the
objective function in Equation 1. This function aims to keep
the embedding vectors of similar data objects to be close to
each other in the object embedding space.
(cid:88)
i,j
oi
i,i = 1, v(cid:62)
voi = voi2
where {vo}o∈Opred are the object embedding vectors, and
Spred is the given similarity matrix. We learn {vo}o∈Opred
by minimizing errorpred.
Ideally, {vo}o∈Opred would preserve all the information in
the similarity matrix Spred leading to errorpred = 0. More
importantly, because Spred
2 will be
close to 1, i.e. all the embedding vectors {vo} are near to
the surface of a unit hypersphere. It means cos(voi, voj ) ≈
v(cid:62)
. Therefore, if oi and oj are similar, voi
oi
and voi will be close to each other in the embedding space.
Figure 1 illustrates how the names are embedded in the name
embedding space. We can see that "Desmond Ng" is close to
"Desmond", but far from "C L" in the embedding space.
In practice, the similarity matrix Spred may be huge, i.e.
O((U s + U t)2). In order to speed up learning, we can
just focus on the similar object pairs. By employing block-
ing techniques such as inverted index and Locality-Sensitive
voj ≈ Spred
i,j
3
errorpred =
(v(cid:62)
oi
voj − Spred
i,j
)2
(1)
f (Fpred) =
Hashing (LSH) we can build a sparse similarity matrix Spred.
Afterwards, stochastic gradient descent is applied to minimize
errorpred.
C. Factoid Embedding
In this step, we learn user identities' latent representations
by embedding the generated user-object and user-user factoids.
We let U a denote the set of all user identities in the
unified network (i.e. U a = U s ∪ U t) and Fpred denote
the set of factoids with a predicate pred, e.g. Ff ollows =
{(cid:104)ui, f ollows, uj(cid:105)}, Fhas name = {(cid:104)ui, has name, o(cid:105)}.
i.e.
Suppose we have d types of user-object predicates,
{pred1, ..., predd}.
For each user-object factoid in Fpred, we define its proba-
bility as follows.
prob(ui, pred, o) =
(cid:80)
exp(v(cid:62)
u(cid:48)∈U a exp(v(cid:62)
· φpred(vo))
u(cid:48) · φpred(vo))
ui
(2)
where vui
is the embedding vector of user identity ui, vo
is the embedding vector of data object o, and φpred is a
projection function which maps vo to the user embedding
space. Note that we have learned vo in the object embedding
step. Particularly, we impose such a constraint on φpred that
it is a Lipschitz continuous function, i.e. there is a a constant
C such that φpred(x)− φpred(y) < C ·x− y for any x and
y in the space. In other words, if two objects are similar i.e.
voi ≈ voj then their projections will be close to each other i.e.
φpred(voi) ≈ φpred(voj ). In this work, we set φpred(vo) as a
linear function, i.e. φpred(vo) = Wpred · vo + bpred, where
Wpred and bpred are unknown parameters, and Wpred's norm
Wpred is limited. We leave other non-linear choices of
φpred(vo) for future work. Given all the user-object factoids in
Fpred, i.e. {(cid:104)ui, pred, o(cid:105)}, we define the following objective
function.
log(prob(ui, pred, o))
(3)
(cid:104)ui,pred,o(cid:105)∈Fpred
Similarly, for each user-user factoid in Ff ollows, we define
its probability as follows.
ui
prob(ui, f ollows, uj) =
exp(v(cid:62)
u(cid:48)∈U a exp(v(cid:62)
· φf ollows(vuj ))
u(cid:48) · φf ollows(vuj ))
(4)
We set φf ollows(vu) = Wf ollows · vu + bf ollows, where
Wf ollows's norm Wpred is limited. Given all the user-
user factoids in Ff ollows, i.e. {(cid:104)ui, f ollows, uj(cid:105)},we define
the following objective function.
(cid:88)
(cid:80)
(cid:88)
f (Ff ollows) =
log(prob(ui, f ollows, uj))
(cid:104)ui,f ollows,uj(cid:105)∈Ff ollows
(5)
We learn user embedding vectors {vu}u∈U a by solving the
following multi-objective optimization problem.
2 repeat
3
4
for pred ∈ {pred1, . . . , predd} do
sample a batch of user-object factoids FB
Fpred;
for (cid:104)ui, pred, o(cid:105) ∈ FB
pred do
sample K "fake" factoids {(cid:104)uk, pred, o(cid:105)}K
update vu according to ∂f (ui,pred,o)
;
pred from
k=1;
end
update Wpred and bpred (once for a certain # of
iterations);
∂vu
end
sample a batch of user-user factoids FB
Ff ollows;
for (cid:104)ui, f ollows, uj(cid:105) ∈ FB
sample K "fake" factoids
{(cid:104)uk, f ollows, uj(cid:105)}K
k=1;
update vu according to ∂f (ui,f ollows,uj )
f ollows do
;
∂vu
f ollows from
end
update Wf ollows and bf ollows (once for a certain #
of iterations);
17 until convergence or reach maximum # of iterations;
18 return {vu}u∈U a.
5
6
7
8
9
10
11
12
13
14
15
16
max{vu}(f (Ff ollows), f (Fpred1), ..., f (Fpredd ))
(6)
Once we learned {vu}u∈U a, we link user identities from
different OSNs by simply comparing the distance between
their embedding vectors. For example, in the user embedding
space in Figure 1, as user ID 1's nearest neighbor is user ID
6, we link them as the same person.
D. Optimization
optimize f (Ff ollows), f (Fpred1), . . . , f (Fpredd ) in turn.
To solve the multi-objective optimization in Equation 6, we
As optimizing each objective function f (F) is computation-
ally expensive, we adopt the approach of negative sampling
proposed in [3]. Particularly, for each factoid (cid:104)ui,·,·(cid:105), K
"fake" factoids are introduced, i.e. {(cid:104)uk,·,·(cid:105)}, where uk are
sampled from some noise distribution P (u). More specifically,
for a user-user factoid (cid:104)ui, f ollows, uj(cid:105) ∈ Ff ollows, we
specifies the following objective function for it:
· φf ollows(vuj ))+
f (ui, f ollows, uj) = log σ(v(cid:62)
ui
K(cid:88)
k=1
Euk∼P1(u)[log σ(−v(cid:62)
uk
· φf ollows(vuj ))]
(7)
1
1+exp(−x) is the sigmoid function. The first
where σ(x) =
term models the observed factoid, and second term models
the "fake" factoids and K is the number of "fake" factoids.
We set P1(u) ∝ d3/4
as proposed in [3], where d is the out-
degree of u in the unified network. For a user-object factoid
(cid:104)ui, pred, o(cid:105) ∈ Fpred, its objective function is as follows.
f (ui, pred, o) = log σ(v(cid:62)
u
K(cid:88)
ui
· φpred(vo))+
Euk∼P2(u)[log σ(−v(cid:62)
uk
· φpred(vo))]
(8)
k=1
And we set P2(u) as a uniform distribution over U a.
Then stochastic gradient descent is used to optimize Equa-
tions 7 and 8. Algorithm 1 gives an overview of Factoid
Embedding. Suppose object embeddings and user embed-
dings have the same dimension m. The time complexity for
each update operation in Algorithm 1 is O(K · m2). So
the time complexity for Algorithm 1 goes through all the
user-object factoids and all the user-user factoids once are
O((U s + U t) · d · K · m2) and O((E s + E t) · K · m2)
respectively.
When we optimize f (ui, pred, o), we actually push vui in
the direction of φpred(vo). It means that, user identities who
share similar objects will be pushed towards each other. (There
is also a similar effect for f (ui, f ollows, uj).) This explains
why Factoid Embedding is able to push similar user identities
close to each other in the user embedding space.
4
ALGORITHM 1: Factoid Embedding
Input: Ff ollows,Fpred1, . . . ,Fpredd: the factoids with
Input: {vo}o∈Opred1
, . . . ,{vo}o∈Opredd
different predicates.
: the object
embeddings for user-object predicates:
pred1, . . . , predd.
Output: {vu}u∈U a.
1 Initialize {vu}u∈U a, Wf ollows, bf ollows, {Wpredi}d
{bpredi}d
i=1;
i=1,
III. EXPERIMENT
A. Data Collection
We evaluate our proposed Factoid Embedding using data
sets from three popular OSNs, namely, Twitter, Facebook and
Foursquare. We first gathered a set of Singapore-based Twitter
users who declared Singapore as location in their user profiles.
From the Singapore-based Twitter users, we retrieve a subset
of Twitter users who declared their Facebook or Foursquare
accounts in their short bio description as the ground truth.
Table II summarizes the statistics of our dataset.
B. Factoid Generation & Object Embedding
The user-user and user-object factoids as described in Sec-
tion II-A are generated using the user information from the
OSNs used in our experiment.
We then calculate the similarity matrices for the data
objects. We use Jaro-Winkler distance [2] to measure username
and screen name similarity.
To measure the similarities
between two profile images, we first use the deep learning
model VGG16 with weights pre-trained on ImageNet2 to
2https://keras.io/applications/#vgg16
Dataset
Network
# Users
# Links
Available Information
# Ground truth matching pairs
TABLE II: Datasets.
Facebook-Twitter
Foursquare-Twitter
Facebook
17,359
224,762
Twitter
20,024
165,406
Foursquare
21,668
312,740
Twitter
25,772
405,590
username,screen name, profile image, network
screen name, profile image, network
1,998
3,602
extract a feature vector for each profile image. The cosine
similarity between the two profile image feature vectors is then
computed. Finally, we embed the data objects {vo}o∈Opred
for each pred (e.g. username) by using stochastic gradient
descent to minimize errorpred in Equation 1.
C. Evaluation Baselines and Metrics
1) Supervised Methods.
• ULink [4] (S1): a supervised method which models
the map from the observed data on the varied
social platforms to the latent user space. The node
representations learned by Deepwalk3, concatenated
with other object embedding vectors are used as user
identity features. The code provided by the author
is used for UIL.
• Logistic Regression (LR) (S2): The following fea-
tures are used: username similarity, screen name
similarity, profile image similarity and the social
status in network as defined in [5].
2) Semi-Supervised Methods.
• COSNET [5] (SS1): an energy-based model which
considers both local and global consistency among
multiple networks. The candidate matching graph
is generated based on profile-based features: user-
name, screen name and profile image. The public
code is used for UIL4.
• IONE [6] (SS2): a network embedding based ap-
proach. Ground truth matching user identity pairs
are needed to transfer the context of network struc-
ture from the source network to the target net-
work. The original version of IONE uses network
information only for UIL. For a fair comparison,
we introduce more anchor links by linking user
identities which share the same username, screen
name or profile image.
• Factoid Embedding* (FE*) (SS3): Our proposed
Factoid Embedding with labeled matching user
identity pairs. Specifically, we adapt our solution to
a semi-supervised version by merging the matching
user identities into one node in the unified network.
The merged user identities therefore share the same
embedding vectors.
3) Unsupervised Methods.
• Name (U1): an unsupervised approach based on
name similarity, which is reported as the most
3https://github.com/phanein/deepwalk
4https://aminer.org/cosnet
5
discriminative feature for UIL [7]. Here it can refer
to username or screen name. We present whichever
has the better performance.
• CNL [8] (U2): An unsupervised method which links
users across different social networks by incorporat-
ing heterogeneous attributes and social features in a
collective manner. The code provided by the author
is used for UIL.
• Factoid Embedding (FE) (U3): Our proposed Fac-
toid Embedding without any labeled matching user
identity pairs.
For each ground truth matching pairs (us∗, ut∗), we rank all
the target users, i.e. ut ∈ Gt according to cos(vus∗ , vut). To
quantitatively evaluate this ranking, we employ the following
two metrics:
• HitRate@K (HR@K) in which a ranking is considered
as correct if the matching user identity ut∗ is within the
top K candidates, i.e. rank(ut∗) ≤ K.
• Mean Reciprocal Rank (MRR) is defined as follows.
(cid:88)
M RR =
1
n
1
rank(ut∗)
(us∗,ut∗)
where (us∗, ut∗) is a ground truth pair, and n is the
number of all the ground truth pairs.
D. Experimental Results
Prediction Performance. We randomly partition the ground
truth matching user identity pairs into five groups and conduct
five-fold cross-validation. Table III presents the overall perfor-
mance of the comparison methods on the Facebook-Twitter
data set. It shows that, our proposed Factoid Embedding
(SS3/U3) yields the best MRR result. Although ULink per-
forms best on HR@1, Factoid Embedding outperforms it on
both HR@K and MRR. The reason may be that, as a super-
vised approach ULink may link precisely the user identity pairs
which can be represented by the training dataset. However,
for the user identity pairs outside the labeled matching pairs,
ULink may lose the ability to match them correctly. In contrast,
by embedding factoids, Factoid Embedding is able to link
such user identity pairs in an unsupervised manner. It explains
why ULink has highest HR@1 but relatively low HR@30. It
is a common problem for the supervised solutions for UIL
because, as we mentioned in the introduction, the labeled
dataset is quite small compared to the whole population. We
also can observe that the Factoid Embedding outperforms
the existing network embedding approach IONE(SS2), which
makes use of the network information only. Interestingly, it
TABLE III: Performance on Facebook-Twitter Dataset
S/N Method
S1
ULink
LR
S2
COSNET
SS1
IONE
SS2
FE*
SS3
U1
Name
CNL
U2
U3
FE
HR@1
0.7071
0.5965
0.6586
0.5605
0.6851
0.5825
0.5930
0.6781
HR@2
0.7285
0.6551
0.7242
0.5695
0.7322
0.6226
0.6225
0.7292
HR@3
0.7414
0.6906
0.7337
0.5725
0.7567
0.6406
0.6387
0.7542
HR@4
0.7471
0.7117
0.7367
0.5730
0.7747
0.6521
0.6451
0.7732
HR@5
0.7557
0.7262
0.7382
0.5750
0.7822
0.6626
0.6506
0.7827
HR@10
0.7757
0.7837
0.7417
0.5805
0.8098
0.6886
0.6701
0.8103
TABLE IV: Performance on Foursquare-Twitter Dataset
S/N Method
ULink
S1
LR
S2
SS1
COSNET
IONE
SS2
FE*
SS3
Name
U1
CNL
U2
U3
FE
HR@1
0.5464
0.5285
0.5421
0.4081
0.5541
0.5227
0.5283
0.5433
HR@2
0.5843
0.5913
0.5905
0.4158
0.6021
0.5730
0.5786
0.5957
HR@3
0.6032
0.6171
0.6116
0.4225
0.6293
0.5980
0.6050
0.6210
HR@4
0.6232
0.6388
0.6238
0.4269
0.6440
0.6154
0.6172
0.6374
HR@5
0.6399
0.6473
0.6340
0.4297
0.6546
0.6332
0.6408
0.6482
HR@10
0.6766
0.6862
0.6585
0.4408
0.6979
0.6768
0.6877
0.6937
HR@30
0.8042
0.8098
0.7452
0.6031
0.8508
0.7232
0.7327
0.8493
HR@30
0.7397
0.7384
0.6693
0.4733
0.7456
0.7293
0.7388
0.7423
MRR
0.7102
0.6592
0.6964
0.5698
0.7297
0.6201
0.6284
0.7254
MRR
0.5915
0.5882
0.5826
0.4212
0.6029
0.5741
0.5853
0.5944
can be seen that the performance of our unsupervised Factoid
Embedding (U3) is very close to the semi-supervised version
(SS3). One possible explanation is that SS3 just merges the
matching pairs into one node, but does not learn from the
labeled matching pairs like other supervised solutions e.g.
ULink. Realizing that
the performance of name similarity
(U1) is relatively good, we think, by "pushing" similar user
identities close to each other, U3 is able to "merge" these
matching pairs in the user embedding space by itself. Thus
the performances of U3 and SS3 are not significantly different.
Table IV shows the results on the Foursquare-Twitter Dataset,
which are consistent to that in Table III. We can therefore
conclude that our proposed Factoid Embedding performs
best in both the unsupervised and supervised settings.
Parameter Analysis. We investigate the performance w.r.t.
the embedding dimension and the number of iterations on the
Facebook-Twitter dataset. Figure 2(c) shows that the MRR per-
formance of Factoid Embedding improves as the dimension
increases. Figure 2 (d) shows the MRR performances over dif-
ferent numbers of iterations. We can see that the performance
improves more significantly in the early iterations.
(a)
(b)
Fig. 2: (a) Performance over Dimensions of User Embedding.
(b) Performance over Iterations.
6
IV. CONCLUSION
In this paper, we proposed a novel framework Factoid
Embedding, which adopts an unsupervised approach to cope
with heterogeneity in user information and link users identities
across multiple OSNs. We evaluated Factoid Embedding
using real-world datasets from three OSNs and benchmarked
against the state-of-the-art UIL solutions. Our experimental
results show that Factoid Embedding outperforms the state-
of-the-art UIL solutions even in situations where the names of
the user identities are dissimilar.
ACKNOWLEDGMENT
This research is supported by the National Research Foun-
dation, Prime Minister's Office, Singapore under its Interna-
tional Research Centres in Singapore Funding Initiative.
REFERENCES
[1] K. Shu, S. Wang, J. Tang, R. Zafarani, and H. Liu, "User identity linkage
across online social networks: A review," SIGKDD Explorations, vol. 18,
no. 2, 2016.
[2] W. W. Cohen, P. Ravikumar, and S. E. Fienberg, "A comparison of string
distance metrics for name-matching tasks," in IJCAI, 2003.
[3] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, "Dis-
tributed representations of words and phrases and their compositionality,"
in NIPS, 2013.
[4] X. Mu, F. Zhu, E. Lim, J. Xiao, J. Wang, and Z. Zhou, "User identity
linkage by latent user space modelling," in SIGKDD, 2016.
[5] Y. Zhang, J. Tang, Z. Yang, J. Pei, and P. S. Yu, "COSNET: connecting
heterogeneous social networks with local and global consistency," in
SIGKDD, 2015.
[6] L. Liu, W. K. Cheung, X. Li, and L. Liao, "Aligning users across social
networks using network embedding," in IJCAI, 2016.
[7] A. Malhotra, L. C. Totti, W. M. Jr., P. Kumaraguru, and V. A. F.
Almeida, "Studying user footprints in different online social networks,"
in ASONAM, 2012.
[8] M. Gao, E. Lim, D. Lo, F. Zhu, P. K. Prasetyo, and A. Zhou, "CNL:
collective network linkage across heterogeneous social platforms," in
ICDM, 2015.
|
1706.08184 | 2 | 1706 | 2017-06-27T01:00:24 | A preference elicitation interface for collecting dense recommender datasets with rich user information | [
"cs.SI",
"cs.IR"
] | We present an interface that can be leveraged to quickly and effortlessly elicit people's preferences for visual stimuli, such as photographs, visual art and screensavers, along with rich side-information about its users. We plan to employ the new interface to collect dense recommender datasets that will complement existing sparse industry-scale datasets. The new interface and the collected datasets are intended to foster integration of research in recommender systems with research in social and behavioral sciences. For instance, we will use the datasets to assess the diversity of human preferences in different domains of visual experience. Further, using the datasets we will be able to measure crucial psychological effects, such as preference consistency, scale acuity and anchoring biases. Last, we the datasets will facilitate evaluation in counterfactual learning experiments. | cs.SI | cs |
A preference elicitation interface for collecting dense
recommender datasets with rich user information
Pantelis P. Analytis
Cornell University
[email protected]
Demo
Tobias Schnabel
Cornell University
[email protected]
Stefan Herzog
MPI for Human Development
[email protected]
Daniel Barkoczi
MPI for Human Development
[email protected]
Thorsten Joachims
Cornell University
[email protected]
ABSTRACT
We present an interface that can be leveraged to quickly and ef-
fortlessly elicit people's preferences for visual stimuli, such as
photographs, visual art and screensavers, along with rich side-
information about its users. We plan to employ the new interface to
collect dense recommender datasets that will complement existing
sparse industry-scale datasets. The new interface and the collected
datasets are intended to foster integration of research in recom-
mender systems with research in social and behavioral sciences. For
instance, we will use the datasets to assess the diversity of human
preferences in different domains of visual experience. Further, using
the datasets we will be able to measure crucial psychological effects,
such as preference consistency, scale acuity and anchoring biases.
Last, we the datasets will facilitate evaluation in counterfactual
learning experiments.
CCS CONCEPTS
• Human-centered computing → Collaborative filtering; So-
cial media; Collaborative and social computing devices;
KEYWORDS
preference elicitation, recommender system datasets, visual art
1 INTRODUCTION
Over the last three decades the recommender systems community
has made immense progress in the way we represent, understand
and learn people's preferences as a function of previously collected
explicit or implicit evaluations. Research in recommender systems
has by all means increased the quality of the curated and recom-
mended content in the online world. Several large datasets have
been a crucial component of this success, as they have commonly
functioned as test-beds on which new theories and algorithms have
been compared (Movielens, LastFM and Netflix to name just a few).
Most of these datasets, however, are very sparse. They contain
thousands items and even the most popular among the items have
been evaluated only by a small subset of their users. Given the large
fraction of missing ratings, it is challenging to accurately estimate
even simple quantities like the average quality of an item, especially
since the patterns of missing data are subject to strong selection
Recsys'17, August 2017, Como, Italy
2018. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00
https://doi.org/10.1145/nnnnnnn.nnnnnnn
biases [6]. This presents fundamental challenges when evaluating
recommendation algorithms on sparse datasets. Further, it becomes
an obstacle for scholars in the social and behavioral sciences as
workarounds have to be developed for dealing with missing values.
To the best of our knowledge, the only dense collaborative filter-
ing dataset was the outcome of the Jester Interface [3]. The interface
curated 100 jokes of various styles and topics. People utilized a slider
to evaluate 5 jokes that were presented to them sequentially. The
first evaluations were used to estimate people's preferences and to
recommend them the remaining jokes. The users continued to read
and evaluate jokes until the pool of 100 items was exhausted. In
total, more than 70.000 people have evaluated at least some of the
jokes, and more than 14.000 have evaluated all the jokes, resulting
to a fully evaluated subset of the dataset.
Figure 1: The design of the preference elicitation interface.
We replicate the design of the Jester interface, using a contin-
uous bar that people can use to express how much they liked
or disliked an item. Participants have to wait for at least 5
seconds before they can proceed to the next item.
2 THE INTERFACE AND DATA COLLECTION
We plan to collect new datasets in different domains of people's vi-
sual experience, ranging from photographs and paintings to designs
for screensavers. Our interface replicates the design of the Jester
interface, adding new elements that can counteract its limitations.
At the outset, people are provided with instructions about how to
use the interface. Then, before the presentation of the stimuli we
collect demographic information about the users. To reduce possi-
ble order effects, the visual stimuli are presented in random order.
As in Jester, users are asked to evaluate items using a slider bar;
they can move the marker of the slide bar to the left to indicate that
they did not like the item, or to the right to indicate that they liked
it. We implement a continuous scale, which allows a fine-grained
evaluation of the presented items. Finally, to limit anchoring bias,
the slide bar is initially semi-transparent and the colors become
vivid only when the user has clicked on it.1
Once all the items have been evaluated, we collect further psy-
chologically relevant information about the users. Numerous stud-
ies have shown that side information can substantially improve
estimates of people's preference and it complements first hand eval-
uations [5]. In the first experiments we will deploy the visual-art
expertise questionnaire developed by Chatterjee et al. [2] to gauge
people's familiarity with the visual arts and a succinct version of the
big-five questionnaire to quickly assess the people's personalities
[7] (see Figure 2). It takes about 20 minutes to complete the current
version of the interface, including the instructions, questionnaires
and evaluation phase.
We intend to conduct the first experiments at Amazon's Mechani-
cal Turk labor market. Several studies have shown that for effortless
tasks the results produced on mTurk are comparable to laboratory
studies [4]. The visual stimuli used in this interface evoke imme-
diate aesthetic judgments, and thus can quickly be transformed
to evaluations. Eventually, we intend to develop a data visualiza-
tion tool that will reward people who complete the study with
information about their preference profiles and how they relate to
those of other individuals. Thus, we intend to create an inherently
motivating interface using as a reward the informational value gen-
erated by the collected data. In this way, we will reduce the cost of
data collection, but also introduce basic ideas behind collaborative
filtering and recommender systems to the wider public.
3 POTENTIAL APPLICATIONS
We envisage several new applications for the developed datasets.
Here we foreshadow a few of these potential uses, keeping in mind
that the community that will have access to the produced datasets
will certainly come up with more. First, they will facilitate cross-
fertilization with the cognitive and behavioral sciences. For instance,
social and cognitive psychologists have extensively studied simple
strategies for inference and estimation where different features are
used to predict an objective truth. The new datasets will open the
way to study strategies for social preference learning in domains
where no objective truth exists [1]. Also, we can manipulate the
design of the interface to study relevant behavioral effects, such as
to study the consistency of evaluations or to investigate the effect
1The interface can be accessed at http://abc-webstudy.mpib-berlin.mpg.de/recstrgs/
study_simulator.php. Both the code for the interface and the collected data will be
publicly available.
2
Figure 2: At the end of the evaluation phase we collect addi-
tional information about the users. We invited the users to
complete a questionnaire about their expertist in the visual
arts and a 10-question version of the big-five questionnaire.
of the granularity of the evaluation scale on the predictions. To
sum up, the datasets will allow us to better understand preference
diversity and its implications for different recommender systems
algorithms as well as for psychological social learning strategies.
Moreover, we believe that the new datasets can fuel existing
streams of research in recommender systems and machine learning.
For instance, dealing with selection-biases and with data missing
not at random is a growing research stream in recommender sys-
tems and machine learning [9]. To evaluate algorithms tuned to
deal with such problems, we can impose selection biases ex-ante
and remove data from the dense dataset accordingly. This set-up
could complement existing sparse datasets for learning, with the
difference that selection biases can be controlled and varied in order
to test robustness. Moving on to the broader class of counterfactual
simulations, dense datasets greatly simplify evaluation since they
can serve as ground-truth when conducting simulations [8].
REFERENCES
[1] Pantelis P Analytis, Daniel Barkoczi, and Stefan M Herzog. You're special, but
it doesn't matter if you're a greenhorn: Social recommender strategies for mere
mortals. In Cognitive Science Society, pages 1799 -- 1804. Cognitive Science Society,
2015.
[2] Anjan Chatterjee, Page Widick, Rebecca Sternschein, William B Smith, and Bianca
Bromberger. The assessment of art attributes. Empirical Studies of the Arts,
28(2):207 -- 222, 2010.
[3] Ken Goldberg, Theresa Roeder, Dhruv Gupta, and Chris Perkins. Eigentaste: A
constant time collaborative filtering algorithm. Information Retrieval, 4(2):133 -- 151,
2001.
[4] Gabriele Paolacci, Jesse Chandler, and Panagiotis G Ipeirotis. Running experiments
on Amazon Mechanical Turk. Judgment and Decision Making, 5(5), 2010.
[5] Seung-Taek Park and Wei Chu. Pairwise preference regression for cold-start
recommendation. In Proceedings of the third ACM conference on Recommender
systems, pages 21 -- 28. ACM, 2009.
[6] B. Pradel, N. Usunier, and P. Gallinari. Ranking with non-random missing ratings:
influence of popularity and positivity on evaluation metrics. In RecSys, pages
147 -- 154, 2012.
[7] Beatrice Rammstedt and Oliver P John. Measuring personality in one minute
or less: A 10-item short version of the big five inventory in english and german.
Journal of Research in Personality, 41(1):203 -- 212, 2007.
[8] Matthew J Salganik, Peter Sheridan Dodds, and Duncan J Watts. Experimental
study of inequality and unpredictability in an artificial cultural market. Science,
311(5762):854 -- 856, 2006.
[9] Tobias Schnabel, Adith Swaminathan, Peter I Frazier, and Thorsten Joachims.
Unbiased comparative evaluation of ranking functions. In ICTIR, pages 109 -- 118,
2016.
|
1904.05331 | 2 | 1904 | 2019-08-21T20:36:12 | Flavour Enhanced Food Recommendation | [
"cs.SI",
"cs.HC",
"cs.IR"
] | We propose a mechanism to use the features of flavour to enhance the quality of food recommendations. An empirical method to determine the flavour of food is incorporated into a recommendation engine based on major gustatory nerves. Such a system has advantages of suggesting food items that the user is more likely to enjoy based upon matching with their flavour profile through use of the taste biological domain knowledge. This preliminary intends to spark more robust mechanisms by which flavour of food is taken into consideration as a major feature set into food recommendation systems. Our long term vision is to integrate this with health factors to recommend healthy and tasty food to users to enhance quality of life. | cs.SI | cs | Flavour Enhanced Food Recommendation
Bangalore, Karnataka, India 560085
Bangalore, Karnataka, India 560085
Nitish Nag
[email protected]
University of California, Irvine
Irvine, California, United States of
America 92697
Kushal Samir Mehta
[email protected]
PES University
100 Feet Ring Road
Aditya Narendra Rao
[email protected]
PES University
100 Feet Ring Road
Nishant Bha(cid:138)acharya
[email protected]
PES University
100 Feet Ring Road
Akash Kulhalli
[email protected]
PES University
100 Feet Ring Road
Pratul Ramkumar
[email protected]
PES University
100 Feet Ring Road
9
1
0
2
g
u
A
1
2
]
I
S
.
s
c
[
2
v
1
3
3
5
0
.
4
0
9
1
:
v
i
X
r
a
Bangalore, Karnataka, India 560085
Bangalore, Karnataka, India 560085
Bangalore, Karnataka, India 560085
Aditya Bharadwaj
[email protected]
PES University
100 Feet Ring Road
Bangalore, Karnataka, India 560085
Dinkar Sitaram
[email protected]
PES University
100 Feet Ring Road
Bangalore, Karnataka, India 560085
Ramesh Jain
[email protected]
University of California, Irvine
Irvine, California, United States of
America 92697
ABSTRACT
We propose a mechanism to use the features of (cid:131)avour to enhance
the quality of food recommendations. An empirical method to de-
termine the (cid:131)avour of food is incorporated into a recommendation
engine based on major gustatory nerves. Such a system has ad-
vantages of suggesting food items that the user is more likely to
enjoy based upon matching with their (cid:131)avour pro(cid:128)le through use
of the taste biological domain knowledge. (cid:140)is preliminary intends
to spark more robust mechanisms by which (cid:131)avour of food is taken
into consideration as a major feature set into food recommenda-
tion systems. Our long term vision is to integrate this with health
factors to recommend healthy and tasty food to users to enhance
quality of life.
CCS CONCEPTS
•Information systems → Collaborative (cid:128)ltering; Personaliza-
tion; Collaborative (cid:128)ltering; Recommender systems; Person-
alization;
KEYWORDS
food computing, personal health navigation, recommendation sys-
tems, (cid:131)avor, (cid:131)avour, taste, gustatory media
ACM Reference format:
Nitish Nag, Aditya Narendra Rao, Akash Kulhalli, Kushal Samir Mehta, Nis-
hant Bha(cid:138)acharya, Pratul Ramkumar, Aditya Bharadwaj, Dinkar Sitaram,
and Ramesh Jain. 2019. Flavour Enhanced Food Recommendation.
In
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation
on the (cid:128)rst page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a
fee. Request permissions from [email protected].
MADiMa '19, Nice, France
© 2019 ACM. 978-1-4503-6916-9/19/10...$15.00
DOI: 10.1145/3347448.3357169
Figure 1: Mammalian taste receptors are the basic unit of
biological taste. Understanding the features which impact
these receptors is the fundamental start to pro(cid:128)ling users
and food in their culinary preferences. As biological discov-
eries in protein structure and function of taste are uncov-
ered, the knowledge must be incorporated into the recom-
mendation systems and health navigation paradigms [16].
Proceedings of 5th International Workshop on Multimedia Assisted Dietary
Management, Nice, France, October 21, 2019 (MADiMa '19), 6 pages.
DOI: 10.1145/3347448.3357169
1 INTRODUCTION
Food is essential for human life. Beyond sustaining health by pro-
viding nourishment, it is also an integral part of human culture
and quality of life. Modern information about nutrition and food
fosters development of food computing methods [9]. (cid:140)e notion of
food computing involves obtaining food data and identifying areas
where it can be applied e(cid:130)ectively, such as health, food sciences,
culinary art, and human behaviour. Food computing collects data
from multiple sources and involves tasks such as perception, recog-
nition, retrieval, recommendation, prediction and monitoring of
Figure 2: Platform Architecture
food intake. One of the key outcomes of food computing is under-
standing the relationship between dietary choices and health state
[10, 12]. A healthy diet promotes overall well-being and lowers the
risk of chronic diseases. To aid in building a healthy diet, algorithms
can potentially compute health scores for food items based on the
users health status [10, 12], the item nutritional features, along with
context and other environmental factors [11]. However, healthy
food su(cid:130)ers from the adoption problem, since healthy food can be in
con(cid:131)ict with taste preferences [5]. (cid:140)is perception results in people
consuming food without full regard for the e(cid:130)ects on their overall
health. In this work, we describe a preliminary recommendation
system that incorporates taste preferences. We determine to what
extent the characteristics of dishes, namely (cid:131)avour and cuisine, and
user inclination a(cid:130)ects the quality of food recommendations. In
combination, we hope this concept is used to help individuals make
health-aware dietary choices that are enjoyable.
2 RELATED WORK
Modern recommendation systems proactively identify and provide
a user with ranked search results that are context-aware. Earlier
food recommendation engines use TF-IDF to generate vectors from
food items while taking into account food database information
[2]. An input to these systems is generally a question similar to
"what's for lunch". Evaluation of these early systems used tradi-
tional metrics such as accuracy, precision, and recall. Unfortunately
these metrics fail to capture the quality of recommendations in
relationship to real world implementation for enjoyment or health.
E(cid:130)ectively extending the food recommendation to incorporate the
individual health state criteria and culinary (cid:131)avour and user pref-
erences will be the next evolution of more personalized food rec-
ommendation [4, 6, 7, 10, 12]. (cid:139)alitative analysis based on user
feedback will also be essential to improving quality of recommen-
dations. Approaches where users are clustered into distinct groups
unfortunately may reduce the personal level recommendation [14].
Other approaches involve various levels of personalizing outputs
for a user with a unique focus. For instance some evaluations are
more focused on usability and appeal of the recommendations, user
Table 1: Database Statistics
User Database, Users with greater than 5 reviews
User Database, Total reviews
User Database, Unique Users
Food Database, Total Dishes
Food Database, Indian Dishes
30,193
22,625
466
1381
1051
previously speci(cid:128)ed interests, or based on a certain demographics
[1, 3, 8]. Furthermore, perceptions of what is healthy or tasty vary
greatly among people [13]. Many of these research e(cid:130)orts have
primarily focused on meeting dietary and nutritional constraints.
(cid:140)is is why we see value in building the research body on (cid:131)avour
characteristics.
3 OVERVIEW
Like most other recommendation systems, ours uses two database
components of items and users to form the input. Food items were
curated containing their ingredient list, nutritional values and their
cuisines were obtained from public food websites. We target food
items that re(cid:131)ect the diet of the South Asian audience. Additionally,
to account for the regional variety, food items were crowd-sourced
by sending out surveys to 200 users.
(cid:140)is resulted in a food database containing 1381 items. To ac-
count for missing values, we used a nutrition facts database (MyFit-
nessPal) to (cid:128)ll in the gaps for nutritional values, while the cuisines
were manually tagged. (cid:140)e second component of user pro(cid:128)les was
constructed by obtaining user reviews for the food items that were
previously scraped from public domain websites and crowd-sourced
ratings for the most recent items consumed. User reviews were
then used to build a user preferences pro(cid:128)le. For each food item
in the curated database, we estimate the intensity of the (cid:128)ve basic
(cid:131)avours of sweet, salty, richness, umami and bi(cid:138)er on a scale of 1 to
10, 10 indicating highest intensity. (cid:140)is is done by identifying and
quantifying the most in(cid:131)uential chemicals for each (cid:131)avour from
the dish. We did not address the basic taste of sour in this work
due to challenges in empirically pro(cid:128)ling the (cid:131)avour from the data
we gathered.
Once the (cid:131)avour scores for all food items have been generated,
we consider it as an additional feature for the recommendation
engine. (cid:140)is means that each food item will have the (cid:128)ve (cid:131)avour
scores as (cid:128)ve extra dimensions. We then apply a similarity score
to predict how much a user will rate another food item based on
previous ratings.
4 IMPLEMENTATION
4.1 Flavour Computing
An objective (cid:131)avour metric is a scale that looks purely at the content
of the food item without considering any external factors such as
user/cooking preferences. A prime example of this is the Scoville
scale, which measures the heat of spiciness of chilli peppers based
on the amount of capsaicin present in it. However, no such metric
exists for other (cid:131)avours. A(cid:138)empts have been made to establish a
relationship between nutrients and taste [15]. We follow a similar
approach and a(cid:138)empt to identify the elements that in(cid:131)uence each
(cid:131)avour the most based on biological receptor functioning as shown
in Figure 1. In all the calculations mentioned below, the total weight
considered is the Total Active Nutrient Weight (in grams) (TANW)
of the dish.
(1) Salt:
(cid:140)e quantity of sodium indicates the saltiness of a dish.
To highlight the prominence of sodium in the dish relative
to its weight, we identify the ratio between the total sodium
present in the dish and the total nutritional weight. (cid:140)is
value is then normalized for soduium chloride, by using
the molar masses of 22.99 and 35.45 g/mol respectively, 100
g of NaCl contains 39.34 g Na and 60.66 g Cl.
100
38.758 · Sodium content(❕)
T ANW
(1)
Salt Score =
(2) Sweet:
(cid:140)e carbohydrate content in foods consists of monosac-
charides, disaccharides and polysaccharides. Monosaccha-
rides (glucose, fructose) and disaccharides (sucrose) con-
tribute positively towards the sweetness of a dish, while
indeigestable polysaccharides (dietary (cid:128)bres) negate their
e(cid:130)ects. We do a weighted addition of the two components
to compute the sweetness score.
su❕ar(❕) − f ibre(❕)
Sweet(A) =
Sweet(B) =
carbohydrates(❕)
Final sweet score = x · A + y · B
T ANW
su❕ar(❕)
where x and y are 0.85 and 0.1, respectively.
(2)
y · k(cid:48)
0
'too bi(cid:138)er'. (cid:140)e rank of each ingredient for each group is
added and a weighted addition is performed, taking into
account the iron content.
Bitter score = x · k
0
(bitter value) +
(3)
(too bitter value) + z · iron content(❕)
where x, y, and z are weights with the values 0.8, 2.4 and
1.3, while k and k(cid:48) are the number of ingredients tagged
as bi(cid:138)er and too bi(cid:138)er respectively. (cid:140)e values for bitter
are assigned to ingredients based on a relative intensity of
bi(cid:138)erness, normalized to 1.
(4) Umami:
(cid:140)e umami taste is biologically sensed by the amino
acid glutamate receptor, which is prominent in protein-
rich dishes. (cid:140)e ingredients were divided into groups like
meats, vegetables, umami enhancers (MSG), and protein
supplements (whey), sorted in order of their glutamate and
protein content. A multiplier was assigned to each ingredi-
ent group, which was then totalled to obtain the (cid:128)nal group
score. (cid:140)e fractional protein content and group score were
again subjected to a weighted addition, obtaining the (cid:128)nal
umami score.
Umami(B) = {❕roup multiplier ∗ ❕roup score}
Protein(❕)
T ANW
Umami(A) =
Umami score = A + B
(4)
where ❕roup multiplier is the weight of each of the fol-
lowing groups - Protein supplements, vegetables, meat and
savoury phrases, with their respective multipliers being
0.8, 7, 3 and 9.45.
(5) Richness:
(cid:140)e richness score is computed by considering saturated
fats, cholesterol and total fats. (cid:140)e saturated fat content
is used as a fraction of the total fat content present in the
food item. (cid:140)e ratio of the total fat content to the total
active nutritional weight and the amount of cholesterol in
the dish relative to its weight is also taken into account
while calculating the richness score. (cid:140)e (cid:128)nal score is
a linear combination of the aforementioned factors. Al-
though richness is not considered a standard taste receptor
at the moment, culinary arts have long used it as a factor
in designing and cooking dishes.
(3) Bi(cid:138)er:
Bi(cid:138)erness is indicated by the calcium and iron content
in the dish. Although this is a crude metric since bi(cid:138)erness
is quite complex, we feel this is an adequate start to pro(cid:128)l-
ing bi(cid:138)erness given data availability. To combat the lack
of data available for these in Indian dishes, we maintained
a list of ingredients that were manually tagged as 'bi(cid:138)er'or
A =
saturated f at(❕)
f at(❕)
f at(❕)
T ANW
B =
cholesterol(m❕)
T ANW
C =
· 1000
Table 2: Score Samples
Table 3: Obtained Error Values
Dish
Curried bean salad
Aloo phujia
Palak paneer
Channa masala
Cilantro pesto
Bi(cid:138)er Rich
0.961
0.7
2.3
2.149
2.25
1.436
2.79
2.012
0.604
4.45
Salt
2.63
3.116
1.184
3.41
0.904
Sweet Umami
2.47
2.534
9.271
0.27
8.064
1.12
9.538
0.88
0.57
2.198
Taste
Bi(cid:138)er
Rich
Salt
Sweet
Umami
Error
1.25
-0.45
-0.38
0.02
8.64
D = ( x · A) + (y · B) + (z · C)
Richness score = D
0.992 · 10
(5)
(cid:140)e weights x, y and z are 0.5, 0.7, 50 respectively, and were
arrived at via matching with user descriptions of richness.
Sample scores are shown in Table 2. For each of the (cid:128)ve food
items, (cid:131)avour scores are indicated on a scale of 1 to 10.
To validate this system, we conducted a survey of 150 users. We
built a website where the users were required to assign (cid:131)avour
scores for randomly sampled dishes. (cid:140)e survey entries were used
as an input to the validation system, along with the (cid:131)avour scores
generated by the system. It then computes the error which indicates
the di(cid:130)erence between the system-generated and the user-provided
scores. Note that error is 0 if abs(variance) ¡ ACTION THRESHOLD.
error = Q3 · ln(variance)
Final taste score = Generated taste score − error
(6)
Here, Q3 is the upper quartile of the list of results obtained from
the survey. ACTION THRESHOLD is a tuned value above which
the error correction is activated per taste. (cid:140)is is done to account
for minor user-to-user variations. (cid:140)is process is repeated per taste
to obtain scores adjusted for user feedback.
Here, the variance is computed di(cid:130)erently than the conventional
procedure - it is computed on the data list obtained by computing
the di(cid:130)erence between the generated and the surveyed taste scores.
(cid:140)is, therefore, provides the actual variation between the generated
scores and what the surveyed users expect. Including the upper
quartile ensures the majority (75%) of user responses are accounted
for, while avoiding the outliers, such as responses that may go
against the general consensus. An example of such a response is
a user whose taste preference is signi(cid:128)cantly skewed towards a
particular (cid:131)avour.
(cid:140)e error in Table 3 has been computed over the food data set
for all users. (cid:140)e values as indicated in the table above shows
the sweet, salty, bi(cid:138)er and rich (cid:131)avour scores generated by our
system are in line with the general consensus of the surveyed users.
However, there is a signi(cid:128)cant deviation from the user-rated scores
and the system-generated scores in the case of umami. A possible
explanation for this anomaly could be due to the fact that a good
understanding of the umami (cid:131)avour is lacking among the general
Table 4: Sample vector (Truncated)
Dish\Tags
Aloo Paratha
Palak Paneer
Potato
0.877
0
Spinach
0
0.819
Flour
0.685
0
Paneer …
…
0.841 …
0
Table 5: Same as Table 4, including taste scores (Truncated)
Dish\Tags
Aloo Paratha
Palak Paneer
Potato
0.877
0
Spinach … Bi(cid:138)er
… 2.29
… 3.72
0.819
0
Salt …
3.83 …
3.02 …
populace of our study. If this data is looked at on a per-user basis, it
behaves as a sensitivity factor for each (cid:131)avour. (cid:140)is way, a pro(cid:128)le
of the (cid:131)avour sensitivity can be developed, that can be used to
personalize the recommendation of food items even further.
4.2 Recommendation Engine
In our work we explore two types of recommendation systems -
Collaborative Filtering and Content Based Filtering. With an aim
to incorporate food (cid:131)avours to improve the quality of recommen-
dations, we compare and contrast the e(cid:130)ects of including (cid:131)avour
when making food recommendations.
(1) Collaborative Filtering:
(cid:140)e Collaborative Filtering approach for recommenda-
tion looks to make predictions regarding a user's preference
by collecting preferences from multiple similar users. (cid:140)e
assumption in Collaborative Filtering is that people who
view and evaluate items in a similar fashion are likely to
assess other food dishes in a similar manner.
Matrix Factorization is a Collaborative Filtering algo-
rithm that takes as input a User-Item Rating Matrix. (cid:140)is
matrix is sparse since it is not likely that a user has rated
all dishes in the food database. (cid:140)e approach aims to break
down the User-Item matrix into two matrices of latent user
and item representation. (cid:140)e intent of this approach is to
reform the original User-Item matrix while (cid:128)lling in the
missing ratings. Figure 3 depicts a User-Item Matrix and
latent matrices, which when multiplied, yield predicted
scores for items a user has not rated while trying to gener-
ate scores as close to the original score for items the user
has rated.
When making recommendations for a particular user,
the Collaborative Filtering Algorithm only considers other
Figure 3: User-Item and latent matrices
Table 6: Dishes reviewed by the user
Dish Name
Chole Bhature
Paneer Tikka Masala
Veg Biryani
Bisi Bele Bath
Aloo Paratha
Vegetarian Korma
Veg Momos
Veg Fried Rice
Rajma
Naan
Dal Makhani
Masala Dosa
Palak Paneer
Khakhra
Malai Ko(cid:137)a
Rating
4
5
4
2
3
2
4
4
3
4
5
5
3
2
3
Table 7: Results on training data
Method
TF-IDF
Matrix Factorisation
TF-IDF with (cid:131)avour
RMSE
1.030
1.040
1.041
Table 8: Results of online A/B testing
Method
TF-IDF
Matrix Factorisation
TF-IDF with (cid:131)avour
RMSE
2.93
2.11
1.94
similar users. It does not take into account the content or
features of an item, hence, food (cid:131)avour cannot be incorpo-
rated when using this method to make recommendations.
(2) Content Based Filtering:
Content Based Filtering algorithm takes into consid-
eration the content or properties of an item. Items are
described with a set of descriptor terms or tags whichform
the basis for item-based comparison.
Term Frequency Inverse Document Frequency (TF-IDF)
has its roots in Information Retrieval but (cid:128)nds its appli-
cation in Content Based Recommendation Systems. We
describe food dishes using their ingredients, the cuisine
and whether the dish is vegetarian or non-vegetarian. A
few examples of tags associated with some dishes are:
• 'Aloo Paratha '- [vegetarian, cumin, (cid:131)our, ginger, lemon,
masala, oil, paratha, potato, salt, wheat, north indian,
punjab]
• 'Palak Paneer '- [vegetarian, clove, coriander, cumin,
curry, garlic, ginger, masala, paneer, salt, spinach,
tomato, turmeric, north Indian, Punjab]
We associated the 1381 dishes in our database with
397 unique tags as described above. Next, for each tag
associated with a dish, the TF-IDF scores for the tag was
calculated using the standard TF-IDF formula.
Wx,y = t f x,y · log( N
d fx
)
(7)
Where,
• x is the set of tags and y is the set of dishes
• t fx,y = 1 if dish y has tag x else 0
• d fx = number of dishes containing tag
• N = total number of dishes
For each dish, the TF-IDF calculation results in the for-
mation of a vector of length 397. A slice of such a vector is
shown in Table 4.
For a given user, equation (8) is used to calculate the
preference score for an unrated dish i, using the scores
for all dishes j that the user has rated, by calculating the
similarity between dish i and j, and weighing the cosine
similarity with the dish score j. Similarly, as Table 5 depicts,
user preference for dishes is also calculated a(cid:137)er including
5 dish (cid:131)avours and performing a weighted average of the
cosine similarity between the dish's ingredient descriptors
Ultimately, the body of food computing research in understand-
ing how item taste needs to be explored in much greater detail. (cid:140)is
may be through a combination of more detailed databases including
chemical pro(cid:128)les and quantitative metrics to understand (cid:131)avours.
In parallel, understanding the taste preferences at an individual
level needs to be captured. Accurate personal food logging is a
notable challenge in this area that will help fuel be(cid:138)er user under-
standing. We hope the above preliminary research e(cid:130)orts aid in
the momentum towards be(cid:138)er quality of life through healthy and
enjoyable culinary experiences.
REFERENCES
[1]
[6]
[7]
[4] David Elsweiler, Morgan Harvey, Bernd Ludwig, and Alan Said. 2015. Bringing
Johan Aberg. 2006. Dealing with Malnutrition: A Meal Planning System for
Elderly.. In AAAI spring symposium: argumentation for consumers of healthcare.
1 -- 7.
[2] MA El-Dosuky, MZ Rashad, TT Hamza, and AH El-Bassiouny. 2012. Food
recommendation using ontology and heuristics. In International conference on
advanced machine learning technologies and applications. Springer, 423 -- 429.
[3] Mehdi Elahi, Mouzhi Ge, Francesco Ricci, Ignacio Fern´andez-Tob´ıas, Shlomo
Berkovsky, and Massimo David. 2015.
Interaction design in a mobile food
recommender system. In CEUR Workshop Proceedings. CEUR-WS.
the" healthy" into Food Recommenders.. In DMRS. 33 -- 36.
[5] Suzanna E Forwood, Alexander D Walker, Gareth J Hollands, and (cid:140)eresa M
Marteau. 2013. Choosing between an apple and a chocolate bar: the impact of
health and taste labels. PloS one 8, 10 (2013), e77500.
Jill Freyne and Shlomo Berkovsky. 2010. Intelligent food planning: personalized
recipe recommendation. In Proceedings of the 15th international conference on
Intelligent user interfaces. ACM, 321 -- 324.
Jill Freyne, Shlomo Berkovsky, and Gregory Smith. 2011. Recipe recommendation:
accuracy and reasoning. In International conference on user modeling, adaptation,
and personalization. Springer, 99 -- 110.
[8] Fang-Fei Kuo, Cheng-Te Li, Man-Kwan Shan, and Suh-Yin Lee. 2012. Intelligent
menu planning: Recommending set of recipes by ingredients. In Proceedings
of the ACM multimedia 2012 workshop on Multimedia for cooking and eating
activities. ACM, 1 -- 6.
[9] Weiqing Min, Shuqiang Jiang, Linhu Liu, Yong Rui, and Ramesh Jain. 2018. A
Survey on Food Computing. arXiv preprint arXiv:1808.07202 (2018).
able Guidance for Improved (cid:139)ality of Life. Computer 52, 4 (2019), 12 -- 20.
[11] Nitish Nag, Vaibhav Pandey, and Ramesh Jain. 2017. Live Personalized Nutrition
Recommendation Engine. In Proceedings of the 2nd International Workshop on
Multimedia for Personal Health and Health Care. ACM, 61 -- 68.
[12] Nitish Nag, Vaibhav Pandey, Preston J Putzel, Hari Bhimaraju, Srikanth Krishnan,
and Ramesh Jain. 2018. Cross-modal health state estimation. In Proceedings of
the… ACM International Conference on Multimedia, with co-located Symposium &
Workshops. ACM International Conference on Multimedia, Vol. 2018. NIH Public
Access, 1993.
[13] Ferda O(cid:131)i, Yusuf Aytar, Ingmar Weber, Raggi Al Hammouri, and Antonio Tor-
ralba. 2017. Is Saki #delicious? (cid:140)e food perception gap on instagram and its
relation to health. In 26th International World Wide Web Conference, WWW 2017.
509 -- 518. h(cid:138)ps://doi.org/10.1145/3038912.3052663 arXiv:1702.06318
[14] Martin Svensson, Jarmo Laaksolahti, Kristina Hook, and Annika Waern. 2000. A
recipe based on-line food store. In Proceedings of the 5th international conference
on Intelligent user interfaces. ACM, 260 -- 263.
[15] Mirre Viskaal van Dongen, Marjolijn C van den Berg, Nicole Vink, Frans J Kok,
and Cees de Graaf. 2012. Taste -- nutrient relationships in commonly consumed
foods. British Journal of Nutrition 108, 1 (2012), 140 -- 147.
[16] David A Yarmolinsky, Charles S Zuker, and Nicholas J P Ryba. 2009. Common
Sense about Taste: From Mammals to Insects. (oct 2009), 234 -- 244 pages. h(cid:138)ps:
//doi.org/10.1016/j.cell.2009.10.001
[10] Nitish Nag and Ramesh Jain. 2019. A Navigational Approach to Health: Action-
and (cid:131)avour descriptors. Assume α such that α ∈ dishes
rated by the user and β to be CosineSimilarity(i,j). (cid:140)en the
user preference score will be:
α β
∀i ∈ All dishes in the database
α ·β · U serScore(i)
(8)
5 RESULTS
We consider three recommendation systems, the (cid:128)rst one being
an implementation of collaborative (cid:128)ltering (Matrix Factorization)
and the second and third being implementations of content based
(cid:128)ltering (TF-IDF), with and without (cid:131)avour incorporated respec-
tively. (cid:140)e users previous ratings as seen in Table 6 revolve around
a lot of rice based dishes as well as rich dishes. Matrix factorization
predicts dishes based on the pa(cid:138)erns of other users. (cid:140)is however
fails to consider the health aspect. TF-IDF improves upon this and
suggests much healthier alternatives but erroneously predicts what
a user may like. TF-IDF with (cid:131)avour is the best of both worlds
where it predicts healthy food items while maintaining an accept-
able level of user taste preferences. (cid:139)antitatively Table 7 shows
the Root Mean Squared Error on the training data which fails to
decisively showcase which method is the best. However, the RMSE
for our online A/B testing between three various recommendation
approaches, as shown in Table 8 yields much be(cid:138)er results as rea-
soned in the qualitative analysis and therefore, we conclude that
using TF-IDF with (cid:131)avour improves recommendation.
We developed a rudimentary cuisine classi(cid:128)er using Naive-Bayes
to assign cuisines to dishes based on their ingredients. However,
the set of dishes we were working with had a heavy bias towards
North Indian dishes, and thus had a insigni(cid:128)cant impact on the
quality of recommendations.
6 FUTURE WORK
(cid:140)e quality of recommendations could be signi(cid:128)cantly improved
with the incorporation of a cuisine element. However, this will re-
quire our data set to expand to a multitude of cuisines. (cid:140)e prepara-
tion techniques will also need to be considered during classi(cid:128)cation,
as it varies from cuisine to cuisine.
Contextual factors such as seasonal sensitivity could be incorpo-
rated into the system, that adds an element of personalizing based
on more context. For example, people enjoy hot drinks in cold
weather, or cold drinks in hot weather. Another example - a nov-
elty function could be incorporated which considers the seasonal
trend of a users preferences which can then be used to (cid:128)ne-tune
the (cid:131)avour scores.
Signi(cid:128)cant improvements can be made to the (cid:131)avour pro(cid:128)ling,
with the availability of complete and accurate nutritional data for
store-bought foods. Existing regulations do not mandate all sup-
pliers to report such data in detail. However, other (cid:131)avour scores
could be re(cid:128)ned if the data is present. Our database of foods can
grow considerably larger as a result of this.
We initially were inspired by encouraging people to eat healthier
through be(cid:138)er recommendations. (cid:140)e limited scope of this work
is on food (cid:131)avour pro(cid:128)ling, and we hope to bolster the work and
accelerate the research (cid:128)eld by more thorough integration of health
factors into food recommendation at large.
|
1904.02846 | 1 | 1904 | 2019-04-05T01:57:29 | A Bayesian-Based Approach for Public Sentiment Modeling | [
"cs.SI",
"stat.AP"
] | Public sentiment is a direct public-centric indicator for the success of effective action planning. Despite its importance, systematic modeling of public sentiment remains untapped in previous studies. This research aims to develop a Bayesian-based approach for quantitative public sentiment modeling, which is capable of incorporating uncertainty and guiding the selection of public sentiment measures. This study comprises three steps: (1) quantifying prior sentiment information and new sentiment observations with Dirichlet distribution and multinomial distribution respectively; (2) deriving the posterior distribution of sentiment probabilities through incorporating the Dirichlet distribution and multinomial distribution via Bayesian inference; and (3) measuring public sentiment through aggregating sampled sets of sentiment probabilities with an application-based measure. A case study on Hurricane Harvey is provided to demonstrate the feasibility and applicability of the proposed approach. The developed approach also has the potential to be generalized to model various types of probability-based measures. | cs.SI | cs | Proceedings of the 2019 Winter Simulation Conference
N. Mustafee, K.-H.G. Bae, S. Lazarova-Molnar, M. Rabe, C. Szabo, P. Haas, and Y-J. Son, eds.
A BAYESIAN-BASED APPROACH FOR PUBLIC SENTIMENT MODELING
Yudi Chen
Wenying Ji
Qi Wang
Department of Civil, Environmental and
Department of Civil and Environment
Infrastructure Engineering
George Mason University
Fairfax, VA 22030, USA
Engineering
Northeastern University
Boston, MA 02115, USA
ABSTRACT
Public sentiment is a direct public-centric indicator for the success of effective action planning. Despite its
importance, systematic modeling of public sentiment remains untapped in previous studies. This research
aims to develop a Bayesian-based approach for quantitative public sentiment modeling, which is capable
of incorporating uncertainty and guiding the selection of public sentiment measures. This study comprises
three steps: (1) quantifying prior sentiment information and new sentiment observations with Dirichlet
distribution and multinomial distribution respectively; (2) deriving the posterior distribution of sentiment
probabilities through incorporating the Dirichlet distribution and multinomial distribution via Bayesian
inference; and (3) measuring public sentiment through aggregating sampled sets of sentiment probabilities
with an application-based measure. A case study on Hurricane Harvey is provided to demonstrate the
feasibility and applicability of the proposed approach. The developed approach also has the potential to be
generalized to model various types of probability-based measures.
1
INTRODUCTION
"Public sentiment is everything," as Abraham Lincoln once said. Government agencies and enterprises have
been noticing the importance of public sentiment, and, in turn, employed public sentiment measurement in
various applications, such as public opinion mining (O'Connor et al. 2010), customer relationship
management (Ang 2011), and enterprise marketing services (Duan et al. 2013), to achieve effective and
efficient policy-making and service or product quality improvement. Generally, public sentiment is learned
through a sample survey in which a set of people sampled from the interest population are interviewed for
their opinions on the issues being considered (Brooker et al. 2003). Although being simple and
straightforward, this approach typically solely covers a limited sample size due to labor-intensive and time-
consuming interviews (Carter et al. 2001). Recently, the rapid growth and utilization of social media
platforms (e.g., Facebook, Twitter, and Instagram), on which people share opinions and sentiments, provide
a valuable opportunity for collecting large-scale datasets. However, these large-scale datasets are in fact
collections of small datasets with various specific conditions (Ghahramani 2015). For example, in social
media-based disaster management, there might be a large amount of disaster-related data over a state, but
there is still a relatively small amount of data in each county or city for analyzing local public sentiment
and planning relief actions (Ragini et al. 2018). In addition to that, the process of collecting interview- or
social media-based sentiments is a random sampling process from the interest population. The smaller the
sampled dataset is, the larger uncertainty it includes, and vice versa. Therefore, it becomes necessary to
incorporate this inherent uncertainty for accurate and reliable modeling of public sentiment, especially
when the sampled dataset is small.
Public sentiment is an aggregation of individuals' sentiments, each of which is typically labeled as
negative, neutral, or positive (Beigi et al. 2016). Naturally, sentiment probabilities, which represent ratios
Chen, Wang, and Ji
for the three sentiments in the interest population, are basic predictors for estimating public sentiment (Yu
and Kak 2012). Uncertainty of public sentiment is from the uncertainty of sentiment probabilities that is
caused by the statistical variation of the randomly sampled dataset. Recently, researchers have successfully
modeled the statistical variation using Beta distribution and binomial distribution to measure binary data
uncertainty in the domain of quality control (Ji and Abourizk 2017). This research has inspired us to utilize
Dirichlet distribution and multinomial distribution, which are the generalized version of Beta and binomial
distributions, to model the uncertainty of sentiment probabilities. Also, the method of aggregating
individuals' sentiments heavily depends on applications and requires a systematic review for guiding the
selection of an appropriate aggregation method. Therefore, a systematic approach, which is capable of
incorporating the inherent uncertainty of the sampled dataset and guiding the selection of the aggregation
method, is needed for public sentiment modeling.
The present study aims to develop a Bayesian-based approach to quantitatively model public sentiment
in an accurate and reliable manner. Explicitly, the proposed approach (1) incorporates prior sentiment
information and sentiment observations via Bayesian inference for enhancing the estimation of public
sentiment; (2) guides the selection of an aggregation method for estimating public sentiment from an
application-based perspective; and (3) models public sentiment in a systematic and reliable manner through
the proposed Bayesian-based approach. The content of this paper is organized as follows. In Section 2,
details of the proposed approach are introduced through the steps of sentiment modeling, sentiment
integration, and public sentiment measurement. In Section 3, a case study on Hurricane Harvey is presented
to demonstrate the feasibility and applicability of the proposed approach. In Section 4, research
contributions and limitations are thoroughly discussed.
2 METHODOLOGY
As depicted in Figure 1, the proposed approach consists of sentiment modeling, sentiment integration, and
public sentiment measurement. First, prior knowledge on sentiment probabilities and evidence from new
sentiment observations are modeled through a Dirichlet distribution and a multinomial distribution
respectively. Then, the prior knowledge and the new evidence are integrated via Bayesian inference for
deriving a posterior distribution on sentiment probabilities. Meanwhile, the posterior distribution is used to
update the prior knowledge. Finally, public sentiment is estimated through aggregating sentiment
probabilities that are sampled from the posterior distribution.
Figure 1: Bayesian-based approach for modeling the public sentiment.
2.1
Sentiment Modeling
The modeling of sentiment probabilities, which summarizes and quantifies the sentiment information, is a
core step to measure public sentiment. Here, sentiment probabilities are modeled through the integration of
prior knowledge and new sentiment observations. In this section, prior knowledge and sentiment
observations are modeled with a Dirichlet distribution and a multinomial distribution respectively for
deriving the posterior distribution of sentiment probabilities.
Bayesian inferencePosterior sentiment informationRandom samplingNet sentimentScaled net sentimentPositive to polarity ratio Prior knowledge modelingSentiment observations modeling2.1.1 Prior Knowledge Modeling
Chen, Wang, and Ji
In Bayesian inference, a prior distribution of an uncertain variable expresses one's belief on this variable
before new evidence is taken into account. In this research, variables in interest are sentiment probabilities
for which a Dirichlet distribution is chosen as the prior due to following reasons: (1) sentiment probabilities
are bounded within the range of [0, 1] which matches the natural boundaries of a Dirichlet distribution; (2)
the property that the Dirichlet distribution is a conjugate prior to the likelihood function of new sentiment
observations provides conveniences for deriving an analytical posterior distribution; and (3) parameters of
the Dirichlet distribution are intuitively and physically meaningful and easy to estimate from sentiment
observations. Hereafter, we use exact numbers {1, 2, 3} to represent the sentiments {negative, neutral,
positive} for making following formulas concise and descent. Therefore, prior knowledge on sentiment
probabilities 𝜃1, 𝜃2, 𝜃3 is modeled as
𝑝(𝜽) = 𝑝(𝜃1, 𝜃2, 𝜃3) = 𝐷𝑖𝑟(𝛼1, 𝛼2, 𝛼3) =
1
𝐵(𝛼1, 𝛼2, 𝛼3)
3
∏ 𝜃𝑖
𝑖=1
𝛼𝑖−1
.
where 𝐵 is a multivariate Beta function for normalization, 𝛼1, 𝛼2, 𝛼3 are three shape parameters that control
the shape of a Dirichlet distribution. Figure 2 depicts four Dirichlet distributions with various combinations
of shape parameters. Color blue represents low probability density, while color red represents high
probability density. All sets of sentiment probabilities are constrained over a simplex in ℝ3.
Ideally, a prior distribution is constructed to match an expert's belief on the variables. However, such
belief is a mental condition and heavily depends on the expert's knowledge to a specific condition(Tokdar
2013). The determination of a prior distribution, especially for small datasets, is beyond the scope of this
paper in spite of the importance. In this research, a uniform (i.e., non-informative) prior distribution, Dir(1,
1, 1), is used for demonstrating the approach.
Figure 2: Probability density plots for Dirichlet distributions with various sets of parameters.
2.1.2 Sentiment Observations Modeling
In Bayesian inference, new evidence or observed data is generally modeled as a likelihood function for
updating prior information. Here, the likelihood function is a multinomial distribution since sentiment is a
categorical variable with three identified polarities (i.e., negative, neutral, and positive). Suppose that there
are 𝑛 sentiment observations in the sampled dataset where each observation produces exactly one of the
sentiments. Out of 𝑛 sentiment observations, 𝑥1 observations are with negative sentiment, 𝑥2 observations
are with neutral sentiment, and 𝑥3 observations are with positive sentiment. Therefore, the likelihood
function is expressed as
Dir(1,1,1)Dir(5,5,5)Dir(6,6,3)Dir(10,3,2)Chen, Wang, and Ji
𝐿(𝑿𝜽) = 𝐿(𝑥1, 𝑥2, 𝑥3𝜃1, 𝜃2, 𝜃3) =
where Γ is a Gamma function.
2.2
Sentiment Integration Via Bayesian Inference
𝑖
Γ(∑ 𝑥𝑖 + 1
)
∏ Γ(𝑥𝑖 + 1)
𝑖
𝑥𝑖
∏ 𝜃𝑖
𝑖
.
Bayesian inference is a method of statistical inference in which Bayes' theorem is used to update the
probability for parameters or variables as more evidence or information becomes available (Gelman et al.
2013). Bayesian inference derives the posterior distribution through the integration of two antecedents, the
prior 𝑝(𝜽) and the likelihood function 𝐿(𝑿𝜽), which represent the prior knowledge and new sentiment
observations respectively. As described in Section 2.1, the prior knowledge is modeled with a Dirichlet
distribution that is a conjugate prior to the likelihood function. Therefore, the posterior distribution is
another Dirichlet distribution and is expressed as
𝑝(𝜽𝑿) =
𝐿(𝑿𝜽)𝑝(𝜽)
𝑝(𝑿)
= 𝐷𝑖𝑟(𝛼1 + 𝑥1, 𝛼2 + 𝑥2, 𝛼3 + 𝑥3).
Notice that, the three shape parameters 𝛼1 + 𝑥1 , 𝛼2 + 𝑥2 , and 𝛼3 + 𝑥3 of the posterior are simple
summations of the corresponding shape parameters 𝛼1, 𝛼2, 𝛼3 in the prior distribution and the numbers of
observations 𝑥1, 𝑥2, 𝑥3 for the three types of sentiments in the sampled dataset. This intuitive property
provides an easy and efficient way for deriving the posterior distribution to update beliefs of sentiment
probabilities. It also makes the shape parameters of the posterior distribution physically meaningful.
2.3
Public Sentiment Measurement
Practically, public sentiment is measured through the aggregation of sentiment probabilities that summarize
the sentiment information in the interest population (Yu and Kak 2012). A public sentiment measure -- the
way of aggregating sentiment probabilities -- is determined by the presented sentiment information
associated with a specific application. For example, in a movie sales prediction, positive to negative ratio
is used as the public sentiment measure to track sentiment variations in different stages (i.e., before and
after the movie release) (Zhang and Skiena 2009). Table 1 lists the most commonly used public sentiment
measures and gives a brief summary for each of them, including their formulas, boundaries, and
applications. Other than these listed measures, public sentiment measure can also be designed to
accommodate the specific sentiment information according to the application.
Table 1: Summary of the commonly used public sentiment measures.
Measure
Formula
Boundary
Net sentiment
(Makrehchi 2013)
𝜃3 − 𝜃1
[−1, 1]
+ 0.5)
[0, 100]
Scaled net sentiment
(Lică and Tută 2011) 100 × (
Positive sentiment probability
(Zhang and Skiena 2009)
Negative sentiment probability
(Zhang and Skiena 2009)
𝜃3 − 𝜃1
2
𝜃3
𝜃1
Presented sentiment
information
Sentiment differences for
obtaining an overall score
Sentiment differences in a
more interpretable range
[0, 1]
Positive sentiments
[0, 1]
Negative sentiments
Chen, Wang, and Ji
Positive to polarity ratio
(Nguyen et al. 2012)
Positive to negative ratio
(Asur and Huberman 2010)
𝜃3 / (𝜃1 + 𝜃3)
[0, 1]
Sentiment change instead of
absolute sentiment values
𝜃3/𝜃1
[0, ∞]
Sentiment change with a
larger variance
To have an intuitive understanding of the listed public sentiment measures, histograms of public
sentiment based on these measures are shown in Figure 3 with a given posterior distribution on sentiment
probabilities, Dir(4, 15, 3). This posterior distribution is consistent with most real applications where data
with neutral sentiment occupies a large portion in the dataset (Nakov et al. 2016). For the net sentiment and
scaled net sentiment, the distribution shapes are almost same and tend to be normal but with different
sentiment ranges. Both the positive sentiment probability and negative sentiment probability are right-
skewed, and they are actually Beta distributions since the remaining two probabilities (neutral+negative or
neutral+positive) can be taken as one probability, non-positive or non-negative. Compared with the positive
to polarity ratio, the positive to negative ratio has no upper limit and is possible to have extreme values.
In the following case study, the negative sentiment probability (NSP) measure will be used for
estimating public sentiment for enhanced disaster management due to its representativeness to public
demands (Ragini et al. 2018).
Figure 3: Histograms of public sentiment based on various measures.
3
CASE STUDY
In the era of information age, social media platforms are playing an increasingly central role in measuring
public sentiments (O'Connor et al. 2010). Twitter, with its social and informational characteristics, is well
suited for a fast-paced emergency environment in collecting nearly real-time public sentiment information
(Kryvasheyeu et al. 2016). In this section, Tweets, which are posted in Houston during Hurricane Harvey,
tied with Hurricane Katrina as the costliest tropical cyclone on record (National Hurricane Center 2018),
are collected to model public sentiment through the proposed Bayesian-based approach.
3.1
Data Description
Chen, Wang, and Ji
The Twitter streaming API was used for collecting geotagged tweets (Wang and Taylor 2016). The
collected geotagged tweets were filtered to ensure that the modeled public sentiment is related to Hurricane
Harvey and localized in Houston, TX. First, we re-extracted Harvey-related tweets posted during Hurricane
Harvey (i.e., Aug. 24, 2017 to Sep. 21, 2017) which contain one of the Harvey-specific keywords (i.e.,
Hurricane, Harvey, and HurricaneHarvey). Then, the Google map API was used to assign the location
information (e.g., country, state, and city) to the Harvey-related tweets, and tweets posted in Houston, TX
were further extracted. Totally, 2,963 tweets were used for modeling Harvey-related public sentiment.
Hurricane Harvey brought catastrophic rainfall-triggered flooding in the Houston metropolitan area
(Blake and Zelinsky 2018). Figure 4 depicts the daily number of tweets (represented by color blue) and the
precipitation in Houston (represented in color red) obtained from the National Oceanic and Atmospheric
Administration (NOAA). Similar trends are observed in numbers of daily tweets and precipitation. The
numbers of daily tweets first increased dramatically during Aug. 24, 2017 to Aug. 27, 2017 due to the
extensive rainfall and reached the peak on Aug. 28, 2017. Unlike the sharp decline in precipitation, the
numbers of daily tweets gradually fall off due to the slower process of flood receding and post-disaster
recovery.
Figure 4: Number of daily tweets and precipitation in Houston during Hurricane Harvey.
3.2
Sentiment Prediction
In this section, sentiment for each extracted tweet is predicted as negative, neutral, or positive using
SentiStrength, a lexicon-based approach (Thelwall 2017). The core of SentiStrength is a lexicon of 2310
sentiment words and word stems obtained from the Linguistic Inquiry and Word Count (LIWC) program
(Pennebaker et al. 2003), the General Inquirer list of sentiment terms (Stone et al. 1966) and ad-hoc
additions made during testing. In addition to the lexicon, SentiStrength includes a list of emoticons and a
list of idioms together with human-assigned sentiment scores for making accurate sentiment predictions,
especially in social media data where emoticons and idioms are extensively used. In most tested social
media cases, SentiStrength works consistently well and approaches human-level accuracy (Thelwall 2017).
We, therefore, applied the Java-version SentiStrength in this case study. For illustration purposes, Figure 5
shows three sample tweets with negative, neutral and positive sentiments respectively.
As depicted in Figure 4, most tweets and precipitation are observed in the first two weeks (Aug. 24,
2017 to Sep. 6, 2017). Therefore, for illustration purpose, only tweets posted in the first two weeks are
analyzed for public sentiment modeling. Figure 6 is a summary of the numbers of daily observations for
each sentiment, color blue represents negative, color gray represents neutral, and color red represents
positive. These results indicate that tweets with neutral sentiment dominate the data set mainly due to that
a large portion of the extracted tweets is for information sharing purposes (e.g., disaster situation report and
relief resources sharing) instead of public opinion expression.
Chen, Wang, and Ji
(a) Negative sentiment
(b) Neutral sentiment
(c) Positive sentiment
Figure 5: Sample tweets with negative, neutral and positive sentiment respectively.
Figure 6: Numbers of daily tweets for each sentiment polarity.
3.3
Public Sentiment Modeling
As described in previous sections, public sentiment is measured through aggregating sentiment probabilities,
which summarize the sentiment information in the interest population, with a public sentiment measure.
Here, negative sentiment probability (NSP) is employed to measure public sentiment since negative
sentiment generally represents public demands (Ragini et al. 2018). The sentiment probabilities are sampled
from the posterior distribution which is derived by integrating the sentiment information in prior knowledge
and daily tweets via Bayesian inference. Table 2 lists the utilized sentiment information, including the prior,
numbers of daily tweets for each sentiment, and the posterior distribution of sentiment probabilities. To
estimate the daily NSP, the following steps are conducted. First, 1,000 sets of sentiment probabilities
(𝜃1, 𝜃2, 𝜃3) are randomly sampled from the corresponding daily posterior distribution. And then, the NSP
𝜃1 in each set is saved for constructing the distribution of daily NSP. To visually represent and compare the
daily NSP, a side-by-side plot in terms of the mean and 95% credible interval is generated, as shown in
Figure 7. The red square is the mean value of daily NSP, and the blue bars are the lower and upper limit of
the credible interval. The credible interval is inversely proportional to the uncertainty of daily NSP and a
smaller credible interval indicates that the daily NSP is measured with a larger daily tweet dataset. The NSP
ranges from nearly 0 to 0.12 and this is because tweets with neutral sentiment dominate in daily tweets. The
mean value of the daily NSP first increases rapidly and reaches the peak at Aug. 28, then gradually declines.
In addition, the uncertainties during Aug. 27 to Aug. 29 are much smaller than other dates due to the large
size of available daily tweets. These observed patterns are intuitively understandable. In the beginning
phase of Hurricane Harvey (Aug. 24, 2017 to Aug. 28, 2017), negative sentiment surges due to extensive
inconveniences and severe damages caused by the extreme rainfall brought by Hurricane Harvey, and then
Twitter user 1Twitter user 2Twitter user 3progressively declines due to the ongoing relief actions in the following recovery phase. These consistencies
between the observed patterns and intuitive understanding of human reactions to disasters verify the
applicability and feasibility of the proposed modeling approach.
Chen, Wang, and Ji
Table 2: Summary of the sentiment information.
Date
(Year 2017)
Prior
Distribution
Numbers of daily tweets
for each sentiment (𝑥1, 𝑥2, 𝑥3)
Posterior
Distribution
Aug. 24
Aug. 25
Aug. 26
Aug. 27
Aug. 28
Aug. 29
Aug. 30
Aug. 31
Sep. 01
Sep. 02
Sep. 03
Sep. 04
Sep. 05
Sep. 06
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
Dir(1, 1, 1)
(2, 41, 6)
(7, 185, 18)
(15, 177, 17)
(31, 339, 41)
(38, 347, 38)
(30, 326, 28)
(21, 230, 32)
(11, 122, 14)
(7, 122, 9)
(6, 87, 7)
(4, 63, 5)
(3, 51, 8)
(3, 45, 8)
(1, 38, 10)
Dir(3, 42, 7)
Dir(8, 186, 19)
Dir(16, 178, 18)
Dir(32, 340, 42)
Dir(39, 348, 39)
Dir(31, 327, 29)
Dir(22, 231, 33)
Dir(12, 123, 15)
Dir(8, 123, 10)
Dir(7, 88, 8)
Dir(5, 64, 6)
Dir(4, 52, 9)
Dir(4, 46, 9)
Dir(2, 39, 11)
Figure 7: Daily negative sentiment probability for the first two weeks.
4
CONCLUSION
Public sentiment is a critical yet often uncertain factor that is highly correlated with the success of action
planning in various applications. In this research, a novel Bayesian-based approach is inventively proposed
to model public sentiment to integrate the sentiment information from the prior knowledge and sentiment
observations in a systematic and reliable manner. In addition, a systematic guidance for the selection of a
public sentiment measure is further discussed. A real case of modeling Hurricane Harvey-related public
Chen, Wang, and Ji
sentiment in Houston, TX is used as an example to demonstrate the feasibility and applicability of the
proposed approach.
This research contributes to the academia by (1) developing a Bayesian-based analytical model to
incorporate both the prior sentiment information and newly collected sentiment observations; (2) reviewing
various public sentiment measures in terms of their formulas, boundaries, and applications; and (3) deriving
a systematic approach to include uncertainty of public sentiment reliably. For practitioners, this proposed
approach is capable of (1) selecting a public sentiment measure based on the corresponding application;
and (2) ranking public sentiment in a more reliable way by including uncertainty for planning actions.
Although this research proposes an approach for incorporating uncertainty of public sentiment caused
by the statistical variation of the sampled dataset, the uncertainty caused by the disagreements among
multiple sentiment classifiers is not included. In the future, the authors will incorporate such uncertainty
with the statistical variation for a more advanced public sentiment modeling.
ACKNOWLEDGMENTS
This study is supported by the Thomas F. and Kate Miller Jeffress Memorial Trust and the National Science
Foundation (Grant No. 1761950). Any opinions, findings, and conclusions or recommendations expressed
in this material are those of the authors and do not necessarily reflect the views of the Thomas F. and Kate
Miller Jeffress Memorial Trust and the National Science Foundation. The authors also gratefully
acknowledge the support of internal grants from the Global Resilience Institute, Northeastern University.
REFERENCES
Ang, L. 2011. "Community Relationship Management and Social Media". Database Marketing & Customer Strategy Management
18(1): 31 -- 38.
Asur, S., and Huberman, B. A. 2010. "Predicting the Future With Social Media". In Proceedings of the 2010 IEEE/WIC/ACM
International Conference on Web Intelligence and Intelligent Agent Technology-Volume, August 31th -- September 3th,
Toronto, Canada, 492 -- 499.
Beigi, G., Hu, X., Maciejewski, R., and Liu, H. 2016. "An Overview of Sentiment Analysis in Social Media and Its Applications
in Disaster Relief". In Sentiment Analysis and Ontology Engineering, edited by W. Pedrycz, and S. Chen, 313 -- 340. Cham:
Springer International Publishing.
Blake, E. S., and Zelinsky, D. A. 2018. "Tropical Cyclone Report - Hurricane Harvey". National Hurricane Center.
Brooker, R. G., College, A.,
2003. Methods
Schaefer, T.
of Measuring Public Opinion.
and
http://www.uky.edu/AS/PoliSci/Peffley/pdf/473Measuring%20Public%20Opinion.pdf, assessed 15th March 2019.
Carter, J. C., Aime, A. A., and Mills, J. S. 2001. "Assessment of Bulimia Nervosa : A Comparison of Interview and Self-Report
Questionnaire Methods". International Journal of Eating Disorders 30(2): 187 -- 192.
Duan, W., Cao, Q., Yu, Y., and Levy, S. 2013. "Mining Online User-Generated Content : Using Sentiment Analysis Technique to
Study Hotel Service Quality". In 2013 46th Hawaii International Conference on System Sciences, January 7th -- 10th, Hawaii,
USA, 3119 -- 3128.
Gelman, B. A., Carlin, J. B., Stern, H. S., David, B., Vehtari, A., and Rubin, D. B. 2013. Bayesian Data Analysis. New York:
Chapman and Hall/CRC.
Ghahramani, Z. 2015. "Probabilistic Machine Learning and Artificial Intelligence". Nature 521: 452 -- 521.
Ji, W., and Abourizk, S. M. 2017. "Credible interval estimation for fraction nonconforming: Analytical and numerical
solutions". Automation in Construction 83: 56-67.
Kryvasheyeu, Y., Chen, H., Obradovich, N., Moro, E., Hentenryck, P. Van, Fowler, J., and Cebrian, M. 2016. "Rapid Assessment
of Disaster Damage Using Social Media Activity". Science advances 2: e1500779.
Lică, L., and Tută, M. 2011. "Predicting Product Performance with Social Media". Informatica Economica 15(2): 46 -- 56.
Makrehchi, M. 2013. "Stock Prediction Using Event-based Sentiment Analysis". In 2013 IEEE/WIC/ACM International
Conferences on Web Intelligence (WI) and Intelligent Agent Technology (IAT), November 17th-20th, Atalnta, USA, 337 -- 342.
Nakov, P., Ritter, A., Rosenthal, S., Sebastiani, F., and Stoyanov, V. 2016. "SemEval-2016 Task 4 : Sentiment Analysis in Twitter".
In Proceedings of SemEval-2016, June 16th-17th, San Diego, USA, 1 -- 18.
National
U.S.
Cyclones
Tables
Updated.
Hurricane
Tropical
https://www.nhc.noaa.gov/news/UpdatedCostliest.pdf, assessed 15th March 2019.
Costiliest
Center.
2018.
Nguyen, L. T., Wu, P., Chan, W., Peng, W., and Zhang, Y. 2012. "Predicting Collective Sentiment Dynamics from Time-series
Social Media". In WISDOM '12 Proceedings of the First International Workshop on Issues of Sentiment Discovery and
Chen, Wang, and Ji
Opinion Mining, August 12th, Beijing, China, Article No. 6.
O'Connor, B., Balasubramanyan, R., Routledge, B. R., and Smith, N. A. 2010. "From Tweets to Polls: Linking Text Sentiment to
Public Opinion Time Series". In Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media,
May 23th-26th, Washington, D.C., USA, 122 -- 129.
Pennebaker, J. W., Mehl, M. R., and Niederhoffer, K. G. 2003. "Psychological Aspects of Natural Language Use: Our Words , Our
Selves". Annual review of psychology 54(1): 547 -- 577.
Ragini, J. R., Anand, P. M. R., and Bhaskar, V. 2018. "Big Data Analytics for Disaster Response and Recovery through Sentiment
Analysis". International Journal of Information Management 42: 13 -- 24.
Stone, P. J., Dunphy, D. C., and Smith., M. S. 1966. The General Inquirer : A Computer Approach to Content Analysis. Cambridge
: The MIT Press.
Thelwall, M. 2017. "The Heart and Soul of the Web ? Sentiment Strength Detection in the Social Web with SentiStrength". In
Cyberemotions, edited by A. H. Janusz, 119 -- 134, Cham: Springer International Publishing.
Tokdar, S. 2013. Choosing a Prior Distribution. https://www2.stat.duke.edu/courses/Spring13/sta732.01/priors.pdf, assessed 15th
March 2019.
Wang, Q., and Taylor, J. E. 2016. "Process Map for Urban-Human Mobility and Civil Infrastructure Data Collection Using
Geosocial Networking Platforms". Journal of Computing in Civil Engineering 30(2): 04015004.
Yu, S., and Kak, S. 2012. "A Survey of Prediction Using Social Media". arXiv preprint, arXiv:1203-1647.
Zhang, W., and Skiena, S. 2009. "Improving Movie Gross Prediction Through News Analysis". In 2009 IEEE/WIC/ACM
International Joint Conference on Web Intelligence and Intelligent Agent Technology, September 15th-18th, Milano, Italy, 301 --
304.
AUTHOR BIOGRAPHIES
YUDI CHEN is a PhD student in the Department of Civil, Environmental & Infrastructure Engineering, George Mason University.
His research focuses on the integration of data mining and complex system simulation to enhance infrastructure and social
resilience. His email address is [email protected].
WENYING JI is an Assistant Professor in the Department of Civil, Environmental & Infrastructure Engineering, George Mason
University. He received his PhD in Construction Engineering and Management from the University of Alberta. He is an
interdisciplinary scholar focused on the integration of advanced data analytics, complex system simulation, and construction
management to enhance the overall performance of infrastructure systems. His e-mail address is [email protected].
QI WANG is an Assistant Professor in the Department of Civil and Environmental Engineering, Northeastern University. He
received a PhD from the Department of Civil and Environmental Engineering at Virginia Tech. His research focuses on the interplay
between urban information and mobility, infrastructure and social resilience. His email address is [email protected].
|
1705.02801 | 4 | 1705 | 2017-12-22T20:42:06 | Graph Embedding Techniques, Applications, and Performance: A Survey | [
"cs.SI",
"cs.LG",
"physics.data-an"
] | Graphs, such as social networks, word co-occurrence networks, and communication networks, occur naturally in various real-world applications. Analyzing them yields insight into the structure of society, language, and different patterns of communication. Many approaches have been proposed to perform the analysis. Recently, methods which use the representation of graph nodes in vector space have gained traction from the research community. In this survey, we provide a comprehensive and structured analysis of various graph embedding techniques proposed in the literature. We first introduce the embedding task and its challenges such as scalability, choice of dimensionality, and features to be preserved, and their possible solutions. We then present three categories of approaches based on factorization methods, random walks, and deep learning, with examples of representative algorithms in each category and analysis of their performance on various tasks. We evaluate these state-of-the-art methods on a few common datasets and compare their performance against one another. Our analysis concludes by suggesting some potential applications and future directions. We finally present the open-source Python library we developed, named GEM (Graph Embedding Methods, available at https://github.com/palash1992/GEM), which provides all presented algorithms within a unified interface to foster and facilitate research on the topic. | cs.SI | cs | Graph Embedding Techniques, Applications, and Performance: A Survey
Palash Goyal and Emilio Ferrara
University of Southern California, Information Sciences Institute
4676 Admiralty Way, Suite 1001. Marina del Rey, CA. 90292, USA
7
1
0
2
c
e
D
2
2
]
I
S
.
s
c
[
4
v
1
0
8
2
0
.
5
0
7
1
:
v
i
X
r
a
Abstract
Graphs, such as social networks, word co-occurrence networks, and communication networks, occur naturally in various real-world
applications. Analyzing them yields insight into the structure of society, language, and different patterns of communication. Many
approaches have been proposed to perform the analysis. Recently, methods which use the representation of graph nodes in vector
space have gained traction from the research community. In this survey, we provide a comprehensive and structured analysis of
various graph embedding techniques proposed in the literature. We first introduce the embedding task and its challenges such as
scalability, choice of dimensionality, and features to be preserved, and their possible solutions. We then present three categories of
approaches based on factorization methods, random walks, and deep learning, with examples of representative algorithms in each
category and analysis of their performance on various tasks. We evaluate these state-of-the-art methods on a few common datasets
and compare their performance against one another. Our analysis concludes by suggesting some potential applications and future
directions. We finally present the open-source Python library we developed, named GEM (Graph Embedding Methods, available
at https://github.com/palash1992/GEM), which provides all presented algorithms within a unified interface to foster and
facilitate research on the topic.
Keywords: Graph embedding techniques, Graph embedding applications, Python Graph Embedding Methods GEM Library
1. Introduction
Graph analysis has been attracting increasing attention in
the recent years due the ubiquity of networks in the real world.
Graphs (a.k.a. networks) have been used to denote information
in various areas including biology (Protein-Protein interaction
networks)[1], social sciences (friendship networks)[2] and lin-
guistics (word co-occurrence networks)[3]. Modeling the in-
teractions between entities as graphs has enabled researchers to
understand the various network systems in a systematic manner[4].
For example, social networks have been used for applications
like friendship or content recommendation, as well as for ad-
vertisement [5]. Graph analytic tasks can be broadly abstracted
into the following four categories: (a) node classification[6],
(b) link prediction[5], (c) clustering[7], and (d) visualization[8].
Node classification aims at determining the label of nodes (a.k.a.
vertices) based on other labeled nodes and the topology of the
network. Link prediction refers to the task of predicting missing
links or links that are likely to occur in the future. Clustering is
used to find subsets of similar nodes and group them together;
finally, visualization helps in providing insights into the struc-
ture of the network.
In the past few decades, many methods have been proposed
for the tasks defined above. For node classification, there are
broadly two categories of approaches - methods which use
random walks to propagate the labels[9, 10], and methods which
extract features from nodes and apply classifiers on them[11,
12]. Approaches for link prediction include similarity based
methods[13, 14], maximum likelihood models[15, 16], and prob-
abilistic models[17, 18]. Clustering methods include attribute
based models[19] and methods which directly maximize (resp.,
minimize) the inter-cluster (resp., intra-cluster) distances[7, 20].
This survey will provide a taxonomy that captures these appli-
cation domains and the existing strategies.
Typically, a model defined to solve graph-based problems
either operates on the original graph adjacency matrix or on a
derived vector space. Recently, the methods based on represent-
ing networks in vector space, while preserving their properties,
have become widely popular[21, 22, 23]. Obtaining such an
embedding is useful in the tasks defined above.1 The embed-
dings are input as features to a model and the parameters are
learned based on the training data. This obviates the need for
complex classification models which are applied directly on the
graph.
1.1. Challenges
Obtaining a vector representation of each node of a graph
is inherently difficult and poses several challenges which have
been driving research in this field:
(i) Choice of property: A "good" vector representation of
nodes should preserve the structure of the graph and the connec-
tion between individual nodes. The first challenge is choosing
1The term graph embedding has been used in the literature in two ways: to
represent an entire graph in vector space, or to represent each individual node
in vector space. In this paper, we use the latter definition since such representa-
tions can be used for tasks like node classification, differently from the former
representation.
Preprint submitted to Knowledge Based Systems
December 27, 2017
the property of the graph which the embedding should preserve.
Given the plethora of distance metrics and properties defined
for graphs, this choice can be difficult and the performance may
depend on the application.
(ii) Scalability: Most real networks are large and contain
millions of nodes and edges - embedding methods should be
scalable and able to process large graphs. Defining a scalable
model can be challenging especially when the model is aimed
to preserve global properties of the network.
(iii) Dimensionality of the embedding: Finding the opti-
mal dimensions of the representation can be hard. For example,
higher number of dimensions may increase the reconstruction
precision but will have high time and space complexity. The
choice can also be application-specific depending on the ap-
proach: E.g., lower number of dimensions may result in better
link prediction accuracy if the chosen model only captures local
connections between nodes.
1.2. Our contribution
This survey provides a three-pronged contribution:
(1) We propose a taxonomy of approaches to graph embed-
ding, and explain their differences. We define four different
tasks, i.e., application domains of graph embedding techniques.
We illustrate the evolution of the topic, the challenges it faces,
and future possible research directions.
(2) We provide a detailed and systematic analysis of vari-
ous graph embedding models and discuss their performance on
the various tasks. For each method, we analyze the properties
preserved and its accuracy, through comprehensive comparative
evaluation on a few common data sets and application scenar-
ios. Furthermore, we perform hyperparameter sensitivity analy-
sis on the methods evaluated to test their robustness and provide
an understanding of the dependence of optimal hyperparameter
on the task performed.
(3) To foster further research in this topic, we finally present
GEM, the open-source Python library we developed that pro-
vides, under a unified interface, implementations of all graph
embedding methods discussed in this survey. To the best of our
knowledge, this is the first paper to survey graph embedding
techniques and their applications.
1.3. Organization of the survey
The survey is organized as follows. In Section 2, we provide
the definitions required to understand the problem and mod-
els discussed next. Section 3 proposes a taxonomy of graph
embedding approaches and provides a description of represen-
tative algorithms in each category. The list of applications for
which researchers have used the representation learning approach
for graphs is provided in Section 4. We then describe our ex-
perimental setup (Section 5) and evaluate the different models
(Section 6). Section 7 introduces our Python library for graph
embedding methods. Finally, in Section 8 we draw our con-
clusions and discuss potential applications and future research
direction.
2. Definitions and Preliminaries
We represent the set {1,··· , n} by [n] in the rest of the paper.
We start by formally defining several preliminaries which have
been defined similar to Wang et al. [23].
Definition 1. (Graph) A graph G(V, E) is a collection of V =
{v1,··· , vn} vertices (a.k.a. nodes) and E = {ei j}n
i, j=1 edges. The
adjacency matrix S of graph G contains non-negative weights
associated with each edge: si j ≥ 0. If vi and v j are not con-
nected to each other, then si j = 0. For undirected weighted
graphs, si j = s ji ∀i, j ∈ [n].
The edge weight si j is generally treated as a measure of
similarity between the nodes vi and v j. The higher the edge
weight, the more similar the two nodes are expected to be.
Definition 2. (First-order proximity) Edge weights si j are also
called first-order proximities between nodes vi and v j, since
they are the first and foremost measures of similarity between
two nodes.
We can similarly define higher-order proximities between
nodes. For instance,
Definition 3. (Second-order proximity) The second-order prox-
imity between a pair of nodes describes the proximity of the
pair's neighborhood structure. Let si = [si1,··· , sin] denote the
first-order proximity between vi and other nodes. Then, second-
order proximity between vi and v j is determined by the similar-
ity of si and s j.
Second-order proximity compares the neighborhood of two
nodes and treats them as similar if they have a similar neigh-
borhood. It is possible to define higher-order proximities using
other metrics, e.g. Katz Index, Rooted PageRank, Common
Neighbors, Adamic Adar, etc. (for detailed definitions, omitted
here in the interest of space, see Ou et al. [24]). Next, we define
a graph embedding:
Definition 4. (Graph embedding) Given a graph G = (V, E),
: vi → yi ∈ Rd ∀i ∈ [n]
a graph embedding is a mapping f
such that d (cid:28) V and the function f preserves some proximity
measure defined on graph G.
An embedding therefore maps each node to a low-dimensional
order proximity might be obtained by minimizing(cid:80)
feature vector and tries to preserve the connection strengths be-
tween vertices. For instance, an embedding preserving first-
i, j si j(cid:107)yi −
y j(cid:107)2
2. Let two node pairs (vi, v j) and (vi, vk) be associated with
connections strengths such that si j > sik. In this case, vi and v j
will be mapped to points in the embedding space that will be
closer each other than the mapping of vi and vk.
3. Algorithmic Approaches: A Taxonomy
In the past decade, there has been a lot of research in the
field of graph embedding, with a focus on designing new em-
bedding algorithms. More recently, researchers pushed for-
ward scalable embedding algorithms that can be applied on
2
graphs with millions of nodes and edges. In the following, we
provide historical context about the research progress in this
domain (§3.1), then propose a taxonomy of graph embedding
techniques (§3.2) covering (i) factorization methods (§3.3), (ii)
random walk techniques (§3.4), (iii) deep learning (§3.5), and
(iv) other miscellaneous strategies (§3.6).
3.1. Graph Embedding Research Context and Evolution
In the early 2000s, researchers developed graph embedding
algorithms as part of dimensionality reduction techniques. They
would construct a similarity graph for a set of n D-dimensional
points based on neighborhood and then embed the nodes of the
graph in a d-dimensional vector space, where d (cid:28) D. The idea
for embedding was to keep connected nodes closer to each other
in the vector space. Laplacian Eigenmaps [25] and Locally Lin-
ear Embedding (LLE) [26] are examples of algorithms based on
this rationale. However, scalability is a major issue in this ap-
proach, whose time complexity is O(V2).
Since 2010, research on graph embedding has shifted to ob-
taining scalable graph embedding techniques which leverage
the sparsity of real-world networks. For example, Graph Fac-
torization [21] uses an approximate factorization of the adja-
cency matrix as the embedding. LINE [22] extends this ap-
proach and attempts to preserve both first order and second
proximities. HOPE [24] extends LINE to attempt preserve high-
order proximity by decomposing the similarity matrix rather
than adjacency matrix using a generalized Singular Value De-
composition (SVD). SDNE [23] uses autoencoders to embed
graph nodes and capture highly non-linear dependencies. The
new scalable approaches have a time complexity of O(E).
3.2. A Taxonomy of Graph Embedding Methods
We propose a taxonomy of embedding approaches. We cat-
egorize the embedding methods into three broad categories: (1)
Factorization based, (2) Random Walk based, and (3) Deep
Learning based. Below we explain the characteristics of each of
these categories and provide a summary of a few representative
approaches for each category (cf. Table 1), using the notation
presented in Table 2.
3.3. Factorization based Methods
Factorization based algorithms represent the connections be-
tween nodes in the form of a matrix and factorize this matrix
to obtain the embedding. The matrices used to represent the
connections include node adjacency matrix, Laplacian matrix,
node transition probability matrix, and Katz similarity matrix,
among others. Approaches to factorize the representative ma-
trix vary based on the matrix properties. If the obtained matrix
is positive semidefinite, e.g. the Laplacian matrix, one can use
eigenvalue decomposition. For unstructured matrices, one can
use gradient descent methods to obtain the embedding in linear
time.
3
3.3.1. Locally Linear Embedding (LLE)
LLE [26] assumes that every node is a linear combination
of its neighbors in the embedding space. If we assume that the
adjacency matrix element Wi j of graph G represents the weight
of node j in the representation of node i, we define
Yi ≈(cid:88)
(cid:88)
j
φ(Y) =
Wi jY j
∀i ∈ V.
Yi −(cid:88)
Wi jY j2,
Hence, we can obtain the embedding Y N×d by minimizing
i
j
invariance, the embedding is centered around zero: (cid:80)
To remove degenerate solutions, the variance of the embedding
is constrained as 1
N YT Y = I. To further remove translational
i Yi = 0.
The above constrained optimization problem can be reduced to
an eigenvalue problem, whose solution is to take the bottom
d + 1 eigenvectors of the sparse matrix (I − W)T (I − W) and
discarding the eigenvector corresponding to the smallest eigen-
value.
3.3.2. Laplacian Eigenmaps
Laplacian Eigenmaps [25] aims to keep the embedding of
two nodes close when the weight Wi j is high. Specifically, they
minimize the following objective function
Yi − Y j2Wi j
(cid:88)
φ(Y) =
1
2
i, j
= tr(YT LY),
where L is the Laplacian of graph G. The objective function
is subjected to the constraint YT DY = I to eliminate trivial
solution. The solution to this can be obtained by taking the
eigenvectors corresponding to the d smallest eigenvalues of the
normalized Laplacian, Lnorm = D−1/2LD−1/2.
3.3.3. Cauchy Graph Embedding
Laplacian Eigenmaps uses a quadratic penalty function on
the distance between embeddings. The objective function thus
emphasizes preservation of dissimilarity between nodes more
than their similarity. This may yield embeddings which do not
preserve local topology, which can be defined as the equality
between relative order of edge weights (Wi j) and inverse order
of distances in the embedded space (Yi − Y j2). Cauchy Graph
Embedding [32] tackles this problem by replacing the quadratic
Yi−Y j2
function Yi − Y j2 with
Yi−Y j2+σ2 . Upon rearrangement, the ob-
jective function to be maximized becomes
(cid:88)
with constraints YT Y = I and(cid:80)
φ(Y) =
i, j
Wi j
Yi − Y j2 + σ2 ,
i Yi = 0 for each i. The new
objective is an inverse function of distance and thus puts em-
phasis on similar nodes rather than dissimilar nodes. The au-
thors propose several variants including Gaussian, Exponential
and Linear embeddings with varying relative emphasis on the
distance between nodes.
Category
Factorization
Random Walk
Published
Year
Science[26]
2000
2001
NIPS[25]
2013 WWW[21]
CIKM[27]
2015
KDD[24]
2016
2014
KDD[28]
KDD[29]
2016
Deep Learning
Miscellaneous
KDD[23]
2016
AAAI[30]
2016
2017
ICLR[31]
2015 WWW[22]
Method
LLE
Laplacian Eigenmaps
Graph Factorization
GraRep
HOPE
DeepWalk
node2vec
SDNE
DNGR
GCN
LINE
Time Complexity
O(Ed2)
O(Ed2)
O(Ed)
O(V3)
O(Ed2)
O(Vd)
O(Vd)
O(VE)
O(V2)
O(Ed2)
O(Ed)
Properties preserved
1st order proximity
1 − kth order proximities
1 − kth order proximities,
structural equivalence
1st and 2nd order proximities
1 − kth order proximities
1 − kth order proximities
1st and 2nd order proximities
Table 1: List of graph embedding approaches
G
V
E
d
Y
Yi
Ys
Yt
W
D
L
< Yi, Y j >
S
Graphical representation of the data
Set of vertices in the graph
Set of edges in the graph
Number of dimensions
Embedding of the graph, V × d
Embedding of node vi, 1 × d (also ith row of Y)
Source embedding of a directed graph, V × d
Target embedding of a directed graph, V × d
Adjacency matrix of the graph, V × V
Diagonal matrix of the degree of each vertex, V × V
Graph Laplacian (L = D − W), V × V
Inner product of Yi and Y j i.e. YiYT
j
Similarity matrix of the graph, V × V
Table 2: Summary of notation
3.3.4. Structure Preserving Embedding (SPE)
Structure Preserving Embedding ([33]) is another approach
which extends Laplacian Eigenmaps. SPE aims to reconstruct
the input graph exactly. The embedding is stored as a posi-
tive semidefinite kernel matrix K and a connectivity algorithm
G is defined which reconstructs the graph from K. The ker-
nel K is chosen such that it maximizes tr(KW) which attempts
to recover rank-1 spectral embedding. Choice of the connec-
tivity algorithm G induces constraints on this objective func-
tion. For e.g., if the connectivity scheme is to connect each
node to neighbors which lie within a ball of radius , the con-
straint (Kii + K j j − 2Ki j)(Wi j − 1/2) ≤ (Wi j − 1/2) produces
a kernel which can perfectly reconstruct the original graph. To
handle noise in the graph, a slack variable is added. For ξ-
connectivity, the optimization thus becomes max tr(KA) − Cξ
s.t. (Kii + K j j − 2Ki j)(Wi j − 1/2) ≤ (Wi j − 1/2) − ξ, where ξ is
the slack variable and C controls slackness.
3.3.5. Graph Factorization (GF)
To the best of our knowledge, Graph Factorization [21] was
the first method to obtain a graph embedding in O(E) time. To
obtain the embedding, GF factorizes the adjacency matrix of
the graph, minimizing the following loss function
φ(Y, λ) =
1
2
(Wi j− < Yi, Y j >)2 +
λ
2
(cid:107)Yi(cid:107)2,
(cid:88)
(i, j)∈E
(cid:88)
i
where λ is a regularization coefficient. Note that the summation
is over the observed edges as opposed to all possible edges.
This is an approximation in the interest of scalability, and as
such it may introduce noise in the solution. Note that as the ad-
jacency matrix is often not positive semidefinite, the minimum
of the loss function is greater than 0 even if the dimensionality
of embedding is V.
3.3.6. GraRep
GraRep [27] defines the node transition probability as T =
D−1W and preserves k-order proximity by minimizing (cid:107)Xk −
t (cid:107)2
F where Xk is derived from T k (refer to [27] for a de-
Yk
s YkT
s for all k to form
tailed derivation).
Ys. Note that this is similar to HOPE [24] which minimizes
t (cid:107)2
(cid:107)S − YsYT
F where S is an appropriate similarity matrix. The
drawback of GraRep is scalability, since T k can have O(V2)
non-zero entries.
It then concatenates Yk
3.3.7. HOPE
HOPE [24] preserves higher order proximity by minimiz-
ing (cid:107)S − YsYT
t (cid:107)2
F, where S is the similarity matrix. The au-
thors experimented with different similarity measures, includ-
ing Katz Index, Rooted Page Rank, Common Neighbors, and
Adamic-Adar score. They represented each similarity measure
as S = M−1
g Ml, where both Mg and Ml are sparse. This enables
HOPE to use generalized Singular Value Decomposition (SVD)
[34] to obtain the embedding efficiently.
4
3.3.8. Additional Variants
3.4.3. Hierarchical Representation Learning for Networks (HARP)
For the purpose of dimensionality reduction of high dimen-
sional data, there are several other methods developed capa-
ble of performing graph embedding. Yan et al.
[35] survey
a list of such methods including Principal Component Analysis
(PCA) [36], Linear Discrimant Analysis (LDA) [37], ISOMAP [38],
Multidimesional Scaling (MDS) [39], Locality Preserving Prop-
erties (LPP) [40] and Kernel Eigenmaps [41]. Matrinex et al.
[42]) proposed a general framework, non-negative graph em-
bedding, which yields non-negative embeddings for these algo-
rithms.
A number of recent techniques have focused on jointly learn-
ing network structure and additional node attribute informa-
tion available for the network., Augmented Relation Embed-
ding (ARE) [43] augments network with content based features
for images and modifies the graph-Laplacian to capture such in-
formation. Text-associated DeepWalk (TADW) [44] performs
matrix factorization on node similarity matrix disentangling the
representation using text feature matrix. Heterogeneous Net-
work Embedding (HNE) [45] learns representation for each modal-
ity of the network and then unifies them into a common space
using linear transformations. Other works ([46, 47, 48]) per-
form similar transformations between various node attributes
and learn joint embedding.
3.4. Random Walk based Methods
Random walks have been used to approximate many prop-
erties in the graph including node centrality[49] and similarity[50].
They are especially useful when one can either only partially
observe the graph, or the graph is too large to measure in its
entirety. Embedding techniques using random walks on graphs
to obtain node representations have been proposed: DeepWalk
and node2vec are two examples.
3.4.1. DeepWalk
DeepWalk [28] preserves higher-order proximity between
nodes by maximizing the probability of observing the last k
nodes and the next k nodes in the random walk centered at
vi, i.e. maximizing log Pr(vi−k, . . . , vi−1, vi+1, . . . , vi+kYi), where
2k + 1 is the length of the random walk. The model generates
multiple random walks each of length 2k + 1 and performs the
optimization over sum of log-likelihoods for each random walk.
A dot-product based decoder is used to reconstruct the edges
from the node embeddings.
3.4.2. node2vec
Similar to DeepWalk [28], node2vec [29] preserves higher-
order proximity between nodes by maximizing the probabil-
ity of occurrence of subsequent nodes in fixed length random
walks. The crucial difference from DeepWalk is that node2vec
employs biased-random walks that provide a trade-off between
breadth-first (BFS) and depth-first (DFS) graph searches, and
hence produces higher-quality and more informative embed-
dings than DeepWalk. Choosing the right balance enables node2vec
to preserve community structure as well as structural equiva-
lence between nodes.
DeepWalk and node2vec initialize the node embeddings ran-
domly for training the models. As their objective function is
non-convex, such initializations can be stuck in local optima.
HARP [51] introduces a strategy to improve the solution and
avoid local optima by better weight initialization. To this pur-
pose, HARP creates hierarchy of nodes by aggregating nodes in
the previous layer of hierarchy using graph coarsening. It then
generates embedding of the coarsest graph and initializes the
node embeddings of the refined graph (one up in the hierarchy)
with the learned embedding.
It propagates such embeddings
through the hierarchy to obtain the embeddings of the origi-
nal graph. Thus HARP can be used in conjunction with random
walk based methods like DeepWalk and node2vec to obtain bet-
ter solutions to the optimization function.
3.4.4. Walklets
DeepWalk and node2vec implicitly preserve higher order
proximity between nodes by generating multiple random walks
which connect nodes at various distances due to its stochastic
nature. On the other hand, factorization based approches like
GF and HOPE explicitly preserve distances between nodes by
modeling it in their objective function. Walklets [52] combine
this idea of explicit modeling with random walks. The model
modifies the random walk strategy used in DeepWalk by skip-
ping over some nodes in the graph. This is performed for mul-
tiple skip lengths, analogous to factorizing Ak in GraRep, and
the resulting set of random walks are used for training the model
similar to DeepWalk.
3.4.5. Additional Variants
There have been several variations of the above methods
proposed recently. Similar to augmenting graph structure with
node attributes for factorization based methods, GenVector [53],
Discriminative Deep Random Walk (DDRW) [54], Tri-party
Deep Network Representation (TriDNR) [55] and [56] extend
random walks to jointly learn network structure and node at-
tributes.
3.5. Deep Learning based Methods
The growing research on deep learning has led to a deluge
of deep neural networks based methods applied to graphs[23,
30, 57]. Deep autoencoders have been used for dimensionality
reduction[58] due to their ability to model non-linear structure
in the data. Recently, SDNE [23], DNGR [30] utilized this abil-
ity of deep autoencoder to generate an embedding model that
can capture non-linearity in graphs.
3.5.1. Structural Deep Network Embedding (SDNE)
Wang et al.
[23] proposed to use deep autoencoders to
preserve the first and second order network proximities. They
achieve this by jointly optimizing the two proximities. The ap-
proach uses highly non-linear functions to obtain the embed-
ding. The model consists of two parts: unsupervised and super-
vised. The former consists of an autoencoder aiming at finding
5
an embedding for a node which can reconstruct its neighbor-
hood. The latter is based on Laplacian Eigenmaps[25] which
apply a penalty when similar vertices are mapped far from each
other in the embedding space.
3.5.2. Deep Neural Networks for Learning Graph Representa-
tions (DNGR)
DNGR combines random surfing with deep autoencoder.
The model consists of 3 components: random surfing, positive
pointwise mutual information (PPMI) calculation and stacked
denoising autoencoders. Random surfing model is used on the
input graph to generate a probabilistic co-occurence matrix,
analogous to similarity matrix in HOPE. The matrix is trans-
formed to a PPMI matrix and input into a stacked denoising
autoencoder to obtain the embedding. Inputting PPMI matrix
ensures that the autoencoder model can capture higher order
proximity. Furthermore, using stacked denoising autoencoders
aids robustness of the model in presence of noise in the graph
as well as in capturing underlying structure required for tasks
such as link prediction and node classification.
3.5.3. Graph Convolutional Networks (GCN)
Deep neural network based methods discussed above, namely
SDNE and DNGR, take as input the global neighborhood of
each node (a row of PPMI for DNGR and adjacency matrix
for SDNE). This can be computationally expensive and inop-
timal for large sparse graphs. Graph Convolutional Networks
(GCNs) [31] tackle this problem by defining a convolution op-
erator on graph. The model iteratively aggregates the embed-
dings of neighbors for a node and uses a function of the ob-
tained embedding and its embedding at previous iteration to
obtain the new embedding. Aggregating embedding of only
local neighborhood makes it scalable and multiple iterations al-
lows the learned embedding of a node to characterize global
neighborhood.
Several recent papers ([59, 60, 61, 62, 63, 64]) have pro-
posed methods using convolution on graphs to obtain semi-
supervised embedding, which can be used to obtain unsuper-
vised embedding by defining unique labels for each node. The
approaches vary in the construction of convolutional filters which
can broadly be categorized into spatial and spectral filters. Spa-
tial filters operate directly on the original graph and adjacency
matrix whereas spectral filters operate on the spectrum of graph-
Laplacian.
3.5.4. Variational Graph Auto-Encoders (VGAE)
Kipf et al. [65] evaluate the performance of variational au-
toencoders [66] on the task of graph embedding. The model
uses a graph convolutional network (GCN) encoder and an in-
ner product decoder. The input is adjacency matrix and they
rely on GCN to learn the higher order dependencies between
nodes. They empirically show that using variational autoen-
coders can improve performance compared to non-probabilistic
autoencoders.
3.6. Other Methods
3.6.1. LINE
LINE [22] explicitly defines two functions, one each for
first- and second-order proximities, and minimizes the com-
bination of the two. The function for first-order proximity is
similar to that of Graph Factorization (GF) [21] in that they
both aim to keep the adjacency matrix and dot product of em-
beddings close. The difference is that GF does this by directly
minimizing the difference of the two.
Instead, LINE defines
two joint probability distributions for each pair of vertices, one
using adjancency matrix and the other using the embedding.
Then, LINE minimizes the Kullback-Leibler (KL) divergence
of these two distributions. The two distributions and the objec-
tive function are as follows
1
1 + exp(− < Yi, Y j >)
(cid:80)
Wi j
(i, j)∈E Wi j
Wi j log p1(vi, v j).
p1(vi, v j) =
p1(vi, v j) =
O1 = − (cid:88)
O1 = KL( p1, p1)
(i, j)∈E
The authors similarly define probability distributions and
objective function for the second-order proximity.
3.7. Discussion
We can interpret embeddings as representations which de-
scribe graph data. Thus, embeddings can yield insights into the
properties of a network. We illustrate this in Figure 1. Consider
a complete bipartite graph G. An embedding algorithm which
attempts to keep two connected nodes close (i.e., preserve the
community structure), would fail to capture the structure of
the graph - as shown in 1(b). However, an algorithm which
embeds structurally-equivalent nodes together learns an inter-
pretable embedding - as shown in 1(c). Similarly, in 1(d) we
consider a graph with two star components connected through
a hub. Nodes 1 and 3 are structurally equivalent (they link to
the same nodes) and are clustered together in 1(f), whereas in
1(e) they are far apart. The classes of algorithms above can be
described in terms of their ability to explain the properties of
graphs.
Factorization-based methods are not capable of learning an
arbitrary function, e.g., to explain network connectivity. Thus,
unless explicitly included in their objective function, they can-
not learn structural equivalence. In random walk based meth-
ods, the mixture of equivalences can be controlled to a certain
extent by varying the random walk parameters. Deep learning
methods can model a wide range of functions following the uni-
versal approximation theorem [67]: given enough parameters,
they can learn the mix of community and structural equivalence,
to embed the nodes such that the reconstruction error is mini-
mized. We can interpret the weights of the autoencoder as a
representation of the structure of the graph. For example, 1(c)
plots the embedding learned by SDNE for the complete bipar-
tite graph G1. The autoencoder stored the bipartite structure in
6
(a) Graph G1
(b) CPE for G1
(c) SPE for G1
(d) Graph G2
(e) CPE for G2
(f) SPE for G2
Figure 1: Examples illustrating the effect of type of similarity preserved. Here, CPE and SPE stand for Community Preserving Embedding and Structural-equivalence
Preserving Embedding, respectively.
weights and achieved perfect reconstruction. Given the vari-
ety of properties of real-world graphs, using general non-linear
models that span a large class of functions is a promising direc-
tion that warrants further exploration.
the original graph from the embedding and evaluating the re-
construction error. They show that a low dimensional represen-
tation for each node (in the order of 100s) suffices to reconstruct
the graph with high precision.
4. Applications
As graph representations, embeddings can be used in a va-
riety of tasks. These applications can be broadly classified as:
network compression (§4.1), visualization (§4.2), clustering (§4.3),
link prediction (§4.4), and node classification (§4.5).
4.1. Network Compression
Feder et al.[68] introduced the concept of network compres-
sion (a.k.a. graph simplification). For a graph G, they defined a
compression G∗ which has smaller number of edges. The goal
was to store the network more efficiently and run graph analy-
sis algorithms faster. They obtained the compression graph by
partitioning the original graph into bipartite cliques and replac-
ing them by trees, thus reducing the number of edges. Over
the years, many researchers have used aggregation based meth-
ods [69, 70, 71] to compress graphs. The main idea in this line
of work is to exploit the link structure of the graph to group
nodes and edges. Navlakha et al.[72] used Minimum Descrip-
tion Length (MDL) [73] from information theory to summarize
a graph into a graph summary and edge correction.
Similar to these representations, graph embedding can also
be interpreted as a summarization of graph. Wang et al.[23] and
Ou et al.[24] tested this hypothesis explicitly by reconstructing
4.2. Visualization
Application of visualizing graphs can be dated back to 1736
when Euler used it to solve "Konigsberger Bruckenproblem"
[74]. In the recent years, graph visualization has found appli-
cations in software engineering [75], electrical circuits [76], bi-
ology [1] and sociology [2]. Battista et al.[76] and Eades et
al.[77] survey a range of methods used to draw graphs and de-
fine aesthetic criteria for this purpose. Herman et al.[78] gen-
eralize this and view it from an information visualization per-
spective. They study and compare various traditional layouts
used to draw graphs including tree-, 3D- and hyperbolic-based
layouts.
As embedding represents a graph in a vector space, dimen-
sionality reduction techniques like Principal Component Anal-
ysis (PCA) [79] and t-distributed stochastic neighbor embed-
ding (t-SNE) [8] can be applied on it to visualize the graph.
The authors of DeepWalk [28] illustrated the goodness of their
embedding approach by visualizing the Zachary's Karate Club
network. The authors of LINE [22] visualized the DBLP co-
authorship network, and showed that LINE is able to cluster
together authors in the same field. The authors of SDNE [23]
applied it on 20-Newsgroup document similarity network to ob-
tain clusters of documents based on topics.
7
12356748
4.3. Clustering
Graph clustering (a.k.a., network partitioning) can be of
two types: (a) structure based, and (b) attribute based clus-
tering. The former can be further divided into two categories,
namely community based, and structurally equivalent cluster-
ing. Structure-based methods [7, 20, 80], aim to find dense sub-
graphs with high number of intra-cluster edges, and low number
of inter-cluster edges. Structural equivalence clustering [81],
on the contrary, is designed to identify nodes with similar roles
(like bridges and outliers). Attribute based methods [19] utilize
node labels, in addition to observed links, to cluster nodes.
White et al.[82] used k-means on the embedding to cluster
the nodes and visualize the clusters obtained on Wordnet and
NCAA data sets verifying that the clusters obtained have in-
tuitive interpretation. Recent methods on embedding haven't
explicitly evaluated their models on this task and thus it is a
promising field of research in the graph embedding community.
4.4. Link Prediction
Networks are constructed from the observed interactions
between entities, which may be incomplete or inaccurate. The
challenge often lies in identifying spurious interactions and pre-
dicting missing information. Link prediction refers to the task
of predicting either missing interactions or links that may ap-
pear in the future in an evolving network. Link prediction is
pervasive in biological network analysis, where verifying the
existence of links between nodes requires costly experimental
tests. Limiting the experiments to links ordered by presence
likelihood has been shown to be very cost effective. In social
networks, link prediction is used to predict probable friend-
ships, which can be used for recommendation and lead to a
more satisfactory user experience. Liben-Nowell et al.[5], Lu
et al.[83] and Hasan et al.[84] survey the recent progress in
this field and categorize the algorithms into (a) similarity based
(local and global) [13, 14, 85], (b) maximum likelihood based
[15, 16] and (c) probabilistic methods [17, 18, 86].
Embeddings capture inherent dynamics of the network ei-
ther explicitly or implicitly thus enabling application to link
prediction. Wang et al.[23] and Ou et al.[24] predict links from
the learned node representations on publicly available collabo-
ration and social networks. In addition, Grover et al.[29] apply
it to biology networks. They show that on these data sets links
predicted using embeddings are more accurate than traditional
similarity based link prediction methods described above.
4.5. Node Classification
Often in networks, a fraction of nodes are labeled. In social
networks, labels may indicate interests, beliefs, or demograph-
ics.
In language networks, a document may be labeled with
topics or keywords, whereas the labels of entities in biology
networks may be based on functionality. Due to various fac-
tors, labels may be unknown for large fractions of nodes. For
example, in social networks many users do not provide their de-
mographic information due to privacy concerns. Missing labels
can be inferred using the labeled nodes and the links in the net-
work. The task of predicting these missing labels is also known
8
as node classification. Bhagat et al.[6] survey the methods used
in the literature for this task. They classify the approaches into
two categories, i.e., feature extraction based and random walk
based. Feature-based models [11, 12, 87] generate features for
nodes based on their neighborhood and local network statistics
and then apply a classifier like Logistic Regression [88] and
Naive Bayes [89] to predict the labels. Random walk based
models [9, 10] propagate the labels with random walks.
Embeddings can be interpreted as automatically extracted
node features based on network structure and thus falls into
the first category. Recent work[28, 22, 24, 23, 29] has evalu-
ated the predictive power of embedding on various information
networks including language, social, biology and collaboration
graphs. They show that embeddings can predict missing labels
with high precision.
5. Experimental Setup
Our experiments evaluate the feature representations ob-
tained using the methods reviewed before on the previous four
application domains. Next, we specify the datasets and evalu-
ation metrics we used. The experiments were performed on a
Ubuntu 14.04.4 LTS system with 32 cores, 128 GB RAM and a
clock speed of 2.6 GHz. The GPU used for deep network based
models was Nvidia Tesla K40C.
5.1. Datasets
We evaluate the embedding approaches on a synthetic and
6 real datasets. The datasets are summarized in Table 3.
SYN-SBM: We generate synthetic graph using Stochastic
Block Model [90] with 1024 nodes and 3 communities. We set
the in-block and cross-block probabilities as 0.1 and 0.01 re-
spectively. As we know the community structure in this graph,
we use it to visualize the embeddings learnt by various ap-
proaches.
KARATE [91]: Zachary's karate network is a well-known
social network of a university karate club. It has been widely
studied in social network analysis. The network has 34 nodes,
78 edges and 2 communities.
BLOGCATALOG [92]: This is a network of social re-
lationships of the bloggers listed on the BlogCatalog website.
The labels represent blogger interests inferred through the meta-
data provided by the bloggers. The network has 10,312 nodes,
333,983 edges and 39 different labels.
YOUTUBE [93]: This is a social network of Youtube users.
This is a large network containing 1,157,827 nodes and 4,945,382
edges. The labels represent groups of users who enjoy common
video genres.
HEP-TH [94]: The original dataset contains abstracts of
papers in High Energy Physics Theory for the period from Jan-
uary 1993 to April 2003. We create a collaboration network
for the papers published in this period. The network has 7,980
nodes and 21,036 edges.
ASTRO-PH [95]: This is a collaboration network of au-
thors of papers submitted to e-print arXiv during the period
from January 1993 to April 2003. The network has 18,772
nodes and 396,160 edges.
Name
V
E
Avg. degree
No. of labels
Synthetic
SYN-SBM KARATE
Social Network
BLOGCATALOG
1024
29,833
58.27
3
34
78
4.59
4
10,312
333,983
64.78
39
YOUTUBE
1,157,827
4,945,382
8.54
47
Collaboration Network
ASTRO-PH
HEP-TH
7,980
21,036
5.27
-
18,772
396,160
31.55
-
Biology Network
PPI
3,890
38,739
19.91
50
Table 3: Dataset Statistics
PROTEIN-PROTEIN INTERACTIONS (PPI) [96]: This
is a network of biological interactions between proteins in hu-
mans. This network has 3,890 nodes and 38,739 edges.
5.2. Evaluation Metrics
To evaluate the performance of embedding methods on graph
reconstruction and link prediction, we use Precision at k (Pr@k)
and MeanAveragePrecision(MAP) as our metrics. For node
classification, we use micro-F1 and macro-F1. These metrics
are defined as follows:
Pr@k is the fraction of correct predictions in top k predic-
tions. It is defined as Pr@k = Epred(1:k)∩Eobs
, where Epred(1 : k)
are the top k predictions and Eobs are the observed edges. For
the task of graph reconstruction, Eobs = E and for link predic-
tion, Eobs is the set of hidden edges.
MAP estimates precision for every node and computes the
k
average over all nodes, as follows:
MAP =
i AP(i)
V
k Pr@k(i)·I{Epredi (k)∈Eobsi}
(cid:80)
,
Epredi (1:k)∩Eobsi
where AP(i) =
,
and Epredi and Eobsi are the predicted and observed edges for
node i respectively.
{k:Epredi (k)∈Eobsi}
, Pr@k(i) =
macro-F1, in a multi-label classification task, is defined as
k
the average F1 of all the labels, i.e.,
(cid:80)
(cid:80)
macro − F1 =
l∈L F1(l)
L
where F1(l) is the F1-score for label l.
,
micro − F1 =
micro-F1 calculates F1 globally by counting the total true
positives, false negatives and false positives, giving equal weight
to each instance. It is defined as follows:
2 ∗ P ∗ R
P + R ,
(cid:80)
(cid:80)
where P =
l∈L(T P(l)+FN(l)), are preci-
sion (P) and recall (R) respectively, and T P(l), FP(l) and FN(l)
denote the number of true positives, false positives and false
negatives respectively among the instances which are associ-
ated with the label l either in the ground truth or the predictions.
(cid:80)
(cid:80)
l∈L(T P(l)+FP(l)), and R =
l∈L T P(l)
l∈L T P(l)
6. Experiments and Analysis
In this section, we evaluate and compare embedding meth-
ods on the for tasks presented above. For each task, we show
9
the effect of number of embedding dimensions on the perfor-
mance and compare hyper parameter sensitivity of the meth-
ods. Furthermore, we correlate the performance of embedding
techniques on various tasks varying hyper parameters to test the
notion of an "all-good" embedding which can perform well on
all tasks.
6.1. Graph Reconstruction
Embeddings as a low-dimensional representation of the graph
are expected to accurately reconstruct the graph. Note that re-
construction differs for different embedding techniques (refer
to Section 3). For each method, we reconstruct the proximity
of nodes and rank pair of nodes according to their proximity.
Then we calculate the ratio of real links in top k predictions as
the reconstruction precision. As the number of possible node
pairs (N(N − 1)) can be very large for networks with a large
number of nodes, we randomly sample 1024 nodes for evalua-
tion. We obtain 5 such samples for each dataset and calculate
the mean and standard deviation of precision and MAP values
for subgraph reconstruction. To obtain optimal hyperparame-
ters for each embedding method, we compare the mean MAP
values for each hyperparameter. We then re-run the experiments
with the optimal hyperparameter on 5 random samples of 1024
nodes and report the results.
Figure 2 illustrates the reconstruction precision obtained by
128-dimensional embeddings. We observe that although per-
formance of methods is dataset dependent, embedding approaches
which preserve higher order proximities in general outperform
others. Exceptional performance of Laplacian Eigenmaps on
SBM can be attributed to the lack of higher order structure in
the data set. We also observe that SDNE consistently performs
well on all data sets. This can be attributed to its capability
of learning complex structure from the network. Embeddings
learned by node2vec have low reconstruction precision. This
may be due to the highly non-linear dimensionality reduction
yielding a non-linear manifold. However, HOPE, which learns
linear embeddings but preserves higher order proximity recon-
structs the graph well without any additional parameters.
Effect of dimension. Figure 3 illustrates the effect of di-
mension on the reconstruction error. With a couple of excep-
tions, as the number of dimensions increase, the MAP value in-
creases. This is intuitive as higher number of dimensions are ca-
pable of storing more information. We also observe that SDNE
is able to embed the graphs in 16-dimensional vector space with
high precision although decoder parameters are required to ob-
tain such precision.
Figure 2: Precision@k of graph reconstruction for different data sets (dimension of embedding is 128).
6.2. Visualization
Since embedding is a low-dimensional vector representa-
tion of nodes in the graph, it allows us to visualize the nodes
to understand the network topology. As different embedding
methods preserve different structures in the network, their abil-
ity and interpretation of node visualization differ. For instance,
embeddings learned by node2vec with parameters set to prefer
BFS random walk would cluster structurally equivalent nodes
together. On the other hand, methods which directly preserve
k-hop distances between nodes (GF, LE and LLE with k = 1
and HOPE and SDNE with k > 1) cluster neighboring nodes
together. We compare the ability of different methods to visu-
alize nodes on SBM and Karate graph. For SBM, following
[23], we learn a 128-dimensional embedding for each method
and input it to t-SNE [8] to reduce the dimensionality to 2 and
visualize nodes in a 2-dimensional space.
Visualization of SBM is show in Figure 4. As we know the
underlying community structure, we use the community label
to color the nodes. We observe that embeddings generated by
HOPE and SDNE which preserve higher order proximities well
separate the communities although as the data is well structured
LE, GF and LLE are able to capture community structure to
some extent.
We visualize Karate graph (see Figure 5) to illustrate the
properties preserved by embedding methods. LLE and LE ((a)
and (f)) attempt to preserve the community structure of the
graph and cluster nodes with high intra-cluster edges together.
GF ((b)) embeds communities very closely and keeps leaf nodes
far away from other nodes. In (d), we observe that HOPE em-
beds nodes 16 and 21, whose Katz similarity in the original
graph is very low (0.0006), farthest apart (considering dot prod-
uct similarity). node2vec and SDNE ((c) and (e)) preserve a mix
of community structure and structural property of the nodes.
Nodes 32 and 33, which are both high degree hubs and central
in their communities, are embedded together and away from
low degree nodes. Also, they are closer to nodes which be-
long to their communities. SDNE embeds node 0, which acts a
bridge between communities, far away from other nodes. Note
that, unlike for other methods, it does not imply that node 0 is
disconnected from the rest of the nodes. The implication here
is that SDNE identifies node 0 as a separate type of node and
encodes its connection to other nodes in encoder and decoder.
The ability of deep autoencoders to identify important nodes in
the network has not been studied but given this observation we
believe this direction can be promising.
6.3. Link Prediction
Another important application of graph embedding is pre-
dicting unobserved links in the graph. A good network rep-
resentation should be able to capture the inherent structure of
graph well enough to predict the likely but unobserved links.
To test the performance of different embedding methods on this
10
2324252627280.00.20.40.60.81.0precision@kSBM2324252627280.00.20.40.60.81.0PPI2324252627280.20.40.60.81.0AstroPh232425262728k0.00.20.40.6precision@kBlogCatalog232425262728k0.20.40.60.81.0Hep-th232425262728k0.00.20.40.60.81.0Youtubenode2vecGFSDNEHOPELEFigure 3: MAP of graph reconstruction for different data sets with varying dimensions.
(a) LLE
(b) GF
(c) node2vec
(d) HOPE
(e) SDNE
(f) LE
Figure 4: Visualization of SBM using t-SNE (original dimension of embedding is 128). Each point corresponds to a node in the graph. Color of a node denotes its
community.
11
212325270.20.40.60.81.0MAPSBM212325270.00.10.20.30.40.50.60.7PPI212325270.00.10.20.30.40.5AstroPh21232527d0.00.10.20.30.4MAPBlogCatalog21232527d0.00.10.20.30.40.50.6Hep-th21232527d0.00.10.20.30.40.5Youtubenode2vecGFSDNEHOPELE1510505101515105051015151050510152520151050201510505101520151050510151050510152025201001020201510505101520151050510151510505101515105051015(a) LLE
(b) GF
(c) node2vec
(d) HOPE
(e) SDNE
(f) LE
Figure 5: Visualization of Karate club graph. Each point corresponds to a node in the graph.
Figure 6: Precision@k of link prediction for different data sets (dimension of embedding is 128).
Figure 7: MAP of link prediction for different data sets with varying dimensions.
12
0.20.10.00.10.20.30.40.30.20.10.00.10.20.30.401234567891011121314151617181920212223242526272829303132330.020.010.000.010.020.030.030.020.010.000.010.020.030.0401234567891011121314151617181920212223242526272829303132331.21.00.80.60.40.20.08.07.57.06.56.05.55.001234567891011121314151617181920212223242526272829303132330.1000.0750.0500.0250.0000.0250.0500.0750.1000.020.000.020.040.060.080.100.1201234567891011121314151617181920212223242526272829303132330.00.51.01.52.02.5012345601234567891011121314151617181920212223242526272829303132330.30.20.10.00.10.20.30.40.30.20.10.00.10.20.30123456789101112131415161718192021222324252627282930313233232425262728k0.000.020.040.060.080.10precision@kPPI232425262728k0.000.050.100.150.20AstroPh232425262728k0.000.050.100.150.200.25BlogCatalog232425262728k0.000.050.100.150.20Hep-thnode2vecGFSDNEHOPELE21232527d0.020.040.060.08MAPPPI21232527d0.000.050.100.150.200.25AstroPh21232527d0.000.050.100.150.20BlogCatalog21232527d0.000.050.100.150.20Hep-thnode2vecGFSDNEHOPELEtask, for each data set we randomly hide 20% of the network
edges. We learn the embedding using the rest of the 80% edges
and predict the most likely edges which are not observed in the
training data from the learned embedding. As with graph re-
construction, we generate 5 random subgraphs with 1024 nodes
and test the predicted links against the held-out links in the sub-
graphs. We perform this experiment for each hyperparameter
and re-run it for optimal hyperparameters on a new random 80-
20 link split.
Figure 6 and 7 show the precision@k results for link predic-
tion with 128-dimensional embeddings and MAP for each di-
mension respectively. Here we can see that the performance of
methods is highly data set dependent. node2vec achieves good
performance on BlogCatalog but performs poorly on other data
sets. HOPE achieves good performance on all data sets which
implies that preserving higher order proximities is conducive
to predicting unobserved links. Similarly, SDNE outperforms
other methods with the exception on PPI for which the perfor-
mance degrades drastically as embedding dimension increases
above 8.
Effect of dimension. Figure 7 illustrates the effect of em-
bedding dimension on link prediction. We make two observa-
tions. Firstly, in PPI and BlogCatalog, unlike graph reconstruc-
tion performance does not improve as the number of dimen-
sions increase. This may be because with more parameters the
models overfit on the observed links and are unable to predict
unobserved links. Secondly, even on the same data set, relative
performance of methods depends on the embedding dimension.
In PPI, HOPE outperforms other methods for higher dimen-
sions,whereas embedding generated by SDNE achieves higher
link prediction MAP for low dimensions.
6.4. Node Classification
Predicting node labels using network topology is widely
popular in network analysis and has variety of applications, in-
cluding document classification and interest prediction. A good
network embedding should capture the network structure and
hence be useful for node classification. We compare the effec-
tiveness of embedding methods on this task by using the gen-
erated embedding as node features to classify the nodes. The
node features are input to a one-vs-rest logistic regression us-
ing the LIBLINEAR library. For each data set, we randomly
sample 10% to 90% of nodes as training data and evaluate the
performance on the remaining nodes. We perform this split 5
times and report the mean with confidence interval. For data
sets with multiple labels per node, we assume that we know
how many labels to predict.
Figure 8 shows the results of our experiments. We can see
that node2vec outperforms other methods on the task of node
classification. As mentioned earlier (§3), node2vec preserves
homophily as well as structural equivalence between nodes.
Results suggest this can be useful in node classification: e.g.,
in BlogCatalog users may have similar interests, yet connect to
others based on social ties rather than interests overlap. Simi-
larly, proteins in PPI may be related in functionality and inter-
act with similar proteins but may not assist each other. How-
ever, in SBM, other methods outperform node2vec as labels re-
13
flect communities yet there is no structural equivalence between
nodes.
Effect of dimension. Figure 9 illustrates the effect of em-
bedding dimensions on node classification. As with link pre-
diction, we observe that performance often saturates or dete-
riorates after certain number of dimensions. This may sug-
gest overfitting on the training data. As SBM exhibits very
structured communities, an 8-dimensional embedding suffices
to predict the communities. node2vec achieves best perfor-
mance on PPI and BlogCat with 128 dimensions.
6.5. Hyperparameter Sensitivity
In this section we plan to address the following questions:
• How robust are the embedding methods with respect to
hyperparameters?
• Do optimal hyperparameters depend on the downstream
tasks the embeddings are used for?
• What insights does performance variance with hyperpa-
rameter provide about a data set?
We answer these questions by analyzing performance of the
embedding methods with various hyperparameters. We present
results on SBM, PPI and Hep-th. Of the methods we evaluated
in this survey, Laplacian Eigenmaps has no hyperparameters,
thus is not included in the following analysis.
Graph Factorization (GF). The objective function of GF
contains a weight regularization term with a coefficient. Intu-
itively, this coefficient controls the generalizability of the em-
bedding. A low regularization coefficient facilitates better re-
construction but may overfit to the observed graph leading to
poor prediction performance. On the other side, a high regular-
ization may underrepresent the data and hence perform poorly
on all tasks. We observe this effect in Figure 10. We see
that performance on prediction tasks, namely link prediction
(Fig. 10b) and node classification (Fig. 10c), improves as we
increase the regularization coefficient, reaches a peak and then
starts deteriorating. However, graph reconstruction performance
(Fig. 10a) may deteriorate with increasing regularization. We
also note that the performance change is considerable and thus
the coefficient should be carefully tuned to the given data set.
HOPE. As HOPE factorizes a similarity matrix between
nodes to obtain the embedding, the hyperparameters depend on
the method used to obtain the similarity matrix. Since in our
experiments we used Katz index for this purpose, we evalu-
ate the effect of the attenuation factor (β), which can be in-
terpreted as the higher order proximity coefficient on perfor-
mance. Graph structure affects the optimal value of this param-
eter. For well-structured graphs with tightly knit communities,
high values of beta would erroneously assign dissimilar nodes
closer in the embedding space. On the contrary, for graphs with
weak community structure it is important to capture higher or-
der distances and thus high values of beta may yield better em-
beddings. We validate our hypothesis in Figure 11. As our
synthetic data SBM consists of tight communities, increasing β
does not improve the performance on any task. However, gain
Figure 8: Micro-F1 and Macro-F1 of node classification for different data sets varying the train-test split ratio (dimension of embedding is 128).
in performance with increasing beta can be observed in PPI
and HEP-TH. This is expected as collaboration and protein net-
works tend to evolve via higher order connections. We observe
that the optimal beta for these data sets is lowest for the task of
graph reconstruction (Fig. 11(a)) and highest for link prediction
(Fig. 11b), 2−6 and 2−4 respectively. This also follows intuition
as higher order information is not necessary for reconstructing
observed edges but is useful for prediction tasks. Nodes farther
from each other are more likely to have common labels than
links between them. For example, in a collaboration network,
authors in a field will form a weak community but many of
them need not be connected to each other (in other words, most
researchers of a same community won't be co-authors of one
another). Thus, if we were to predict field for an author, hav-
ing information about other authors inside the weak community
can help improve the accuracy of our model.
SDNE. SDNE uses a coupled deep autoencoder to embed
graphs. It leverages a parameter to control the weight of ob-
served and unobserved link reconstruction in the objective func-
tion. A high parameter value would focus on reconstructing ob-
served links disregarding the absence of unobserved links. This
parameter can be crucial as a low value could hinder predict-
ing hidden links. Figure 12 illustrates the results of our analy-
sis. We observe that performance on link prediction (Fig. 12b)
greatly varies depending on the weight, with a more than 3-fold
increase in MAP for Hep-th with the optimal parameter value,
and about 2-fold increase for PPI. The performance on node
classification (Fig. 12c), on the other hand, is less affected by
the parameter. Overall, we see that the maximum performance
is achieved for an intermediate value of the weight above which
the performance drops.
node2vec. node2vec performs biased random walks on the
graph and embeds nodes commonly appearing together in them
close in the embedding space. Of the various hyperparame-
ters of the method (which include walk length, context size
and bias weights), we analyze the effect of bias weights on
performance and adopt commonly-used values for the remain-
ing hyperparameter [29], namely, context size of 10 and walk
length of 80. node2vec has two bias weights: (a) inout pa-
rameter (q), which controls the likelihood of random walk to
go further away from the incoming node (higher values favor
closer nodes), and (b) return parameter (p), which weighs the
return probability (lower values favor return). Lower values of
q would help capture longer distances between nodes and aims
towards preserving structural equivalence. Figure 13 illustrates
the effect on PPI and HEPTH. In node classification (Fig. 13c)
we observe that low q values help achieve higher accuracy sug-
gesting that capturing structural equivalence is required to ac-
curately embed the structure of the graph. On the contrary, high
q values favor link prediction (Fig. 13b) following intuition that
capturing community structure is crucial for the task. We make
similar observations for SBM in Figure 14 for the task of link
14
0.20.40.60.80.40.50.60.70.80.91.0Micro-F1scoreSBM0.20.40.60.80.0750.1000.1250.1500.1750.2000.225PPI0.20.40.60.80.200.250.300.350.40BlogCatalog0.20.40.60.8Trainratio0.40.60.81.0Macro-F1scoreSBM0.20.40.60.8Trainratio0.050.100.150.20PPI0.20.40.60.8Trainratio0.050.100.150.200.25BlogCatalognode2vecGFSDNEHOPELEFigure 9: Micro-F1 and Macro-F1 of node classification for different data sets varying the number of dimensions. The train-test split is 50%.
(a) Graph Reconstruction
(b) Link Prediction
(c) Node Classification
Figure 10: Effect of regularization coefficient (α) in Graph Factorization on various tasks.
prediction. MAP increases with increasing q until it reaches an
optimal. We also note that the optimal values of q in SBM are
much higher as the graph has strong community structure.
7. A Python Library for Graph Embedding
We released an open-source Python library, GEM (Graph
Embedding Methods, https://github.com/palash1992/GEM),
which provides a unified interface to the implementations of all
the methods presented here, and their evaluation metrics. The
library supports both weighted and unweighted graphs. GEM's
hierarchical design and modular implementation should help
the users to test the implemented methods on new datasets as
well as serve as a platform to develop new approaches with
ease.
GEM (https://github.com/palash1992/GEM) provides
implementations of Locally Linear Embedding [26], Laplacian
Eigenmaps [25], Graph Factorization [21], HOPE [24], SDNE
[23] and node2vec [29]. For node2vec, we use the C++ im-
plementation provided by the authors [95] and yield a Python
interface. In addition, GEM provides an interface to evaluate
the learned embedding on the four tasks presented above. The
15
212325270.40.50.60.70.80.91.0Micro-F1scoreSBM212325270.0750.1000.1250.1500.1750.2000.225PPI212325270.200.250.300.35BlogCatalog21232527d0.20.40.60.81.0Macro-F1scoreSBM21232527d0.050.100.15PPI21232527d0.050.100.150.20BlogCatalognode2vecGFSDNEHOPELE10−310−210−1100regu0.100.150.200.250.30GFhepthppisbm10−310−210−1100regu0.0250.0500.0750.1000.125GFhepthppisbm10−310−210−1100regu0.00.20.40.60.8GFppisbm(a) Graph Reconstruction
(b) Link Prediction
(c) Node Classification
Figure 11: Effect of attenuation factor (β) in HOPE on various tasks.
(a) Graph Reconstruction
(b) Link Prediction
(c) Node Classification
Figure 12: Effect of observed link reconstruction weight in SDNE on various tasks.
interface is flexible and supports multiple edge reconstruction
metrics including cosine similarity, euclidean distance and de-
coder based (for autoencoder-based models). For multi-labeled
node classification, the library uses one-vs-rest logistic regres-
sion classifiers and supports the use of other ad hoc classifiers.
8. Conclusion and Future Work
This review of graph embedding techniques covered three
broad categories of approaches: factorization based, random
walk based and deep learning based. We studied the structure
and properties preserved by various embedding approaches and
characterized the challenges faced by graph embedding tech-
niques in general as well as each category of approaches. We
reported various applications of embedding and their respec-
tive evaluation metrics. We empirically evaluated the surveyed
methods on these applications using several publicly available
real networks and compared their strengths and weaknesses.
Finally, we presented an open-source Python library, named
GEM, we developed with implementation of the embedding
methods surveyed and evaluation tasks including graph recon-
struction, link prediction, node classification and visualization.
We believe there are three promising research directions in
the field of graph embedding: (1) exploring non-linear models,
(2) studying evolution of networks, and (3) generate synthetic
networks with real-world characteristics. As shown in the sur-
vey, general non-linear models (e.g. deep learning based) have
shown great promise in capturing the inherent dynamics of the
graph. They have the ability to approximate an arbitrary func-
tion which best explains the network edges and this can result in
highly compressed representations of the network. One draw-
back of such approaches is the limited interpretability. Fur-
ther research focusing on interpreting the embedding learned
by these models can be very fruitful. Utilizing embedding to
study graph evolution is a new research area which needs fur-
ther exploration. Recent work by [97], [98] and [99] pursued
this line of thought and illustrate how embeddings can be used
for dynamic graphs. Generating synthetic networks with real-
world characteristics has been a popular field of research[100]
primarily for ease of simulations. Low dimensional vector rep-
resentation of real graphs can help understand their structure
and thus be useful to generate synthetic graphs with real world
characteristics. Learning embedding with a generative model
can help us in this regard.
References
References
[1] A. Theocharidis, S. Van Dongen, A. Enright, T. Freeman, Network visu-
alization and analysis of gene expression data using biolayout express3d,
Nature protocols 4 (2009) 1535–1550.
16
2−82−62−42−2beta0.00.20.40.6HOPEhepthppisbm2−82−62−42−2beta0.000.050.100.15HOPEhepthppisbm2−82−62−42−2beta0.00.20.40.60.81.0HOPEppisbm21222324beta0.20.40.60.81.0SDNEhepthppisbm21222324beta0.050.100.15SDNEhepthppisbm21222324beta0.20.40.60.81.0SDNEppisbm(a)
(b)
(c)
(d) Graph Reconstruction
(e) Link Prediction
(f) Node Classification
Figure 13: Effect of random walk bias weights in node2vec on various tasks.
[8] L. v. d. Maaten, G. Hinton, Visualizing data using t-sne, Journal of Ma-
chine Learning Research 9 (2008) 2579–2605.
[9] A. Azran, The rendezvous algorithm: Multiclass semi-supervised learn-
ing with markov random walks, in: Proceedings of the 24th international
conference on Machine learning, 2007, pp. 49–56.
[10] S. Baluja, R. Seth, D. Sivakumar, Y. Jing, J. Yagnik, S. Kumar,
D. Ravichandran, M. Aly, Video suggestion and discovery for youtube:
taking random walks through the view graph, in: Proc. 17th int. confer-
ence on World Wide Web, 2008, pp. 895–904.
[11] S. Bhagat, I. Rozenbaum, G. Cormode, Applying link-based classifi-
cation to label blogs, in: Proceedings of WebKDD: workshop on Web
mining and social network analysis, ACM, 2007, pp. 92–101.
[12] Q. Lu, L. Getoor, Link-based classification, in: ICML, Vol. 3, 2003, pp.
496–503.
[13] P. Jaccard, Etude comparative de la distribution florale dans une portion
des Alpes et du Jura, Impr. Corbaz, 1901.
[14] L. A. Adamic, E. Adar, Friends and neighbors on the web, Social net-
works 25 (3) (2003) 211–230.
[15] A. Clauset, C. Moore, M. E. Newman, Hierarchical structure and the
prediction of missing links in networks, Nature 453 (7191) (2008) 98–
101.
[16] H. C. White, S. A. Boorman, R. L. Breiger, Social structure from mul-
tiple networks. i. blockmodels of roles and positions, American journal
of sociology 81 (4) (1976) 730–780.
[17] N. Friedman, L. Getoor, D. Koller, A. Pfeffer, Learning probabilistic
relational models, in: IJCAI, 1999, pp. 1300–1309.
[18] D. Heckerman, C. Meek, D. Koller, Probabilistic entity-relationship
models, prms, and plate models, Introduction to statistical relational
learning (2007) 201–238.
[19] Y. Zhou, H. Cheng, J. X. Yu, Graph clustering based on structural/at-
tribute similarities, Proceedings of the VLDB Endowment 2 (1) (2009)
718–729.
[20] J. Shi, J. Malik, Normalized cuts and image segmentation, IEEE Trans-
actions on pattern analysis and machine intelligence 22 (8) (2000) 888–
905.
[21] A. Ahmed, N. Shervashidze, S. Narayanamurthy, V. Josifovski, A. J.
(a)
Figure 14: Effect of random walk bias weights in node2vec on SBM.
[2] L. C. Freeman, Visualizing social networks, Journal of social structure
1 (1) (2000) 4.
[3] R. F. i Cancho, R. V. Sol´e, The small world of human language, Proceed-
ings of the Royal Society of London B: Biological Sciences 268 (1482)
(2001) 2261–2265.
[4] J. Leskovec, J. Kleinberg, C. Faloutsos, Graph evolution: Densification
and shrinking diameters, ACM Transactions on Knowledge Discovery
from Data (TKDD) 1 (1) (2007) 2.
[5] D. Liben-Nowell, J. Kleinberg, The link-prediction problem for social
networks, journal of the Association for Information Science and Tech-
nology 58 (7) (2007) 1019–1031.
[6] S. Bhagat, G. Cormode, S. Muthukrishnan, Node classification in social
networks, in: Social network data analytics, Springer, 2011, pp. 115–
148.
[7] C. H. Ding, X. He, H. Zha, M. Gu, H. D. Simon, A min-max cut algo-
rithm for graph partitioning and data clustering, in: International Con-
ference on Data Mining, IEEE, 2001, pp. 107–114.
17
2−22−12021q0.20.30.4node2vechepthppi2−22−12021q0.010.020.030.04node2vechepthppi2−22−12021q0.2020.2040.2060.2080.2100.212node2vecppi2−22−12021p0.20.30.4node2vechepthppi2−22−12021p0.010.020.030.04node2vechepthppi2−22−12021p0.20250.20500.20750.21000.2125node2vecppi4041424344q0.0750.1000.1250.1500.1750.200node2vecsbmSmola, Distributed large-scale natural graph factorization, in: Proceed-
ings of the 22nd international conference on World Wide Web, ACM,
2013, pp. 37–48.
[22] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, Q. Mei, Line: Large-
scale information network embedding, in: Proceedings 24th Interna-
tional Conference on World Wide Web, 2015, pp. 1067–1077.
[23] D. Wang, P. Cui, W. Zhu, Structural deep network embedding, in: Pro-
ceedings of the 22nd International Conference on Knowledge Discovery
and Data Mining, ACM, 2016, pp. 1225–1234.
[24] M. Ou, P. Cui, J. Pei, Z. Zhang, W. Zhu, Asymmetric transitivity pre-
serving graph embedding, in: Proc. of ACM SIGKDD, 2016, pp. 1105–
1114.
[25] M. Belkin, P. Niyogi, Laplacian eigenmaps and spectral techniques for
embedding and clustering, in: NIPS, Vol. 14, 2001, pp. 585–591.
[26] S. T. Roweis, L. K. Saul, Nonlinear dimensionality reduction by locally
linear embedding, Science 290 (5500) (2000) 2323–2326.
[27] S. Cao, W. Lu, Q. Xu, Grarep: Learning graph representations with
global structural information, in: Proceedings of the 24th ACM Inter-
national on Conference on Information and Knowledge Management,
ACM, 2015, pp. 891–900.
[28] B. Perozzi, R. Al-Rfou, S. Skiena, Deepwalk: Online learning of so-
cial representations, in: Proceedings 20th international conference on
Knowledge discovery and data mining, 2014, pp. 701–710.
[29] A. Grover, J. Leskovec, node2vec: Scalable feature learning for net-
works, in: Proceedings of the 22nd International Conference on Knowl-
edge Discovery and Data Mining, ACM, 2016, pp. 855–864.
[30] S. Cao, W. Lu, Q. Xu, Deep neural networks for learning graph represen-
tations, in: Proceedings of the Thirtieth AAAI Conference on Artificial
Intelligence, AAAI Press, 2016, pp. 1145–1152.
[31] T. N. Kipf, M. Welling, Semi-supervised classification with graph con-
volutional networks, arXiv preprint arXiv:1609.02907.
[32] D. Luo, F. Nie, H. Huang, C. H. Ding, Cauchy graph embedding, in:
Proceedings of the 28th International Conference on Machine Learning
(ICML-11), 2011, pp. 553–560.
[33] B. Shaw, T. Jebara, Structure preserving embedding, in: Proceedings of
the 26th Annual International Conference on Machine Learning, ACM,
2009, pp. 937–944.
[34] C. F. Van Loan, Generalizing the singular value decomposition, SIAM
Journal on Numerical Analysis 13 (1) (1976) 76–83.
[35] S. Yan, D. Xu, B. Zhang, H.-J. Zhang, Q. Yang, S. Lin, Graph embed-
ding and extensions: A general framework for dimensionality reduction,
IEEE transactions on pattern analysis and machine intelligence 29 (1)
(2007) 40–51.
[36] I. T. Jolliffe, Principal component analysis and factor analysis, in: Prin-
cipal component analysis, Springer, 1986, pp. 115–128.
analysis and machine intelligence 23 (2) (2001) 228–233.
[38] J. B. Tenenbaum, V. De Silva, J. C. Langford, A global geometric frame-
work for nonlinear dimensionality reduction, science 290 (5500) (2000)
2319–2323.
[39] J. B. Kruskal, M. Wish, Multidimensional scaling, Vol. 11, Sage, 1978.
[40] X. He, P. Niyogi, Locality preserving projections, in: Advances in neural
information processing systems, 2004, pp. 153–160.
[41] M. Brand, Continuous nonlinear dimensionality reduction by kernel
eigenmaps, in: IJCAI, 2003, pp. 547–554.
[42] A. M. Mart´ınez, A. C. Kak, Non-negative graph embedding, IEEE Conf.
Comput. Vis. Pattern Recognit. (CVPR) 23 (2) (2008) 1–8.
[43] Y.-Y. Lin, T.-L. Liu, H.-T. Chen, Semantic manifold learning for image
retrieval, in: Proceedings of the 13th annual ACM international confer-
ence on Multimedia, ACM, 2005, pp. 249–258.
[44] C. Yang, Z. Liu, D. Zhao, M. Sun, E. Y. Chang, Network representation
learning with rich text information., in: IJCAI, 2015, pp. 2111–2117.
[45] S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, T. S. Huang, Het-
erogeneous network embedding via deep architectures, in: Proceedings
of the 21th ACM SIGKDD International Conference on Knowledge Dis-
covery and Data Mining, ACM, 2015, pp. 119–128.
[46] C. Tu, W. Zhang, Z. Liu, M. Sun, Max-margin deepwalk: Discriminative
learning of network representation., in: IJCAI, 2016, pp. 3889–3895.
[47] D. Zhang, J. Yin, X. Zhu, C. Zhang, Homophily, structure, and content
augmented network representation learning, in: Data Mining (ICDM),
2016 IEEE 16th International Conference on, IEEE, 2016, pp. 609–618.
18
[37] A. M. Mart´ınez, A. C. Kak, Pca versus lda, IEEE transactions on pattern
[66] D. P. Kingma, M. Welling, Auto-encoding variational bayes, arXiv
[48] X. Huang, J. Li, X. Hu, Label informed attributed network embedding,
in: Proceedings of the Tenth ACM International Conference on Web
Search and Data Mining, ACM, 2017, pp. 731–739.
[49] M. E. Newman, A measure of betweenness centrality based on random
walks, Social networks 27 (1) (2005) 39–54.
[50] F. Fouss, A. Pirotte, J.-M. Renders, M. Saerens, Random-walk compu-
tation of similarities between nodes of a graph with application to col-
laborative recommendation, IEEE Transactions on knowledge and data
engineering 19 (3).
[51] H. Chen, B. Perozzi, Y. Hu, S. Skiena, Harp: Hierarchical representation
learning for networks, arXiv preprint arXiv:1706.07845.
[52] B. Perozzi, V. Kulkarni, S. Skiena, Walklets: Multiscale graph
embeddings for interpretable network classification, arXiv preprint
arXiv:1605.02115.
[53] Z. Yang, J. Tang, W. W. Cohen, Multi-modal bayesian embeddings for
learning social knowledge graphs., in: IJCAI, 2016, pp. 2287–2293.
[54] J. Li, J. Zhu, B. Zhang, Discriminative deep random walk for network
classification., in: ACL (1), 2016.
[55] S. Pan, J. Wu, X. Zhu, C. Zhang, Y. Wang, Tri-party deep network rep-
resentation, Network 11 (9) (2016) 12.
[56] Z. Yang, W. W. Cohen, R. Salakhutdinov, Revisiting semi-supervised
learning with graph embeddings, arXiv preprint arXiv:1603.08861.
[57] M. Niepert, M. Ahmed, K. Kutzkov, Learning convolutional neural net-
works for graphs, in: Proceedings of the 33rd annual international con-
ference on machine learning. ACM, 2016.
[58] Y. Bengio, A. Courville, P. Vincent, Representation learning: A review
and new perspectives, IEEE transactions on pattern analysis and ma-
chine intelligence 35 (8) (2013) 1798–1828.
[59] J. Bruna, W. Zaremba, A. Szlam, Y. LeCun, Spectral networks and lo-
cally connected networks on graphs, arXiv preprint arXiv:1312.6203.
[60] M. Henaff, J. Bruna, Y. LeCun, Deep convolutional networks on graph-
structured data, arXiv preprint arXiv:1506.05163.
[61] D. K. Duvenaud, D. Maclaurin, J. Iparraguirre, R. Bombarell, T. Hirzel,
A. Aspuru-Guzik, R. P. Adams, Convolutional networks on graphs for
learning molecular fingerprints, in: Advances in neural information pro-
cessing systems, 2015, pp. 2224–2232.
[62] Y. Li, D. Tarlow, M. Brockschmidt, R. Zemel, Gated graph sequence
neural networks, arXiv preprint arXiv:1511.05493.
[63] M. Defferrard, X. Bresson, P. Vandergheynst, Convolutional neural net-
works on graphs with fast localized spectral filtering, in: Advances in
Neural Information Processing Systems, 2016, pp. 3844–3852.
[64] W. L. Hamilton, R. Ying, J. Leskovec, Inductive representation learning
on large graphs, arXiv preprint arXiv:1706.02216.
[65] T. N. Kipf, M. Welling, Variational graph auto-encoders, arXiv preprint
arXiv:1611.07308.
preprint arXiv:1312.6114.
[67] K. Hornik, M. Stinchcombe, H. White, Universal approximation of an
unknown mapping and its derivatives using multilayer feedforward net-
works, Neural networks 3 (1990) 551–560.
[68] T. Feder, R. Motwani, Clique partitions, graph compression and
speeding-up algorithms, in: Proceedings of the twenty-third annual
ACM symposium on Theory of computing, 1991, pp. 123–133.
[69] P. M. Pardalos, J. Xue, The maximum clique problem, Journal of global
Optimization 4 (3) (1994) 301–328.
[70] Y. Tian, R. A. Hankins, J. M. Patel, Efficient aggregation for graph sum-
marization, in: Proceedings of the SIGMOD international conference on
Management of data, ACM, 2008, pp. 567–580.
[71] H. Toivonen, F. Zhou, A. Hartikainen, A. Hinkka, Compression of
weighted graphs, in: Proc. 17th international conference on Knowledge
discovery and data mining, 2011, pp. 965–973.
[72] S. Navlakha, R. Rastogi, N. Shrivastava, Graph summarization with
bounded error, in: Proceedings of the international conference on Man-
agement of data, ACM, 2008, pp. 419–432.
[73] J. Rissanen, Modeling by shortest data description, Automatica 14 (5)
[74] D. Jungnickel, T. Schade, Graphs, networks and algorithms, Springer,
(1978) 465–471.
2005.
[75] E. R. Gansner, S. C. North, An open graph visualization system and its
applications to software engineering, Software Practice and Experience
30 (11) (2000) 1203–1233.
[76] G. Di Battista, P. Eades, R. Tamassia, I. G. Tollis, Algorithms for draw-
ing graphs: an annotated bibliography, Computational Geometry 4 (5)
(1994) 235–282.
[77] P. Eades, L. Xuemin, How to draw a directed graph, in: Visual Lan-
guages, 1989., IEEE Workshop on, IEEE, 1989, pp. 13–17.
[78] I. Herman, G. Melanc¸on, M. S. Marshall, Graph visualization and navi-
gation in information visualization: A survey, IEEE Trans on visualiza-
tion and computer graphics 6 (1) (2000) 24–43.
[79] K. Pearson, Liii. on lines and planes of closest fit to systems of points in
space, The London, Edinburgh, and Dublin Philosophical Magazine and
Journal of Science 2 (11) (1901) 559–572.
[80] M. E. Newman, M. Girvan, Finding and evaluating community structure
in networks, Physical review E 69 (2) (2004) 026113.
[81] X. Xu, N. Yuruk, Z. Feng, T. A. Schweiger, Scan: a structural clustering
algorithm for networks, in: Proceedings 13th international conference
on Knowledge discovery and data mining, 2007, pp. 824–833.
[82] S. White, P. Smyth, A spectral clustering approach to finding communi-
ties in graphs, in: Proceedings of the 2005 SIAM international confer-
ence on data mining, SIAM, 2005, pp. 274–285.
[83] L. Lu, T. Zhou, Link prediction in complex networks: A survey, Physica
A: Statistical Mechanics and its Applications 390 (6) (2011) 1150–1170.
[84] M. Al Hasan, M. J. Zaki, A survey of link prediction in social networks,
in: Social network data analytics, 2011, pp. 243–275.
[85] L. Katz, A new status index derived from sociometric analysis, Psy-
chometrika 18 (1) (1953) 39–43.
[86] K. Yu, W. Chu, S. Yu, V. Tresp, Z. Xu, Stochastic relational models for
discriminative link prediction, in: NIPS, 2006, pp. 1553–1560.
[87] J. Neville, D. Jensen, Iterative classification in relational data, in: Proc.
Workshop on Learning Statistical Models from Relational Data, 2000,
pp. 13–20.
[88] D. W. Hosmer Jr, S. Lemeshow, R. X. Sturdivant, Applied logistic re-
gression, Vol. 398, John Wiley & Sons, 2013.
[89] A. McCallum, K. Nigam, et al., A comparison of event models for naive
bayes text classification, in: AAAI-98 workshop on learning for text
categorization, Vol. 752, Citeseer, 1998, pp. 41–48.
[90] Y. J. Wang, G. Y. Wong, Stochastic blockmodels for directed graphs,
Journal of the American Statistical Association 82 (397) (1987) 8–19.
[91] W. W. Zachary, An information flow model for conflict and fission in
small groups, Journal of anthropological research 33 (4) (1977) 452–
473.
[92] L. Tang, H. Liu, Relational learning via latent social dimensions, in: Pro-
ceedings of the 15th international conference on Knowledge discovery
and data mining, ACM, 2009, pp. 817–826.
[93] L. Tang, H. Liu, Scalable learning of collective behavior based on sparse
social dimensions, in: Proceedings of the 18th ACM conference on In-
formation and knowledge management, ACM, 2009, pp. 1107–1116.
[94] J. Gehrke, P. Ginsparg, J. Kleinberg, Overview of the 2003 kdd cup,
ACM SIGKDD Explorations 5 (2).
[95] J. Leskovec, A. Krevl, SNAP Datasets: Stanford large network dataset
collection, http://snap.stanford.edu/data (2014).
[96] B.-J. Breitkreutz, C. Stark, T. Reguly, L. Boucher, A. Breitkreutz,
M. Livstone, R. Oughtred, D. H. Lackner, J. Bahler, V. Wood, et al.,
The biogrid interaction database: 2008 update, Nucleic acids research
36 (suppl 1) (2008) D637–D640.
[97] H. Dai, Y. Wang, R. Trivedi, L. Song, Deep coevolutionary network:
Embedding user and item features for recommendation.
[98] P. Goyal, N. Kamra, X. He, Y. Liu, Dyngem: Deep embedding method
for dynamic graphs.
[99] L. Zhu, D. Guo, J. Yin, G. Ver Steeg, A. Galstyan, Scalable temporal
latent space inference for link prediction in dynamic social networks,
IEEE Transactions on Knowledge and Data Engineering 28 (10) (2016)
2765–2777.
[100] P. W. Holland, K. B. Laskey, S. Leinhardt, Stochastic blockmodels: First
steps, Social networks 5 (2) (1983) 109–137.
19
|
1703.10545 | 1 | 1703 | 2017-03-30T16:02:25 | FairJudge: Trustworthy User Prediction in Rating Platforms | [
"cs.SI",
"cs.AI",
"stat.ML"
] | Rating platforms enable large-scale collection of user opinion about items (products, other users, etc.). However, many untrustworthy users give fraudulent ratings for excessive monetary gains. In the paper, we present FairJudge, a system to identify such fraudulent users. We propose three metrics: (i) the fairness of a user that quantifies how trustworthy the user is in rating the products, (ii) the reliability of a rating that measures how reliable the rating is, and (iii) the goodness of a product that measures the quality of the product. Intuitively, a user is fair if it provides reliable ratings that are close to the goodness of the product. We formulate a mutually recursive definition of these metrics, and further address cold start problems and incorporate behavioral properties of users and products in the formulation. We propose an iterative algorithm, FairJudge, to predict the values of the three metrics. We prove that FairJudge is guaranteed to converge in a bounded number of iterations, with linear time complexity. By conducting five different experiments on five rating platforms, we show that FairJudge significantly outperforms nine existing algorithms in predicting fair and unfair users. We reported the 100 most unfair users in the Flipkart network to their review fraud investigators, and 80 users were correctly identified (80% accuracy). The FairJudge algorithm is already being deployed at Flipkart. | cs.SI | cs | FairJudge: Trustworthy User Prediction in Rating
Platforms
Srijan Kumar
University of Maryland
[email protected]
Mohit Kumar
Flipkart, India
[email protected]
Bryan Hooi
Carnegie Mellon University
[email protected]
Christos Faloutsos
Carnegie Mellon University
[email protected]
Disha Makhija
Flipkart, India
[email protected]
V.S. Subrahmanian
University of Maryland
[email protected]
7
1
0
2
r
a
M
0
3
]
I
S
.
s
c
[
1
v
5
4
5
0
1
.
3
0
7
1
:
v
i
X
r
a
ABSTRACT
Rating platforms enable large-scale collection of user opin-
ion about items (products, other users, etc.). However,
many untrustworthy users give fraudulent ratings for exces-
sive monetary gains. In the paper, we present FairJudge, a
system to identify such fraudulent users. We propose three
metrics: (i) the fairness of a user that quantifies how trust-
worthy the user is in rating the products, (ii) the reliability
of a rating that measures how reliable the rating is, and
(iii) the goodness of a product that measures the quality of
the product. Intuitively, a user is fair if it provides reliable
ratings that are close to the goodness of the product. We
formulate a mutually recursive definition of these metrics,
and further address cold start problems and incorporate be-
havioral properties of users and products in the formulation.
We propose an iterative algorithm, FairJudge, to predict
the values of the three metrics. We prove that FairJudge is
guaranteed to converge in a bounded number of iterations,
with linear time complexity. By conducting five different
experiments on five rating platforms, we show that Fair-
Judge significantly outperforms nine existing algorithms in
predicting fair and unfair users. We reported the 100 most
unfair users in the Flipkart network to their review fraud
investigators, and 80 users were correctly identified (80%
accuracy). The FairJudge algorithm is already being de-
ployed at Flipkart.
1.
INTRODUCTION
Consumer generated ratings are now an essential part of
several platforms. For instance, users on Yelp and TripAd-
visor rate restaurants, hotels, attractions, and various types
of service offerings. Every major online marketplace (eBay,
Amazon, Flipkart) uses online ratings as a way of recog-
nizing good products and rewarding honest/good behavior
by vendors. Because buyers frequently look at reviews be-
fore buying a product or using a vendor, there is a huge
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are not
made or distributed for profit or commercial advantage and that copies bear
this notice and the full citation on the first page. Copyrights for components
of this work owned by others than ACM must be honored. Abstracting with
credit is permitted. To copy otherwise, or republish, to post on servers or to
redistribute to lists, requires prior specific permission and/or a fee. Request
permissions from [email protected].
Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00.
incentive for unethical entities to give fraudulent ratings to
compromise the integrity of these consumer generated rating
systems [14, 12, 30, 9]. The goal of this paper is to identify
such unfair users.
In this paper, we present three novel metrics to quantify
the trustworthiness of users and reviews, and the quality of
products, building on our prior work [13]. We model user-
to-item ratings with timestamps as a bipartite graph. For
instance, on an online marketplace such as Amazon, a user
u rates a product p with a rating (u, p). Each user has an
intrinsic level of fairness F (u), each product p has an intrin-
sic goodness G(p) (measuring its quality), and each rating
(u, p) has an intrinsic reliability R(u, p). Intuitively, a fair
user should give ratings that are close to the goodness of the
product, and good products should get highly positive reli-
able ratings. Clearly, these F (u), G(p), R(u, p) metrics are
all inter-related, and we propose three mutually-recursive
equations to model them.
However, it is not possible to predict the true trustwor-
thiness of users that have only given a few ratings. For ex-
ample, users with only a few ratings, all of which are highly
accurate, can be a fraudulent shill account building initial
reputation [9] or it can be a genuine user. Similarly, the true
quality of products that have received only a few ratings is
also uncertain [17, 20]. We propose a Bayesian solution to to
address these cold start problems in our formulation by in-
corporating priors to users' fairness and products' goodness
scores.
Additionally, the rating behavior is often very indicative of
their nature. For instance, unusually rapid or regular behav-
ior has been associated with fraudulent entities, such as fake
accounts, sybils and bots [27, 15, 8, 28]. Similarly, unusu-
ally bursty ratings received by a product may be indicative
of fake reviews [31]. Therefore, we propose a Bayesian tech-
nique to incorporate users' and products' rating behavior in
the formulation, by penalizing unusual behavior [8].
Combining the network, cold start treatment and behav-
ioral properties together, we present the FairJudge formu-
lation and an iterative algorithm to find the fairness, good-
ness and reliability scores of all entities together. We prove
that FairJudge has linear time complexity and it is guar-
anteed to converge in a bounded number of iterations.
How well does FairJudge work? We conduct extensive
experiments using 5 real-world data sets – two Bitcoin user
trust networks, Epinions, Amazon and Flipkart, India's biggest
online marketplace. With the help of five experiments, we
]
8
[
T
S
E
N
D
R
I
B
]
9
2
[
s
s
e
n
i
t
s
u
r
T
]
2
[
e
l
g
a
E
d
u
a
r
F
]
4
2
[
e
l
g
a
E
p
S
]
1
2
[
D
A
B
]
7
1
,
2
2
,
3
2
[
s
r
e
h
t
O
e
g
d
u
J
r
i
a
F
Uses network information
Uses behavior properties
Prior free
Theoretical Guarantees
Table 1: Proposed algorithm FairJudge satisfies all
desirable properties.
user and product. FraudEagle [2] is a belief propagation
model to rank users, which assumes fraudsters rate good
products poorly and bad products positively, and vice-versa
for honest users. Random-walk based algorithms have been
developed to detect trolls [32] and link farming from col-
lusion on Twitter [7].
[10, 34, 16] identify group of fraud-
sters based on local neighborhood of the users. A survey on
network-based fraud detection can be found in [3].
Behavioral fraud detection algorithms are often feature-
based. Consensus based features have been proposed in [23,
17] – our proposed goodness metric is also inspired by con-
sensus or 'wisdom of crowds'. Commonly used features are
derived from timestamps [33, 31, 20] and review text [26, 6,
25]. SpEagle [24] extends FraudEagle [2] to incorporate be-
havior features. BIRDNEST [8] creates a Bayesian model to
estimate the belief of each user's deviation in rating behavior
from global expected behavior. [10, 4, 28] study coordinated
spam behavior of multiple users. A survey on behavior based
algorithms can be found in [11].
Our proposed FairJudge algorithm combines both net-
work and behavior based algorithms, along with Bayesian
solution to cold start problems. Since review text is not
always available, for e.g.
in a subset of our datasets, we
only focus on ratings and timestamps. FairJudge provides
theoretical guarantees and does not require any user inputs.
Table 1 compares FairJudge to the closest existing algo-
rithms, which do not always satisfy all the desirable proper-
ties.
3. FAIRJUDGE FORMULATION
In this section, we present the FairJudge algorithm that
jointly models the rating network and behavioral properties.
We first present our three novel metrics - Fairness, Reli-
ability and Goodness - which measure intrinsic properties
of users, ratings and products, respectively, building on our
prior work [13]. We show how to incorporate Bayesian priors
to address user and product cold start problems, and how
to incorporate behavioral features of the users and products.
We then prove that our algorithm have several desirable the-
oretical guarantees.
Prerequisites. We model the rating network as a bipartite
network where user u gives a rating (u, p) to product p. Let
the rating score be represented as score(u,p). Let U,R
and P represent the set of all users, ratings and products,
respectively, in a given bipartite network. We assume that
all rating scores are scaled to be between -1 and +1, i.e.
score(u,p) ∈ [−1, 1]∀(u, p) ∈ R. Let, Out(u) be the set
of ratings given by user u and In(p) be the set of ratings
(a)
(b)
Figure 1: (a) The proposed algorithm, FairJudge, con-
sistently performs the best, by having the highest AUC,
in predicting fair and unfair users with varying percent-
age of training labels. (b) FairJudge discovered a bot-net
of 40 confirmed shills of one user, rating each other pos-
itively.
show that FairJudge outperforms several existing meth-
ods [2, 8, 21, 24, 29, 23, 22, 17] in predicting fraudulent
users. Specifically, in an unsupervised setting, FairJudge
has the best or second best average precision in nine out of
ten cases. Across two supervised settings, FairJudge has
the highest AUC ≥ 0.85 across all five datasets. It consis-
tently performs the best as the percentage of training data
is varied between 10 and 90, as shown for the Alpha network
in Figure 1(a). Further, we experimentally show that both
the cold start treatment and behavior properties improve
the performance of FairJudge algorithm, and incorporat-
ing both together performs even better.
FairJudge is practically very useful. We reported the 100
most unfair users as predicted by FairJudge in the Flipkart
online marketplace. Review fraud investigators at Flipkart
studied our recommendations and confirmed 80 of them were
unfair, presenting a validation of the utility of FairJudge
in identifying real-world review fraud. In fact, FairJudge
is already being deployed at Flipkart. On the Bitcoin Al-
pha network, using FairJudge, we discovered a botnet-like
structure of 40 unfair users that rate each other positively
(Figure 1(b)), which are confirmed shills of a single account.
Overall, the paper makes the following contributions:
• Algorithm: We propose three novel metrics called fair-
ness, goodness and reliability to rank users, products and
ratings, respectively. We propose Bayesian approaches to
address cold start problems and incorporate behavioral prop-
erties. We propose the FairJudge algorithm to iteratively
compute these metrics.
• Theoretical guarantees: We prove that FairJudge al-
gorithm is guaranteed to converge in a bounded number of
iterations, and it has linear time complexity.
• Effectiveness: We show that FairJudge outperforms
nine existing algorithms in identifying fair and unfair users,
conducted via five experiments on five rating networks.
2. RELATED WORK
Existing works in rating fraud detection can be catego-
rized into network-based and behavior-based algorithms:
Network-based fraud detection algorithms are based on
iterative learning, belief propagation, and node ranking tech-
niques. Similar to our proposed FairJudge algorithm, [29,
21, 16] develop iterative algorithms that jointly assign scores
in the rating networks based on consensus of ratings - [29]
scores each user, review and product, and [21] scores each
102030405060708090Percentageoftrainingdata0.50.60.70.80.9AverageAUCFairJudgeExistingAlgorithmsAlphaNetworksupa2supa3xdragonflyxcaptain-n00dlevragnarodasupa4supa5thebutterzonebabblertetrisxlemonfoodst4mpakhan08kingkatarisol56synopsrgsammeycaptainddlcodawdanielpbarronsupadupajenkinsrawrmageawesomeotdiggsprophexystalersdecaturbawsepopart64jamesam42pirateat40stamitb-t-c-buyeraetheroyotagadasupabtcmixersFigure 2: While most ratings of fair users have
high reliability, some ratings also have low reliabil-
ity (green arrow). Conversely, unfair users also give
some highly reliability ratings (red arrow), but most
of their ratings have low reliability.
received by product p. So, Out(u) and In(p) represents
their respective counts.
3.1 Fairness, Goodness and Reliability
Users, ratings and products have the following character-
istics:
• Users vary in fairness. Fair users rate products without
bias, i.e. they give high scores to high quality products, and
low scores to bad products. On the other hand, users who
frequently deviate from the above behavior are 'unfair'. For
example, fraudulent users often create multiple accounts to
boost ratings of unpopular products and bad-mouth good
products of their competitors [28, 9]. Hence, these fraud-
sters should have low fairness scores. The fairness F (u) of a
user u lies in the [0, 1] interval ∀u ∈ U . 0 denotes a 100% un-
trustworthy user, while 1 denotes a 100% trustworthy user.
• Products vary in terms of their quality, which we mea-
sure by a metric called goodness. The quality of a product
determines how it would be rated by a fair user. Intuitively,
a good product would get several high positive ratings from
fair users, and a bad product would receive high negative
ratings from fair users. The goodness G(p) of a product p
ranges from −1 (a very low quality product) to +1 (a very
high quality product) ∀p ∈ P.
• Finally, ratings vary in terms of reliability. This mea-
sure reflects how trustworthy the specific rating is. The
reliability R(u, p) of a rating (u, p) ranges from 0 (an un-
trustworthy rating) to 1 (a trustworthy rating) ∀(u,p) ∈ R
The reader may wonder: isn't the rating reliability, iden-
tical to the user's fairness? The answer is 'no'. Consider
Figure 2, where we show the rating reliability distribution
of the top 1000 fair and top 1000 unfair users in the Flip-
kart network, as identified by our FairJudge algorithm (ex-
plained later). Notice that, while most ratings by fair users
have high reliability, some of their ratings have low relia-
bility, indicating personal opinions that disagree with ma-
jority (see green arrow). Conversely, unfair users give some
high reliability ratings (red arrow), probably to camouflage
themselves as fair users. Thus, having reliability as a rating-
specific metric allows us to more accurately characterize this
distribution.
Given a bipartite user-product graph, we do not know the
values of these three metrics for any user, product or rating.
Clearly, these scores are mutually interdependent. Let us
look at an example.
Figure 3: Toy example showing products (P1, P2,
P3), users (UA, UB, UC , UD, UE and UF ), and rating
scores provided by the users to the products. User
UF always disagrees with the consensus, so UF is
unfair.
Example 1
(Running Example). Figure 3 shows a sim-
ple example in which there are 3 products, P1 to P3, and 6
users, UA to UF . Each review is denoted as an edge from
a user to a product, with rating score between −1 and +1.
Note that this is a rescaled version of the traditional 5-star
rating scale where a 1, 2, 3, 4 and 5 star corresponds to
−1,−0.5, 0, +0.5 and +1 respectively.
One can immediately see that UF 's ratings are inconsistent
with those of the UA, UB, UC , UD and UE. UF gives poor
ratings to P1 and P2 which the others all agree are very good
by consensus. UF also gives a high rating for P3 which the
others all agree is very bad. We will use this example to
motivate our formal definitions below.
(cid:80)
(cid:80)
Fairness of users.
Intuitively, fair users are those who
give reliable ratings, and unfair users mostly give unreliable
ratings. So we simply define a user's fairness score to be the
average reliability score of its ratings:
(u,p)∈Out(u)
R(u, p)
F (u) =
Out(u)
(4)
Other definitions such as temporally weighted average can
be developed, but we use the above for simplicity.
Goodness of products. When a product receives rat-
ing scores via ratings with different reliability, clearly, more
importance should be given to ratings that have higher reli-
ability. Hence, to estimate a product's goodness, we weight
the ratings by their reliability scores, giving higher weight
to reliable ratings and little importance to low reliability
ratings:
(u,p)∈In(p)
G(p) =
R(u, p) · score(u,p)
In(p)
(5)
Returning to our running example, the ratings given by
users UA, UB, UC , UD, UE and UF to product P1 are
+1, +1, +1, +1, +1 and −1, respectively. So we have:
G(P1) =
1
6
(R(UA, P1) + R(UB, P1) + R(UC , P1)+
R(UD, P1) + R(UE, P1) − R(UF , P1))
+0.5+0.5−1−1−1−1+0.5+0.5+1+1+1+1−1+0.5+1−1−1+1Unfair userUCUBP1P3P2UFUEUDUAFairness of user u, F (u) =
Reliability of rating (u, p), R(u, p) =
Goodness of product p, G(p) =
0.5 · α1 + α2 · IBIRDN ESTIRT DU (u) +(cid:80)
β2 · IBIRDN ESTIRT DP (p) +(cid:80)
(F (u) + (1 − score(u,p) − G(p)
α1 + α2 + Out(u)
))
2
1
2
β1 + β2 + In(p)
(u,p)∈Out(u) R(u, p)
(u,p)∈In(p) R(u, p) · score(u,p)
(1)
(2)
(3)
Figure 4: This is the set of mutually recursive definitions of fairness, reliability and goodness for the pro-
posed FairJudge algorithm. The yellow shaded part addresses the cold start problems and gray shaded part
incorporates the behavioral properties.
Reliability of ratings. A rating (u, p) should be consid-
ered reliable if (i) it is given by a generally fair user u, and (ii)
its score is close to the goodness score of product p. The first
condition makes sure that ratings by fair users are trusted
more, in lieu of the user's established reputation. The sec-
ond condition leverages 'wisdom of crowds', by making sure
that ratings that deviate from p's goodness have low reliabil-
ity. This deviation is measured as the normalized absolute
difference, score(u,p) − G(p)/2. Together:
R(u, p) =
1
2
(F (u) + (1 − score(u,p) − G(p)
2
))
(6)
In our running example, for the rating by user UF to P1:
R(UF , P1) =
1
2
F (UF ) + (1 − − 1 − G(P1)
2
)
(cid:18)
(cid:19)
Similar equations can be associated with every edge (rat-
ing) in the graph of Figure 3.
3.2 Addressing Cold Start Problems
If a user u has given only a few ratings, we have very little
information about his true behavior. Say all of u's ratings
are very accurate – it is hard to tell whether it is a fraudster
that is camouflaging and building reputation by giving gen-
uine ratings [9], or it is actually a benign user. Conversely, if
all of u's ratings are very deviant, it is hard to tell whether
the user is a fraudulent shill account [23, 17], or simply a
normal user whose rating behavior is unusual at first but
stabilizes in the long run [8]. Due to the lack of sufficient
information about the ratings given by the user, little can
be said about his fairness. Similarly, for products that have
only been rated a few times, it is hard to accurately deter-
mine their true quality, as they may be targets of fraud [17,
20]. This uncertainty due to insufficient information of less
active users and products is the cold start problem.
We solve this issue by assigning Bayesian priors to each
user's fairness score as follows:
0.5 · α +(cid:80)
F (u) =
(u,p)∈Out(u) R(u, p)
α + Out(u)
(7)
Here, α is a non-negative integer constant, which is the
relative importance of the prior compared to the rating re-
liability – the lower (higher) the value of α, the more (less,
resp.)
the fairness score depends on the reliability of the
ratings. The 0.5 score is the default global prior belief of all
users' fairness, which is the midpoint of the fairness range
[0, 1]. If a user gives only a few ratings, then the fairness
score of the user is close to the default score 0.5. The more
number of ratings the user gives, the more the fairness score
moves towards the user's rating reliabilities. This way shills
with few ratings have little effect on product scores.
Similarly, the Bayesian prior in product's goodness score
is incorporated as:
(cid:80)
G(p) =
(u,p)∈In(p) R(u, p) · score(u,p)
(8)
β + In(p)
Again, β is a non-negative integer constant. The prior belief
of product's goodness is set to 0 which is the midpoint of
the goodness range [−1, 1], and so 0 · β = 0 does not appear
in the numerator. We will explain how the values of α and
β are set in Section 4.
3.3
Incorporating Behavioral Properties
Rating scores alone are not sufficient to efficiently estimate
the fairness, goodness and reliability values. The behavior
of the users and products is also an important aspect to be
considered. As an example, fraudsters have been known to
give several ratings in a very short timespan, or regularly at
fixed intervals which indicates bot-like behavior [15, 8, 28].
Even though the ratings themselves may be very accurate,
the unusually rapid behavior of the user is suspicious. Be-
nign users, on the other hand, have a more spread out rating
behavior as they lack regularity [15]. In addition, products
that receive an unusually high number of ratings for a very
short time period may have bought fake ratings [31, 20].
Therefore, behavioral properties of the ratings that a user
gives or a product receives are indicative of their true nature.
Here, we show a Bayesian technique to incorporate the
rating behavioral properties of users and products. We focus
on temporal rating behavior as the behavioral property for
the rest of the paper, but our method can be used with any
additional set of properties. A user u's temporal rating be-
havior is represented as the time difference between its con-
secutive ratings, inter-rating time distribution IRT DU (u).
To model the behavior, we use a recent algorithm called
BIRDNEST [8], which calculates a Bayesian estimate of how
much user u's IRT DU (u) deviates from the global popula-
∈ U. This esti-
tion of all users' behavior, IRT DU (u
mate is the BIRDNEST score of user u, BIRDN ESTIRT DU (u) ∈
[0, 1]. We use IBIRDN ESTIRT DU (u) = 1−BIRDN ESTIRT DU (u),
as user u's behavioral normality score. When
IBIRDN ESTIRT DU (u) = 1, it means the user's behavior is
absolutely normal, and 0 means totally abnormal. Similarly,
for products, IBIRDN ESTIRT DP (p) is calculated from the
)∀u
(cid:48)
(cid:48)
(cid:48)
(cid:48)
)∀p
consecutive ratings' time differences IRT DP (p) that prod-
∈ P.
uct p gets, with respect to the global IRT DP (p
As in the case of cold start, we adopt a Bayesian approach
to incorporate the behavioral properties in the fairness and
goodness equations 7 and 8. The IBIRDN ESTIRT DU (u)
score is treated as user u's behavioral Bayesian prior. As
opposed to global priors (0.5 and 0) in the cold start case,
this prior is user-dependent and may be different for differ-
ent users. The resulting equation is given in Equation 1.
Note that now there are two non-negative integer constants,
α1 and α2, indicating the relative importance of the cold
start and behavioral components, respectively, to the net-
work component. The Bayesian prior for products is in-
corporated similarly to give the final goodness equation in
Equation 3.
Overall, the FairJudge formulation represented in Fig-
ure 4 is the set of three equations that define the fairness,
goodness and reliability scores in terms of each other.
It
combines the network, cold start treatment and behavioral
properties together.
4. THE FAIRJUDGE ALGORITHM
Having formulated the fairness, goodness and reliability
metrics in Section 3, we present the FairJudge algorithm in
Algorithm 1 to calculate their values for all users, products
and ratings. The algorithm is iterative, so let F t, Gt and Rt
denote the fairness, goodness and reliability score at the end
of iteration t. Given the rating network and non-negative
integers α1, α2, β1 and β2, we first initialize all scores to the
highest value 1 (see line 3).1 Then we iteratively update the
scores using Equations (3), (2) and (1) until convergence
(see lines 6-12). Convergence occurs when all scores change
minimally (see line 12).
is the acceptable error bound,
which is set to a very small value, say 10
−6.
But how do we set the values of α1, α2, β1 and β2? In an
unsupervised scenario, it is not possible to find the best
combination of these values apriori. Therefore, the algo-
rithm is run for several combinations of α1, α2, β1 and β2
as inputs, and the final scores of a user across all these
runs are averaged to get the final FairJudge score of the
user. Formally, let C be the set of all parameter combina-
tions {α1, α2, β1, β2}, and F (uα1, α2, β1, β2) be the fairness
score of user u after running Algorithm 1 with α1, α2, β1
and β2 as input. So the final fairness score of user u is
F (u) =
(cid:80)
(α1,α2 ,β1,β2)∈C F (uα1,α2,β1,β2)
(cid:80)
(α1,α2 ,β1 ,β2)∈C G(pα1,α2,β1,β2)
(cid:80)
and
(α1,α2,β1 ,β2)∈C R((u,p)α1,α2,β1,β2)
R(u, p) =
. In our exper-
iments, we varied all (integer) parameters from 0 to 5, i.e.
0 ≤ α1, α2, β1, β2 ≤ 5, giving 6x6x6x6 = 1296 combinations.
So, altogether, scores from 1296 different runs were averaged
to get the final unsupervised FairJudge scores. This final
score is used for ranking the users.
. Similarly,
G(p) =
C
C
C
In a supervised scenario, it is indeed possible to learn the
relative importance of parameters. We represent each user u
as a feature vector of its fairness scores across several runs,
i.e. F (uα1, α2, β1, β2),∀(α1, α2, β1, β2) ∈ C are the features
for user u. Given a set of fraudulent and benign user labels, a
random forest classifier is trained that learns the appropriate
weights to be given to each score. The higher the weight,
1Random initialization gives similar results.
Algorithm 1 FairJudge Algorithm
1: Input: Rating network (U , R, P), α1, α2, β1, β2
2: Output: Fairness, Reliability and Goodness scores, given
3: Initialize F 0(u) = 1, R0(u, p) = 1 and G0(p) = 1, ∀u ∈
α1, α2, β1 and β2
U , (u, p) ∈ R, p ∈ P.
IBIRDN ESTIRT DP (p) ∀p ∈ P.
IBIRDN ESTIRT DU (u)
4: Calculate
∀u
∈
U
and
5: t = 0
6: do
7:
8: Update goodness of products using Equation 3: ∀p ∈ P,
t = t + 1
Gt(p) =
β2·IBIRDN ESTIRT DP
(u,p)∈In(p) Rt−1(u,p).score(u,p)
.
9: Update reliability of ratings using Equation 2 ∀(u, p) ∈ R,
)).
10: Update fairness of users using Equation 1 ∀u ∈ U ,
(F t−1(u) + (1 − score(u,p)−Gt(p)
(u)+(cid:80)
0.5·α1+α2·IBIRDN ESTIRT DU
Rt(u, p) = 1
2
F t(u) =
error = max(maxu∈U F t(u) − F t−1(u), max(u,p)∈R
Rt(u, p) − Rt−1(u, p), maxp∈P Gt(p) − Gt−1(p))
α1+α2+Out(u)
11:
2
12: while error >
13: Return F t+1(u), Rt+1(u, p), Gt+1(p), ∀u ∈ U , (u, p) ∈
(u,p)∈Out(u) Rt(u,p)
R, p ∈ P
(p)+(cid:80)
β1+β2+In(p)
the more important the particular combination of parameter
values is. The learned classifier's prediction labels are then
used as the supervised FairJudge output.
Example 2
(Running Example). Let us revisit our run-
ning example. Let, α1 = α2 = β1 = β2 = 0. We initialize
all fairness, goodness and reliability scores to 1 (line 3 in
Algorithm 1. Consider the first iteration of the loop (i.e.
when t is set to 1 in line 7). In line 8, we must update the
goodness of all products. Let us start with product P1. Its
goodness G0(P1) was 1, but this gets updated to
G1(P1) =
−1(1) + 1(1) + 1(1) + 1(1) + 1(1) + 1(1)
= 0.67.
6
We see that the goodness of P1 has dropped because of UA's
poor rating. The following table shows how the fairness and
goodness values change over iterations (we omit reliability
for brevity):
Node
Property
P1
P2
P3
G(P1)
G(P2)
G(P3)
UA - UE
F (UA) - F (UE )
UF
F (UF )
Fairness/Goodness in iterations
1
0.67
0.25
-0.67
0.92
0.62
2
0.67
0.28
-0.67
0.89
0.43
5
0.67
0.31
-0.67
0.86
0.24
9 (final)
0.68
0.32
-0.68
0.86
0.22
0
1
1
1
1
1
By symmetry, nodes UA to UE have the same fairness
values throughout. After convergence, UF has low fairness
score, while UA to UE have close to perfect scores. Confirm-
ing our intuition, the algorithm quickly learns that UF is an
unfair user as all of its ratings disagree with the rest of the
users. Hence, the algorithm then downweighs UF 's ratings
in its estimation of the products' goodness, raising the score
of P1 and P2 as they deserve.
4.1 Theoretical Guarantees of FairJudge
∞
Here we present the theoretical properties of FairJudge.
(u, p) be the final scores after
Let, F
convergence, for some input α1, α2, β1, β2.
(p) and R
(u), G
∞
∞
Lemma 1
(Lemma 1). The difference between a prod-
uct p's final goodness score and its score after the first it-
∞
(p) − G1(p) ≤ 1. Similarly,
eration is at most 1, i.e. G
R
(u, p) − R1(u, p) ≤ 3/4 and F
(u) − F t(u) ≤ 3/4.
∞
∞
The proof is shown in the appendix [1].
Theorem 1
∞
(u, p)− Rt(u, p) ≤ ( 3
(Convergence Theorem). The difference
4 )t,
during iterations is bounded as R
∀(u, p) ∈ R. As t increases, the difference decreases and
Rt(u, p) converges to R
(u)−F t(u) ≤
∞
4 )t,∀u ∈ U and G
( 3
We prove this theorem formally in the appendix [1]. As
the algorithm converges for all α1, α2, β1, β2, the entire al-
gorithm is guaranteed to converge.
∞
(p) − Gt(p) ≤ ( 3
4 )(t−1),∀p ∈ P.
(u, p). Similarly, F
∞
Corollary 1
(Iterations till Convergence). The num-
ber of iterations needed to reach convergence is at most 2 +
(cid:100) log(/2)
log(3/4)(cid:101). In other words, treating as constant, the num-
ber of iterations needed to reach convergence is bounded by
a constant.
Again, the proof is shown in the appendix [1].
Linear algorithmic time complexity.
In each itera-
tion, the algorithm updates goodness, reliability and fairness
scores of each product, rating and user, respectively. Each
of these updates takes constant time. So, the complexity of
each iteration is O(E + V ) = O(E). By Corollary 1,
the algorithm converges in a constant number of iterations.
Hence the time complexity is O(kE), which is linear in the
number of edges, and k is a constant equal to the product
of the number of iterations till convergence and the number
of runs of the algorithm.
5. EXPERIMENTAL EVALUATION
In this section, we present the results of the proposed
FairJudge algorithm to identify fair and unfair users. We
conduct extensive experiments on five different rating net-
works and show five major results:
(i) We compare FairJudge algorithm with five recent algo-
rithms to predict benign and malicious users in an unsuper-
vised setting. We show that FairJudge performs the best
or second best in nine out of ten cases.
(ii) We show that FairJudge outperforms nine algorithms
across all datasets, when training data is available.
(iii) We show that FairJudge is robust to the percentage of
training data available, and consistently performs the best.
(iv) We show that both cold start treatment and behav-
ior properties improve the performance of FairJudge algo-
rithm, and incorporating both of them together perform the
best.
(v) We show the linear running time of FairJudge.
The FairJudge algorithm is already being deployed at
Flipkart.
5.1 Datasets: Rating Networks
We use the following five datasets. Table 2 has their prop-
erties. All ratings are rescaled between -1 and +1.
• Flipkart is India's biggest online marketplace where users
rate products. The ground truth labels are generated by re-
view fraud investigators in Flipkart, who look at various
properties of the user, rating and the product being rated.
• Epinions network has two components – user-to-post rat-
ing network and user-to-user trust network [18]. Algorithms
are run on the rating network and ground truth is defined
using the trust network – a user is defined as trustworthy if
its total trust rating is ≥ +10, and unfair if ≤ −10.
Table 2: Five rating networks used for evaluation.
Network # Users (% unfair, fair) # Products # Edges
OTC
Alpha
Amazon
Flipkart
Epinions
4,814 (3.7%, 2.8%)
3,286 (3.1%, 4.2%)
256,059 (0.09%, 0.92%)
1,100,000 (-, -)
120,486 (0.84%, 7.7%)
5,858
3,754
74,258
550,000
132,585
35,592
24,186
560,804
3,300,000
4,835,208
• Amazon is a user-to-product rating network [19]. The
ground truth is defined using helpfulness votes, which is in-
dicative of malicious behavior [6] – users with at least 50
votes are trustworthy (helpful) if the proportion of helpful-
to-total votes is ≥ 0.75, and untrustworthy if ≤ 0.25.
• Bitcoin OTC is a user-to-user trust network of Bitcoin
users. The network is made bipartite by splitting each user
into a 'rater' with all its outgoing edges and 'product' with
all incoming edges. The ground truth is defined as: trust-
worthy users are the platform's founder and users he rated
highly positively (≥ 0.5). Untrustworthy users are the ones
that these trusted users give at least three more high nega-
tive ratings (≤ −0.5) than high positive ratings (≥ 0.5).
• Bitcoin Alpha is another Bitcoin trust network and its
ground truth is created similar to OTC, starting from the
founder of this platform.
5.2 Baselines
We compare FairJudge with nine state-of-the-art unsu-
pervised and supervised algorithms. The unsupervised al-
gorithms are:
• Bias and Deserve (BAD) [21] assigns a bias score bias(u)
to each user u, which measures user's tendency to give high
or low ratings. 1−bias(u) is the prediction made by BAD.
• Trustiness [29] algorithm assigns a trustiness, honesty and
reliability score to each user, product and rating, respec-
tively. We use the trustiness score as its prediction.
• FraudEagle [2] is a belief propagation based algorithm.
Users are ranked according to their fraud score.
• SpEagle [24] incorporates behavior features into FraudEa-
gle, and the final spam scores of users are used for ranking.
• BIRDNEST [8] ranks users by creating a Bayesian model
with users' timestamp and rating distributions.
We also compare with supervised algorithms, when train-
ing labels are available:
• SpEagle+ [24] is a supervised extension of SpEagle that
leverages known training labels in the ranking.
• SpamBehavior [17]: This technique uses user's average rat-
ing deviations as feature.
• Spamicity [22] is creates each user's features as its review
burstiness and maximum reviews per day.
• ICWSM'13 [23] uses user's fraction of positive reviews,
maximum reviews in a day and average rating deviation as
features for prediction.
5.3 Experiment 1: Unsupervised Prediction
In this experiment, the task is to rank the users based
on their suspiciousness. We compare unsupervised Fair-
Judge with the suite of five unsupervised algorithms in
terms of their Average Precision scores, which measures the
relative ordering the algorithm give to the known fair and
unfair users. This score corresponds to the area under the
precision-recall curve. We calculate two average precision
scores – one for fair users and another for unfair users. Ta-
Table 3: Unsupervised Predictions: The table shows the Average Precision values of all algorithms in unsu-
pervised prediction of unfair and fair users across five datasets. The best algorithm in each column is colored
blue and second best is gray. Overall, FairJudge performs the best or second best in 9 of the 10 cases. nc
indicates 'no convergence'.
Unfair user prediction
Fair user prediction
FraudEagle
BAD
SpEagle
BIRDNEST
Trustiness
FairJudge
OTC Alpha Amazon Epinions Flipkart OTC Alpha Amazon Epinions Flipkart
93.67
79.75
74.40
61.89
74.11
86.03
47.21
55.92
12.16
19.09
40.05
56.18
86.08
63.29
68.42
53.46
49.40
76.43
96.88
97.19
93.42
93.32
97.33
97.35
86.94
77.41
80.91
46.11
84.09
90.80
71.99
68.31
82.23
77.18
78.19
86.16
nc
nc
nc
nc
nc
nc
79.96
nc
nc
nc
58.31
85.71
nc
57.14
97.09
62.47
nc
39.27
38.07
98.53
nc
99.35
37.08
63.43
ble 3 shows the resulting average precision score on the five
datasets.
We see that FairJudge performs the best in identifying
fair users in 4 out of 5 networks, and second best in the
Flipkart network. In identifying unfair users, our algorithm
performs the best in two networks and second best in the
two Bitcoin networks. The BIRDNEST algorithm is ob-
served to perform quite well in case of Flipkart network, but
has much weaker performance on other datasets. Note that
FraudEagle, SpEagle and Trustiness are not scalable and
do not converge for the two largest networks, Epinions and
Flipkart, as opposed to FairJudge which is guaranteed to
converge. We discuss scalability in Section 5.7.
Overall, in unsupervised prediction, FairJudge performs
the best or second best in 9 out of 10 cases.
5.4 Experiment 2: Supervised Prediction
In this experiment, the task is to predict the malicious and
benign users, given some labels from both categories. The
performance is measured using area under the ROC curve
(AUC) which is a standard measures when data is imbal-
anced, as is our case. For each algorithm, a feature vector is
created for each user and a binary classifier is trained. As a
reminder from Section 4, for each user u, supervised Fair-
Judge creates a 1296 dimentional feature vector of its fair-
ness scores F (uα1, α2, β1, β2), one for each of the 1296 com-
binations of α1, α2, β1, β2 ∈ [0, 5]. For baselines FraudEagle,
BAD, SpEagle, SpEagle+, BIRDNEST and Trustiness, the
feature vector for user u is the score the baseline gives to
u and u's outdegree. For baselines SpamBehavior, Spam-
icity and ICWSM'13, the feature vector for user u is their
respective features given in Section 5.2.
We perform stratified 10-fold cross-validation using ran-
dom forest classifier. The resulting AUCs are reported in
Table 4. We see that FairJudge outperforms all exist-
ing algorithms across all datasets and consistently has AUC
≥ 0.85.
Interestingly, supervised FairJudge performs extremely
well on the Flipkart dataset, while it did not perform as well
on this dataset in the unsupervised experiment. This is be-
cause by using the training data, the classifier learns the im-
portance of features F (uα1, α2, β1, β2) ∀{α1, α2, β1, β2} ∈
C. We reported the 100 most unfair users predicted by
FairJudge to review fraud investigators in Flipkart, and
they found 80 users to be fraudulent (80% accuracy).
5.5 Experiment 3: Robustness of FairJudge
In this experiment, we evaluate the performance of the
algorithms as the percentage of training data changes. We
Table 4: Supervised Predictions: 10-fold cross val-
idation with individual predictions as features in a
Random Forest classifier. Values reported are AUC.
FairJudge performs the best across all datasets. nc
means 'no convergence'.
FraudEagle
BAD
SpEagle
BIRDNEST
Trustiness
SpEagle+
SpamBehavior
Spamicity
ICWSM'13
FairJudge
OTC Alpha Amazon Epinions Flipkart
0.89
0.79
0.69
0.71
0.82
0.55
0.77
0.88
0.75
0.91
0.81
0.80
0.63
0.56
0.72
0.67
0.80
0.60
0.84
0.86
0.76
0.68
0.57
0.73
0.75
0.66
0.69
0.74
0.71
0.85
nc
0.81
nc
0.84
nc
nc
0.80
0.50
0.82
0.89
nc
0.64
nc
0.80
nc
nc
0.60
0.82
0.82
0.85
vary the training data from 10% to 90% in steps of 10. Fig-
ure 5 shows the average AUC on test sets by using 50 random
samples of training data. We make two observations. First,
FairJudge is robust to the amount of training data.
Its
performance is relatively stable (AUC ≥ 0.80 in almost all
cases) as the amount of training data varies. Second, Fair-
Judge outperforms other algorithms consistently across all
datasets for almost all training percentages. Together, these
two show the efficiency of supervised FairJudge algorithm
even when small amount of training data is available.
5.6 Experiment 4: Importance of Network, Cold
Start and Behavior
In this experiment, we show the importance of the dif-
ferent components in the FairJudge algorithm – network
(given by Equations 4, 5 and 6; shown as N), cold start
treatment (C), and behavioral properties (B). Figure 6(a)
shows the average precision in unsupervised case for the Al-
pha dataset, when network property is combined with the
other two components, and Figure 6(b) shows the average
AUC in the supervised case. In both cases, network prop-
erties alone has the lowest performance. Adding either the
cold start treatment component or the behavioral property
component increases this performance. To combine network
properties with behavioral property component only, the
cold start property is removed by setting α1 = β1 = 0 in
the FairJudge algorithm. Likewise, α2 and β2 are set to 0
to combine with cold start treatment alone. Further, com-
bining all three together gives the best performance. Sim-
ilar observations hold for the other datasets as well. This
Figure 5: Variation of AUC with percentage of training data available for supervision. FairJudge consistently performs
the best across all settings, and its performance is robust to the training percentage.
(a) Unsupervised
(b) Supervised
Figure 6: Change in performance of FairJudge on Alpha
network in (a) unsupervised and (b) supervised experi-
ments when different components are used: network (N),
cold start treatment (C) and behavioral (B).
(a)
(b)
Figure 7:
time increases linearly with the number of edges.
Unfair users give highly negative ratings.
(a) FairJudge scales linearly - the running
(b)
shows that all three components are important for predict-
ing fraudulent users.
5.7 Experiment 5: Linear scalability
We have theoretically proved in Section 4.1 that Fair-
Judge is linear in running time in the number of edges.
To show this experimentally as well, we create random net-
works of increasing number of nodes and edges and compute
the running time of the algorithm till convergence. Figure 7
shows that the running time increases linearly with the num-
ber of edges in the network, which shows that FairJudge
algorithm is indeed scalable to large size networks for prac-
tical use.
5.8 Discoveries
Here we look at some insights and discoveries about ma-
licious behavior found by FairJudge.
As seen previously in Figure 2, most ratings given by un-
fair users have low reliability, while some have high reliabil-
ity, indicating camouflage to masquerade as fair users. At
the same time, most ratings of fair users have high reliabil-
(a)
(b)
Figure 8: Identified unfair users by FairJudge are (a)
faster in rating , and give extreme ratings.
ity, but some ratings have low reliability, indicating personal
opinion about products that disagrees with 'consensus'.
We see in Figure 7(b) that in the Amazon network, un-
fair users detected by FairJudge (F (u) ≤ 0.5) give highly
negative rating on average (mean out-rating weight of -0.88),
while fair users give positive ratings (mean out-weight 0.62).
Unfair users also give almost half as many ratings as fair
users (7.85 vs 15.92). This means on average, fraudsters
aggressively bad-mouth target products.
We also observe in Figure 8 that unfair users in OTC
network: (a) give ratings in quick succession of less than a
few minutes, and (b) exhibit bimodal rating pattern – either
they give all -1.0 ratings (possibly, bad-mouthing a competi-
tor) or all +1.0 ratings (possibly, over-selling their product-
s/friends). As an example, the most unfair user found by
FairJudge had 3500 ratings, all with +0.5 score, and al-
most all given 15 seconds apart (apparently, a script). On
the other hand, fair users have a day to a month between
consecutive ratings, and they give mildly positive ratings
(between 0.1 and 0.5). These observations are coherent with
existing research [15, 5].
Figure 1(d) shows a set of 40 unfair users, as identified by
FairJudge on the Alpha network, that collude to positively
rate each other and form sets of tightly knit clusters – they
are confirmed to be shills of a single user.
In summary, unfair users detected by FairJudge exhibit
strange characteristics with respect to their behavior:
• They have bimodal rating pattern - they give too low (bad-
mouthing) or too high (over-selling) ratings.
• They are less active, have no daily periodicity, and post
quickly, often less than a few minutes apart.
• They tend to form near-cliques, colluding to boost their
own or their product's ratings.
• They camouflage their behavior to masquerade as benign
users.
102030405060708090Percentageoftrainingdata0.650.750.850.95AverageAUCOTCNetwork102030405060708090Percentageoftrainingdata0.50.60.70.80.9AverageAUCAlphaNetwork102030405060708090Percentageoftrainingdata0.50.60.70.80.9AverageAUCAmazonNetwork102030405060708090Percentageoftrainingdata0.50.60.70.80.9AverageAUCFraudEagleSpEagleTrustinessEpinionsNetwork102030405060708090Percentageoftrainingdata0.60.650.70.750.80.85AverageAUCFraudEagleSpEagleTrustinessFlipkartNetworkFraudEagleBADSpEagleBIRDNESTTrustinessSpEagle+SpamBehaviorSpamicityICWSM'13FairJudge020406080100AveragePrecisionN64N+B71.9N+C74.9N+C+B76.50.00.20.40.60.81.0AverageAUCN0.71N+B0.84N+C0.81N+C+B0.85103104105106107Numberofedgesinnetwork100101102103104Runtime(seconds)Slope=100.51.0FairnessRange−1.0−0.50.00.51.0AverageOut-weight−0.880.62SecondMinuteHourDayMonthUserInter-RatingTimeProfile0.000.010.020.030.040.050.060.07Fractionofratings−1.0−0.50.00.51.0MeanUserRating0.000.050.100.150.200.25FractionofUsersUnfairusersFairusers6. CONCLUSIONS
We presented the FairJudge algorithm to address the
problem of identifying fraudulent users in rating networks.
This paper has the following contributions:
• Algorithm: We proposed three mutually-recursive met-
rics - fairness of users, goodness of products and reliability of
ratings. We extended the metrics to incorporate Bayesian
solutions to cold start problem and behavioral properties.
We proposed the FairJudge algorithm to iteratively com-
pute these metrics.
• Theoretical guarantees: We proved that FairJudge
algorithm has linear time complexity and is guaranteed to
converge in a bounded number of iterations.
• Effectiveness: By conducting five experiments, we showed
that FairJudge outperforms nine existing algorithms to
predict fair and unfair users. FairJudge is practically use-
ful, and already under deployment at Flipkart.
7. REFERENCES
[1] Additional material.
http://cs.umd.edu/~srijan/fairjudge/, 2017.
[2] L. Akoglu, R. Chandy, and C. Faloutsos. Opinion
fraud detection in online reviews by network effects. In
ICWSM, 2013.
[3] L. Akoglu, H. Tong, and D. Koutra. Graph based
anomaly detection and description: a survey. TKDD,
29(3):626–688, 2015.
[4] C. Chen, K. Wu, V. Srinivasan, and X. Zhang.
Battling the internet water army: Detection of hidden
paid posters. In ASONAM, 2013.
[5] J. Cheng, C. Danescu-Niculescu-Mizil, and
J. Leskovec. Antisocial behavior in online discussion
communities. In ICWSM, 2015.
[6] A. Fayazi, K. Lee, J. Caverlee, and A. Squicciarini.
Uncovering crowdsourced manipulation of online
reviews. In SIGIR, 2015.
[7] S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma,
G. Korlam, F. Benevenuto, N. Ganguly, and K. P.
Gummadi. Understanding and combating link farming
in the twitter social network. In WWW, 2012.
[8] B. Hooi, N. Shah, A. Beutel, S. Gunneman, L. Akoglu,
M. Kumar, D. Makhija, and C. Faloutsos. Birdnest:
Bayesian inference for ratings-fraud detection. In
SDM, 2016.
[9] B. Hooi, H. A. Song, A. Beutel, N. Shah, K. Shin, and
C. Faloutsos. Fraudar: Bounding graph fraud in the
face of camouflage. In KDD, 2016.
[10] M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and
S. Yang. Catchsync: catching synchronized behavior
in large directed graphs. In KDD, 2014.
[11] M. Jiang, P. Cui, and C. Faloutsos. Suspicious
behavior detection: current trends and future
directions. IEEE Intelligent Systems, 2016.
[12] N. Jindal and B. Liu. Opinion spam and analysis. In
WSDM, 2008.
[13] S. Kumar, F. Spezzano, V. Subrahmanian, and
C. Faloutsos. Edge weight prediction in weighted
signed networks. In ICDM, 2016.
[14] T. Lappas, G. Sabnis, and G. Valkanas. The impact of
fake reviews on online visibility: A vulnerability
assessment of the hotel industry. INFORMS, 27(4),
2016.
[15] H. Li, G. Fei, S. Wang, B. Liu, W. Shao,
A. Mukherjee, and J. Shao. Bimodal distribution and
co-bursting in review spam detection. In WWW, 2017.
[16] R.-H. Li, J. Xu Yu, X. Huang, and H. Cheng. Robust
reputation-based ranking on bipartite rating networks.
In SDM, 2012.
[17] E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and
H. W. Lauw. Detecting product review spammers
using rating behaviors. In CIKM, 2010.
[18] P. Massa and P. Avesani. Trust-aware recommender
systems. In RecSys, 2007.
[19] J. J. McAuley and J. Leskovec. From amateurs to
connoisseurs: modeling the evolution of user expertise
through online reviews. In WWW, 2013.
[20] A. J. Minnich, N. Chavoshi, A. Mueen, S. Luan, and
M. Faloutsos. Trueview: Harnessing the power of
multiple review sites. In WWW, 2015.
[21] A. Mishra and A. Bhattacharya. Finding the bias and
prestige of nodes in networks based on trust scores. In
WWW, 2011.
[22] A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu,
M. Castellanos, and R. Ghosh. Spotting opinion
spammers using behavioral footprints. In KDD, 2013.
[23] A. Mukherjee, V. Venkataraman, B. Liu, and N. S.
Glance. What yelp fake review filter might be doing?
In ICWSM, 2013.
[24] S. Rayana and L. Akoglu. Collective opinion spam
detection: Bridging review networks and metadata. In
KDD, 2015.
[25] V. Sandulescu and M. Ester. Detecting singleton
review spammers using semantic similarity. In WWW,
2015.
[26] H. Sun, A. Morales, and X. Yan. Synthetic review
spamming and defense. In KDD, 2013.
[27] B. Viswanath, M. A. Bashir, M. Crovella, S. Guha,
K. P. Gummadi, B. Krishnamurthy, and A. Mislove.
Towards detecting anomalous user behavior in online
social networks. In USENIX Security, 2014.
[28] B. Viswanath, M. A. Bashir, M. B. Zafar, S. Bouget,
S. Guha, K. P. Gummadi, A. Kate, and A. Mislove.
Strength in numbers: Robust tamper detection in
crowd computations. In COSN, 2015.
[29] G. Wang, S. Xie, B. Liu, and S. Y. Philip. Review
graph based online store review spammer detection. In
ICDM, 2011.
[30] J. Wang, A. Ghose, and P. Ipeirotis. Bonus,
disclosure, and choice: what motivates the creation of
high-quality paid reviews? In ICIS, 2012.
[31] G. Wu, D. Greene, and P. Cunningham. Merging
multiple criteria to identify suspicious reviews. In
RecSys, 2010.
[32] Z. Wu, C. C. Aggarwal, and J. Sun. The troll-trust
model for ranking in signed networks. In WSDM, 2016.
[33] S. Xie, G. Wang, S. Lin, and P. S. Yu. Review spam
detection via temporal pattern discovery. In KDD,
2012.
[34] J. Ye and L. Akoglu. Discovering opinion spammer
groups by network footprints. In ECML-PKDD, 2015.
|
1201.3745 | 1 | 1201 | 2012-01-18T10:30:21 | Social Networks Research Aspects: A Vast and Fast Survey Focused on the Issue of Privacy in Social Network Sites | [
"cs.SI"
] | The increasing participation of people in online activities in recent years like content publishing, and having different kinds of relationships and interactions, along with the emergence of online social networks and people's extensive tendency toward them, have resulted in generation and availability of a huge amount of valuable information that has never been available before, and have introduced some new, attractive, varied, and useful research areas to researchers. In this paper we try to review some of the accomplished research on information of SNSs (Social Network Sites), and introduce some of the attractive applications that analyzing this information has. This will lead to the introduction of some new research areas to researchers. By reviewing the research in this area we will present a categorization of research topics about online social networks. This categorization includes seventeen research subtopics or subareas that will be introduced along with some of the accomplished research in these subareas. According to the consequences (slight, significant, and sometimes catastrophic) that revelation of personal and private information has, a research area that researchers have vastly investigated is privacy in online social networks. After an overview on different research subareas of SNSs, we will get more focused on the subarea of privacy protection in social networks, and introduce different aspects of it along with a categorization of these aspects. | cs.SI | cs | Social Networks Research Aspects : A Vast and Fast Survey Focused on the Issue of
Privacy in Social Network Sites
Mohammad Soryani
Mazandaran University of Science and Technology
Mazandaran, Iran
Abstract— The increasing participation of people in online
activities in recent years like content publishing, and having
different kinds of relationships and interactions, along with the
emergence of online social networks and people’s extensive
tendency toward them, have resulted in generation and
availability of a huge amount of valuable information that has
never been available before, and have introduced some new,
attractive, varied, and useful research areas to researchers. In
this paper we try to review some of the accomplished research
on information of SNSs (Social Network Sites), and introduce
some of the attractive applications that analyzing this
information has. This will lead to the introduction of some new
research areas to researchers. By reviewing the research in this
area we will present a categorization of research topics about
online social networks. This categorization includes seventeen
research subtopics or subareas that will be introduced along
with some of the accomplished research in these subareas.
According to the consequences (slight, significant, and
sometimes catastrophic) that revelation of personal and private
information has, a research area that researchers have vastly
investigated is privacy in online social networks. After an
overview on different research subareas of SNSs, we will get
more focused on the subarea of privacy protection in social
networks, and introduce different aspects of it along with a
categorization of these aspects.
Keywords- Social Networks; Privacy; Privacy in Social
Networks; SNS; Survey; Taxonomy;
INTRODUCTION
I.
In recent years several attractive and user-friendly
facilities have been introduced to online society and we see
an extensive and increasing participation of people in
various online activities like several kinds of content
publishing (blogging, writing reviews etc.) and having
different kinds of relationships and interactions. The huge
amount of information that is generated in this way by
people has never been available before and is highly
valuable from different points of views. An outstanding
phenomenon that has had a significant influence on this
extensive participation and
includes a
large part of
generated information is SNSs (Social Network Sites).
Maybe in past, to study about the relationships, behaviors,
interactions, and properties of specific groups of people it
Behrooz Minaei
Iran University of Science & Technology
Tehran, Iran
was necessary to make a lot of effort to gain some not very
detailed information about them, but in the new situation
and with the emergence of online social networks, and the
huge amount of various activities that are logged by their
users, the desired information is accessed much more simple
and with
than before by
incomparably more details
researchers. This has led to different kinds of research with
different goals which we will have an overview on in this
paper. The benefits and stakeholders that may benefit from
having this information or having the results of analyzing it
are several but some of them are: commercial companies for
advertising and promoting their products, sociologists to
analyze the behavior and features of different societies,
intelligence organizations to prevent and detect criminal
activities, educational and cultural activists for promoting
their goals, employers for acquiring information about job
seekers, and generally any kind of information with any
application that you may think of, related to people and
human societies, may be obtained by having access to the
information available on SNSs or the results of analyzing
these information. In this paper we try to review some of the
accomplished research on the available information of SNSs
and present a categorization of research topics and subareas
related to online social networks’ information.
As a lot of peoples’ published information is private
and on the other side as we will see, having access to them
has a lot of applications and benefits for different parties,
letting them to be available with unlimited access has
consequences that sometimes may be catastrophic. We will
pay more attention to this issue in this paper.
In the following sections of this paper we will first
introduce sixteen research subareas about online social
networks while mentioning a few of accomplished studies
related with them. After that we will have a more focused
review on another important research subarea namely
privacy protection in social networks, and will present a
categorization of its different aspects. We will conclude at
the end. To have a look at the whole picture of the
categorization from above, Fig.1 shows several research
sub-topics about SNSs and Fig.2 extends the topic of
privacy and presents a categorization of several aspects of
privacy in social networks.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org363may be desirable to find special persons with high skill in a
special field or
in
influential persons
to find most
propagating some special kind of content. In [3] a social
Uhttp://vark.comU
T)
is
search engine named Aardvark
( 1
presented that needs to find the best person for answering a
specific question, and one of its information resources is
people’s profiles on facebook. In [4] some work is done
towards forming a team of experts from members of a social
network. In [5] to specify influential persons within Twitter,
ranking people based on their followers, PageRank and
number of retweets is investigated. In [6] some definitions
are defined for different people whose actions impacts on
making the same actions by others and such people are
called leaders. In this paper some algorithms are presented
for detecting these people by the use of a social graph and a
table which contains users’ actions. In [14] some references
are cited in which some methods for extracting most
important (central) members are presented. It has mentioned
strengths and weaknesses of some metrics. In [21] Content
Power Users (CPUs) in blog networks are defined as users
whose published content has a lot of impact on other users’
actions. In this paper a method for identifying these users is
presented and some other research works about detecting
highly influential people in social networks are cited.
2) Commerce and Marketing: Advertisement in SNSs
can be targeted [11] [31] [6]. Targeting users whose activity
influences others could be beneficial for companies [6]. As
is mentioned in [11] a manufacturer can select a number of
users and give them its product with some discount or even
free, and hope that their influence on other users promotes
their product. In the case of discounting the amount of
discount is exposed to discussion. In [31] using users’
profile information and the information about their activities
towards targeted advertisement is mentioned.
3) Monitoring and Analyzing Users’ Activities: In
[12] users’ behavior in a social network is analyzed to
identify the patterns of closeness between colleagues. Paper
[24] notes the importance of awareness about users’
participation patterns in knowledge-sharing social networks
for researchers and social network industry; and analyses
users’ activities in three social networks. Some results that
are different from common assumptions are reported.
4) Crawling: To analyze the information of SNSs first
we must acquire it. One of the most important ways to do
this is using crawlers. Crawlers generally should have some
specifications like being up to date and having mechanisms
to prevent fetching the same page more than once.
According to special characteristics of social networks like
the huge size, and the auto crawling prevention mechanisms
that SNSs use it seems that we need special kind of
Figure 1. A categorization of research topics in social networks area.
II.
BA CATEGORIZATION OF RESEARCH TOPICS IN SOCIAL
NETWORKS AREA
1) Detecting Special Individuals: Some people with
special characteristics may be attractive
some
for
companies, manufacturers, organizations, etc. for example it
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org3641
T
1
crawlers. In [10] noting the large size of data, and the
different way of data presentation in social networks a
parallel crawler is proposed for crawling social networks. In
[39] [7] facebook is crawled and the problem of facing with
CAPTCHAs is noted. In [38] the ethicality of web crawlers
is discussed.
5) Content Mining: One kind of information that is
made by users is the content that they put in the sites in
different ways. In [8] according to the real-time nature of
twitter, an algorithm for monitoring and analyzing the
tweets is proposed towards detecting a specific event. In this
work a system is implemented to detect earthquakes in
Japan and is able to do so with high accuracy. In [9] new
type of texts that are published on SNSs and are usually
short with an informal form of writing (called social
snippets) are
investigated and some applications of
analyzing such texts are mentioned. Their focus is on
keyword extraction from this kind of texts. In [36]
mentioning the applications of identifying the quality of
users’ reviews about different issues, using social networks
information to improve reviews quality identification is
discussed. In [22] the necessity of applying automated
language analysis techniques towards security in digital
communities including social networks is mentioned and an
approach is proposed for detecting a special kind of
malicious activity.
6) Social Network Extraction: There are a lot of data
in various forms on the web that apparently do not have the
structure of a social network but with some mining activities
on them like extracting the identity of data owners and the
relations between them it is possible to extract the social
network that relies beneath these data. Examples of such
studies are [1] and [2]. In [1] the information of a message
board is used and in [2] a system named ArnetMiner
[http://www.arnetminer.org] is presented that extracts a
social network of researchers. In [21] extraction of social
network using a blog is mentioned.
7) Group Detection: In [4] identifying a group of
skillful people to accomplish a specific job with a minimum
communication cost in a social network is discussed. In [25]
an efficient algorithm for large social networks named
ComTector is presented for detecting communities. In [33]
grouping in a social network is done towards detecting the
backbone of a social network.
8) Link and Relationship Mining: In [12] relationship
closeness is investigated based on the behavior of users in a
social network inside a company. It is mentioned that Some
behaviors are a sign of professional closeness and some are
a sign of personal closeness. In [13] an approach is
presented for estimation of relationship strength, and is
evaluated with facebook and linkedin data. In [34] an
approach for inferring the links that exist but are not
observed is presented and a good survey about link mining
in social networks is cited.
9) Criminal Activity Detection: Some specifications
of SNSs like presence of great number of various people
and new ways of communication has attracted criminals to
use them for their malicious activities, so to prevent and
detect such activities some special research is necessary to
be done. In [22] some challenges about law enforcement
and the necessity of using automated language analysis
techniques for active policing in digital communities is
mentioned. It notes some applications of using these
techniques like identifying the child predators who pretend
to be a child. In [29] a system is proposed for identifying
suspects with the help of social network analysis (SNA). In
[16] the application of SNA in criminal investigation and
yet protecting privacy at the same time is discussed. In [32]
the importance of clustering web opinions from intelligence
and security informatics point of view along with some
criminal activities that could be done in this space are
mentioned and a clustering algorithm for detecting the
context of the discussions available at social networks is
presented.
10) Search: Search engines, both general purpose and
special purpose ones use different information as parameters
for ranking their search results. SNSs may be a valuable
source of information to improve the ranking. For example
special characteristics of people acquired from social
networks, may be considered for ranking search results
tailored to each individual’s characteristics resulting in
personalized search. In [19] using the structure of a social
network toward improved result ranking in profile search is
studied and using the social graph for improving ranking in
other types of online search is mentioned as a future
research. In [3] a search engine is introduced that instead of
looking for appropriate documents related with the given
query, it looks for suitable persons for answering the given
question. To do that it gathers information about people
from different resources including SNSs. In [37] towards
leveraging
the
information about searchers
in social
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org365networks for document ranking, a framework named
SNDocRank is presented. Also a study about personalizing
search results using users’ information is cited.
11)
Information and Activity Diffusion and
Propagation: The way that information and activities
propagate through a social network is another area that is
worth to investigate and studying about it can have various
benefits. For example commercial companies may be
interested in the results of such studies to improve the
spread of information about their products, or educational
and cultural activists may benefit from it for promoting their
goals. In [20] information propagation in blogs is studied
and some applications for such a study are mentioned. In [6]
the spread and prevalence of users’ actions is investigated
over time, to identify users whose actions have influence on
other users’ actions.
12) Recommendation and Suggestion: According to
[27] the goal of a recommender system is to recommend a
set of items to a user whose favorite items are similar to
them. In this work some algorithms have been designed and
implemented for such systems in social networks. In [28]
some techniques are presented for link prediction and the
application of such techniques in friend recommendation in
social networks is mentioned. In [23] some important
aspects of research related with social recommendation that
could be done are mentioned.
13) Influence Maximization: The problem here is to
find a number of persons whose scope of influence is
maximum; for example a company that has developed an
application for a social network and wants to market it on
that social network and can afford to invest on limited
number of users (for example for giving gifts to them)
would like to choose these users so that the extent of final
influenced users is maximum [35]. In [26] assigning roles to
users and application of being aware of these roles in
influence maximization is mentioned. In [35] in addition to
improving another algorithm called greedy, some heuristics
are presented that run much faster.
14) Prediction: By studying the information of SNSs it
is possible to predict some events that may happen in future.
For example some research has been done recently to
predict future links in social networks [34]. In [28] some
techniques for predicting the links that may be established in
future are presented.
15) Data Management: Managing the huge volume of
SNSs’ data has several aspects and due to special features of
this kind of data, needs specific research. For example the
structure of storing data is very important and can affect the
amount of needed storage. In [30] a study is done about
compressing social networks and a new method for
compressing social networks is presented. Some of the
similarities and differences between this problem and the
problem of compressing web graph are found. Their results
show vast difference between compressibility characteristics
of social networks and web graph.
16) Geolocation: Detecting the location of the user can
have several applications including personalization. Among
the studies in which SNSs are used to detect the location of
users is [18]. In this work researchers of facebook have
mentioned some applications of knowing the location of
users like news personalization, and with pointing to
inconsistency of results when using
ip address for
geolocation they have presented a method for detecting the
location of the user using information about the location of
her friends. It is also mentioned that their algorithms could
be run iteratively towards identifying the location of most
users who have not provided any information about their
location.
17) Privacy: As the focus of this paper is on the area of
privacy in SNSs, we will present a broader overview on
several aspects of this area along with introducing a
taxonomy of these aspects which is shown in Fig.2.
17-1 Defence
17-1-1 Helping Users
Users need to be informed about the consequences of
their various information publication and their activities;
need to know which part of their information is accessible
and for whom; need to have some facilities to control the
way that people can access their information, and need to
get all of these requirements in a simple and understandable
way that does not need a lot of time and effort. A user gets
acquainted with the matter of privacy from the first steps of
her experience on SNSs by facing with privacy policies text.
Definitely you too have faced with such a text and confirm
that they are not very pleasant for users and a lot of people
accept and pass over them without reading. In [42] the
challenge of showing users’ privacy related issues to them
in an understandable way is presented with an interesting
example where a possible interpretation of a privacy-related
text may be different from what really happens. In a study
that is done on six well-known SNSs [51], it is mentioned
that privacy policies often have internal inconsistencies and
also there is a lack of clear phrases about data retention.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org366
Figure 2. A categorization of privacy related aspects in Social Network Sites.
Overall privacy related texts like privacy policies should be
unambiguous,
simply
and
as possible,
short
as
understandable. This can be considered as the first step of
helping users
towards
their privacy protection. After
accepting the privacy policy agreement, there are some
flexible privacy settings that could be adjusted and help the
user to specify the way her information is accessible. Since
it is difficult for the average user to adjust these fine grained
and detailed settings [44], some research towards helping
users to do that in the best way could be useful. In [44] a
work has been done toward automatically adjusting these
settings with the minimum effort of the user. In this study a
wizard is introduced that builds a classifier based on the
user’s answers to the systems requests and uses it to
automatically adjust the settings. The possibility of using a
limited amount of user’s input to build a machine learning
model that concisely describes the privacy preferences of a
user, and using this model for automatically adjusting
privacy settings of a user is presented in this paper. Some
other interesting points about this approach are the adoption
of the system after a new friend is added by a user (it
presents some information about the user’s preferences),
and the possibility of viewing and modifying the obtained
model by advanced users. Another helpful facility (the work
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org367is presented by Lipford et al. and is cited in [44]) is a tool
that makes the user able to view her own profile from the
view point of each of her friends and consequently
observing the results of her settings. It seems that some sort
of this approach is adopted by facebook [44]. In [54] a
method for suggesting privacy settings to newcomers is
presented and the importance of these primitive settings due
to the users’ tendency towards keeping them is noted. In this
study to some extent, a review about how to use machine
learning to prepare and suggest primitive privacy settings
that are more probably useful for users is presented. Another
helpful aid for users’ better privacy protection is providing
some informative metrics by which users can obtain concise
useful information. In [42] it is suggested to use an approach
which uses data mining and potentially other AI tools to
find out the amount of difficulty that accessing users’
information has, and to provide some metrics for showing
that, that is a useful tool for informing users about their
privacy risk. Another metric that is presented in [65] is
“privacy score”. In this study some models and algorithms
have been presented for calculating this metric and some
mathematical models are developed
to estimate
the
sensitivity and visibility of the information, which are
influential on privacy risk. Sometimes users do not behave
appropriately regarding their privacy while using SNSs.
Understanding these risky behaviors, their causes, and then
informing people and developing preventive mechanisms
could be another way of helping users. In [47] a few of these
risky behaviors are mentioned : incaution in accepting
friendship requests, clicking on links received from others
without enough caution, reacting to suspicious friendship
requests after accepting them (not before) and therefore
letting suspicious users to access information, interaction
with fake profiles and overall, high implicit trust that exists
in SNSs. A study is cited there in which 41% of 200 users
whom a friendship request were randomly sent to, accepted
it, and most of the users had not limited access to their
personal profile information. In another study which is also
cited in [47], publicly available information of some people
has been gathered from some SNSs, and have been used in
phishing emails; results show that targeted people whose
received emails contains some information about them or
their friends are more likely to get involved. In [46] [50] and
[59] some surveys have been conducted as a way for
studying users and acquiring information that leads to better
helping them. In [46] interviews and surveys are used to
investigate
the effective
factors
that cause personal
information exposure by students on facebook and why they
do it despite the existing concerns. How to defend them
against privacy threats is also studied. In [59] a survey is
conducted in which the participants are highly educated and
some information about users’ behaviors, viewpoints, and
concerns about privacy
related
issues are gained.
Notwithstanding all of the existing threats and risks about
private information disclosure, however users extensively
tend to engage in social relations and interactions in SNSs
and naturally each of these relations and interactions needs
some information exposure. In [40] a study is done with the
goal of determining the least information that needs to be
shared to accomplish a specific interaction. An interesting
study towards preparing helpful tools for users to protect
their privacy is [53] in which helping users to jointly
manage the privacy of their shared content is studied.
Sometimes people who benefit from or get harmed by
publication of a specific information unit are multiple, and
publishing such information may put the privacy of several
people at risk. An example of this kind of information that is
extensively being published over SNSs is a photo in which
several people exist. Photos are sometimes tagged and/or
some additional information about them is available besides
them. Support for common ownership in SNSs, and the
requirements of solutions namely being fair, lightweight,
and practical are mentioned as some issues that exist about
joint management of privacy in [53]. In [59] it’s been tried
to find a way for a user to express her privacy preferences,
and a method to do this with the aim of being easy to
understand by other users and also being machine readable
(so that it can be used by other service providers and third
parties) is presented. It is mentioned that they intend to use
cryptographic techniques to provide the possibility of
proving privacy violation for the data owner (for example to
a legal authority) which is another helpful facility towards
users’ privacy protection.
17-1-2 Protecting Online Information of SNSs
Let’s assume that we have given all of the helpful
information to users to properly manage their information
publishing and protecting their privacy. Besides that we
have provided them with best tools for adjusting their
privacy settings in a fast, accurate, and simple way. Is it the
time to relax and feel like we have done all we could do, or
there are other issues that we should take care of and study
about? The problem is that some of those who are interested
in having users’ information do not give up and try to
exploit from any possible way (sometimes legal and
sometimes illegal) to acquire their desired information. In
addition to studies that have been done towards directly
helping users, it is necessary to make some efforts to keep
the online information out of undesired reach. In this part
we will take a look at this issue. A study on five Russian
SNSs [50] shows that despite more concerned users, there is
a significant gap between their providers and western SNS
Providers about understanding the privacy related concepts
and preparing appropriate defencive mechanisms; and
overall the privacy condition is reported to be catastrophic
that leads to exposure of a large amount of users’
information. An important tool that is used to acquire the
online information of SNSs is a bot, with which intruders
are able to accomplish their actions automatically and with a
large scale. Among the actions that could be done with these
automatic systems are: crawling, creating fake profiles, and
sending forged friendship requests. Obviously something
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org368needs to be done to stop these systems. In fact SNS
providers should somehow determine whether the requests
are sent by a real person or by an automatic system. One
thing that could be done is to monitor IP addresses. Another
method that is common for online automatic activity
detection is using CAPTCHAs [http://www.captcha.net,
47]. A CAPTCHA is a program that protects websites
against bots by creating tests that human can pass but
programs cannot [http://www.captcha.net]. According to
[47], facebook uses an adoption of reCAPTCHA (a related
reference is cited) solution which is developed at Carnegie
Mellon university. Automatic
systems may have
mechanisms to pass CAPTCHAs. Also they can exploit the
possibility of changing CAPTCHAs that some websites
offer, to find a CAPTCHA which they are able to pass. To
deal with this, the rate of presented CAPTCHAs could be
limited. [47]
In [50] it is concluded that most Russian SNSs do not
prevent automatic profile crawling appropriately. Also
according to [47] in some cases there is a lot of
improvement possibility to make CAPTCHAs more difficult
to break, and not every SNSs try enough to make automatic
crawling and access more difficult. Another way of
prevention and detection of suspicious activities is using
behavior based anomaly detection techniques that can
reduce the speed of the attack and its economical feasibility
[47]. Although SNSs should try to protect the privacy of
users and keep their information accessible only in the way
that they have determined by their settings, however there
may be some privacy breaches. In [47] an interesting
example is mentioned. It is said that according to similar
characteristics of SNSs, an extendable model could be built
and potential breaches could be detected by formal analysis
of this model. Changing the structure of services may help
to increase the privacy protection level for users. For
example in [67] extending link types is mentioned as a
helpful action for privacy protection. It means instead of
simply just being connected or not connected, people could
for example specify the direction of their connection or the
amount of trust which exists in the relationship. An example
of its benefit is when a malicious user succeeds to fool
another user and establish a connection with her. In this
situation using trust degree can decrease the consequences
of this connection. [67]
A kind of extended link types is recently adopted by
google’s SNS [http://plus.google.com].
In [59] and [60] using cryptographic techniques is
proposed to prove privacy violations, that can prevent
unauthorized access, and
if happened compensate or
decrease the damage.
17-1-3 Protecting while Publishing
17-1-3-1 Anonymization
So far we have discussed privacy protection by means
of limiting access to users’ personal information. In this
section we are going to take a look at a kind of protection
that aims to protect the privacy and publish information at
the same time. As we mentioned, there is a high interest and
desire with various motivations to have access to SNSs data.
A method that is used to publish this data and protect users’
privacy at the same time is called anonymization. An
informal definition of anonymization in the context of
privacy protection
its
that
information
replacing
is
revelation may damage users’ privacy (email, address etc.)
with other harmless data. In [36] and [52] the tradeoff
between privacy and utility of anonymized data is discussed.
A good survey about anonymizing social network
information is [17]. In this study anonymization methods
have been categorized and according to it, the state-of-the-
art methods for social network information anonymization
are clustering based approaches and graph modification
approaches. Clustering based approaches
include four
subcategories of vertex clustering, edge clustering, vertex
and
edge
clustering,
and vertex-attribute mapping
clustering. Graph modification approaches include three
subcategories
graph
randomized
optimization,
of
modification, and greedy graph modification. In [43] a
weakness of past studies about anonymization is mentioned,
which is their focus on methods that consider a single
instance of a network, while SNSs evolutionally change and
the information that does not reflect these changes is not
enough for every analysis. In this paper some studies that
has been done about the evolution of social networks are
mentioned and also it is noted that anonymization of
different instances taken in different times is not sufficient
and comparing
them
leads
to
information revelation.
Researchers of this paper have cited a report of their own in
which they have proposed an approach for this problem. As
we will see in the attacks section the beneficiaries still try to
acquire their desired information and try to extract it even
from anonymized data, so some studies towards improving
anonymization techniques and overcoming their weaknesses
like [69] have been and will be done. Researchers in [48]
believe that in the area of users’ privacy, mathematical rigor
is needed towards having clear definitions about the
meaning of comprising privacy and the information that the
adversary has access to.
17-1-3-2 Smart Publishing
An application of Social Network Analysis (SNA) is
criminal investigation [16] but it seems to somehow have
contradiction with
the matter of users’ privacy. An
interesting approach is presented in [16] with which without
direct access to the SNS information and even their
anonymized form, only some results of SNA (in form of
two centrality metrics) is given to investigators and gives
them the opportunity to send queries without privacy
violation.
17-1-4 Protecting Against SNS Providers
Another privacy related concern is about inappropriate
or undesired use of users’ information by SNS providers
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org369[67] [59] [63]. Towards solving this problem a key
management scheme is presented in [15]. In the proposed
method, information is encrypted and SNS providers are
unaware of the keys. It is claimed that it does not have a
weakness of some other related works and does not require
the user and her information viewer to be present at the
same time. In [55] a client-server based arichitecture is
proposed for protecting users’ information from SNS
providers’ access in which information is transferred as
encrypted blocks. In [67] peer to peer (P2P) architecture for
SNSs and
this
for designing
tendency
researchers
architecture for next generation of SNSs is mentioned. Some
of the advantages of client-server architecture over P2P
architecture (like more efficient data mining in a central
repository), and shortcomings of using client-server
architecture with encryption (like some relations of users
being detectable by other data like IP addresses) are also
noted. A combination of P2P architecture and a good
encryption scheme is noted as a better solution for privacy
protection in SNSs.
17-2 Attack
As it was mentioned there are interested applicants that
do not give up after we put some barriers on their way and
try to make unauthorized information out of their reach.
They still try to attack and pass the barriers and reach their
desired information. In this part we take a look at these
attacks from two points of view, attacks on anonymized data
and attacks on access limited information.
17-2-1 Attacking anonymized Information
Despite the efforts towards protecting users’ private
information when publishing SNSs
information using
anonymization, this information is still exposed to a special
kind of attacks that aim at discovering information in
anonymized
information. Adversaries may use some
background information to accomplish this kind of attacks.
[17] [52] [48]
For example the attacker may have some specific
information about her target (the person who the attacker
intends to get access to her information), and be able to
recognize her target among the anonymized information
[17]. In [48] three types of attacks are presented as active
attacks, passive attacks, and semi-passive attacks : Passive
attacks are described as those in which attackers begin their
work to detect the identity of nodes after anonymized
information is published; at the other side in active attacks
the adversary tries to create some accounts in the SNS and
establish some links in the network so that these links will
be present in the anonymized version of the information; in
semi-passive attacks there is no new account creation but
some links are established with the target user before the
information is anonymized. Having background information
(both the information that the attackers themselves has
injected to the network and the information that they have
acquired in other ways) is an important tool in the hand of
anonymized information attackers. In [17] some examples
of background information are mentioned like attributes of
vertices, vertex degree, and neighborhoods. In [69] using
neighborhood information is presented as an example of a
type of attacks called neighborhood attacks. In [52] vertex
degree is said to be the most vastly used parameter. In [48]
some studies about using interesting information like user
prepared text for attacking anonymized data are cited
(although in different contexts from the SN context of that
paper). In [39] good information
is presented about
anonymization and deanonymization. In this paper a passive
method is proposed for identity detection in anonymized
information, and using it along with the information of two
well known SNSs (twitter, flickr) notable results are
obtained regarding identity detection of some members of
these SNSs in the anonymized graph of twitter. In this work
the
information
inside flickr
is used as background
information. An important point mentioned in [43] is that in
the area of social networks anonymization, the main focus
so far has been on a single instance of the network’s
information in a specific time, and this is inconsistent with
the very dynamic nature of these networks. It is noted there
that having several copies of anonymized data of a social
network, which are taken in different times may lead to
information revelation by comparing these copies.
17-2-2 Attacking Access Limited Information
Using the facilities which users are given, to adjust how
their information could be accessed, they can make their
information not to be accessible by everyone, and specify
different limitations for different parts of their information,
for example a person may set her pictures to only be
viewable by her close friends. Attackers certainly would try
to cross these borders. In [67] “social link forging attacks”
and “node identity forging attacks” are mentioned. The
former means deceiving a user and convincing her to
establish a link (may include impersonating one of her
friends by the attacker), the latter means creating several
fake identities and pretending to have several personalities
in a SNS. In [42] a breach is detected in linkedIn, and using
the presented method the contacts of a victim are extracted.
Increasing the credibility of phishers’ messages using the
credibility of people who are connected with the victim is
noted as a motivation for this kind of attacks. Some more
complicated attacks are also cited in this paper. In [47] a
type of attack called “automated identity theft” along with
its two subtypes called “profile cloning” and “cross-site
profile cloning” is presented. In these attacks the attacker
tries to make fake profiles which appear to belong to
persons who really exist and have profiles either in the
target SNS or other SNSs. In this study a prototype of an
attack system for performing attacks is presented which
performs crawling, users’ information gathering, profile
creation, message sending, and tries to break CAPTCHAs.
Some experiments have been done on five social networks
including facebook and linkedin.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org370III. CONCLUSIONS
Emergence of
increasing
social networks and
participation of people in activities in these sites along with
the huge amount of various information like interactions,
reviews, interests and different kinds of published contents
that are logged by users have attracted researchers and other
parties to have access to this information or to the results of
analyzing it. This information has never been available with
such a huge volume, detail, and ease and speed of access
before. A few number of those who are interested in having
this information or the results of analyzing it alongside their
motivations are: commercial companies for advertising and
promoting their products, sociologists for analyzing the
behavior and features of different societies, intelligence
organizations
for preventing and detecting criminal
activities, educational and cultural activists for promoting
their goals, and employers for acquiring information about
job seekers. In this paper along with introducing some of the
studies in this area, a categorization of research subareas
was presented and a base has been provided for researchers
to briefly get acquainted with some new, attractive and
useful research areas. A categorization of reviewed research
subtopics is illustrated in Fig.1.
People always have some private information that do
not want to be exposed to public access, and if accessed by
some adversaries, may have some (sometimes catastrophic)
consequences. So in this survey we focused on the issue of
protecting users’ privacy and presented a categorization of
different aspects of
this area. This categorization
is
illustrated in Fig.2.
[2]
REFERENCES
[1] Naohiro Matsumura, David E. Goldberg, and Xavier Llor\&\#224;.
2005. Mining directed social network from message board. In Special
interest tracks and posters of the 14th international conference on
World Wide Web (WWW '05). ACM, New York, NY, USA, 1092-
1093.
Jie Tang, Jing Zhang, Limin Yao, and Juanzi Li. 2008. Extraction
and mining of an academic social network. In Proceeding of the 17th
international conference on World Wide Web (WWW '08). ACM,
New York, NY, USA, 1193-1194.
[3] Damon Horowitz and Sepandar D. Kamvar. 2010. The anatomy of a
large-scale social search engine. In Proceedings of
the 19th
international conference on World wide web (WWW '10). ACM,
New York, NY, USA, 431-440.
[4] Theodoros Lappas, Kun Liu, and Evimaria Terzi. 2009. Finding a
team of experts in social networks. In Proceedings of the 15th ACM
SIGKDD international conference on Knowledge discovery and data
mining (KDD '09). ACM, New York, NY, USA, 467-476.
[5] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. 2010.
What is Twitter, a social network or a news media?. In Proceedings
of the 19th international conference on World wide web (WWW '10).
ACM, New York, NY, USA, 591-600.
[6] Amit Goyal, Francesco Bonchi, and Laks V.S. Lakshmanan. 2008.
Discovering leaders from community actionsf. In Proceeding of the
17th ACM conference on Information and knowledge management
(CIKM '08). ACM, New York, NY, USA, 499-508.
[7] Alice Leung, Roven Lin, and Jesse Ng, Philip Szeto. 2009.
Implementation of a Focused Social Networking Crawler.
doi=http://courses.ece.ubc.ca/412/term_project/reports/2009/focused_
social_net_crawler.pdf
[8] Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010.
Earthquake shakes Twitter users: real-time event detection by social
sensors. In Proceedings of the 19th international conference on
World wide web (WWW '10). ACM, New York, NY, USA, 851-860.
[9] Zhenhui Li, Ding Zhou, Yun-Fang Juan, and Jiawei Han. 2010.
Keyword extraction for social snippets. In Proceedings of the 19th
international conference on World wide web (WWW '10). ACM,
New York, NY, USA, 1143-1144.
[10] Duen Horng Chau, Shashank Pandit, Samuel Wang, and Christos
Faloutsos. 2007. Parallel crawling for online social networks.
In Proceedings of the 16th international conference on World Wide
Web (WWW '07). ACM, New York, NY, USA, 1283-1284.
[11] Nicole Immorlica and Vahab S. Mirrokni. 2010. Optimal marketing
and pricing over social networks. In Proceedings of the 19th
international conference on World wide web (WWW '10). ACM,
New York, NY, USA, 1349-1350.
[12] Anna Wu, Joan M. DiMicco, and David R. Millen. 2010. Detecting
professional versus personal closeness using an enterprise social
network site. In Proceedings of the 28th international conference on
Human factors in computing systems (CHI '10). ACM, New York,
NY, USA, 1955-1964.
[13] Rongjing Xiang, Jennifer Neville, and Monica Rogati. 2010.
Modeling
relationship
strength
in online
social networks.
In Proceedings of the 19th international conference on World wide
web (WWW '10). ACM, New York, NY, USA, 981-990.
[14] Katarzyna Musia\&\#322;, Przemys\&\#322;aw Kazienko, and Piotr
Br\&\#243;dka. 2009. User position measures in social networks.
In Proceedings of the 3rd Workshop on Social Network Mining and
Analysis (SNA-KDD '09). ACM, New York, NY, USA, , Article 6 , 9
pages.
[15] Keith Byron Frikken and Preethi Srinivas. 2009. Key allocation
schemes for private social networks. In Proceedings of the 8th ACM
workshop on Privacy in the electronic society (WPES '09). ACM,
New York, NY, USA, 11-20.
[16] Florian Kerschbaum and Andreas Schaad. 2008. Privacy-preserving
social network analysis for criminal investigations. In Proceedings of
the 7th ACM workshop on Privacy in the electronic society (WPES
'08). ACM, New York, NY, USA, 9-14.
[17] Bin Zhou, Jian Pei, and WoShun Luk. 2008. A brief survey on
anonymization techniques for privacy preserving publishing of social
network data. SIGKDD Explor. Newsl. 10, 2 (December 2008), 12-
22.
[18] Lars Backstrom, Eric Sun, and Cameron Marlow. 2010. Find me if
you can: improving geographical prediction with social and spatial
proximity. In Proceedings of the 19th international conference on
World wide web (WWW '10). ACM, New York, NY, USA, 61-70.
[19] Jonathan Haynes and Igor Perisic. 2009. Mapping search relevance to
social networks. In Proceedings of the 3rd Workshop on Social
Network Mining and Analysis (SNA-KDD '09). ACM, New York,
NY, USA, , Article 2 , 7 pages.
[20] Yong-Suk Kwon, Sang-Wook Kim, Sunju Park, Seung-Hwan Lim,
and Jae Bum Lee. 2009. The information diffusion model in the blog
world. In Proceedings of the 3rd Workshop on Social Network
Mining and Analysis (SNA-KDD '09). ACM, New York, NY, USA, ,
Article 4 , 9 pages.
[21] Seung-Hwan Lim, Sang-Wook Kim, Sunju Park, and Joon Ho Lee.
2009. Determining content power users
in a blog network.
In Proceedings of the 3rd Workshop on Social Network Mining and
Analysis (SNA-KDD '09). ACM, New York, NY, USA, , Article 5 , 8
pages.
[22] Danny Hughes, Paul Rayson, James Walkerdine, Kevin Lee, Phil
Greenwood, Awais Rashid, Corinne May-Chahal, and Margaret
Brennan. 2008. Supporting Law Enforcement in Digital Communities
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org371through Natural Language Analysis. In Proceedings of the 2nd
international workshop on Computational Forensics (IWCF '08),
Sargur N. Srihari and Katrin Franke (Eds.). Springer-Verlag, Berlin,
Heidelberg, 122-134.
[23] Irwin King, Michael R. Lyu, and Hao Ma. 2010. Introduction to
social recommendation. In Proceedings of the 19th international
conference on World wide web (WWW '10). ACM, New York, NY,
USA, 1355-1356.
[24] Lei Guo, Enhua Tan, Songqing Chen, Xiaodong Zhang, and Yihong
(Eric) Zhao. 2009. Analyzing patterns of user content generation in
online social networks. In Proceedings of the 15th ACM SIGKDD
international conference on Knowledge discovery and data mining
(KDD '09). ACM, New York, NY, USA, 369-378.
[25] Nan Du, Bin Wu, Xin Pei, Bai Wang, and Liutong Xu. 2007.
Community detection in large-scale social networks. In Proceedings
of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web
mining and social network analysis (WebKDD/SNA-KDD '07).
ACM, New York, NY, USA, 16-25.
[26] Jerry Scripps, Pang-Ning Tan, and Abdol-Hossein Esfahanian. 2007.
Node roles and community structure in networks. In Proceedings of
the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining
and social network analysis (WebKDD/SNA-KDD '07). ACM, New
York, NY, USA, 26-35.
[27] Zeinab Abbassi and Vahab S. Mirrokni. 2007. A recommender
system based on
local random walks and spectral methods.
In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007
workshop on Web mining and
social network analysis
(WebKDD/SNA-KDD '07). ACM, New York, NY, USA, 102-108.
[28] Tomasz Tylenda, Ralitsa Angelova, and Srikanta Bedathur. 2009.
Towards time-aware link prediction in evolving social networks.
In Proceedings of the 3rd Workshop on Social Network Mining and
Analysis (SNA-KDD '09). ACM, New York, NY, USA, , Article 9 ,
10 pages.
[29] Li Ding, Dana Steil, Matthew Hudnall, Brandon Dixon, Randy Smith,
David Brown, and Allen Parrish. 2009. PerpSearch: an integrated
crime detection system. In Proceedings of
the 2009 IEEE
international conference on Intelligence and security informatics
(ISI'09). IEEE Press, Piscataway, NJ, USA, 161-163.
[30] Flavio Chierichetti, Ravi Kumar, Silvio Lattanzi, Michael
Mitzenmacher, Alessandro Panconesi, and Prabhakar Raghavan.
2009. On compressing social networks. In Proceedings of the 15th
ACM SIGKDD international conference on Knowledge discovery and
data mining (KDD '09). ACM, New York, NY, USA, 219-228.
[31] Mitra, P. & Baid, K., 2009. Targeted advertising for online social
networks. 2009 First International Conference on Networked Digital
Technologies, p.366-372.
[32] Christopher C. Yang and Tobun D. Ng. 2009. Web opinions analysis
with scalable distance-based clustering. In Proceedings of the 2009
IEEE
international conference on
Intelligence and security
informatics (ISI'09). IEEE Press, Piscataway, NJ, USA, 65-70.
[33] Nan Du, Bin Wu, and Bai Wang. 2007. Backbone Discovery in
In Proceedings of
the
IEEE/WIC/ACM
Social Networks.
International Conference on Web Intelligence (WI '07). IEEE
Computer Society, Washington, DC, USA, 100-103.
[34] Heath Hohwald, Manuel Cebrian, Arturo Canales, Rub\&\#233;n
Lara, and Nuria Oliver. 2009. Inferring Unobservable Inter-
community Links in Large Social Networks. In Proceedings of the
2009 International Conference on Computational Science and
Engineering - Volume 04 (CSE '09), Vol. 4. IEEE Computer Society,
Washington, DC, USA, 375-380.
[35] Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient influence
maximization in social networks. In Proceedings of the 15th ACM
SIGKDD international conference on Knowledge discovery and data
mining (KDD '09). ACM, New York, NY, USA, 199-208.
[36] Yue Lu, Panayiotis Tsaparas, Alexandros Ntoulas, and Livia Polanyi.
2010. Exploiting social context for review quality prediction.
In Proceedings of the 19th international conference on World wide
web (WWW '10). ACM, New York, NY, USA, 691-700.
[37] Liang Gou, Hung-Hsuan Chen, Jung-Hyun Kim, Xiaolong (Luke)
Zhang, and C. Lee Giles. 2010. SNDocRank: document ranking
based on social networks. In Proceedings of the 19th international
conference on World wide web (WWW '10). ACM, New York, NY,
USA, 1103-1104.
[38] C. Lee Giles, Yang Sun, and Isaac G. Councill. 2010. Measuring the
web crawler ethics. In Proceedings of the 19th international
conference on World wide web (WWW '10). ACM, New York, NY,
USA, 1101-1102.
[39] Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda.
2009. All your contacts are belong to us: automated identity theft
attacks on social networks. In Proceedings of the 18th international
conference on World wide web (WWW '09). ACM, New York, NY,
USA, 551-560.
[40] Eran Toch, Norman M. Sadeh, and Jason Hong. 2010. Generating
default privacy policies for online social networks. In Proceedings of
the 28th of the international conference extended abstracts on Human
factors in computing systems (CHI EA '10). ACM, New York, NY,
USA, 4243-4248.
[41] Jonathan Anderson, Claudia Diaz, Joseph Bonneau, and Frank
Stajano. 2009. Privacy-enabling social networking over untrusted
networks. In Proceedings of the 2nd ACM workshop on Online social
networks (WOSN '09). ACM, New York, NY, USA, 1-6.
[42] Jessica Staddon. 2009. Finding "hidden" connections on linkedIn an
argument for more pragmatic social network privacy. In Proceedings
of the 2nd ACM workshop on Security and artificial intelligence
(AISec '09). ACM, New York, NY, USA, 11-14.
[43] Smriti Bhagat, Graham Cormode, Balachander Krishnamurthy, and
Divesh Srivastava. 2010. Privacy in dynamic social networks.
In Proceedings of the 19th international conference on World wide
web (WWW '10). ACM, New York, NY, USA, 1059-1060.
[44] Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social
networking sites. In Proceedings of the 19th international conference
on World wide web (WWW '10). ACM, New York, NY, USA, 351-
360.
[45] Arvind Narayanan and Vitaly Shmatikov. 2009. De-anonymizing
Social Networks. In Proceedings of the 2009 30th IEEE Symposium
on Security and Privacy (SP
'09). IEEE Computer Society,
Washington, DC, USA,
173-187. DOI=10.1109/SP.2009.22
http://dx.doi.org/10.1109/SP.2009.22
[46] Alyson L. Young and Anabel Quan-Haase. 2009. Information
revelation and internet privacy concerns on social network sites: a
case study of facebook. In Proceedings of the fourth international
conference on Communities and technologies (C\&\#38;T '09). ACM,
New York, NY, USA, 265-274.
[47] Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007.
Wherefore art thou r3579x?: anonymized social networks, hidden
patterns, and structural steganography. In Proceedings of the 16th
international conference on World Wide Web (WWW '07). ACM,
New York, NY, USA, 181-190.
[48] Slava Kisilevich and Florian Mansmann. 2010. Analysis of privacy in
online social networks of runet. In Proceedings of the 3rd
international conference on Security of information and networks
(SIN '10). ACM, New York, NY, USA, 46-55.
[49] Leanne Wu, Maryam Majedi, Kambiz Ghazinour, and Ken Barker.
2010. Analysis of social networking privacy policies. In Proceedings
of the 2010 EDBT/ICDT Workshops (EDBT '10). ACM, New York,
NY, USA, , Article 32 , 5 pages.
[50] Balachander Krishnamurthy and Craig E. Wills. 2008. Characterizing
privacy in online social networks. In Proceedings of the first
workshop on Online social networks (WOSN '08). ACM, New York,
NY, USA, 37-42.
[51] Anna Cinzia Squicciarini, Mohamed Shehab, and Federica Paci.
2009. Collective privacy management
in
social networks.
In Proceedings of the 18th international conference on World wide
web (WWW '09). ACM, New York, NY, USA, 521-530.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org372[52] Xiaowei Ying, Kai Pan, Xintao Wu, and Ling Guo. 2009.
Comparisons of randomization and K-degree anonymization schemes
for privacy preserving social network publishing. In Proceedings of
the 3rd Workshop on Social Network Mining and Analysis (SNA-
KDD '09). ACM, New York, NY, USA, , Article 10 , 10 pages.
[53] Tiancheng Li and Ninghui Li. 2009. On the tradeoff between privacy
and utility in data publishing. In Proceedings of the 15th ACM
SIGKDD international conference on Knowledge discovery and data
mining (KDD '09). ACM, New York, NY, USA, 517-526.
[54] Esma Aimeur, Sebastien Gambs, and Ai Ho. 2009. UPP: User
Privacy Policy for Social Networking Sites. In Proceedings of the
2009 Fourth International Conference on Internet and Web
Applications and Services (ICIW '09). IEEE Computer Society,
Washington, DC, USA, 267-272.
[55] Esma Aimeur, Sebastien Gambs, Ai Ho, "Towards a Privacy-
Enhanced Social Networking Site," Availability, Reliability and
Security,
International Conference on, pp. 172-179, 2010
International Conference on Availability, Reliability and Security,
2010
[56] Safebook A Privacy-Preserving Online Social Network Leveraging
on Real-Life Trust
[57] Kun Liu and Evimaria Terzi. 2009. A Framework for Computing the
Privacy Scores of Users in Online Social Networks. In Proceedings of
the 2009 Ninth IEEE International Conference on Data Mining
(ICDM '09). IEEE Computer Society, Washington, DC, USA, 288-
297.
[58] Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, and Yuguang Fang. 2010.
Privacy and security for online social networks: challenges and
opportunities. Netwrk. Mag. of Global Internetwkg. 24, 4 (July 2010),
13-18.
[59] B. K. Tripathy and G. K. Panda. 2010. A New Approach to Manage
Security against Neighborhood Attacks
in Social Networks.
In Proceedings of the 2010 International Conference on Advances in
Social Networks Analysis and Mining (ASONAM
'10). IEEE
Computer Society, Washington, DC, USA, 264-269.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org373 |
1911.12558 | 1 | 1911 | 2019-11-28T07:07:33 | Addressing Time Bias in Bipartite Graph Ranking for Important Node Identification | [
"cs.SI",
"cs.LG"
] | The goal of the ranking problem in networks is to rank nodes from best to worst, according to a chosen criterion. In this work, we focus on ranking the nodes according to their quality. The problem of ranking the nodes in bipartite networks is valuable for many real-world applications. For instance, high-quality products can be promoted on an online shop or highly reputed restaurants attract more people on venues review platforms. However, many classical ranking algorithms share a common drawback: they tend to rank older movies higher than newer movies, though some newer movies may have a high quality. This time bias originates from the fact that older nodes in a network tend to have more connections than newer ones. In the study, we develop a ranking method using a rebalance approach to diminish the time bias of the rankings in bipartite graphs. | cs.SI | cs | Addressing Time Bias in Bipartite Graph Ranking for Important Node
Identification
Hao Liao1, Jiao Wu1, Mingyang Zhou1, Alexandre Vidmer1
1 College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, China
9
1
0
2
v
o
N
8
2
]
I
S
.
s
c
[
1
v
8
5
5
2
1
.
1
1
9
1
:
v
i
X
r
a
Abstract
The goal of the ranking problem in networks is to rank nodes
from best to worst, according to a chosen criterion. In this
work, we focus on ranking the nodes according to their qual-
ity. The problem of ranking the nodes in bipartite networks
is valuable for many real-world applications. For instance,
high quality products can be promoted on an online shop or
highly reputed restaurants attract more people on venues re-
views platforms. However, many classical ranking algorithms
share a common drawback: they tend to rank older movies
higher than newer movies, though some newer movies may
have a high quality. This time bias originates from the fact
that older nodes in a network tend to have more connections
than newer ones. In the study, we develop a ranking method
using a rebalance approach to diminish the time bias of the
rankings in bipartite graphs.
As a result, it is indicated that the rankings produced after ap-
plying the rebalancing of the scores not only reduce time bias,
but also reflect the quality of the benchmark items more ac-
curately. The ranking performance improvements range from
20% to 80%, the experiments were conducted on three real
datasets with ground truth benchmark.
Introduction
In online social networks, we constantly need to select con-
tent, for instance which content to read, which videos to
watch, or which people to follow (Zheng et al. 2018) (Pinto,
Almeida, and Gonc¸alves 2013). However, our time is lim-
ited, and the amount of content available is so huge that we
have no time to go through all of them (Chen et al. 2017b).
Then, we rely on rankings by algorithm or people to guide
us to this huge volume of data (He et al. 2018). The re-
sults of these rankings influence our decision on which prod-
ucts to buy, which Web pages to visit, whom to choose as
a friend, and so on (Wang et al. 2018) (Szabo and Huber-
man 2008) (Chen et al. 2017a). It is then pretty clear that the
rankings are very important in our daily life.
Producing the ranking is the first step, but then it is needed
to evaluate the quality of the produced ranking. It is usually
a difficult task due to the lack of real ground truth data. The
traditional assessment of information quality is based on the
discernment of a few selected experts. For instance, Oscars
are awarded to movies by a comity of people working in
the movie industry. The awarded movies can then be used
to form a list constituting a kind of ground truth for our
evaluation. Still, a question remains: are algorithms able to
compute the intrinsic quality of movies?
In this work, the network/graph representation is used.
A network is composed of nodes and links, which represent
objects and their interactions. A link connects two nodes if
they have an interaction. For instance, in the citation net-
work, nodes are scientific papers and links are citations. Bi-
partite graph is a special case in which two types of nodes
are present, and the link can only present the interaction be-
tween two different types of nodes. For instance, in Netflix,
one type of node is the user and the other one is a movie.
For simplicity, we refer to one type of node as user and
the other one as item in the rest of the paper. The network
framework provides a great tool to represent the relation-
ship between users and items. With online data, it is easy
to form a bipartite graph that represents the interaction be-
tween nodes (Cao, Guo, and Cheng 2011). An important
goal in the bipartite graph ranking is to find the high quality
nodes based on a specific definition of what is quality (Cai
et al. 2017). The quality can for instance reflects the like-
liness of an item to be popular in the future (Feng et al.
2017). It can also be used to perform link prediction and
recommendation for the users (Liao et al. 2018). Neural net-
works have recently successfully been applied to the recom-
mendation problem in bipartite network (Lian et al. 2018;
Wang et al. 2018).
The most famous ranking algorithms mainly deal with
unipartite graphs. Those algorithms including: PageR-
ank (Page et al. 1999), HITS (Kleinberg 1999a), and their
variants. The bias towards old nodes in networks has been
studied for PageRank in the scientific citation network (Mar-
iani, Medo, and Zhang 2016). Similarly in the movie net-
work, there is a bias toward older items with the classical
ranking algorithm. This is not in the interest of the users to
have a ranking composed mainly by old movies.
In this paper, we propose a solution to the time-bias prob-
lem of ranking nodes in bipartite networks. We use the struc-
tural property of the network and the features of the nodes,
including rating, degree, and time of appearance in the net-
work. The main highlights of this paper are the followings:
• We develop a new method to balance the ranking results
in bipartite networks according to their age, and show the
impact of this balance process on the ranking.
• We compare our method with state-of-art ranking meth-
ods, and present a complementary evaluation with the ex-
ternal ground truth. These experiments enable future ap-
plications to adapt to this important balancing procedure.
• We compare eight algorithms on three widely-used
datasets, illustrating how our method enhances the identi-
fication rate of high quality vertices, and also enhance the
balance of the ranking results.
• We study the influence of the parameters on the perfor-
mance, proving our method does not depend on the fine-
tuning of parameters.
The remaining paper is organized as follows. We first intro-
duce related works, graph-based ranking methods, and bi-
partite graph-based ranking methods in Related Work. We
describe the network approach and the general problem in
Problem Statement. Then we describe our approach in Pro-
posed Framework, and in Experimental Setting we describe
the datasets, the metrics, and the other algorithms used in
this work. The results of our method and the comparison
with other methods is shown in Results and Discussion. Fi-
nally, we summarize and discuss our main results in Conclu-
sion and Perspective.
Related Work
Ranking items or people is a widespread practice. The
method developed in this work aims to rank the objects in
graphs. In this section, we will then review the preceding
works which also used the graph approach to rank objects.
One of the most famous ranking algorithms is PageR-
ank (Page et al. 1999), which ranks Web pages according to
their importance in the network. This algorithm was used to
provide search results by Google's search engine. This ex-
ample illustrates the importance of the ranking algorithms
in online networks, as it became one of the most impor-
tant companies in the world. The simplicity of this algo-
rithm allowed it to be modified and used for various sit-
uations and ranking goals. For instance, Reverse PageR-
ank (Fogaras 2003) gives a high score to Web pages that
are highly connected in the network. These Web pages are
critical in the network and their removal would highly af-
fect the network's connectivity. Topic sensitive PageRank
improved the original PageRank algorithm by adding con-
text into the algorithm query (Haveliwala 2002). Hub, au-
thority and relevance scores algorithm (HAR) (Li, Ng, and
Ye 2012), extended the concept of PageRank to graph with
multi-relational data.
Another famous algorithm was created in the same pe-
riod: the HITS algorithm (Kleinberg 1999a), which also
aimed to rank Web pages according to their importance in
the network. Both the methods are iterative and are based
on the fact that important Web pages have links point-
ing to other important Web pages. The main difference is
that HITS algorithm consists of two scores: one author-
ity score, and one hub score. The fact that this algorithm
uses two different scores makes it a good candidate to
be used in bipartite graphs (Deng, Lyu, and King 2009;
He et al. 2017).
In this work, we are interested in the ranking of nodes
in bipartite graphs. As said above, the HITS algorithm was
extended to the bipartite graphs. The first extension is co-
HITS (Deng, Lyu, and King 2009). The considered bipartite
graph was the graph composed of queries and Web pages.
A user submits a query to the engine, and the co-HITS al-
gorithm shows the results according to their computed rele-
vance. More recently, the BiRank algorithm (He et al. 2017)
was developed to be used on any type of bipartite networks,
for instance, queries and Web pages, or users and items. This
algorithm is iterative as PageRank and HITS, but the normal-
ization is performed differently.
Problem Statement
We use the network approach to define our problem. A
graph/network G(V, E) is a set of vertices/nodes V con-
nected by edges/links E. The nodes v ∈ V are the objects
of the networks. It can for instance represent people, scien-
tific publications, or music albums. The edges e ∈ E are
the connection between the nodes. Their meanings depend
on the context: for instance, if the nodes are people, an edge
could indicate a friendship relation.
Figure 1: Illustration of the time bias obtained with the BiHits rank-
ing algorithm on Amazon dataset (see Section Proposed Frame-
work). On the left the five albums with the highest score, and on
the right the average ranking position on the y-axis as a function of
the release year on the x-axis.
In our problem, the graphs are said to be bipartite. A
graph is bipartite if it can be divided into two sets of nodes
such that each node is only connected to nodes in the other
sets. In this work, one set of nodes are users, and the oth-
ers are items (movies or music albums in this work). A link
connects a user and an item if the user has rated the item.
In the mathematical formulas and illustrations, we use Latin
letters subscripts for users, and Greek letters subscripts for
items. Our rebalance method is motivated by the time ba-
sis present in classical ranking algorithms (as shown in Fig-
ure 1). This bias is due to the fact that in many networks,
popular nodes tend to get more attention than less popu-
lar nodes, thus favoring older nodes over newer ones (Price
1976). When there is such a strong bias in the ranking pro-
cess of an algorithm, it is obvious that it cannot be reliable at
estimating the intrinsic quality of nodes. It is then necessary
to address this problem by balancing the scores attributed
to nodes For a ranking list to be useful to users, it should
not only display well-known items; the more recent items
should also have the opportunity to make it to the top of the
BiHITS ranking'sTOP-5Abbey road (1969)Revolver (1966)We Are the World (1985) Nevermind (1991)The Dark Side of the Moon (1973)19602010list. In order for users to really benefit from the ranking list,
we not only need to find good classical well-known projects,
but also let excellent works of different periods of time have
the opportunity to present to users. The ranking algorithms
considered here only rely on the structure of the network,
without the use of metadata or external additional data: given
a bipartite network G(V, E), a ranking algorithm produces
a score list R, where each Rα in the list represents the qual-
ity of the item obtained with the algorithm. The quality of
the score list is assessed by comparing it with the opinion of
experts: a good score list should assign a higher score to the
items that have been praised by the experts. The problem we
address in this work is the time-base of rankings: usual rank-
ing algorithms give a higher score to older nodes compared
to newer ones. Then, the top of the rankings obtained using
such algorithms are occupied by old items 1.
Proposed Framework
We provide a method that assigns high scores with the same
frequency to old and new nodes. For online shops, new prod-
ucts are easier to be discovered and bought by customers. In
the art world, it makes more recent works more likely to be
noticed and appreciated.
Time biased ranking algorithm
We design our framework so that any ranking algorithm can
be used as a baseline method to obtain the scores. Several
algorithms were tested in this work, and BiRank stood out
as the method of choice (He et al. 2017). The baseline per-
formance of this algorithm were among the best, and its con-
ception allows it to be easily extended with additional data
such as query, or prior knowledge on users/items. The equa-
tions read:
(cid:88)
(cid:88)
α
i
Ri =
Fα =
wiα√
√
di
dα
wiα√
√
dα
di
Fα
Ri,
(1)
(2)
where Ri and Fα are the score for user i and item α, respec-
tively, di and dα their degree, and Fwiα denote the weight
between user i and item α. In this work, we use two different
kinds of weights, the ratings and the time decaying weights
wij = δa(t−tij ), where δ is the time decay parameter, tiα
is the time at which user i reviewed item α, t is the current
time, and a is a parameter to control the decay. In this works,
we set the value of δ to 0.85, a to 1/1year. The fine tuning
of the decay parameters does not affect the results signifi-
cantly. We label them BiRankr and BiRankt, respectively.
The algorithm is iterative, the users and items scores are ini-
tialized from uniform random distribution between 0 and 1.
The iterations stop when the difference between two consec-
utive steps is smaller than a threshold: (cid:107)Ri − Ri−1(cid:107) < th
and (cid:107)Fi − Fi−1(cid:107) < th.
BiRank method uses the bipartite graph's structure and
the user and item's previous information, distributes score
to nodes iteratively, and finally converges to a stable and
unique ranking result. BiRank smooths the edges' weight by
the degree of two linked nodes while using symmetric nor-
malization is one of the key characteristics of the method.
However, the scores obtained with this method are time bi-
ased.
Standardization of the scores
The crucial step in our method is the use of
this
standardization to rescale scores. There are different
ways to rescale scores. For instance, one could rescale
α = (Fα −
the scores with min-max scaling F (cid:48)
minβ(Fβ)/(maxβ(Fβ) minβ(Fβ)). However, this type of
normalization is sensitive to outliers, as minimum and max-
imum are only determined by one small or large value in the
sample. However, in our problem the items are reviewed in
different time periods, and the context is different for each
time period. The user's reviews will be time dependant. Ob-
viously: users in 2000 and in 2015 have different opinions
and criteria. As we are interested in the comparison between
different sample, we need a method which make samples
comparable. The z-score is suitable for this, as it allows for
a greater comparability of the data: each standardized set has
a mean of zero and a standard deviation of one. Even if the
mean and the standard deviation of scores vary over time,
this process allows a fair comparison between all items. The
z-score is defined as:
z = (x − µ)/σ
(3)
where µ denotes the average value of the population, and
σ denotes the standard deviation of the population. When
the z-value is negative, it means that x is below the average
value; when it is positive, it means that x is above the aver-
age value. Moreover, the value of z is equal to the number
of standard deviation between the value of x and the mean.
In our case, the scores obtained by the ranking algorithms
are standardized over time, similarly to (Mariani, Medo, and
Zhang 2016). The process is the following. We first compute
all items' scores F with a ranking algorithm. This base score
can be computed from any ranking algorithm. Then, we sort
all items according to the time at which they enter the net-
work. In order to compute the score of item α, we select
p close items according to the time at which the item was
published/released. The rebalance score of item α is then:
F (cid:48)
α(pα) =
Fα − u(pα)
σ(pα)
,
(4)
where u(p) is the average score in p items, σ(p) the standard
deviation and pα the close set in which item α belongs to.
The rebalance process removes the rewards or penalties
on items' scores due to the time of period at which they ap-
pear. It is important to note that the selection of the items
appearing at the same time period is defined with a num-
ber of items. Several different approaches on how to group
items were tested. For instance, grouping the items that enter
in the network on the same day, week or month did not lead
to satisfactory results. Finally we decided to group the items
with the closest ∆p items in time. For item i, its group is
composed by the ∆p
2 items
that are newer. In the case there is less than ∆p
2 items older
than i, we choose the ∆p oldest items, and similarly for new
items. The method is illustrated in Figure 2.
2 items that are older, and the ∆p
Figure 2: Diagram of the method. The inputs of the method are the ratings of the items by the users, and the output is a list of score for each
item in the network.
Experimental Setting
In this section, we test the balance framework coupled with
five algorithms. Three real datasets are used: Amazon Mu-
sic, MovieLens, and Netflix. Their basic statistics are illus-
trated in Table 1. Then we show the performance of the bal-
ance framework with different metrics to prove its ability to
identify important nodes and to time balance the scores.
Datasets
Table 1: Datasets Basic Statistics, with ki the average degree of
users and kα the average degree of items.
Name
Amazon Music
MovieLens
Netflix
#Users #Items < ki > < kα >
Sparsity
11.61 5.05 × 10−4
22959 62828
4344.26 3.14 × 10−2
2101
5892 147.26 11963.67 2.50 × 10−2
138395
478692
31.77
65.95
Amazon Music Amazon is the biggest online shopping
platform in America. The Amazon Music data used in
this work were gathered by Stanford University's SNAP
group1 (Leskovec, Adamic, and Huberman 2007). We firstly
clean the data: delete those unused content from metadata,
and extract user ID, product ID, and the timestamps of the
ratings. The ratings range from 1 to 5. Some albums come in
different versions. In order to solve the problems that could
arise from these duplicate items, we combine the reviews of
users on these items. Finally, to ensure the validity of the
data, we only select the users with at least 10 reviews as
1http://snap.stanford.edu/
valid users and products that received at least 10 reviews as
valid products.
MovieLens The MovieLens dataset was collected from
a well-known movie recommendation website, which was
founded by the GroupLens research team of the School of
Computer Science and Engineering at the University of Min-
nesota2 (Harper and Konstan 2016). We only choose the
users that have reviewed at least 20 movies as valid users,
and choose those movies that received more than 20 reviews
as valid items. User's ratings for movies range from 1 to 5.
The dataset does not provide the release date for movies. In
order to obtain it, we mapped metadata with the MovieLens
dataset.
Netflix The company Netflix released data about its users'
records and organized a data science competition, whose
goal was to predict the users' ratings of movies 3. Since then,
the Netflix dataset has been used for various purposes, such
as recommendation, or ranking of movies in our case. The
original data contains around 18'000 movies and 500'000
users. Note that for Netflix the release year of movies is
available, but not the release date, which is essential in our
study. After the mapping process for the release dates, we
are left with 5'892 movies.
Ground truths
In general ranking problem, it is difficult
to define whether a product has higher intrinsic quality be-
cause different users will have different views and feelings
about it, the quality of the product depends on many intan-
2https://grouplens.org/datasets/movielens/
3https://netflixprize.com
Rebalanced scoresThresholdreached?noIterative computeRatingsUser iUser ListRatingsItem ListItem 1Item 2Item 3Item 4Item N……--432……Item αyesItem ageAverage scoreInitial scoresSort by time……Item ageAverage scoreUser 1User 2User 3User 4User M……--32Step 1: Bipartite ranking algorithmStep 2: Z-score rebalancingStep 3: Matching with ground truthRebalance processβαγFinal item listGround-truth listmatchingμσ-Item ……SortβαγItem mean (μ), standard deviation(σ)𝒔𝒄𝒐𝒓𝒆=𝒊𝒏𝒊𝒕𝒊𝒂𝒍𝒔𝒄𝒐𝒓𝒆−𝝁𝝈…Initial score listRebalanced score list……………∆p𝟐olderitems∆p𝟐newer itemsgible subjective factors. We can't simply judge a product's
quality according to some good reviews or low ratings. In
this paper, we choose specific products that are widely rec-
ognized to be of high quality to build the ground truth. Both
our ground truth data can be collected on public websites.
Amazon Music For the Amazon Music dataset, we collect
albums that have won the Grammy Music Awards to build
the list of high quality items used for the ground truth. The
Grammy Awards awards music that has achieved outstand-
ing results over the past year. The voting committee is com-
posed of members of the entertainment industry. For the mu-
sic that won this award, we consider that they are widely rec-
ognized.
MovieLens and Netflix For the movie datasets, we choose
the movies that won the Oscar Award to be the ground truth
items. In the movie industry, the Oscar is the most significant
award in the world. A film, which was awarded at the Os-
cars, is a work recognized by the audience around the world
as well as filmmakers and is well qualified as a ground truth.
Additionally to the Oscar awards, we selected the top250
ranking from IMDb. This ranking is produced by IMDb's
own algorithm based on users' reviews, but it is a very fa-
mous top and we use it as an additional ground truth for our
algorithms. The main interest of this top is that, unlike the
Oscar awards, it is not evenly distributed over the years.
Metrics
Imbalance We propose a metric to quantitatively analyze
time balance about the ranking result. According to the
assumption of (Radicchi, Fortunato, and Castellano 2008;
Radicchi and Castellano 2012), with an ideal ranking algo-
rithm, old nodes and new nodes should have equal opportu-
nity to get high ranking. For example, divide all nodes into
S groups G1, G2, G3, ..., GS according to the time that they
enter the network, in which G1 is the earliest group and GS
is the latest group. With a time balanced ranking algorithm,
items in every group have the same probability to rank in the
Top-L position (such as Top-1%), which means the number
of items that rank in Top-L in every group should obey the
hypergeometric distribution (Radicchi and Castellano 2012).
We define m the number of items, the average number of
items that enter Top-L per group is n(0) = mL/S. Then the
standard deviation of the ideal ranking algorithm is:
σ0(L) =
(1 − 1
S
)(1 − L)
m
m − 1
The deviation to the ideal ranking is then defined as
(cid:114) mL
(cid:118)(cid:117)(cid:117)(cid:116) 1
S
S
σ(L) =
(ni − n0)2,
with ni the number of items reaching at the top L rank in
group i. The imbalance is then given as the ratio of the actual
standard deviation over the ideal standard deviation:
Imbalance =
A value close to 0 that corresponds to a time balanced rank-
ing, and the more it differs from 0, the more the ranking is
time biased.
i=1
S(cid:88)
(cid:12)(cid:12)(cid:12)(cid:12) σ
σ0
(cid:12)(cid:12)(cid:12)(cid:12) .
− 1
(5)
(6)
(7)
Additionally to the imbalance metric, we use the follow-
ing standard metrics. Precision and Recall measure the al-
gorithm's accuracy, focusing on the top of the ranking list.
NDCG, the Normalized Discounted Cumulative Gain (Liu
and OZSU 2009) is a popular ranking quality measure.
Compared to Precision and Recall, NDCG account for the
position of the item in the ranking list. AUC (Davis and
Goadrich 2006) is a common statistical significance metric
of information retrieval method, and is used to evaluate the
whole list.
Baselines
In order to prove our balance framework's performance
and universality, we selected three other important bipartite
ranking algorithms. These algorithms are derived from the
HITS algorithm (Kleinberg 1999b). Note that most of these
methods propose initial values for the fitness and reputation
value based on a query or additional information. We re-
strict the methods to the case where there is no additional
information. In this work, we use three more methods as
our baseline, they are BiHITS (Deng, Lyu, and King 2009),
QRep (Lu et al. 2016) and BGRM (Rui et al. 2007).
Results and Discussion
In this section, we compare the results of the algorithms and
evaluate their ranking performance with the four metrics de-
scribed previously. The code and data used in this work are
available online4.
Figure 3: Recall for rating BiRank before and after applying the
rebalance method for (a) Amazon Music (Grammy) and (b) Netflix
(IMDb) datasets.
Evaluation of
important node recognition Table 2
shows the results obtained by each algorithm under three
evaluation metrics, Recall, Precision and AUC for the
ground truth built from awards. It can be seen that for all
datasets, all the Recall and Precision scores are increased of
the rebalance algorithms, better than its corresponding orig-
inal algorithm, while the value of AUC is maintained at a
relatively stable level. The only exception with BRGM algo-
rithm, for which the Recall score is anyway small. Among
4https://github.com/Joey5555/Rebalance-project
199520002005201020150.00.20.40.60.81.019401950196019701980199020000.00.20.40.60.81.0RecallYear BiRankr RB-BiRankrRecallYear BiRankr RB-BiRankr(a) Amazon Music (b) NetflixTable 2: Performance of the algorithms on the Awards for the three datasets. The Groud truth of Amazon Music is Grammy, and for MovieLens
and Netflix are Oscar and IMDb Top 250, respectively. The ranking lists are composed of the top-1% items for each algorithm. Here Rec.
stands for Recall and Pre. stands for Precision.
Method
Amazon Music MovieLens(Oscar) Netflix(Oscar) MovieLens(IMDb) Netflix(IMDb)
Rec. Pre. AUC Rec. Pre. AUC Rec. Pre. AUC Rec. Pre. AUC Rec. Pre. AUC
BiHITS
.326
BiRankr
.72 .932 .318 .333
RB-BiHITS .478 .105 .928 .455 .476
.406 .089 .947 .364 .381
RB-BiRankr .500 .110 .941 .500 .524
.420 .092 .952 .318 .333
.522 .115 .948 .409 .426
.326 .072 .943 .272 .286
RB-QRep
.514 .113 .943 .409 .426
BRGM .007 .002 .678 .091 .095
RB-BRGM .014 .003 .537 .091 .095
RB-BiRankt
BiRankt
QRep
.977
.979
.958
.963
.956
.961
.975
.920
.770
.591
.62 .271 .738 .219 .762
.101 .441 .824 .247 .857
.062 .271 .755 .205 .714
.113 .492 .827 .247 .857
.047 .203 .744 .192 .667
.105 .458 .824 .205 .714
.043 .186 .736 .164 .571
.097 .424 .828 .205 .714
− .581 .014 .048
− .501 .095 .651
−
−
.834
.845
.770
.951
.762
.944
.828
.856
.650
.027
.170 .305 .892
.292 .525 .937
.170 .305 .910
.311 .559 .949
.123 .220 .901
.283 .508 .947
.113 .203 .898
.274 .492 .943
− .703
− .534
−
−
them, the RB-BiRankt algorithm has the best Recall value
and Precision value for Amazon Music. The RB-BiRankr
algorithm performs best on Precision and Recall for Movie-
Lens and Netflix. Figure 3 shows the value of Recall for
rebalance process effectively rebalance the score across the
years, not favoring early or later years.
Figure 5: Influence of the value of the number of groups p on
the imbalance value of the top-1% items on (a) Amazon Music
(Grammy) and (b) Netflix (IMDb) datasets. The Relative imbal-
ance is the value of the imbalance after the rebalance process over
the original imbalance value.
In Figure 3(a), it can be seen that after 2001, all the Re-
call value of RB-Birankr are better than Birankr's, and af-
ter 2010, each year's recall value of Birankr is very small,
even zero, while the RB-Birankr keeps a relatively stable
level. And in Figure 3(b), it is interesting that RB-Birankr
performs both better for older items than its no-rebalance
counterpart while being outperformed for newer items. This
shows that this modification not only deals for the bias to-
wards the older item, but can also benefit to recent ones. The
trends are similar to other algorithms, hence we only show
Birankr and RB-Birankr.
We also evaluate the impact of the length of the results list
L on Recall and NDGC. The results are shown on Figure 4.
For the Amazon Music dataset, we see that the rebalance
method improves the performance of most algorithms, inde-
pendently of the length of the results list. The only exception
to this is the algorithm BiRankt evaluated with the NDCG
metric. Similar observations can be made for the Netflix
dataset for BiRankr. These results show that the rebalance
Figure 4: NDGC and Recall values as a function of the length of
the results list L for (a) Amazon Music (Grammy) and (b) Netflix
(IMDb) datasets. The dashed line represents the performance of the
algorithms before the rebalance process, and the solid lines after the
rebalance process.
Birankr and its rebalance counterpart, RB-Birankr for Ama-
zon Music and Netflix. In order to compute the Recall for
each year, we use the data up to the limit date of the Awards.
For instance, to be nominated for the Oscar of year T , a
movie needs to open at the latest on the 31st of December of
year T − 1. Then, the ground truth list is composed of the
movies awarded at year T . For Amazon Music, the benefit
is clear for the recent years, while a bit outperformed by the
original method in the early years. For Netflix on the other
hand, the improvement of the Recall metric compared to the
original method is in the early years. This shows that this
1020304050024681010203040500.000.040.080.1210203040500246810203040500.000.050.100.150.200.25NDCGL(a) Amazon MusicRecallLNDCGL QRep RB-QRepBiHITS RB-BiHITS BiRankr RB-BiRankrBiRankt RB-BiRanktRecallL(b) Netflix12510205010020050010002000-0.20.00.20.40.60.81.01.212510205010020050010002000-0.20.00.20.40.60.81.01.2Relative Imbalance p RB-BiRanktRelative Imbalance p RB-BiRankr (a) Amazon Music(b) Netflixmethod improves the results for the top of the ranking list,
but also consistently when going further into the list.
Table 4: Top-10 albums in the ranking lists of RB-BiRankr and
BiRank algorithms.
Evaluation of time balance
In order to compare the time
balance of the rankings for the 10 algorithms, we first divide
all the items into 40 groups according to their time. The first
group is composed of the oldest items, and the 40th group
is the newest items. Then, we take the list of 1% top rated
items for each algorithm, and we count how many of these
items belong to each group. Table 3 shows the imbalance
value of all algorithms. The comparison of imbalance be-
fore and after the rebalance process is very clear. The rebal-
ance algorithm can significantly reduce the time imbalance
of every algorithm considered in this work. The RB-BiHITS
algorithm has the best performance, as its imbalance value
is the closest to zero on both Amazon Music and MovieLens
data sets. This means that in the result of RB-BiHITS, each
groups' number distribution of top item is the closest to hy-
pergeometric distribution.
Table 3: The imbalance value of the rankings obtained with algo-
rithms.
Method
BiHITS
RB-BiHITS
BiRankr
RB-BiRankr
BiRankt
RB-BiRankt
QRep
RB-QRep
BRGM
RB-BRGM
Amazon Music MovieLens Netflix
7.06
0.14
5.57
0.10
5.10
0.18
5.24
0.15
2.21
1.45
0.02
0.04
0.01
0.11
0.04
0.06
0.26
0.10
0.01
0.06
0.30
0.03
0.44
0.03
0.60
0.03
0.48
0.18
0.09
0.30
The influence of p on imbalance
In order to study the in-
fluence of the number of group p on imbalance value, we
compute the value of the imbalance for different values of
p, ranging from 1 to 2000. We show the results in Figure 5
for the rebalanced BiRank algorithms. The y-axis on the fig-
ure represents the relative imbalance: the imbalance before
over the imbalance after applying the rebalance method. It
can be seen that on Figure 5(a) that for Amazon Music, the
imbalance stabilizes and remain small after p = 10. For Net-
flix in Figure 5(b), the algorithm is able to keep a low relative
imbalance after 20. This result is important as it shows that
the value of imbalance stays quite small at p, and so does not
need to be finely tuned.
Case study In Table 4, we illustrate the effect of the re-
balance process on the top of the list. To this end, we run
the algorithm on the amazon dataset, and we list the top-10
albums ranked by the original and the rebalanced version
of BiRankr. The effect of the rebalance is clear: there are
more recent albums than with the original algorithm. More-
over, the diversity is higher with the rebalanced version, as
the original algorithm has only five different musicians in
the top-10 list, while the rebalanced list has eight different
musicians.
Musician Album Name
The Dark Side
of the Moon
The Beatles
Abbey Road
Sgt. Pepper's
Lonely Hearts
Club Band
1
Master of
Puppets
BiRankr
Musician
Pink Floyd(1973)
The Beatles(1968)
The Beatles(1969)
The Beatles(1967)
The Beatles(2000)
Metallica(1986)
RB-BiRankr
Album Name
Death Magnetic Metallica(2008)
1
Lateralus
Fallen
The Beatles(2000)
Tool(2001)
Evanescence(2003)
Kid A
Radiohead(2000)
Confessions on
a Dance Floor Madonna(2005)
Come Away
with Me
The
Emancipation
of Mimi
St. Anger
Music
Metallica(2003)
Madonna(2000)
Norah Jones(2002) OK Computer Radiohead(1997)
Mariah Carey(2005) Nevermind
Nirvana(1991)
Revolver
Wish You
Were Here
The Beatles(1966)
Pink Floyd(1975)
Conclusion and Perspective
Due to the huge amount of content available online, it is dif-
ficult for an individual to find high quality content. The on-
line companies might favor the popular contents for adver-
tisement purpose, despite the quality of the content. Then,
people may spend a tremendous amount of time searching
for the contents of good quality. This is where ranking al-
gorithms such as the one developed in this work can prove
useful.
In this work, we proposed a novel and general balance
framework to balance the ranking results without losing the
accuracy but obtain rankings that include items from all time
periods. We showed that this method can be easily applied
to all ranking algorithms, and that it constantly improved the
accuracy of the algorithms. Moreover, it does not only push
relevant items at the top of the rankings, but we showed that
the quality of the rankings is also improved if we look fur-
ther down the list. We could not single out one algorithm
which performed constantly better than the others, some al-
gorithms have better performance on specific datasets.
Our work combined a general method and the evaluation
of the outcomes with quantitative metrics based on ground
truth established by the experts of the domain. In the future
study, the balance framework could be applied to the more
general domain such as economic systems and those sys-
tems without ground truth. The proposed method also could
be a good tool to evaluate the time bias of new ranking algo-
rithms.
References
[Cai et al. 2017] Cai, Y.; Liu, S.; Hu, J.; Bai, G.; and Dong,
S. 2017. A hybrid bipartite graph based recommendation
algorithm for mobile games. In Big Data (Big Data), 2017
IEEE International Conference on, 3575 -- 3582. IEEE.
[Cao, Guo, and Cheng 2011] Cao, L.; Guo, J.; and Cheng, X.
2011. Bipartite graph based entity ranking for related en-
tity finding. In Proceedings of the 2011 IEEE/WIC/ACM In-
ternational Conferences on Web Intelligence and Intelligent
Agent Technology-Volume 01, 130 -- 137. IEEE Computer So-
ciety.
[Chen et al. 2017a] Chen, J.; Zhang, H.; He, X.; Nie, L.; Liu,
W.; and Chua, T.-S. 2017a. Attentive collaborative filtering:
Multimedia recommendation with item- and component-
In Proceedings of the 40th International
level attention.
ACM SIGIR Conference on Research and Development in
Information Retrieval, SIGIR '17, 335 -- 344. New York, NY,
USA: ACM.
[Chen et al. 2017b] Chen, X.; Zhang, Y.; Ai, Q.; Xu, H.; Yan,
J.; and Qin, Z. 2017b. Personalized key frame recommenda-
tion. In Proceedings of the 40th International ACM SIGIR
Conference on Research and Development in Information
Retrieval, SIGIR '17, 315 -- 324. New York, NY, USA: ACM.
[Davis and Goadrich 2006] Davis, J., and Goadrich, M.
2006. The relationship between precision-recall and roc
curves. In Proceedings of the 23rd International Conference
on Machine Learning, 233 -- 240. ACM.
[Deng, Lyu, and King 2009] Deng, H.; Lyu, M. R.; and
King, I. 2009. A generalized co-hits algorithm and its appli-
cation to bipartite graphs. In Proceedings of the 15th ACM
SIGKDD international conference on Knowledge discovery
and data mining, 239 -- 248. ACM.
[Feng et al. 2017] Feng, F.; Nie, L.; Wang, X.; Hong, R.; and
Chua, T.-S. 2017. Computational social indicators: a case
study of chinese university ranking. In Proceedings of the
40th International ACM SIGIR Conference on Research and
Development in Information Retrieval, 455 -- 464. ACM.
[Fogaras 2003] Fogaras, D. 2003. Where to start browsing
the web? In International Workshop on Innovative Internet
Community Systems, 65 -- 79. Springer.
[Harper and Konstan 2016] Harper, F. M., and Konstan, J. A.
2016.
The movielens datasets: History and context.
ACM Transactions on Interactive Intelligent Systems (tiis)
5(4):19.
[Haveliwala 2002] Haveliwala, T. H. 2002. Topic-sensitive
pagerank. In Proceedings of the 11th international confer-
ence on World Wide Web, 517 -- 526. ACM.
[He et al. 2017] He, X.; Gao, M.; Kan, M.-Y.; and Wang,
D. 2017. Birank: Towards ranking on bipartite graphs.
IEEE Transactions on Knowledge and Data Engineering
29(1):57 -- 71.
[He et al. 2018] He, X.; He, Z.; Song, J.; Liu, Z.; Jiang, Y.-
G.; and Chua, T.-S. 2018. Nais: Neural attentive item sim-
IEEE Transactions on
ilarity model for recommendation.
Knowledge and Data Engineering.
[Kleinberg 1999a] Kleinberg, J. M. 1999a. Authoritative
sources in a hyperlinked environment. J. ACM 46(5):604 --
632.
[Kleinberg 1999b] Kleinberg, J. M. 1999b. Authoritative
sources in a hyperlinked environment. Journal of the ACM
(JACM) 46(5):604 -- 632.
[Leskovec, Adamic, and Huberman 2007] Leskovec,
J.;
Adamic, L. A.; and Huberman, B. A. 2007. The dynamics
of viral marketing. ACM Transactions on the Web (TWEB)
1(1):5.
[Li, Ng, and Ye 2012] Li, X.; Ng, M. K.; and Ye, Y. 2012.
Har: hub, authority and relevance scores in multi-relational
In Proceedings of the 2012 SIAM
data for query search.
International Conference on Data Mining, 141 -- 152. SIAM.
[Lian et al. 2018] Lian, J.; Zhang, F.; Xie, X.; and Sun, G.
2018. Towards better representation learning for personal-
ized news recommendation: a multi-channel deep fusion ap-
proach. In IJCAI, 3805 -- 3811.
[Liao et al. 2018] Liao, L.; He, X.; Zhang, H.; and Chua, T.-
S. 2018. Attributed social network embedding. IEEE Trans-
actions on Knowledge and Data Engineering 30(12):2257 --
2270.
[Liu and OZSU 2009] Liu, L., and OZSU, M. T. 2009. Nor-
malized Discounted Cumulated Gain (nDCG). Springer US.
1920 -- 1920.
[Lu et al. 2016] Lu, L.; Chen, D.; Ren, X. L.; Zhang, Q. M.;
Zhang, Y. C.; and Zhou, T. 2016. Vital nodes identification
in complex networks. Physics Reports 650:1 -- 63.
[Mariani, Medo, and Zhang 2016] Mariani, M. S.; Medo,
M.; and Zhang, Y.-C. 2016. Identification of milestone pa-
pers through time-balanced network centrality. Journal of
Informetrics 10(4):1207 -- 1223.
[Page et al. 1999] Page, L.; Brin, S.; Motwani, R.; and Wino-
grad, T. 1999. The pagerank citation ranking: Bringing order
to the web. Technical Report 1999-66, Stanford InfoLab.
[Pinto, Almeida, and Gonc¸alves 2013] Pinto, H.; Almeida,
J. M.; and Gonc¸alves, M. A. 2013. Using early view patterns
to predict the popularity of youtube videos. In Proceedings
of the Sixth ACM International Conference on Web Search
and Data Mining, 365 -- 374. ACM.
[Price 1976] Price, D. d. S. 1976. A general theory of biblio-
metric and other cumulative advantage processes. Journal
of the American Society for Information Science 27(5):292 --
306.
[Radicchi and Castellano 2012] Radicchi, F., and Castellano,
C. 2012. Testing the fairness of citation indicators for com-
parison across scientific domains: The case of fractional ci-
tation counts. Journal of Informetrics 6(1):121 -- 130.
F.;
[Radicchi, Fortunato, and Castellano 2008] Radicchi,
Fortunato, S.; and Castellano, C. 2008. Universality of
citation distributions: Toward an objective measure of
scientific impact. Proceedings of the National Academy of
Sciences 105(45):17268 -- 17272.
[Rui et al. 2007] Rui, X.; Li, M.; Li, Z.; Ma, W.-Y.; and Yu,
N. 2007. Bipartite graph reinforcement model for web im-
In Proceedings of the 15th ACM Interna-
age annotation.
tional Conference on Multimedia, 585 -- 594. ACM.
[Szabo and Huberman 2008] Szabo, G., and Huberman,
B. A. 2008. Predicting the popularity of online content.
Available at SSRN 1295610.
[Wang et al. 2018] Wang, X.; Chen, Y.; Yang, J.; Wu, L.; Wu,
Z.; and Xie, X. 2018. A reinforcement learning frame-
In 2018 IEEE In-
work for explainable recommendation.
ternational Conference on Data Mining (ICDM), 587 -- 596.
IEEE.
[Zheng et al. 2018] Zheng, G.; Zhang, F.; Zheng, Z.; Xiang,
Y.; Yuan, N. J.; Xie, X.; and Li, Z. 2018. Drn: A deep re-
inforcement learning framework for news recommendation.
In Proceedings of the 2018 World Wide Web Conference on
World Wide Web, 167 -- 176. International World Wide Web
Conferences Steering Committee.
|
1312.0649 | 1 | 1312 | 2013-12-02T22:40:40 | Dynamics of Trends and Attention in Chinese Social Media | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | There has been a tremendous rise in the growth of online social networks all over the world in recent years. It has facilitated users to generate a large amount of real-time content at an incessant rate, all competing with each other to attract enough attention and become popular trends. While Western online social networks such as Twitter have been well studied, the popular Chinese microblogging network Sina Weibo has had relatively lower exposure. In this paper, we analyze in detail the temporal aspect of trends and trend-setters in Sina Weibo, contrasting it with earlier observations in Twitter. We find that there is a vast difference in the content shared in China when compared to a global social network such as Twitter. In China, the trends are created almost entirely due to the retweets of media content such as jokes, images and videos, unlike Twitter where it has been shown that the trends tend to have more to do with current global events and news stories. We take a detailed look at the formation, persistence and decay of trends and examine the key topics that trend in Sina Weibo. One of our key findings is that retweets are much more common in Sina Weibo and contribute a lot to creating trends. When we look closer, we observe that most trends in Sina Weibo are due to the continuous retweets of a small percentage of fraudulent accounts. These fake accounts are set up to artificially inflate certain posts, causing them to shoot up into Sina Weibo's trending list, which are in turn displayed as the most popular topics to users. | cs.SI | cs |
1
Dynamics of Trends and Attention in Chinese
Social Media
Louis Lei Yu
Sitaram Asur
Bernardo A. Huberman
!
Abstract—There has been a tremendous rise in the growth of
online social networks all over the world in recent years. It has
facilitated users to generate a large amount of real-time content
at an incessant rate, all competing with each other to attract
enough attention and become popular trends. While Western
online social networks such as Twitter have been well studied,
the popular Chinese microblogging network Sina Weibo has had
relatively lower exposure. In this paper, we analyze in detail
the temporal aspect of trends and trend-setters in Sina Weibo,
contrasting it with earlier observations in Twitter. We find that
there is a vast difference in the content shared in China when
compared to a global social network such as Twitter. In China,
the trends are created almost entirely due to the retweets of
media content such as jokes, images and videos, unlike Twitter
where it has been shown that the trends tend to have more
to do with current global events and news stories. We take a
detailed look at the formation, persistence and decay of trends
and examine the key topics that trend in Sina Weibo. One of
our key findings is that retweets are much more common in
Sina Weibo and contribute a lot to creating trends. When we
look closer, we observe that most trends in Sina Weibo are due
to the continuous retweets of a small percentage of fraudulent
accounts. These fake accounts are set up to ar tificially inflate
cer tain posts, causing them to shoot up into Sina Weibo’s
trending list, which are in turn displayed as the most popular
topics to users.
Index Terms—social network; web structure analysis; temporal
analysis; China; social computing
Louis Lei Yu, Department of Mathematics and Computer Sci-
ence, Gustavus Adolphus College, 800 W College Ave, St Peter,
MN 56082, phone: (415)374-9197, FAX: (507) 933-7041, e-mail:
[email protected]
Sitaram Asur, Social Computing Lab, HP Labs, 1501 Page Mill
Road, Palo Alto, CA 94304, phone: (650) 857-1501, fax: (650) 852-
8156, email: [email protected]
Bernardo A. Huberman, Social Computing Lab, HP Labs, 1501 Page
Mill Road, Palo Alto, CA 94304, phone: (650) 857-1501, fax: (650)
852-8156, email: [email protected]
1 IN TRODUC T ION
In the past few years, social media services
as well as the users who subscribe to them,
have grown at a phenomenal rate. This im-
mense growth has been witnessed all over the
world with millions of people of different back-
grounds using these services on a daily basis.
This widespread generation and consumption
of content has created an extremely complex
and competitive online environment where dif-
ferent types of content compete with each other
for the attention of users. It is very interesting
to study how certain types of content such as
a viral video, a news article, or an illustrative
picture, manage to attract more attention than
others, thus bubbling to the top in terms of
popularity. Through their visibility, these popu-
lar topics contribute to the collective awareness
reflecting what is considered important. It can
also be powerful enough to affect the public
agenda of the community.
There have been prior studies on the charac-
teristics of trends and trend-setters in Western
online social media ( [1], [2]). In this paper, we
examine in detail a significantly less-studied
but equally fascinating online environment:
Chinese social media, in particular, Sina Weibo:
China’s biggest microblogging network.
Over the years there have been news reports
on various Internet phenomena in China, from
the surfacing of certain viral videos to the
spreading of rumors ( [3]) to the so called “hu-
man flesh search engines”: a primarily Chinese
Internet phenomenon of massive search using
online media such as blogs and forums ( [4]).
These stories seem to suggest that many events
happening in Chinese online social networks
are unique products of China’s culture and
social environment.
Due to the vast global connectivity provided
by social media, netizens all over the world
are now connected to each other like never
before; they can now share and exchange ideas
with ease. It could be argued that the manner
in which the sharing occurs should be similar
across countries. However, China’s unique cul-
tural and social environment suggests that the
way individuals share ideas might be different
than that in Western societies [5]. For example,
the age of Internet users in China is a lot
younger. So it is likely that they may respond
to different types of content than Internet users
in Western societies. The number of Internet
users in China is larger than that in the U.S, and
the majority of users live in large urban cities.
One would expect that the way these users
share information can be even more chaotic.
An important question to ask is to what extent
would topics have to compete with each other
in order to capture users’ attention in this
dynamic environment. Furthermore, as docu-
mented by [6], it is known that the information
shared between individuals in Chinese social
media is monitored. Hence another interesting
question to ask is what types of content would
netizens respond to and what kind of popular
topics would emerge u nder such constant
surveillance.
Given the above questions, we present an
analysis on the evolution of trends in Sina
Weibo. We monitored the evolution of the top
trending keywords in Sina Weibo for 30 days.
First, we analyzed the model of growth in these
trends and examined the persistance of these
topics over time. In this regard, we investigated
if topics initially ranked higher tend to stay
in the list of top 50 trending topics longer.
Subsequently, by analyzing the timestamps of
tweets, we looked at the propagation and de-
caying process of the trends in Sina Weibo and
compare it to earlier observations of Twitter [1].
Our findings are as follows:
• We discovered that the majority of trends
2
in Sina Weibo are arising from frivolous
content, such as jokes and funny images
and photos unlike Twitter where the trends
are mainly news-driven.
• We established that retweets play a greater
role in Sina Weibo than in Twitter, con-
tributing more to the generation and per-
sistence of trends.
• Upon examining the tweets in detail, we
made an important discovery. We ob-
served that many trending keywords in
Sina Weibo are heavily manipulated and
controlled by certain fraudulent accounts.
The irregular activities by these accounts
made certain tweets more visible to users
in general.
• We found significant evidence suggesting
that a large percentage of the trends in
Sina Weibo are due to artificial inflation by
fraudulent accounts. The users we identi-
fied as fraudulent were 1.08% of the total
users sampled, but they were responsible
for 49% of the total retweets (32% of the
total tweets).
• We evaluated some methods to identify
fraudulent accounts. After we removed
the tweets associated with fraudulent ac-
counts, the evolution of the tweets con-
taining trending keywords follow the same
persistent and decaying process as the one
in Twitter.
The rest of the paper is organized as fol-
lows. In Section 2 we provide background in-
formation on the development of Internet in
China and on the Sina Weibo social network.
In Section 3 we survey some related work on
trends and spam in social media. In Section
4, we perform a detailed analysis of trending
topics in Sina Weibo. In Section 5, we provide
a discussion of our findings.
2 BACKGROUND
In this Section, we provide some background
information on the Internet in China, the devel-
opment of Chinese social media services, and
Sina Weibo, the most popular microblog service
in China
2.1 The Internet in China
The development of the Internet industry in
China over the past decade has been impres-
sive. According to a survey from the China In-
ternet Network Information Center (CNNIC),
by July 2008, the number of Internet users in
China has reached 253 million, surpassing the
U.S. as the world’s largest Internet market [7].
Furthermore, the number of Internet users in
China as of 2010 was reported to be 420 million.
Despite this, the fractional Internet penetra-
tion rate in China is still low. The 2010 survey
by CNNIC on the Internet development in
China [8] reports that the Internet penetration
rate in the rural areas of China is on average
5.1%. In contrast, the Internet penetration rate
in the urban cities of China is on average
21.6%. In metropolitan cities such as Beijing
and Shanghai, the Internet penetration rate has
reached over 45%, with Beijing being 46.4% and
Shanghai being 45.8% [8].
According to the survey by CNNIC in 2010
[7], China’s cyberspace is dominated by urban
students between the age of 18–30 (see Figure
1 and Figure 2, taken from [7]).
Fig. 1. Age Distribution of Internet Users in
China
The Government plays an important role in
fostering the advance of the Internet industry
in China. Tai [6] points out four major stages
of Internet development in China, “with each
period reflecting a substantial change not only
in technological progress and application, but
also in the Government’s approach to and ap-
parent perception of the Internet.”
3
Fig. 2. The Occupation Distribution of Internet
Users in China
According to The Internet in China 1 released
by the Information Office of the State Council
of China:
The Chinese government attaches
great importance to protecting the safe
flow of Internet information, actively
guides people to manage websites in
accordance with the law and use the
Internet in a wholesome and correct
way.
2.2 Chinese Online Social Networks
Online social networks are a major part of
the Chinese Internet culture [3]. Netizens2 in
China organize themselves using forums, dis-
cussion groups, blogs, and social networking
platforms to engage in activities such as ex-
changing viewpoints and sharing information
[3]. According to The Internet in China:
Vigorous online ideas exchange is a
major characteristic of China’s Inter-
net development, and the huge quan-
tity of BBS posts and blog articles is
1. “The Internet in China” by the Information Office of the
State Council of the People’s Republic of China is available at
http://www.scio.gov.cn/zxbd/wz/201006/t667385.htm
2. A netizen is a person actively involved in online commu-
nities [9].
far beyond that of any other country.
China’s websites attach great impor-
tance to providing netizens with opin-
ion expression services, with over 80%
of them providing electronic bulletin
service. In China, there are over a
million BBSs and some 220 million
bloggers. According to a sample sur-
vey, each day people post over three
million messages via BBS, news com-
mentary sites, blogs, etc., and over
66% of Chinese netizens frequently
place postings to discuss various top-
ics, and to fully express their opinions
and represent their interests. The new
applications and services on the In-
ternet have provided a broader scope
for people to express their opinions.
The newly emerging online services,
including blog, microblog, video shar-
ing and social networking websites
are developing rapidly in China and
provide greater convenience for Chi
nese citizens to communicate online.
Actively participating in online in-
formation communication and con-
tent creation, netizens have greatly en-
riched Internet information and con-
tent.
2.3 Sina Weibo
Sina Weibo was launched by the Sina corpo-
ration, China’s biggest web portal, in August
2009. It has been reported by the Sina corpo-
ration that Sina Weibo now has 250 million
registered accounts and generates 90 million
posts per day. Similar to Twitter, a user profile
in Sina Weibo displays the user ’s name, a brief
description of the user, the number of followers
and followees the user has. There are three
types of user accounts in Sina Weibo, regular
user accounts, verified user accounts, and the
expert (star) user account. A verified user ac-
count typically represents a well known public
figure or organization in China.
Twitter users can address tweets to other
users and can mention others in their tweets.
A common practice in Twitter is “retweeting”,
or rebroadcasting someone else’s messages to
4
one’s followers. The equivalent of a retweet in
Sina Weibo is instead shown as two amalga-
mated entries: the original entry and the cur-
rent user ’s actual entry which is a commentary
on the original entry.
Sina Weibo has another functionality absent
from Twitter: the comment. When a Sina Weibo
user makes a comment, it is not rebroadcasted
to the user ’s followers. Instead, it can only be
accessed under the original message.
3 RE LATED WORK
In this Section, we provide a survey of papers
in two related areas: spam detection and the
study of trends in social networks. In each
area, we present work on both Western social
networks and Chinese social networks.
3.1 Spam Detection in Twitter
Spam and bot detection in social networks is
a relatively recent area of research, motivated
by the vast popularity of social websites such
as Twitter and Facebook. It draws on research
from several areas of computer science such
as computer security, machine learning, and
network analysis.
In the 2010 work by Benevenuto et al [10], the
authors examine spam detection in Twitter by
first collecting a large dataset of more than 54
million users, 1.9 billion links, and 1.8 billion
tweets. After exploring content and behavoir
attributes, they developed an SVM classifier
and was able to detect spammers with 70% pre-
cision and non-spammers with 96% precision.
As an insightful follow up, the authors used
χ2 statistics to evaluate the importance of the
attributes they used in their model.
The second paper with direct application to
spam detection in Twitter was by Wang [11].
Wang motivated his research with the statistic
that an estimated 3% of messages in Twitter
are spam. The dataset used in in this study
was relatively smaller, gathering information
from 25,847 users, 500 thousand tweets, and
49 million follower/friend relationships. Wang
used decision trees, neural network, SVM, and
naive Bayesian models.
Finally, Lee et al. [12] described a differ-
ent approach to detect spammers. They cre-
ated honeypot user accounts in Twitter and
recorded the features of users who interact with
these accounts. They then used these features
to develop a classifier with high precision.
3.2 Spam Detection in General Online So-
cial Networks
In social bookmarking websites, Markines et al.
[13] used just 6 features - tag spam, tag blur,
document structure, number of ads, plagiarism,
and valid links, to develop a classifier with 98%
accuracy.
On facebook, Boshmaf et al. successfully
launched a network of social bots [14]. Despite
Facebook’s bot detection system, the authors
were able to achieve an 80% infiltration rate
over 8 weeks.
In online ad exchanges, advertisers pay web-
sites for each user that clicks through an ad
to their website. The way fraud occurs in this
domain is for bots to click through ads on
a website owned by the botnet owners. The
money at stake in this case has made the bots
employed very sophisticated. The botnet own-
ers use increasingly stealthy, distributed traffic
to avoid detection. Stone et al. examined vari-
ous attacks and prevention techniques in cost
per click ad exchanges [15]. Yu et al. [16] gave
a sophisticated approach to detect low-rate bot
traffic by developing a model that examines
query logs to detect coordination across bots
within a botnet.
3.3 Spam Detection in Chinese Online So-
cial Networks
Some studies had been done on spam and
bot detection in Chinese online social networks
[17], [18]. Xu et al. [19] observed the spammers
in Sina Weibo and found that the spammers can
be classified into two categories: promoters and
robot accounts.
Lin et al. [20] presented an analysis of spam-
ming behaviors in Sina Weibo. Using methods
such as proactive honeypots, keyword based
search and buying spammer samples directly
from online merchants. they were able to col-
lect a large set of spammer samples. Through
5
their analysis they found three representative
spamming behaviors: aggressive advertising,
repeated duplicate reposting, and aggressive
following.
spammer
identification system. Through
tests with real data it is demonstrated that the
system can effectively detect the spamming be-
haviors and identify spammers in Sina Weibo.
3.4 Battling the “Internet Water Army” in
Chinese Online Social Networks
One relevant area of research is the study of
the “Online Water Army” 3 . It represents full-
time or part-time paid posters hired by PR
companies to help in raising the popularity of a
specific company or person by posting articles,
replies, and comments in online social net-
works. According to CCTV 4 , these paid posters
in China help their customers using one of the
following three tactics: 1. promoting a specific
product, company or person; 2. smear/slander
competitors; 3. help deleting negative posts or
comments.
st in BBS systems, and online social net-
works.
In the work by Chen et al. [21], the authors
examined comments in the Chinese news web-
sites such as Sina.com and Sohu.com and used
reply, activity, and semantic features to de-
velop an SVM classifier via the LIBSVM Python
library with 95% accuracy at detecting paid
posters. Interesting information discussed in
the paper includes the organizational structure
of PR firms which hire the paid posters and
the choice of features: percentage of replies,
average interval time of posts, active days, and
number of reports commented on.
3.5 Measuring Influences in Online Social
Networks
For many years the structural properties of var-
ious Western social networks have been well
studied by sociologists and computer scientists
[22] [23] [24] [25].
In social network analysis, social
influence
refers to the concept of people modifying their
3. e.g., http://shuijunwang.com or http://www.51shuijun.net
4. see
report
in
Chinese
http://news.cntv.cn/china/20101107/102619.shtml
at
behavior to bring them closer to the behavior of
their friends. In a social-affiliation network con-
sists of nodes representing individuals, links
representing friendships, and nodes represent-
ing foci: “social, psychological, legal, or phys-
ical entities around which joint activities are
organized (e.g., workplace, social groups) [26]”,
if A and B are friends, and F is a focus that A
participates in. Over time, B can participate in
the same focus due to A’s involvement, this is
called a membership closure [26].
Agarwal et al.
[27] examined methods to
identify influential bloggers in the blogosphere.
They discovered that the most influential blog-
gers are not necessarily the most active. Back-
strom et al. [28] studied the characteristics of
membership closure in LiveJournal. Crandall et
al. [29] studied the adaptation of influences
between editors of Wikipedia articles.
Romero et al.
[30] measured retweets in
Twitter and found that passivity was a major
factor when it comes to message forwarding.
Based on this result, they presented a measure
of social influences that takes into account the
passivity of the audience in social networks.
3.6 The Study of Trends in Twitter
There are various studies on trends in Twitter
[2] [31] [32] [33].
One of the most extensive investigations into
trending topics in Twitter was by Asur et al.
[34]. The authors examined the growth and
persistence of trending topics in Twitter and
observed that it follows a log-normal distri-
bution of popularity. Accordingly, most topics
faded from popularity relatively quickly, while
a few topics lasted for long periods of time.
They estimated the average duration of topics
to be around 20-40 minutes. When they exam-
ined the content of the trends, they observed
that traditional notions of influence such as the
frequency of posting and the number of follow-
ers were not the main drivers of popularity in
trends. Rather it was the resonating nature of
the content that was important. An interesting
finding was that news topics from traditional
media sources such as CNN, New York Times
and ESPN was shown to be some of the most
popular and long lasting trending topics in
6
Twitter, suggesting that Twitter amplifies some
of the broader trends occurring in society.
Cha et al. [35] explored user influences on
Twitter trends and discovered some interesting
results. First, users with many followers were
found to not be very effective in generating
mentions or retweets. Second, the most influ-
ential users tend to influence more than one
topic. Third, influences were found to not arise
spontaneously, but instead as the result of fo-
cused efforts, often concentrating on one topic.
3.7 Social Influences and the Propagation
of Information in Chinese Social Networks
Researchers have analyzed the structure of var-
ious Chinese offline social networks [36] [37]
[38] [39] [40].
There have been only a few studies on social
influences in Chinese online social networks.
Jin [3] studied the structure and interface of
Chinese online Bulletin Board Systems (BBS)
and the behavioral patterns of its users. Xin
[41] conducted a survey of BBS’s influence on
University students in China. Yu et al. [42]
looked at the adaptation of books, movies, mu-
sic, events and discussion groups on Douban,
the largest online media database and one of
the largest online communities in China.
In a similar area, there are some studies on
the structural properties and the characteristics
of information propagation in Chinese online
social networks [43] [44], [45], [46], [47]. Yang et
al. [48] noted that various information services
(e.g., eBay, Orkut, and Yahoo!) encountered
serious challenges when entering China. They
presented an empirical study of social interac-
tions among Chinese netizens based on over
4 years of comprehensive data collected from
Mitbbs (www.mitbbs.com), the most frequently
used online forum for Chinese nationals who
are studying or working abroad.
Lin et al. [49] presented a comparison of the
interaction patterns between two of the largest
online social networks in China: Renren and
Sina Weibo. Niu et al. [50] gave an empirical
analysis of Renren, it follows an exponentially
truncated power law in-degree distribution,
and has a short average node distance.
King et al. [5] studied the concept of guanxi,
a unique dyadic social construct, as applied
to the interaction between web sites in China.
Chang et al. [51] studied a special case of the
propagation of information in Chinese online
social networks: the sending and receiving of
messages containing wishes and moral sup-
port. They provided analysis on the data from
Linkwish, a micro social network for wish
sharing with users mainly from Taiwan, Hong
Kong, and Macao.
Fan et al. [52] looked at the propagation of
emotion in Sina Weibo. They found that the
correlation of anger among users is signifi-
cantly higher than that of joy, which indicates
that angry emotion could spread more quickly
and broadly in the network. And, there is a
stronger sentiment correlation between a pair
of users if they share more interactions. Finally,
users with larger number of friends possess
more significant sentiment influence to their
neighborhoods.
4 ANALYS IS O F TRENDS AND TREND -
SE TTERS IN S INA WE IBO
4.1 The Trending Keywords
Sina Weibo offers a list of 50 keywords that
appear most frequently in users’ tweets. They
are ranked according to the frequency of ap-
pearances in the last hour. This is similar to
Twitter, which also presents a constantly up-
dated list of trending topics: keywords that are
most frequently used in tweets over a period
of time. We extracted these keywords over a
period of 30 days (from June 18th, 2011 to July
18th, 2011) and retrieved all the corresponding
tweets containing these keywords from Sina
Weibo.
We first monitored the hourly evolution of
the top 50 keywords in the trending list for 30
days. We observed that the average time spent
by each keyword in the hourly trending list is
6 hours. And the distribution for the number
of hours each topic remains on the top 50
trending list follows the power law (as shown
in Figure 3 a). The distribution suggests that
only a few topics exhibit long-term popularity.
Another interesting observation is that a lot
of the key words tend to disappear from the
top 50 trending list after a certain amount of
time and then later reappear. We examined the
7
distribution for the number of times keywords
reappear in the top 50 trending list (Figure 3
b). We observe that this distribution follows the
power law as well.
Both the above observations are very similar
to the earlier study of trending topics in Twitter
by [1]. However, one important difference with
Twitter is that the average trending time is
significantly higher in Sina Weibo (in Twitter it
was 20-40 minutes). This suggests that Weibo
may not have as many topics competing for
attention as Twitter.
Following our observation that some key-
words stay in the top 50 trending list longer
than others, we wanted to investigate if topics
that are ranked higher initially tend to stay in
the top 50 trending list longer. We separated
the top 50 trending keywords into two ranked
sets of 25 each: the top 25 and the bottom 25.
Figure 4 illustrates the plot for the percentage
of topics that placed in the bottom 25 relating to
the number of hours these topics stayed in the
top 50 trending list. We can observe that topics
that do not last are usually the ones that are
in the bottom 25. On the other hand, the long-
trending topics spend most of their time in the
top 25, which suggests that items that become
very popular are more likely to stay longer in
the top 50. This intuitively means that items
that attract phenomenal attention initially are
not likely to dissipate quickly from people’s
interests.
Fig. 4. Distribution of trending times for topics in
the bottom 25 of the top 50 trend list
8
Fig. 3. Distributions of trending time and the number of times topics reappeared
4.2 The Evolution of Tweets
Next, we investigate the process of persis-
tence and decay for the trending topics in
Sina Weibo. In particular, we want to measure
the distribution for the time intervals between
tweets containing the trending keywords. We
continuously monitored the keywords in the
top 50 trending list and for each trending topic
we retrieved all the tweets containing the key-
word from the time the topic first appeared in
the top 50 trending list until the time it dis-
appeared. Accordingly, we collected complete
data for 811 topics over the course of 30 days
(from June 20th, 2011 to July 20nd, 2011). In
total we collected 574,382 tweets from 463,231
users. Among the 574,382 Tweets, 35% of the
tweets (202,267 tweets) are original
tweets,
and 65% of the tweets (372,115 tweets) are
retweets. 40.3% of the total users (187130 users)
retweeted at least once in our sample.
We measured the number of tweets that each
topic gets in 10 minute intervals, from the time
the topic starts trending until the time it stops.
From this we can sum up the tweet counts over
time to obtain the cumulative number of tweets
Nq (ti ) of topic q for any time frame ti , This is
given as :
i(cid:88)
τ =1
Nq (ti) =
nq (tτ )
(1)
where nq (t) is the number of tweets on topic
q in time interval t. We then calculate the ratios
Cq (ti , tj ) = Nq (ti )/Nq (tj ) for topic q for time
frames ti and tj .
Figure 5 shows the distribution of Cq (ti , tj )’s
over all topics for two arbitrarily chosen pairs
of time frames: (10, 2) and (8, 3) (nevertheless
such that ti > tj , and ti is relatively large, and
tj is small).
These figures suggest that the ratios Cq (ti , tj )
are distributed according to the log-normal
distributions. We tested and confirmed that
the distributions indeed follow the log-normal
distributions.
This finding agrees with the result from a
similar experiment in Twitter trends. Asur and
others [1] argued that the log-normal distribu-
tion occurs due to the multiplicative process
involved in the growth of trends which incor-
porates the decay of novelty as well as the
rate of propagation. The intuitive explanation is
that at each time step the number of new tweets
(original tweets or retweets) on a topic is mul-
tiplied over the tweets that we already have.
The number of past tweets, in turn, is a proxy
for the number of users that are aware of the
topic up to that point. These users discuss the
topic on different forums, including Twitter, es-
sentially creating an effective network through
which the topic spreads. As more users talk
9
Fig. 5. The distribution of Cq (ti , tj )’s over all topics for two arbitrarily chosen pairs of time frames:
(10, 2) and (8, 3)
about a particular topic, many others are likely
to learn about it, thus giving the multiplicative
nature of the spreading. On the other hand,
the monotically decreasing decaying process
characterizes the decay in timeliness and nove
lty of the topic as it slowly becomes obsolete.
However, while only 35% of the tweets in
Twitter are retweets, there is a much larger
percentage of tweets that are retweets in Sina
Weibo. From our sample we observed that
a high 65% of the tweets are retweets. This
implies that the topics are trending mainly be-
cause of some content that has been retweeted
many times. Thus, Sina Weibo users are more
likely to learn about a particular topic through
retweets.
4.3 Trend-setters in Sina Weibo
For every new trending keyword we retrieved
the most retweeted tweets in the past hour and
compiled a list of most retweeted users. Table
1 illustrates the top 20 most retweeted authors
appearing in at least 10 trending topics each.
The influential authors are ranked according
to the ratio between the number of times the
authors’ tweets are retweeted and the number
of trending topics these tweets appeared in.
From Table 1 we observed that only 4 out
of the top 20 influential authors were verified
accounts. The 4 verified accounts represent an
urban fashion magazine, a fashion brand, an
online travel magazine, and a Chinese celebrity.
The other 16 influential authors are unverified
accounts. They all seem to have a strong fo-
cus on collecting user-contributed jokes, movie
trivia, quizzes, stories and so on. This is in
sharp contrast to the topics that are popular in
Twitter as reported by [1]. When we looked at
a longer list of authors we observed the same
trend. The most popular items were all related
to frivolous content and media, unlike Twitter
which had a strong affinity towards news and
current events.
The “# of Times Tweeted” column in Ta-
ble 1 gives the unique tweets that have been
retweeted. We can observe that the rate at
which they have been retweeted is phenom-
enal. For example,
the top retweeted user
posted 37 tweets which in total were retweeted
1194999 times.
4.4 The Evolution of Retweets and Original
Tweets
In the next experiemnt, we separate the tweets
in Sina Weibo into original tweets and retweets
and calculate the densities of ratios between cu-
mulative retweets/original tweets counts mea-
sured in different time frames. Figure 6 shows
10
TABLE 1
Top 20 Retweeted Users in At Least 10 Trending Topics
Account Descriptions Verified
Yes
Fashion Magazine
Yes
Fashion Brand
Travel Magazine
Yes
No
Gourmet Factory
No
Horoscopes
No
Silly Jokes
No
Good Movies
Wonderful Quotes
No
No
Global Music
No
Funny Jokes
No
Creative Ideas
Chinese singer
Yes
No
Good Music
No
Movie Factory
No
Strange Stories
No
Beautiful Pictures
Global Music
No
No
Female Fashion
No
Useful Tips
Funny Quizzes
No
# of Times Retweeted
1194999
849404
127737
553586
1545955
3210130
1497968
602528
697308
3667566
742178
284600
323022
1509003
1668910
435312
432444
809440
735070
589477
# of Tweets
37
21
123
86
101
258
140
39
116
438
111
25
52
230
250
33
65
87
153
77
# of Topics
12
13
21
12
38
81
38
17
22
121
25
10
12
59
66
18
18
34
31
25
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
the distributions of original tweets/retweets
ratios over all topics for two arbitrarily chosen
pairs of time frames: (10, 2) and (8, 3).
We find (as the last two sub-figures in Figure
6 show) that the distributions of ratios for orig-
inal tweets follow the log-normal distribution.
However, we observe (as the first two sub-
figures in Figure 6 show) that for retweets, the
distributions do not satisfy all the properties
of the log-normal distribution. This is indicated
by the large amount of low retweet ratios in the
distribution. Furthermore, there are high spikes
in the lower ratios area of the distribution.
Identifying Spam Activity in Sina
4.5
Weibo
From Figure 6 in the previous Section we ob-
served that there is a high percentage of low
ratios in the distribution of retweet ratios. This
suggests that for a lot of the topics, there is an
initial flurry of retweets. We hypothesize that
this is due to the activities of certain users in
Sina Weibo. As these accounts post a tweet,
they tend to set up many other fake accounts
to continuously retweet this tweet, expecting
that the high retweet numbers would propel
the tweet to place in the Sina Weibo hourly
trending list. This would then cause other users
to notice the tweet more after it has emerged
as the top hourly, daily, or weekly trend setter.
We attempt to verify the above hypothesis
empirically. We define a spamming account as
one that is set up for the purpose of repeat-
edly retweeting certain messages, thus giving
these messages artificially inflated popularity.
According to our hypothesis, the users who
retweet abnormally high amounts are more
likely to be spam accounts.
Figure 7 a) illustrates the distribution for
the number of users and their corresponding
number of retweets (over all topics). Figure 7
b) illustrates the distribution for the number
of users and the numbers of topics that they
caused to trend by their retweets. We observe
that both distributions in Figure 7 follow the
power law. This implies that there are certain
users who retweet a lot, and a small number
of users are responsible for a large number of
topics. Next, we investigate who these users
are. We manually checked the top 40 accounts
who retweeted the most. To our surprise, 37 of
these 40 accounts could no longer be accessed.
That is, when we queried the accounts’ IDs, we
retrieved a message from Sina Weibo stating
that the account has been removed and can no
longer be accessed (see Figure 8).
According to Sina Weibo’s frequently asked
question page, if a user sends a tweet contain-
11
Fig. 6. The densities of ratios between cumulative original tweets/retweets counts measured in two
arbitrary time frames: (10, 2) and (8, 3)
ing illegal or sensitive information, such tweet
will be immediately deleted by Sina Weibo’s
administrators, however, the users’ accounts
will still be active. For the above reason we
assume that if an account was active one month
ago and can no longer be reached, it indicates
that this account has very likely performed
malicious activities such as spamming and has
hence been deleted.
Next, we inspect the user accounts with the
most retweets in our sample and the number of
accounts they retweeted. We see that although
these accounts retweeted a lot, they mostly
only retweet messages from a few users. We re-
organize the users who retweeted by the ratio
between the number of times he/she retweeted
and the number of users he/she retweeted. We
refer to this as the user-retweet ratio. Table
2 illustrates the top 10 users with the highest
user-retweet ratios. We note that for all these
users, they each retweet posts from only one
account. We observe that this is true for the
top 30 accounts with the highest user-retweet
ratios.
Next, we conduct the following experiment:
starting from the users with the highest user-
retweet ratios, we used a crawler to automati-
cally visit and retrieve each user ’s Sina Weibo
account. Thus we measured the percentage of
user accounts that can still be accessed (as
opposed to be directed to the error page) or-
ganized by user-retweet ratios (Table 3). We
12
Fig. 7. The distribution for the number of users’ retweets and the number of topics users’ retweets
trend in
TABLE 2
The top 10 accounts with the highest user-retweet ratios (u-r ratio)
User ID
1840241580
2241506824
1840263604
1840237192
1840251632
2208320854
2208320990
2208329370
2218142513
1843422117
Number of Retweets Number of Users Retweeted U-R Ratio
134
1
134
125
1
125
68
1
68
64
1
64
64
1
64
55
1
55
51
1
51
48
1
48
47
1
47
44
1
44
observe that only 12% of the accounts with
user-retweet ratios of above 30 are active. And,
as user-retweet ratios decrease, the percentages
of active accounts slowly increase. We consider
this to be strong evidence for the hypothesis
that user accounts with high user-retweet ratios
are likely to be spam accounts.
We observe that in some cases, accounts with
lower user-retweet ratios can still be a spam
account. For example, an account could retweet
a number of posts from other spam accounts,
thus minimizing the suspicion of being de-
tected as a spam account itself.
4.6 Removing Spammers in Sina Weibo
From our sample, after automatically checking
each account, we identified 4985 accounts that
were deleted by the Sina Weibo administra-
tor. We called these 4985 accounts “suspected
spam accounts”. There were 463,231 users in
our sample, and 187,130 of them retweeted at
least once. Thus we identified 1.08% of the
total users (2.66% of users that retweeted) as
suspected spam accounts.
Next, in order to measure the effect of spam
on the Weibo network, we removed all retweets
from our sample disseminated by suspected
spam accounts as well as posts published by
them (and then later retweeted by others). We
hypothesize that by removing these retweets,
TABLE 3
The percentage of accounts whose profiles can still be accessed, organized by user-retweet ratio
13
Ratio
≥30
20 – 29
11 – 19
10
9
8
7
6
5
4
3
2
1
Percentage of Active Accounts
12%
38%
16%
22%
12%
16%
15%
21%
30%
58%
80%
96%
92%
Percentage of Inactive Accounts
88%
63%
84%
78%
88%
84%
85%
79%
70%
42%
20%
4%
8%
moved, we re-calculated the distribution of
user-retweet ratios again for arbitrarily chosen
pairs of time frames. Figure 9 illustrates the dis-
tribution for time frames (10, 2). We observed
that the distribution is now much smoother
and seem to follow the log-normal distribution.
We performed the log-normal test and verified
that this is indeed the case.
Fig. 8. An Example of an Error Page
we can eliminate the influences caused by
the suspected spam accounts. We observed
that after these posts were removed, we were
left with only 189,686 retweets in our sample
(51% of the original total retweets). In other
words, by removing retweets associated wth
suspected spam accounts, we successfully re-
moved 182,429 retweets, which is 49% of
the total retweets and 32% of total tweets
(both retweets and original tweets) from our
sample. This result is very interesting because
it shows that a large amount of retweets in our
sample are associated with suspected spam ac-
counts. The spam accounts are therefore artifi-
cially inflating the popularity of topics, causing
them to trend.
To see the difference after the posts associ-
ated with suspected spam accounts were re-
Fig. 9. The distribution of retweet ratios for time
frame (10, 2) after the removal of tweets associ-
ated with suspected spam accounts
4.7 Spammers and Trend-setters
We found 6824 users in our sample whose
tweets were retweeted. However,
the total
number of users who retweeted at least one
person’s tweet was 187130, which is very
skewed. Figure 10 illustrates the distribution
for the number of times users were retweeted.
This distribution follows the power law.
14
celebrities by repeatedly retweeting their posts,
which can also be construed as spam; however,
we exclude those from our list of suspected
spam accounts. Figure 11 illustrates two ex-
amples of the activities from suspected spam
accounts.
Fig. 10. The distribution for the frequency of
retweets of user posts
the number of users
We discovered that
whose tweets were retweeted by the suspected
spam accounts was 4665, which is a surprising
68% of the users who were retweeted in our
sample. This shows that the suspected spam
accounts affect a majority of the trend-setters
in our sample, helping them raise the retweet
number of their posts and thereby making their
posts appear on the trending list. The overall
effect of the spammers is very significant. We
also observed that a high 98% of the total trend-
ing keywords can be found in posts retweeted
by suspected spam accounts. Thus it can also
be argued that many of the trends themselves
are artificially generated, which is a very im-
portant result.
4.8 Examples of Spam Accounts
Next, we investigate the activities of typical
spam accounts in Sina Weibo. We have shown
that accounts with high retweet ratios are likely
to be spam accounts. Although the majority
of the accounts had already been deleted by
the administrator, we manually inspected 100
currently existing accounts with high retweet
ratios and found that 95 clearly participate in
spamming activities. The other 5 were regu-
lar users supporting their favorite singers and
Fig. 11. Example of a spam account
First, we observe that the suspected spam ac-
counts we inspected tend to repeatedly retweet
the same post with the goal of increasing the
retweet number of said post. Next, the interval
time of these repeated retweets tend to be very
close to each other with long breaks between
each set. Finally, we observe that the replies
left from spam accounts often do not make any
sense (see the comments circled in Figure 11).
[21] had similar findings, and explained that
this was because the paid posters are mainly
interested in finishing the job as quickly as
possible, thus they tend to retweet multiple
times in short bursts and leave gibberish as
replies. We observe that the replies in 11 a) and
b) are not proper sentences.
For
the 4665 users whose tweets were
retweeted by at least one suspected spam ac-
count, we calculate the percentage of retweets
from spam accounts and the percentage of
suspected spam accounts involved. We selected
only accounts whose tweets were retweeted by
at least 50% of the accounts that are suspected
spam accounts. From our manual inspection
we found mainly three types of accounts:
1) Verified accounts from celebrities and re-
ality show contestants: We hypothesize
that they employ spam accounts to boast
the popularity of their posts, making it
seem like the posts were retweeted by
many fans;
2) Verified accounts from companies: We
hypothesize that they employ spam ac-
counts to boast the perceived popularity
of their products;
3) Unverified accounts with posts consist of
ads for products: We hypothesize that
these accounts employ spam accounts to
distribute the ads and to boast the per-
ceived popularity of their products, hop-
ing other users will notice and distribute
(see Figure 12 for an example).
Fig. 12. Example of an account using spam
5 D ISCUSS ION AND FU TURE WORK
We have examined the tweets relating to the
trending topics in Sina Weibo. First we ana-
lyzed the growth and persistence of trends.
When we looked at the distribution of tweets
15
over time, we observed that there was a sig-
nificant difference when contrasted with Twit-
ter. The effect of retweets in Sina Weibo was
significantly higher than in Twitter. We also
found that many of the accounts that contribute
to trends tend to operate as user contributed
online magazines, sharing amusing pictures,
jokes, stories and antidotes. Such posts tend
to recieve a large amount of responses from
users and thus retweets. Yang et al. [48] have
shown similar results about Mitbbs users for-
warding amusing messages and “virtual gifts”
to online friends. The effect of this is similar
to that of sending “a cyber greeting card”.
This phenomenon can also be observed from
text messages sent from cell phones between
individuals in China [53]. This is interesting in
the context of there being strong censorship in
chinese social media. It can be hypothesized
that under such circumstances, it is these kind
of “safe” topics that can emerge.
When we examined the retweets in more
detail, we made an important discovery. We
found that 49% of the retweets in Sina Weibo
containing trending keywords were actually
associated with fraudulent accounts. We ob-
served that these accounts comprised of a small
amount (1.08% of the total users) of users but
were responsible for a large percentage of the
total retweets for the trending keywords. These
fake accounts are responsible for artificially
inflating certain posts, thus creating fake trends
in Sina Weibo.
We relate our finding to the questions we
raised in the introduction. There is a strong
competition among content in online social me-
dia to become popular and trend and this gives
motivation to users to artificially inflate topics
to gain a competitive edge. We hypothesize
that certain accounts in Sina Weibo employ
fake accounts to repeatedly repeat their tweets
in order to propel them to the top trending list,
thus gaining prominence as top trend setters
(and more visible to other users). We found
evidence suggesting that the accounts that do
so tend to be verified accounts with commercial
purposes.
It is clear that the owners of these user con-
tributed online magazines see this as a business
opportunity to gain audience for their content.
They can start by generating and propagating
popular content and subsequently begin insert-
ing advertisements amongst the jokes in their
their Sina Weibo accounts. The artificial infla-
tion makes it an even more effective campaign.
We have found that we can effectively detect
suspected spam accounts using retweet ratios.
This can lead to future work such as using
machine learning to identify other spamming
techniques. In the future, we would like to ex-
amine the behavior of these fake accounts that
contribute to artificial inflation in Sina Weibo
to learn how successful they are in influencing
trends.
RE FERENCES
[1]
S. Asur, B. A. Huberman, G. Szabo, and C. Wang, “Trends
in social media - persistence and decay,” in 5th Interna-
tional AAAI Conference on Weblogs and Social Media, 2011.
[2] B. A. Huberman, D. M. Romero, and F. Wu, “Social
networks that matter: Twitter under the microscope,”
Computing Research Repository, 2008.
[3] L. Jin, “Chinese outline BBS sphere: what BBS has brought
to China,” Master ’s thesis, Massachusetts Institute of
Technology, April 2009.
[4] B. Wang, B. Hou, Y. Yao, and L. Yan, “Human flesh search
model incorporating network expansion and gossip with
feedback,” in Proceedings of the 2009 13th IEEE/ACM Inter-
national Symposium on Distributed Simulation and Real Time
Applications.
IEEE Computer Society, 2009, pp. 82–88.
[5] V. King, L. Yu, and Y. Zhuang, “Guanxi in the chinese
web,” in Proceedings of the 2009 IEEE International Confer-
ence on Computational Science and Engineering, vol. 4.
IEEE
Computer Society, 2009, pp. 9–17.
[6] T. Z. Xue, The Internet in China : Cyberspace and Civil
Society. Routledge, 2006.
[7] CNNIC. (2010) The 21st statistics report on the internet
development in china (in chinese). [Online]. Available:
http://www.cnnic.cn/index/0E/00/11/index.htm
[8] ——. (2010) Survey report on internet development in
rural china (in chinese). [Online]. Available: http://www.
cnnic.cn/en/index/00/02/index.htm
F. Y. Wang, “Beyond x 2.0: where should we go?” IEEE
Intelligent Systems, vol. 24, no. 3, pp. 2–4, 2009.
[10] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida,
“Detecting spammers on twitter,” in Collaboration, Elec-
tronic messaging, Anti-Abuse and Spam Conference (CEAS),
vol. 6. National Academy Press, 2010.
[11] A. Wang, “Detecting spam bots in online social net-
working sites: a machine learning approach,” Data and
Applications Security and Privacy XXIV, pp. 335–342, 2010.
[12] K. Lee, J. Caverlee, and S. Webb, “Uncovering social
spammers: social honeypots+ machine learning,” in Pro-
ceeding of the 33rd international ACM SIGIR conference on
Research and development in information retrieval. ACM,
2010, pp. 435–442.
[9]
16
[13] B. Markines, C. Cattuto, and F. Menczer, “Social spam
detection,” in Proceedings of the 5th International Workshop
on Adversarial Information Retrieval on the Web. ACM, 2009,
pp. 41–48.
[14] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu,
“The socialbot network: when bots socialize for fame and
money,” in Proceedings of the 27th Annual Computer Security
Applications Conference. ACM, 2011, pp. 93–102.
[15] B. Stone-Gross, R. Stevens, A. Zarras, R. Kemmerer,
C. Kruegel, and G. Vigna, “Understanding fraudulent
activities in online ad exchanges,” in Proceedings of the
2011 ACM SIGCOMM conference on Internet measurement
conference. ACM, 2011, pp. 279–294.
[16] F. Yu, Y. Xie, and Q. Ke, “Sbotminer: large scale search
bot detection,” in Proceedings of the third ACM international
conference on Web search and data mining. ACM, 2010, pp.
421–430.
[17] L. Liu and K. Jia, “Detecting spam in chinese microblogs
- a study on sina weibo,” in Computational Intelligence and
Security (CIS), 2012 Eighth International Conference on, 2012,
pp. 578–581.
[18] Y. Zhou, K. Chen, L. Song, X. Yang, and J. He, “Feature
analysis of spammers in social networks with active
honeypots: A case study of chinese microblogging net-
works,” in Advances in Social Networks Analysis and Mining
(ASONAM), 2012 IEEE/ACM International Conference on,
2012, pp. 728–729.
[19] X. Yong, Z. Yi, and C. Kai, “Observation on spammers
in sina weibo,” in Proceedings of the 2nd International
Conference on Computer Science and Electronics Engineering
(ICCSEE 2013). Atlantis Press, 2013.
[20] C. Lin, J. He, Y. Zhou, X. Yang, K. Chen, and L. Song,
“Analysis and identification of spamming behaviors in
sina weibo microblog,” in Proceedings of the 7th Workshop
on Social Network Mining and Analysis, ser. SNAKDD ’13,
2013, pp. 5:1–5:9.
[21] C. Chen, K. Wu, V. Srinivasan, and X. Zhang, “Battling the
internet water army: Detection of hidden paid posters,”
CoRR, vol. abs/1111.4297, 2011.
[22] M. Jamali and H. Abolhassani, “Different aspects of
social network analysis,” in Proceedings of
the 2006
IEEE/WIC/ACM International Conference on Web Intelli-
gence, 2006, pp. 66–72.
[23] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and
B. Bhattacharjee, “Measurement and analysis of online
social networks,” in Proceedings of the 7th SIGCOMM
Conference on Internet Measurement. ACM, 2007, pp. 29–
42.
[24] M. Buchanan, Nexus: Small Worlds and the Groundbreaking
Theory of Networks. W. W. Norton & Company, May 2003.
[25] R. Kumar, J. Novak, and A. Tomkins, “Structure and
evolution of online social networks,” in Proceedings of the
12th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining. ACM, 2006, pp. 611–617.
[26] M. McPherson, L. Smith-Lovin, and J. M. Cook, “Birds of
a feather: homophily in social networks,” Annual Review
of Sociology, vol. 27, no. 1, pp. 415–444, 2001.
[27] N. Agarwal, H. Liu, L. Tang, and P. S. Yu, “Identifying the
Influential Bloggers in a Community,” WSDM’08, 2008.
[28] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan,
“Group formation in large social networks: membership,
growth, and evolution,” in Proceedings of the 12th Interna-
tional Conference on Knowledge Discovery and Data Mining.
ACM, 2006, pp. 44–54.
17
[48]
[50]
[49]
[46] H. Chen and E. Haley, “The lived meanings of product
placement in social network sites (snss) among urban
chinese white-collar professional users: A story of happy
network,” Journal of Interactive Advertising, vol. 11, no. 1,
pp. 11–16, 2010.
[47] S.-C. Chu and S. M. Choi, “Electronic word-of-mouth
in social networking sites: A cross-cultural study of the
united states and china,” Journal of Global Marketing,
vol. 24, no. 3, pp. 263–281, 2011.
J. Yang, M. S. Ackerman, and L. A. Adamic, “Virtual gifts
and guanxi: Supporting social exchange in a chinese on-
line community,” in Proceedings of the ACM 2011 Conference
on Computer Supported Cooperative Work, ser. CSCW ’11,
2011, pp. 45–54.
J. Lin, Z. Li, D. Wang, K. Salamatian, and G. Xie, “Analysis
and comparison of interaction patterns in online social
network and social media,” in Computer Communications
and Networks (ICCCN), 2012 21st International Conference
on, 2012, pp. 1–7.
J. Niu, J. Peng, L. Shu, C. Tong, and W. Liao, “An em-
pirical study of a chinese online social network–renren,”
Computer, vol. 46, no. 9, pp. 78–84, 2013.
[51] G. Chang, H.-S. Huang, and J. Y.
jen Hsu, “Detecting
chinese wish messages in social media: An empirical
study,” in ICWSM, 2013.
[52] R. Fan, J. Zhao, Y. Chen, and K. Xu, “Anger is more in-
fluential than joy: Sentiment correlation in weibo,” CoRR,
vol. abs/1309.2402, 2013.
[53] Y. Xia, “Chinese use of mobile texting for social interac-
tions: Cultural implications in the use of communication
technology,” Intercultural Communication Studies, vol. 21,
no. 2, p. 131, 2012.
[29] D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and
S. Suri, “Feedback effects between similarity and social
influence in online communities,” in Proceedings of the
14th ACM SIGKDD international conference on Knowledge
discovery and data mining. ACM, 2008, pp. 160–168.
[30] D. M. Romero, W. Galuba, S. Asur, and B. A. Huberman,
“Influence and passivity in social media,” in 20th Interna-
tional World Wide Web Conference (WWW’11), 2011.
[31] H. Kwak, C. Lee, H. Park, and S. Moon, “What is twitter,
a social network or a news media?” in Proceedings of the
19th international conference on World wide web, ser. WWW
’10, 2010, pp. 591–600.
[32] M. Mathioudakis and N. Koudas, “Twittermonitor: trend
detection over the twitter stream,” in Proceedings of the
2010 international conference on Management of data, ser.
SIGMOD ’10, 2010, pp. 1155–1158.
[33] S. Wu, J. M. Hofman, W. A. Mason, and D. J. Watts, “Who
says what to whom on twitter,” in Proceedings of the 20th
international conference on World wide web, ser. WWW ’11,
2011, pp. 705–714.
[34] S. Asur, B. A. Huberman, G. Szabo, and C. Wang, “Trends
in social media: Persistence and decay,” in 5th International
AAAI Conference on Weblogs and Social Media. AAAI, 2011,
pp. 434–437.
[35] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi,
“Measuring user influence in twitter: The million follower
fallacy,” in 4th International AAAI Conference on Weblogs
and Social Media (ICWSM). AAAI, 2010.
[36] Y. Bian, “Bringing strong ties back in: indirect ties, net-
work bridges, and job searches in china,” American Socio-
logical Review, vol. 62, no. 3, pp. 366–385, 1997.
[37] D. Ruan, “Interpersonal networks and workplace controls
in urban china,” The Australian Journal of Chinese Affairs,
vol. 29, pp. 89–105, 1993.
J.-L. Farh, A. S. Tsui, K. Xin, and B.-S. Cheng, “The influ-
ence of relational demography and guanxi: the Chinese
case,” Organization Science, vol. 9, no. 4, pp. 471–488, 1998.
[39] Y. Bian, R. Breiger, D. Davis, and J. Galaskiewicz, “Occu-
pation, class, and social networks in urban china,” Social
Forces, vol. 83, no. 4, pp. 1443–1468, 2005.
[40] P. J. Carrington, J. Scott, and S. Wasserman, Eds., Models
and Methods in Social Network Analysis. Cambrige Uni-
versity Press, 2005.
[41] M. Xin, “Chinese bulletin board system’s influence upon
university students and ways to cope with it (in chinese),”
Journal of Nanjing University of Technology (Social Science
Edition), vol. 4, pp. 100 –104, 2003.
[42] L. Yu and V. King, “The evolution of friendships in
chinese online social networks,” in Proceedings of the 2010
IEEE Second International Conference on Social Computing,
ser. SOCIALCOM ’10, 2010, pp. 81–87.
[43] Z.-J. Zhong, “Social networking services (sns) in china,”
International Journal of e-Business Management, vol. 4, no. 1,
pp. 66–69, 2010.
[44] B. Zhang, X. Guan, M. J. Khan, and Y. Zhou, “A time-
varying propagation model of hot topic on {BBS} sites
and blog networks,” Information Sciences, vol. 187, no. 0,
pp. 15 – 32, 2012.
[45] M. Chan, X. Wu, Y. Hao, R. Xi, and T. Jin, “Microblogging,
online expression, and political efficacy among young
chinese citizens: The moderating role of information and
entertainment needs in the use of weibo,” Cyberpsy., Be-
havior, and Soc. Networking, vol. 15, no. 7, pp. 345–349,
2012.
[38]
|
1806.05637 | 1 | 1806 | 2018-06-14T16:34:02 | Immunization of networks with non-overlapping community structure | [
"cs.SI",
"physics.soc-ph"
] | Although community structure is ubiquitous in complex networks, few works exploit this topological property to control epidemics. In this work, devoted to networks with non-overlapping community structure (i.e, a node belongs to a single community), we propose and investigate three deterministic immunization strategies. In order to characterize the influence of a node, various pieces of information are used such as the number of communities that the node can reach in one hop, the nature of the links (intra community links, inter community links), the size of the communities, and the interconnection density between communities. Numerical simulations with the Susceptible-Infected-Removed (SIR) epidemiological model are conducted on both real-world and synthetic networks. Experimental results show that the proposed strategies are more effective than classical deterministic alternatives that are agnostic of the community structure. Additionally, they outperform stochastic and deterministic strategies designed for modular networks. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
Immunization of networks with non-overlapping
community structure
Zakariya Ghalmane · Mohammed El
Hassouni · Hocine Cherifi
Received: date / Accepted: date
Abstract Although community structure is ubiquitous in complex networks, few
works exploit this topological property to control epidemics. In this work, devoted
to networks with non-overlapping community structure (i.e, a node belongs to
a single community), we propose and investigate three deterministic immuniza-
tion strategies. In order to characterize the influence of a node, various pieces
of information are used such as the number of communities that the node can
reach in one hop, the nature of the links (intra community links, inter commu-
nity links), the size of the communities, and the interconnection density between
communities. Numerical simulations with the Susceptible-Infected-Removed (SIR)
epidemiological model are conducted on both real-world and synthetic networks.
Experimental results show that the proposed strategies are more effective than
classical deterministic alternatives that are agnostic of the community structure.
Additionally, they outperform stochastic and deterministic strategies designed for
modular networks.
Keywords Community structure · Immunization strategy · Epidemic spreading ·
Influence · Centrality · SIR model
Zakariya Ghalmane
LRIT URAC No 29, Faculty of Science, Rabat IT center, Mohammed V University, Rabat,
Morocco
E-mail: [email protected]
Mohammed El Hassouni
LRIT URAC No 29, Faculty of Science, Rabat IT center, Mohammed V University, Rabat,
Morocco
E-mail: [email protected]
Hocine Cherifi
LE2I UMR 6306 CNRS, University of Burgundy, Dijon, France
E-mail: [email protected]
8
1
0
2
n
u
J
4
1
]
I
S
.
s
c
[
1
v
7
3
6
5
0
.
6
0
8
1
:
v
i
X
r
a
2
1 Introduction
Zakariya Ghalmane et al.
The structure of networks is crucial in explaining epidemiological patterns. In the
past few years, many immunization strategies have been developed using various
topological properties of the network in order to mitigate and control the epidemic
outbreaks. Despite the fact that there is clear evidence that many social networks
show marked patterns of strong community structure [1–4], this property has gen-
erally been ignored. A network with a strong community structure consists on
cohesive subgroups of vertices that share many connections with members of their
group and few connections with vertices outside their group. Bridge nodes are
the ones that link different communities. They create a pathway of spreading dis-
ease outside of their community. Their influence on epidemic spreading has been
particularly investigated in previous works [5–7]. Indeed, immunization of these
nodes allows confining the disease into the community where it starts. However,
one must not neglect the importance of the highly connected nodes embedded into
their community on the epidemic spreading.
Motivated by the reasons referred to above, we propose to make a better use
of the information about the community structure in order to develop new im-
munization strategies. In this work, we restrict our attention to networks where
each node belongs to a single community. We use a global deterministic approach.
In other words, for each node of the network, an influence measure is computed
and the nodes are ranked and immunized according to this measure. The first
proposed method targets nodes having a big inter-community influence. It is mea-
sured by the number of neighboring communities linked to the node. The second
immunization method targets nodes which could have at the same time a high
influence inside and outside their communities. Greater importance is given to
those belonging to large communities since they could affect more nodes. This
strategy is based on a weighted combination of the number of intra-community
and inter-community links of each node in the network. The third method has the
same objectives than the previous one. It is designed in order to take also into
account the density variation of the communities.
Experiments on real-world networks as well as synthetic networks have been
conducted in order to evaluate the efficiency of the methods as compared to both
deterministic and stochastic alternatives. Results of the investigations on the SIR
epidemiological model show that the proposed strategies are in most cases, more
efficient than their competitors. Extensive tests show that none of the proposed
strategies outperform the two others in every situations. Indeed, controlled vari-
ations of the community structure in synthetic networks show that performances
are greatly influenced by the strength of the community structure. The proposed
strategies are thus clearly complementary. Indeed, their efficiency is at the best
for networks belonging to a different range of community structure strength.
The remainder of this paper is organized as follows. In Section 2, related
works and immunization strategies are introduced. In Section 3, the proposed
community-based strategies are defined. Section 4 introduces the experimental
setting used in this work. In Section 5, the experimental results are presented.
Finally, section 6 serves as a conclusion to the paper.
Immunization of networks with non-overlapping community structure
3
2 Related work
Immunization strategies aim to immunize a few key nodes to achieve effectively
the goal of reducing or stopping the spread of infectious diseases. They can be
classified as stochastic or deterministic strategies. In stochastic strategies, local
information about randomly selected nodes is used in order to identify target
nodes. As they do not need any information about the full network structure, they
can be used in situations where it is unavailable. In deterministic strategies, for
each node of the network, one compute a measure of influence using local or global
information. Nodes are then ranked and immunized according to their influence
value. Recently, researchers have begun to pay more attention to the community
structure in terms of epidemic dynamics [8,9]. Stochastic and deterministic strate-
gies based on the community structure characteristics have been proposed. They
can be categorized into two groups. The first group is based on topological prop-
erties of non-overlapping community structure, while the second group uses the
overlapping community structure features (i.e, a node could belong to multiple
communities). We give a brief overview covering both types of strategies in order
to highlight how communities can be advantageously used. However, experimental
investigations are restricted to strategies designed for non-overlapping community
structure which represents the focus of this study.
2.1 Stochastic immunization strategies.
These strategies target the most influential nodes using local information around
randomly selected nodes. Their main advantage is that they require only a lim-
ited amount of information about the network topology. We present two stochastic
methods based on non overlapping community structure and one strategy designed
for overlapping communities.
- Community Bridge Finder (CBF): Proposed by Salathe et al. [10], it is a
random walk based algorithm designed to search for bridge nodes. The basic idea
is that real-world networks exhibit a strong community structure with few links
between the communities. Therefore, when a walker reaches a node in another
community, he is no longer linked to previously visited sites.
The CBF algorithm works as follows:
Step 1: Select a random node vi=0 and follow a random path.
Step 2: vi−1(i(cid:23)2) is considered as a potential target if there is not more than
one connection from vi to any of the previous visited nodes.
Step 3: Two random neighboring nodes of vi are picked (other than vi−1), if
there is no connections back to the previously visited nodes vj≺i then, the poten-
tial target is marked as a bridge and it is immunized. Otherwise, a random walk
at vi−1 is taken back.
Comparisons have been performed with the Acquaintance strategy (A node is
selected at random and one of its randomly selected neighbors is immunized).
Extensive tests conducted on real-world and synthetic networks using the SIR
epidemic model show that CBF performs mostly better, often equally well, and
rarely worse than the Acquaintance strategy [11]. It performs particularly well on
networks with strong community structure.
4
Zakariya Ghalmane et al.
- Bridge-Hub Detector (BHD): The Bridge-Hub Detector [12] is another vari-
ant of CBF strategy. It targets bridge hub nodes for immunization by exploring
friendship circles of visited nodes. The procedure of the BHD algorithm can be
specified as follows:
Step 1: Select a random node vi=0 and follow a random path.
Step 2: Let vi be the node selected after i walks, and fi be the set of all
neighbors of the node vi. The node vi is targeted for immunization if there is at
least a node in fi that is not a member in the set Fi−1 and that is not connected
to the nodes in Fi−1 where Fi−1 ≡ f0
be targeted for immunization and Fi will be updated to Fi ≡ Fi−1
(cid:83) ...(cid:83) ft−1. Otherwise, vi will not
(cid:83) fi.
(cid:83) f1
(cid:83) f2
Step 3: One node vH is randomly selected for immunization among the nodes
in fi that do not belong and could not be linked back to Fi−1.
Therefore, a pair of nodes, a bridge node and a bridge hub, are targeted for im-
munization via a random walk. BHD was applied on simulated and empirical
data constructed from social network of five US universities. Experimental results
demonstrate that it compares favorably with Acquaintance and CBF strategies.
Indeed, it results in reduced epidemic size, lower peak prevalence and fewer nodes
need to be visited before finding the target nodes.
- Random-Walk Overlap Selection (RWOS ): This random walk based strat-
egy [13] targets the high degree overlapping nodes. It starts with defining the list
of overlapping nodes obtained from known or extracted communities. Then, a ran-
dom walk is followed starting from a random node of the network. At each step,
the visited node is nominated as a target for immunization if it belongs to the
list of overlapping nodes, otherwise, the random-walk proceeds. Simulation results
on synthetic and real-wold networks with the SIR epidemic model show that the
proposed method outperforms CBF and BHD strategies. In some cases it has a
smaller epidemic size compared to the membership strategy where overlapping
nodes are ranked according to the number of communities they belong to. In par-
ticular, its performance improves in networks with strong community structures
and with greater overlap membership values.
To summarize, results show that stochastic methods designed for networks
with community structure are more efficient that classical stochastic strategies.
One of the very important contribution of these works is to demonstrate that it
is important to better take into account the modular organization of real-world
networks in order to develop efficient immunization strategies. Note, however, that
stochastic methods are not as efficient as deterministic ones. Their main advantage
is that they do not require a full knowledge of the global structure of the network.
2.2 Deterministic immunization strategies
Nodes are immunized according to a rank computed using a specific influence
(centrality) measure. Nodes with high centrality are targeted for immunization as
they are more likely to infect many other nodes. The majority of known methods
make use of the structural information either at the microscopic or at the macro-
scopic level to characterize the node importance. These strategies such as Degree
and Betweenness measures are very effective but they require the knowledge of
the topology of the entire network. Refer to [14] for a comprehensive survey on
the subject. Based on the fact that the influence of a node is closely linked to
Immunization of networks with non-overlapping community structure
5
the network topological structure, and that a vast majority of real-world networks
exhibit a modular organization, some deterministic methods have been developed
lately for such networks.
- Comm strategy: N. Gupta et al [15] proposed a strategy called the Comm
measure of a node. It combines the number of its intra-community links (links
with nodes inside its community) and the number of its inter-community links
(links with nodes outside its community) to rank nodes that are both hubs in
their community and bridges between communities. In this measure, the num-
ber of inter-community links is raised up to power two while the number of the
intra-community links is not raised to give more importance to bridges. Results
on synthetic and real-world networks show that the Comm based strategy can
be more effective as degree and betweenness strategies. However, it gives signifi-
cant importance to the bridges compared to the community hubs. Yet, the hubs
are commonly believed to be also influential nodes as they can infect their many
neighbors. In some cases, they may play a very major role in the epidemic spread-
ing.
- Membership strategy: L. Hbert-Dufresne et al. [16] proposed an immuniza-
tion strategy based on the overlapping community structure of networks. Nodes
are targeted according to their membership number, which indicates the num-
ber of communities to which they belong. Experiments with real-world networks
of diverse nature (social, technological, communication networks, etc.) and two
epidemiological models show that this strategy is more efficient as compared to
degree, coreness and betweenness strategies. Furthermore, its best performances
are obtained for high infection rates and dense communities.
- OverlapNeighborhood strategy (ON ): M. Kumar et al [17] proposed a
strategy based on overlapping nodes. It targets immediate neighbors of overlap-
ping nodes for immunization. This strategy is based on the idea that high degree
nodes are neighbors of overlapping nodes. Using a limited amount of information
at the community structure level (the overlapping nodes), this strategy allows to
immunize high degree nodes in their respective communities. Experiments con-
ducted on four real-world networks show that this immunization method is more
efficient than stochastic methods such as CBF [18, 19], BHD and RWOS methods.
It also performs almost as well as degree and betweenness strategies while using
less information about the overall network structure.
Globally, experimental results demonstrate that the cited deterministic strate-
gies allows to reach the efficiency of classical strategies that are agnostic about
the community structure with less information. However, there is still room for
improvement.
3 Proposed measures
In order to quantify the influence of a node in the diffusion process on community
structured networks, we propose three measures that integrate various levels of
information.
6
Zakariya Ghalmane et al.
3.1 Number of Neighboring Communities Measure
The main idea of this measure is to rank nodes according to the number of com-
munities they reach directly (through one link). The reason for targeting these
nodes is that they are more likely to contribute to the epidemic outbreak towards
multiple communities. Note that all the nodes that do not have inter-community
links share the same null value for this measure.
3.1.1 Definition:
For a given node i belonging to a community Ck ⊂ C, the Number of Neighboring
Communities βc1 (i) is given by:
βc1 (i) =
aij
(1)
(cid:88)
(cid:95)
Cl⊂C\{Ck}
j∈Cl
Where aij is equal to 1 when a link between nodes i and j exists, and zero other-
wise.(cid:87) represents the logical operator of disjunction, i.e,(cid:87)
j∈Cl
the node i is connected to at least one of the nodes j ∈ Cl.
aij is equal to 1 when
3.1.2 Algorithm:
Algorithm 1: Computation of the Number of Neighboring Community Mea-
sure
Input : Graph G(V,E), Community set: C = {C1, ..., Cm} where m is the
number of communities
Output: A map M (node, measure value)
1 Create and initialize an empty map M (node, value)
2 for each community Ck,k∈{1,2,...,m} in the set C do
3
for each i in the community Ck do
βC1 ← 0
for each C' in C \ {Ck} do
if ∃j ∈ C(cid:48) : eij = 1 (a link exist between i and j) then
4
5
6
7
8
9
βC1 ← βC1 + 1
end
end
10
M.add(i, βC1)
end
11
12 end
3.1.3 Toy example:
In order to illustrate the behavior of this measure a toy example is given in Fig-
ure 1. Nodes are ranked according to the Number of Neighboring Communities
Immunization of networks with non-overlapping community structure
7
Fig. 1 Rank of nodes according to (a) Number of Neighboring Communities measure βc1 (b)
Degree measure (c) Betweenness measure. Nodes are ranked from the most influential (nodes
having the highest measure value) to the less influential node (nodes having the lowest measure
value) in the network.
measure in Figure 1 (a). This measure could distinguish between the different
community bridges within the network where it targets the most influential ones
for immunization. To clarify this idea, let's take the example of nodes n5 and n10
which are both community bridges and which have the same number of either in-
ternal and external links. According to Degree centrality measure in Figure 1 (b),
both nodes have the same rank since it depends only on their number of neigh-
bors. However, they have different ranks according to the Number of Neighboring
Communities measure. The proposed measure gives more importance to node n5
which is linked to three external communities, so ever if it is contaminated, it can
transmit the epidemic disease first to its own community C1 and also towards
the neighboring communities C2, C3 and C4. While the epidemic disease could be
transmitted to nodes belonging to the communities C1 and C2 in the case of node
n10 contamination. Therefore, n5 represents a threat for 20 nodes which is the
majority of nodes of the network, while n10 represents a threat to only 12 nodes.
On the other hand, Betweenness centrality measure tries to immunize network
bridges having a high fraction of geodesics passing through them. Yet, these nodes
do not always represent the community bridges which are very important and
must be immunized in priority in this type of network. As it is shown in Figure 1
(c) according to Betweenness measure, the nodes n15 and n12 are ranked among
the less influential nodes, although, both are community bridges that are likely
to contribute to the epidemic outbreak to external communities. Therefore, the
Number of Neighboring Communities measure targets the most influential bridges
which can spread the epidemics to multiple communities.
3.2 Community Hub-Bridge Measure
Each node of the network share its links with nodes inside its community (intra-
community links) and nodes outside its community (inter-community links). De-
pending of the distribution of these links, it can propagates the epidemic more or
less in its community or to its neighboring communities. Therefore, it can be con-
sidered as a hub in its community and a bridge with its neighboring communities.
That is the reason why we call this measure the Community Hub-Bridge measure.
123βc1(a)n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n21223133232333323332233C4n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n21221122122232233133233C4123Degree(b)1713n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n219981275436C4Betweeness(c)1010111212131314141414148
Zakariya Ghalmane et al.
Furthermore, the hub influence depends on the size of the community, while the
bridge influence depends on the number of its neighboring communities.
3.2.1 Definition:
For a given node i belonging to a community Ck ⊂ C , the Community Hub-Bridge
measure βc2 (i) is given by:
Where:
βc2 (i)i∈Ck = hi(Ck) + bi(Ck)
hi(Ck) = Card(Ck) ∗ kintra
i
(Ck)
bi(Ck) = βc1(i) ∗ kinter
i
(Ck)
(2)
(3)
(4)
i
kintra
i
(Ck) and kinter
(Ck) are respectively the intra-community degree and the
inter-community degree of node i. Card(Ck) is the size of its community. βc1(i)
represents the number of its neighboring communities.
hi(Ck) tend to immunize preferentially hubs inside large communities. Indeed,
they can infect more nodes than those belonging to small communities.
bi(Ck) allows to target nodes that have more links with various communities. Such
nodes have a big inter-community influence.
3.2.2 Algorithm:
Algorithm 2: Computation of the Community Hub-Bridge measure
Input : Graph G(V,E), Community set: C = {C1, ..., Cm} where m is the
number of communities
Output: A map M (node, measure value)
1 Create and initialize an empty map M (node, value)
2 for each community Ck,k∈{1,2,...,m} in the set C do
3
Calculate the size of the community Ck
for each i in the community Ck do
4
5
6
7
8
9
end
10
11 end
Calculate βC1 the number of neighboring communities of i described
in Algorithm 1
Calculate kintra
Calculate kinter
(Ck) the intra-community links of the node i
(Ck) the inter-community links of the node i
i
i
Calculate βC2 the Community Hub-Bridge measure of the node i
according to Equation (2)
M.add(i, βC2)
Immunization of networks with non-overlapping community structure
9
Fig. 2 Rank of nodes according to (a) Community Hub-Bridge measure βc2 (b) Degree
measure (c) Betweenness measure. Nodes are ranked from the most influential to the less
influential node in the network.
3.2.3 Toy example:
Figure 2 (a) shows the rank of nodes according to the Community Hub-Bridge
measure. This measure targets nodes having a good balance of inner and outer
connections inside the community. However, it takes into consideration the size
of the community for quantifying the influence of the community hubs and the
number of neighboring communities for the bridges. Thus, even-though, both n6
and n16 have four inner links inside their own communities n6 is considered more
influential because it is located in community C1 which is the largest community
of the network. Therefore, it could be a threat to several nodes inside the network
if ever it is infected. Unlike degree measure in Figure 2 (b) that classifies the
nodes n6 and n16 in the same rank based on their number of connections without
considering their location within the network. It is also noticed from the previous
example given in Figure 1 (a) that many nodes have the same rank because they
have the same number of neighboring communities. So, if we consider the nodes n10
and n12, they are both connected to only one neighboring community (respectively
C1 and C3 ), consequently they have the same rank. However, n10 has a bigger
connectivity to C1 in term of the number of outer links. The reason why we
introduced the quantity of outer links as a new parameter in the second term
of the Community Hub-Bridge measure to distinguish between bridges having big
connectivity and those having lower connectivity with external communities. Based
on Community Hub-Bridge measure n10 is more influential than node n12 as it
can be seen in Figure 2 (a) since it has three outer connections towards community
C1 while node n12 has only one connection towards C3. Therefore, the influence
of nodes according to this measure is linked to two factors; the importance of
nodes inside their communities by giving the priority to those located in large
communities, and the connectivity of the nodes towards various communities.
n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n21221122122232233133233C4123Degree(b)1713n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n219981275436C4Betweeness(c)101011121213131414141414(a)n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n2144215535755969813C4βc2171310111112131310
Zakariya Ghalmane et al.
3.3 Weighted Community Hub-Bridge Measure
The Community Hub-Bridge measure targets in priority the hubs in large com-
munities and the bridges linked to multiple communities. However, no importance
is given to the community structure strength. When the community structure
is well-defined, more importance should be given to the bridges. Indeed, in this
case breaking the network in multiple communities allows to contain the epidemic
spreading where it started. On the contrary, when the community structure is very
loose, it is of prime interest to immunize the hubs in large communities. Weighting
each component of the community Hub-Bridge allows therefore to give more or
less importance to bridges or hubs according to the community structure strength.
3.3.1 Definition:
For a given node i belonging to a community Ck ⊂ C, the Weighted Community
Hub-Bridge Measure βc3 (i) is given by:
βc3 (i)i∈Ck = ρCk ∗ hi(Ck) + (1 − ρCk ) ∗ bi(Ck)
(5)
Where ρCk represents the interconnection density between the community Ck and
the other communities of the network. It is given by:
(cid:80)
i∈Ck
ρCk =
kinter
i
/(kinter
i
+ kintra
i
)
Card(Ck)
(6)
If the communities are very cohesive, then more importance is given to the bridges
in order to isolate the communities. Otherwise, more importance is given to the
hubs inside large communities.
Immunization of networks with non-overlapping community structure
11
3.3.2 Algorithm:
Algorithm 3: Computation of the Weighted Community Hub-Bridge mea-
sure
Input : Graph G(V,E), Community set: C = {C1, ..., Cm} where m is the
number of communities
Output: A map M (node, measure value)
1 Create and initialize an empty map M (node, value)
2 for each community Ck,k∈{1,2,...,m} in the set C do
3
Calculate the size of the community Ck
Calculate ρCk the the interconnection density between the community
Ck and the other communities of the network according to Equation
(6)
for each i in the community Ck do
4
5
6
7
8
9
Calculate βC1 the number of neighboring communities of i described
in Algorithm 1
Calculate kintra
Calculate kinter
(Ck) the intra-community links of the node i
(Ck) the inter-community links of the node i
i
i
Calculate βC3 the Weighted Community Hub-Bridge measure of the
node i according to Equation (5)
10
M.add(i, βC3)
end
11
12 end
3.3.3 Toy example:
This measure is very similar to the Community Hub-Bridge measure. However,
it is designed in order to be able to adapt to the community structure strength.
As it can be noticed from Figure 3 (a) the network given in this example has
a well-defined community structure. Thus, the interconnection density ρCk has a
small value for all the communities of the network. As we can clearly see, if we
take the example of the community C1, the density of inter-community links is
equal to ρC1 ≈ 0.15. Consequently, 15% of importance is given to the hub term
hi(C1) and 85% of importance is given to the bridge term bi(C1). This explains
why all the community bridges (n5, n2 and n4 ) are immunized before the other
nodes of the community C1. It helps to isolate this community and prevent the
epidemic diffusion to move from C1 to the other communities of the network.
Thus, the Weighted Community Hub-Bridge measure has the ability to adapt
to the strenght of the community structure. It gives more weight to the bridges
when the network has a well-defined community structure in order to isolate the
communities, while it gives more weight to hubs in the case of networks with a
weak community structure since the network acts in this case like a single big
community.
12
Zakariya Ghalmane et al.
Fig. 3 Rank of nodes according to (a) Weighted Community Hub-Bridge measure βc3 (b)
Degree measure (c) Betweenness measure. Nodes are ranked from the most influential to the
less influential node in the network.
Table 1 LFR network parameters
Number of nodes
Average degree
Maximum degree
Exponent for the degree distribution
Exponent for the community size distribution
Mixing parameter
Community size range set
15 000
7
122
3
2.5
0.1, 0.4, 0.7, 0.9
[50 250],[100 500]
4 Experimental Setting
In this section, we present the data and methods used in the empirical evaluation
of the various immunization strategies presented above.
4.1 Datasets
In order to evaluate the various measures under study, synthetic networks with con-
trolled topological properties, together with real-world networks have been used.
4.1.1 Synthetic networks
Synthetic networks are generated using the LFR (Lancichinetti, Fortunato and
Radicchi) algorithm [20]. It generates random samples of networks with power-
law distributed degree and community size. Hence, LFR algorithm guarantees
networks with realistic features [21]. This algorithm allows to control different
parameters when generating networks. Mainly, the mixing parameter µ, determines
the ratio of the number of external neighbors of a node to the total degree of the
node. Its value controls the strength of the community structure. For small values
of µ, the communities are well-separated because they share few links, whereas
when µ increases the proportion of inter community links becomes higher, making
community identification a difficult task. Experimental studies showed that for
a scale-free network, the degree distribution exponent α usually ranges from 2
to 3, and the maximal degree is estimated to be kmax ∼ n1/(α−1) [22–24]. The
parameters values used in our experiments are given in Table 1.
n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n21221122122232233133233C4123Degree(b)1713n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n219981275436C4Betweeness(c)101011121213131414141414n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n213341882859886131367C4(a)βc31713101112121313Immunization of networks with non-overlapping community structure
13
Table 2 The basic topological properties of six real-world networks. N and E are respectively
the total numbers of nodes and links. Q is the modularity. Nc is the number of communities.
Network
Caltech
Princeton
Georgetown
Oklahoma
Power grid
CR-QC
N
620
5112
7651
10386
4941
5242
E
7255
28684
163225
88266
6594
14496
Q
0.788
0.753
0.662
0.914
0.93
0.86
Nc
13
21
42
67
41
396
4.1.2 Real-world networks
Real-world networks of various nature (online social networks, a technological net-
work and a collaboration network) are used in order to test the immunization
strategies.
- Facebook: We use a network gathered by Traud et al. [25] from Facebook 1
online social network . This data includes the friendship network of five univer-
sities in the US. It provides also information about the individuals such as the
dormitory, the major or the field of specialization and the year of class.
- Power-grid: This technological network is an undirected, unweighted network
containing information about the topology of the Western States Power Grid of
the United States. An edge represents a power supply line. A node is either a
generator, a transformer or a substation. This data2 is compiled by D. Watts and
S. Strogatz [26].
- General Relativity and Quantum Cosmology (GR-QC): GR-QC3 is a
collaboration network collected from the e-print arXiv. It covers scientific col-
laborations between authors of papers submitted to the General Relativity and
Quantum Cosmology category. The nodes represent the authors and there is a
link between two nodes if they co-authored a paper. This data is available in the
SNAP repository compiled by J. Leskovec et al. [27].
As the community structure of these networks is unknown, we use a commu-
nity detection algorithm. We choose to use the Louvain algorithm that proved to
be efficient in synthetic networks for a wide range of community strength [28].
Furthermore, the topological properties of the uncovered communities are also
realistic [29].
The basic topological properties of these networks are given in Table 2.
4.2 Epidemiological model
The Susceptible-Infected-Recovered (SIR) epidemic model [30,31] is used to simu-
late the spreading process in networks. In this model, there are three states for each
node: susceptible (S), infected (I) and recovered (R). The infection mechanism of
the SIR model is shown in Figure 4. Initially, targeted nodes are chosen according
to a given immunization strategy until a desired immunization coverage of the
population is achieved, and their state is set to resistant R. All remaining nodes
1http://code.google.com/p/socialnetworksimulation/
2http://www-personal.umich.edu/~mejn/netdata/
3http://snap.stanford.edu/data/ca-GrQc.html
14
Zakariya Ghalmane et al.
Fig. 4 The infection mechanism of the classic SIR model.
are in S state. After this initial set-up, infection starts from a random susceptible
node. Its state changes to I. At each time step, the epidemic spreads from one
infected node to a neighboring susceptible node according to the transmission rate
of infection λ. Furthermore, infected nodes recover at rate γ, i.e. the probability
of recovery of an infected node per time step is γ. If recovery occurs, the state
of the recovered node is set from infected to resistant. The epidemic spreading
process ends when there is no infected node in the network. After each simulation,
we record the total number of recovered nodes (the epidemic size).
4.3 Immunization scheme
To investigate the spread of an infectious disease on a contact network, we use
the methodology described in Figure 5. For deterministic strategies, the influence
of every node in the network is calculated according to a given centrality mea-
sure. Then, nodes are sorted in decreasing order of their influence values. Next,
nodes with highest centrality are removed from the network (or their state is set to
resistant) until a desired immunization coverage is achieved. For stochastic immu-
nization, nodes are targeted and removed according to a random strategy initiated
from randomly chosen nodes in the network. In both cases, the network obtained
after the targeted immunization is used to simulate the spreading process, running
the SIR epidemic model simulations. After a simulation, we record the total num-
ber of cases infected (the epidemic size). In order to ensure the effectiveness of the
SIR propagation model evaluation, results are averaged over 600 independent real-
izations. Finally, we calculate the mean epidemic size to evaluate the effectiveness
of the proposed methods.
4.4 Evaluation Criteria
To compare the performance of different immunization strategies, we use the frac-
tion of the epidemic size. We also use the relative difference of outbreak size ∆rβ0,βc
defined by:
∆rβ0,βc =
Rβ0 Rβc
Rβ0
(7)
Where Rβ0 and Rβc are respectively the final numbers of recovered nodes for the
alternative and the proposed strategy after the SIR simulations. If the relative
γλSIRImmunization of networks with non-overlapping community structure
15
Fig. 5 The main steps of the immunization scheme.
difference of outbreak size is positive, the epidemic spreads less with the proposed
strategy. Therefore, it is the most efficient one. Otherwise, the epidemic spreads
more with the proposed strategy and the alternative strategy is more efficient.
5 Results and discussion
In this section, we report the results of two sets of experiments. The first set
of experiments is performed with synthetic networks with controlled community
structure. It is aimed at getting a better understanding of the relationship between
the community structure and the centrality measures. These experiments are con-
ducted on networks generated with the LFR algorithm. Indeed, this algorithm
allows to control various topological properties of the community structure. We
investigate the influence of the strength of the community structure. The commu-
nity size range effect is also studied. Finally, the proposed immunization strategies
are compared with both deterministic strategies (Degree, Betweenness and Comm
strategies) and stochastic strategies (Community Bridge Finder [10] and Bridge
Hub Detector [12] strategies).
The second set of experiments concerns real-world networks. Online Social net-
works, a technological network and a collaboration network are used. Recall that,
as there is no ground-truth data for these networks, the community structure is
uncovered using the Louvain Algorithm. Indeed, previous studies on synthetic net-
works have shown that it succeeds in identifying the communities for a large range
of community structure strength [12]. First, the proposed immunization strate-
gies are compared and discussed, then their evaluation is performed against both
stochastic and deterministic alternative strategies.
StochasticImmunizationDeterministicImmunizationEpidemicsizeCentralitymeasuresRemovingthe top n nodesSorting nodesS.I.R modelRandomsearchbasedselectionRemoving selected nodesLFR networksorReal-World networks16
Zakariya Ghalmane et al.
Fig. 6 Influence of the strength of the community structure on the epidemic size of the
proposed methods. Simulations are performed on LFR-generated networks with various mixing
parameter values µ. Each epidemic size value is the average of 600 S.I.R simulation runs.
5.1 Synthetic networks
5.1.1 Influence of the strength of the Community Structure
In the LFR model, the mixing parameter value µ varies from 0 to 1. It allows to
control the strength of the community structure from well-separated communities
with few inter-community links (low values of µ) to a network with no community
structure (high values of µ). In order to investigate the effect of the strength of
the community structure on the performance of the proposed methods, five net-
works have been generated for each value of the mixing parameter (µ = 0.1, 0.4,
0.7 and 0.9). Figure 6 reports the average fraction of the epidemic size versus
the proportion of immunized nodes for each µ value. It can be noticed from the
results reported in this figure, that the performance of Community Hub-Bridge
and Weighted Community Hub-Bridge exhibits a similar behavior. Whatever the
fraction of immunized nodes the methods, perform best when the communities are
well-separated. When the fraction of inter-connections between the communities
increases, performance decrease gradually. Indeed, with well-separated communi-
ties, the epidemics is localized to few communities, while it tends to spread more
51015202530f (%)020406080100Epidemic Size (%)(a) Number of Neighboring Communities = 0.1 = 0.4 = 0.7 = 0.951015202530f (%)020406080100Epidemic Size (%)(b) Community Hub-Bridge = 0.1 = 0.4 = 0.7 = 0.951015202530f (%)020406080100Epidemic Size (%)(c) Weighted Community Hub-Bridge = 0.1 = 0.4 = 0.7 = 0.9Immunization of networks with non-overlapping community structure
17
when the inter connections increase. The Number of Neighboring Communities
strategy shows its best performance for a medium range community strength value
(µ = 0.4). Its efficiency decreases slightly in the case of well-defined community
structure, and it gets even worse when it is very loose. Let's now turn to the com-
parisons of the proposed methods between them. We can distinguish three cases
depending of the community structure strength.
In networks exhibiting a very strong community structure, we can see in Fig-
ure 6 that the Community Hub-Bridge strategy is the most efficient. This is due to
the fact that both alternatives methods (Number of Neighboring Communities and
Weighted Community Hub-Bridge strategies) target preferentially the bridges. In
fact, it is not the best solution in a network where the intra-community links pre-
dominate. As there is few external connections compared to the total connections
(intra-community links are considered to be 90% of the total links of the network
when µ=0.1), local outbreaks may die out before reaching other communities.
Therefore, immunizing community hubs seems to be more efficient than immuniz-
ing bridges in networks with strong community structure. This is the reason why
the Community Hub-Bridge method which targets nodes having a good balance
of inner and outer connections is more efficient.
In networks with weak community structure as it can be seen in Figure 6, the
Weighted Community Hub-Bridge method is the most efficient. Indeed, when µ
has a high value, the network does not have a well-defined community structure.
In that case, Weighted Community Hub-Bridge strategy can better adapt to the
community structure. It gives more weight to the community hubs as they are the
most influential nodes in networks with a loose community structure. Remember
that the network acts as a single community in the extreme case where µ (cid:62) 0.9.
That is the reason why it performs better than the other proposed methods.
In networks with community structure of medium strength, the Number of
Neighboring Communities outperforms all the other proposed methods as it re-
ported in Figure 6. In this type of networks, nodes have many external connections
while maintaining a well-preserved community structure. Therefore, there is much
more options for the epidemic to spread easily to neighboring communities. As the
Number of Neighboring Communities strategy targets the most influential com-
munity bridges, it prevents the epidemic spreading to multiple communities. This
is the reason why this immunization method shows its best performance in this
case.
To summarize, Community-Hub bridge strategy is well-suited to situations
where the communities are well-defined (Dense communities with few links be-
tween communities). One must prefer weighted Hub-Bridge strategy when the
community structure is very loose. In between the Number of Neighboring Com-
munities strategy is more efficient.
5.1.2 Community Size Range effects
The aim of this investigation is to show the impact of the community size range
on the performance of the proposed methods. Studies reported above have been
performed with community structure size in the range [100, 500]. In this para-
graph, they are also evaluated in networks with community size range equals to
[50, 250]. Figure 7 reports the epidemic size versus the percentage of immunized
nodes for values of the mixing parameter µ ranging from µ = 0.1 to µ = 0.9,
18
Zakariya Ghalmane et al.
Fig. 7 Effect of community size range on the epidemic spreading of the proposed methods.
Simulations are performed on LFR network with different community structure. Each value is
the average of 600 runs per network and immunization method.
and with the two community size range under study. One can see that all the
immunization strategies exhibit the same behavior. They always perform better
in networks with smaller community size range. Furthermore, the differences be-
tween the epidemic sizes in the two situations decrease when the proportion of
immunized nodes increases. In networks with a big community size range, there
are a small number of communities. Consequently, the range of the Number of
Neighboring Communities measure is also small, and many nodes have the same
values (as it is shown in the example given in section 3.1). That makes the ranking
less efficient. In networks with a smaller community size range, there are much
more communities. In this case, more nodes have different numbers of neighbor-
ing communities values and the ranking is more efficient. That is the reason why
the Number of Neighboring communities performs better in the latter case. Con-
cerning Community Hub-Bridge and Weighted Community Hub-Bridge measures,
both are weighted by the number of neighboring communities. This weight be-
comes more discriminative as the community size range decreases. That explains
why they also perform better in networks with small community size range.
From Figure 7, one can also see that the Community Hub-Bridge method is
always the best immunization method in networks with well-defined community
51015202530f (%)020406080100Epidemic Size (%)(a) Number of Neighboring Communities51015202530f (%)020406080100Epidemic Size (%)(b) Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(c) Weighted Community Hub-Bridge = 0.1; [100,500] = 0.1; [50,250] = 0.4; [100,500] = 0.4; [50,250] = 0.7; [100,500] = 0.7; [50,250] = 0.9; [100,500] = 0.9; [50,250]Immunization of networks with non-overlapping community structure
19
structure, and that the Number of Neighboring Communities outperforms the
other proposed immunization methods (where µ = 0.4). Moreover, the Weighted
Community Hub-Bridge is still the most efficient one in networks with non-cohesive
community structure.
5.1.3 Comparison with the alternative methods
Figure 8 reports the relative difference of the outbreak size between the proposed
strategies and both stochastic (Acquaintance, CBF, BHD) and deterministic al-
ternatives (Degree, Betweenness and Comm) as a function of the fraction of immu-
nized nodes. Community Hub-Bridge is taken as the reference in (a), (d) and (g),
Number of Neighborhood communities in (b), (e) and (h) and Weighted Commu-
nity Hub-Bridge in (c), (f) and (e). The values of the mixing parameter (µ = 0.1,
µ = 0.4, µ = 0.7) cover the three situations in terms of community strength
(strong, median and weak community structure).
Figure 8 (a), (d) and (g) shows that ∆R/R0 has always a positive value. Thus,
Community Hub-Bridge always yields a smaller epidemic size compared to all the
alternative methods whatever the fraction of immunized nodes values, and this
holds for all the range of community structure strength. The middle panels of Fig-
ure 8 reports the results of the comparative evaluation of the Number of Neighbor-
ing Communities strategy. Overall, it is more efficient than the tested alternative
methods. However, Betweenness performs better in networks with strong commu-
nity structure (µ = 0.1) and fraction of immunized nodes below 18%. Indeed,
the relative difference is negative in this case. Therefore, targeting the community
bridges is not the best immunization solution in networks with very well-defined
community structure. It can be also noticed from Figure 8 (c), (f) and (i) that the
Weighted Community Hub-Bridge method results always in the lowest epidemic
size compared to the other methods. To summarize, if we exclude the case of the
Number of neighborhood Communities strategy in the situation where the network
has a strong community structure (µ = 0.1), in every other situations the relative
difference of the outbreak is always positive. That indicates that all the proposed
strategies outperform the alternatives. Let's now turn to more detailed compar-
isons. First of all, these results clearly demonstrate the superiority of deterministic
methods over stochastic methods. Indeed, in any case, the biggest differences are
observed with Acquaintance followed by CBF and BHD. In fact, their rank is cor-
related with the level of information that they possess on the network topology. In
fact, Acquaintance is totally agnostic about the network topology, CBF targets the
bridges between the communities while BHD targets both bridges and hubs. Even
though CBF and BHD are community-based methods, they use the information
only at the level of randomly chosen nodes, from where their low performances.
The compared effectiveness of the three alternatives deterministic strategies de-
pends on the strength of the community structure. For strong community structure
(µ = 0.1), Degree and Comm strategy are very close while Betweenness centrality
is slightly more performing whatever the value of fraction of immunized nodes. For
medium community structure strength (µ = 0.4), results are more mixed, even if
betweenness centrality is still a little bit more efficient. For weak community struc-
ture (µ = 0.7), the three strategies are well separated. Degree ranks first, followed
by Betweenness and Comm strategy in terms of efficiency.
20
Zakariya Ghalmane et al.
Fig. 8 The relative difference of the outbreak size ∆R/R0 as a function of the fraction of
immunized nodes f . The left panels show the difference between Community Hub-Bridge
method and the alternative methods. The middle panels show the difference between Number
of Neighboring Communities method and the alternative methods, while the right panels show
the difference between Weighted Community Hub-Bridge and the alternative methods. We
note that a positive value of ∆R/R0 means a higher performance of the proposed method.
Simulations are performed on LFR network with different community structure. Final values
are obtained by running 600 independent simulations per network, immunization coverage and
immunization method.
51015202530f (%)020406080100ƊR/R0 (%)=0.1(a) Community Hub-Bridge51015202530f (%)020406080100ƊR/R0 (%)=0.1(b) Number of Neighboring Communities51015202530f (%)020406080100ƊR/R0 (%)=0.1(c) Weighted Community Hub-BridgeDegreeBetweenessAcq%aintanceCBF [10]BHD [12]NΔ G% ta et alΔ [15]51015202530f (%)010203040506070ƊR/R0 (%)=0.4(d) Community Hub-Bridge51015202530f (%)010203040506070ƊR/R0 (%)=0.4(e) Number of Neighboring Communities51015202530f (%)010203040506070ƊR/R0 (%)=0.4(f) Weighted Community Hub-Bridge51015202530f (%)01020304050ƊR/R0 (%)=0.7(g) Community Hub-Bridge51015202530f (%)01020304050ƊR/R0 (%)=0.7(h) Number of Neighboring Communities51015202530f (%)01020304050ƊR/R0 (%)=0.7(i) Weighted Community Hub-Bridge Immunization of networks with non-overlapping community structure
21
Fig. 9 The epidemic size of the proposed community based methods performed on six real
networks of different types namely on facebook network of four universities (a) Caltech (b)
Princeton (c) Georgetown (d) Oklahoma, and on (e) Collaboration network (f) Power network.
Final values are obtained by running 600 independent simulations per network, immunization
coverage and immunization method.
5.2 Real-world networks
As our goal is to cover a wide range of situations, real-world data come from
different domains (social, technical and collaboration networks). In order to link
the results of this set of experiments with those performed on synthetic data, we
estimate the mixing proportion parameter of the uncovered community structure
51015202530f (%)020406080100Epidemic Size (%)(a) CaltechNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(b) PrincetonNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(c) GeorgetownNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(d) OklahomaNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(e) ca-GrQcNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(f) Power-gridNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge22
Zakariya Ghalmane et al.
Table 3 The estimated mixing parameter µ of the real-world networks.
Network
µ
Power-grid
ca-GrQc
Princeton Oklahoma Caltech Georgetown
0.034
0.095
0.354
0.441
0.448
0.522
by the Louvain algorithm. Indeed, experiments performed with synthetic networks
have shown that the community strength is a major parameter in order to explain
the efficiency of the proposed immunization strategies. Estimated values reported
in Table 3 show that the networks cover a wide range of community strength.
5.2.1 Spreading efficiency of the proposed methods
Figure 9 shows the epidemic size as a function of the fraction of immunized nodes
obtained after the SIR simulations for the proposed immunization methods. These
results corroborate the conclusions we made with the synthetic networks. It can
be observed on Figure 9 (e) and (f) that in networks with strong community struc-
ture, Community Hub-Bridge is the most efficient immunization method. Indeed,
the estimated mixing parameter value µ is equal to 0.03 and 0.09 respectively for
the power-grid network and the collaboration network. Communities are very well
separated, and the Community Hub-Bridge method targets nodes with a good bal-
ance of intra-community and inter-community links. That is where its superiority
lies.
In networks with average community structure strength shown in Figure 9
(a), (b) and (d), the Number of Neighboring Communities outperforms the other
proposed methods. It targets the bridges connected to multiple communities which
facilitates the spread of epidemics throughout the whole network. Therefore, it is
the most efficient method in Caltech, Princeton and Oklahoma networks.
The Weighted Community Hub-Bridge is the most efficient method for the
Georgetown network (where µ = 0.522) as reported in Figure 9 (c). This method
depends on the fraction of the inter-community links for each community within
the network, which allows us to give the appropriate weighting to favor either
the inter-community or the intra-community influence. This is the reason why
it outperforms the other proposed methods in the Georgetown network which
does not have a strong community structure. Finally, these results confirm the
paramount influence of the mixing proportion parameter in order to choose the
most appropriate strategy in a given situation. Whatever the origin of the network,
what matters the most is the strength of the community structure.
5.2.2 Comparison with the alternative methods
The relative difference of the outbreak size between deterministic as well as stochas-
tic strategies and the proposed strategies is reported in Figure 10. Similarly than
with synthetic networks, the stochastic strategies (CBF and BHD) perform poorly
as compared to deterministic ones. Indeed, it appears clearly that these two types
of methods are well separated. The results of the comparative evaluation of the
deterministic strategies are quite consistent with what might have been expected.
The proposed strategies are globally more efficient than their competitors. This is
all the more true when they are used appropriately.
Immunization of networks with non-overlapping community structure
23
The left panels of Figure 10 show the comparison between the Community
Hub-Bridge and the alternative methods. It outperforms the deterministic meth-
ods in networks with strong community structure (Power Grid and ca-GrQc) with
a minimal gain of around 10 % over the best alternative (Betweenness). Its benefits
reduces when the strength of the community structure gets looser. It is still above
Betweenness for Princeton and Oklahoma networks, despite their medium range
mixing proportion. However, when the community structure becomes weaker (Cal-
tech and Georgetown), it is less performing when the fraction of immunized nodes
is greater than 20 %.
The middle panels of Figure 10 show the comparison between the Number of
Neighboring Communities and its alternative. It shows its best performances for
networks with medium mixing proportion values (Princeton, Oklahoma, Caltech)
with gains above 10 % as compared to the most performing alternative (Between-
ness). It is still performing better than the best alternative for Georgetown (degree
strategy), but with gains of less than 10 %. However, it performs in some cases
worse than Degree and Betweenness in networks with strong community structure
(Power-grid and the collaboration networks).
The right panels of Figure 10 show the comparison between the Weighted
Community Hub-Bridge and the alternative strategies. As expected, it outperforms
its competitors in networks with average and high community structure strength.
However, it can be worse than betweenness for networks with a strong community
structure.
To summarize, these experiments reveal that the proposed algorithms are very
effective in identifying the influential nodes to be selected for immunization. When
they are used on the appropriate networks in terms of community strength, they
outperform the available strategies, simply by using relevant information about
the community structure.
6 Conclusion
The adoption of an appropriate immunization strategy aroused much interest
among researchers to control any threat of infectious diseases spreading. Despite
the presence of the community structure in all the social networks, this property
has been mostly ignored by the existing immunization strategies. In this paper,
three community based strategies are proposed. They engage more topological
information related to networks with non-overlapping community structure. The
proposed strategies are evaluated in different synthetic and real networks. To verify
their effectiveness, SIR epidemic model is employed. First of all, results show that
the performance of stochastic strategies is far from what can be expected from
deterministic strategies. Indeed, as they do not have access to the whole network
structure, it is not easy to exploit their properties.
Extensive investigation shows also that generally, the proposed immunization
strategies have a smaller epidemic size compared to the most influential determin-
istic immunization strategies (Betweenness and Degree) and the Comm strategy
designed for networks with non-overlapping community structure. The Commu-
nity Hub-Bridge method is particularly suited to networks with strong community
structure. The Number of Neighboring communities shows its best with medium
strength community structure while Weighted Community Hub-Bridge is more
24
Zakariya Ghalmane et al.
efficient in networks with weak community structure. Additionally, the commu-
nity size range plays also an important role in the diffusion process. Immunization
strategies are more efficient when the community size is small. One of the main
benefit of this work is to show that significant gains can be achieved by mak-
ing a better use of the knowledge on the community structure organization. It
can be extended in multiple directions. First of all, these measures can surely be
improved by using finer weights in order to make them more robust to the commu-
nity structure variation. Now that the impact of the community structure strength
has been clearly identified, stochastic versions of the proposed strategies need to
be designed. Finally, extension to non-overlapping community structures can be
considered.
References
1. Porter, Mason A., Jukka-Pekka Onnela, and Peter J. Mucha. "Communities in networks."
Notices of the AMS 56.9 (2009): 1082-1097.
2. Ferrara, Emilio. "Community structure discovery in facebook." International Journal of
Social Network Mining 1.1 (2012): 67-90.
3. Jebabli, Malek, et al. "User and group networks on YouTube: A comparative analysis."
Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Con-
ference of. IEEE, 2015.
4. Jebabli, Malek, et al. "Overlapping community structure in co-authorship networks: A
case study." u-and e-Service, Science and Technology (UNESST), 2014 7th International
Conference on. IEEE, 2014.
5. Liu, Zonghua, and Bambi Hu. "Epidemic spreading in community networks." EPL (Eu-
rophysics Letters) 72.2 (2005): 315.
6. Gupta, Naveen, Anurag Singh, and Hocine Cherifi. "Community-based immunization
strategies for epidemic control." Communication Systems and Networks (COMSNETS),
2015 7th International Conference on. IEEE, 2015.
7. Chakraborty, Debayan, Anurag Singh, and Hocine Cherifi. "Immunization Strategies
Based on the Overlapping Nodes in Networks with Community Structure." International
Conference on Computational Social Networks. Springer, Cham, 2016.
8. Palla, Gergely, et al. "Uncovering the overlapping community structure of complex net-
works in nature and society." nature 435.7043 (2005): 814.
9. Fortunato, Santo, and Darko Hric. "Community detection in networks: A user guide."
Physics Reports 659 (2016): 1-44.
10. Salath, Marcel, and James H. Jones. "Dynamics and control of diseases in networks with
community structure." PLoS computational biology 6.4 (2010): e1000736.
11. Cohen, Reuven, Shlomo Havlin, and Daniel Ben-Avraham. "Efficient immunization strate-
gies for computer networks and populations." Physical review letters 91.24 (2003): 247901.
12. Gong, Kai, et al. "An efficient immunization strategy for community networks." PloS one
8.12 (2013): e83489.
13. Taghavian, Fatemeh, Mostafa Salehi, and Mehdi Teimouri. "A local immunization strategy
for networks with overlapping community structure." Physica A: Statistical Mechanics and
its Applications 467 (2017): 148-156.
14. L, Linyuan, et al. "Vital nodes identification in complex networks." Physics Reports 650
(2016): 1-63.
15. Gupta, Naveen, Anurag Singh, and Hocine Cherifi. "Centrality measures for networks with
community structure." Physica A: Statistical Mechanics and its Applications 452 (2016):
46-59.
16. Hbert-Dufresne, Laurent, et al. "Global efficiency of local immunization on complex net-
works." Scientific reports 3 (2013): 2171.
17. Kumar, Manish, Anurag Singh, and Hocine Cherifi. "An Efficient Immunization Strategy
Using Overlapping Nodes and Its Neighborhoods." Companion of the The Web Conference
2018 on The Web Conference 2018. International World Wide Web Conferences Steering
Committee, 2018.
Immunization of networks with non-overlapping community structure
25
18. NEWMAN, Mark EJ. A measure of betweenness centrality based on random walks. Social
networks, 2005, vol. 27, no 1, p. 39-54.
19. Brandes, Ulrik. "A faster algorithm for betweenness centrality." Journal of mathematical
sociology 25.2 (2001): 163-177.
20. Lancichinetti, Andrea, Santo Fortunato, and Filippo Radicchi. "Benchmark graphs for
testing community detection algorithms." Physical review E 78.4 (2008): 046110.
21. Orman, Gnce Keziban, Vincent Labatut, and Hocine Cherifi. "Towards realistic artificial
benchmark for community detection algorithms evaluation." International Journal of Web
Based Communities 9.3 (2013): 349-370.
22. Albert, Rka, and Albert-Lszl Barabsi. "Statistical mechanics of complex networks." Re-
views of modern physics 74.1 (2002): 47.
23. Boccaletti, Stefano, et al. "Complex networks: Structure and dynamics." Physics reports
424.4-5 (2006): 175-308.
24. Newman, Mark EJ. "The structure and function of complex networks." SIAM review 45.2
(2003): 167-256.
25. Traud, Amanda L., Peter J. Mucha, and Mason A. Porter. "Social structure of facebook
networks." Physica A: Statistical Mechanics and its Applications 391.16 (2012): 4165-4180.
26. Watts, Duncan J., and Steven H. Strogatz. "Collective dynamics of small-worldnetworks."
nature 393.6684 (1998): 440.
27. Leskovec, Jure, Jon Kleinberg, and Christos Faloutsos. "Graph evolution: Densification
and shrinking diameters." ACM Transactions on Knowledge Discovery from Data (TKDD)
1.1 (2007): 2.
28. Orman, Gnce Keziban, Vincent Labatut, and Hocine Cherifi. "On accuracy of community
structure discovery algorithms." arXiv preprint arXiv:1112.4134 (2011).
29. Orman, Gnce Keziban, Vincent Labatut, and Hocine Cherifi. "Comparative evaluation of
community detection algorithms: a topological approach." Journal of Statistical Mechan-
ics: Theory and Experiment 2012.08 (2012): P08001.
30. Newman, Mark EJ. "Spread of epidemic disease on networks." Physical review E 66.1
(2002): 016128.
31. Moreno, Yamir, Romualdo Pastor-Satorras, and Alessandro Vespignani. "Epidemic out-
breaks in complex heterogeneous networks." The European Physical Journal B-Condensed
Matter and Complex Systems 26.4 (2002): 521-529.
26
Zakariya Ghalmane et al.
51015202530f (%)−10010203040506070ƊR/R0 (%)51015202530f (%)−10010203040506070ƊR/R0 (%)(a) Caltech51015202530f (%)−10010203040506070ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]51015202530f (%)01020304050607080ƊR/R0 (%)51015202530f (%)01020304050607080ƊR/R0 (%)(b) Princeton51015202530f (%)01020304050607080ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]51015202530f (%)010203040506070ƊR/R0 (%)51015202530f (%)010203040506070ƊR/R0 (%)(c) Georgetown51015202530f (%)010203040506070ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]51015202530f (%)01020304050607080ƊR/R0 (%)51015202530f (%)01020304050607080ƊR/R0 (%)(d) Oklahoma51015202530f (%)01020304050607080ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]Immunization of networks with non-overlapping community structure
27
Fig. 10 The relative difference of the outbreak size ∆R/R0 as a function of the fraction
of immunized nodes f . The left panels show the difference between Community Hub-Bridge
method and the alternative methods. The middle and the right panels show respectively the
difference between the Number of Neighboring Communities method, the Weighted Commu-
nity Hub-Bridge and the alternative methods. We note that a positive value of ∆R/R0 means
a higher performance of the proposed method. Simulations are performed on different types
of real-world networks. Final values are obtained by running 600 independent simulations per
network, immunization coverage and immunization method.
51015202530f (%)−1001020304050607080ƊR/R0 (%)51015202530f (%)−1001020304050607080ƊR/R0 (%)(e) ca-GrQc51015202530f (%)−1001020304050607080ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]51015202530f (%)020406080ƊR/R0 (%)51015202530f (%)020406080ƊR/R0 (%)(f) Power-grid51015202530f (%)020406080ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15] |
1601.07108 | 1 | 1601 | 2016-01-26T17:26:58 | Centrality Measures for Networks with Community Structure | [
"cs.SI",
"physics.soc-ph"
] | Understanding the network structure, and finding out the influential nodes is a challenging issue in the large networks. Identifying the most influential nodes in the network can be useful in many applications like immunization of nodes in case of epidemic spreading, during intentional attacks on complex networks. A lot of research is done to devise centrality measures which could efficiently identify the most influential nodes in the network. There are two major approaches to the problem: On one hand, deterministic strategies that exploit knowledge about the overall network topology in order to find the influential nodes, while on the other end, random strategies are completely agnostic about the network structure. Centrality measures that can deal with a limited knowledge of the network structure are required. Indeed, in practice, information about the global structure of the overall network is rarely available or hard to acquire. Even if available, the structure of the network might be too large that it is too much computationally expensive to calculate global centrality measures. To that end, a centrality measure is proposed that requires information only at the community level to identify the influential nodes in the network. Indeed, most of the real-world networks exhibit a community structure that can be exploited efficiently to discover the influential nodes. We performed a comparative evaluation of prominent global deterministic strategies together with stochastic strategies with an available and the proposed deterministic community-based strategy. Effectiveness of the proposed method is evaluated by performing experiments on synthetic and real-world networks with community structure in the case of immunization of nodes for epidemic control. | cs.SI | cs |
Centrality Measures for Networks with Community
Structure
Naveen Gupta
Computer Science and Engineering Discipline
PDPM Indian Institute of Information Technology,
Design & Manufacturing Jabalpur,
Jabalpur, India
email: Corresponding author: [email protected]
Anurag Singh
Department of Computer Science and Engineering,
National Institute of Technology,
Delhi, India
Hocine Cherifi
University of Burgundy, LE2I UMR CNRS 6306,
Dijon, France
Abstract
Understanding the network structure, and finding out the influential nodes
is a challenging issue in the large networks. Identifying the most influential
nodes in the network can be useful in many applications like immunization
of nodes in case of epidemic spreading, during intentional attacks on com-
plex networks. A lot of research is done to devise centrality measures which
could efficiently identify the most influential nodes in the network. There are
two major approaches to the problem: On one hand, deterministic strategies
that exploit knowledge about the overall network topology in order to find
the influential nodes, while on the other end, random strategies are com-
pletely agnostic about the network structure. Centrality measures that can
deal with a limited knowledge of the network structure are required. Indeed,
in practice, information about the global structure of the overall network is
rarely available or hard to acquire. Even if available, the structure of the
network might be too large that it is too much computationally expensive
to calculate global centrality measures. To that end, a centrality measure is
Preprint submitted to Physica A: Statistical Mechanics and its ApplicationsJanuary 27, 2016
proposed that requires information only at the community level to identify
the influential nodes in the network. Indeed, most of the real-world networks
exhibit a community structure that can be exploited efficiently to discover
the influential nodes. We performed a comparative evaluation of prominent
global deterministic strategies together with stochastic strategies with an
available and the proposed deterministic community-based strategy. Effec-
tiveness of the proposed method is evaluated by performing experiments on
synthetic and real-world networks with community structure in the case of
immunization of nodes for epidemic control.
Keywords: Complex Networks, Epidemic Dynamics, Community
Structure, Immunization Strategies
1. Introduction
Outbreak of infectious diseases is a serious threat to the lives of people
and it also brings serious economic loss for the victim countries. So, it is
very important to discover the propagation rules in the social groups in or-
der to prevent the epidemics or at least to control the epidemic spreading.
Vaccination allows to protect people and prevent them to transmit disease
among their contacts. As mass vaccination is not always feasible, due to
limited vaccination resources, targeted immunization strategies are of prime
interest for public health. Impact of the contact network topology on disease
transmission is a hot topic in the large networks study. A lot of work is done
towards this direction by various researchers [1, 2, 3, 4, 5, 6, 7, 8].
Network organization can be characterized at different scales ranging from
the microscopic to the macroscopic level. At the microscopic level, one con-
centrates on the differences between individuals in order to identify the most
influential ones. At this level, statistical measures are used to summarize
some of the overall network features. The centrality of a node is a very im-
portant feature. Since the nodes with high centrality values can propagate
information to the whole network more easily than the rest of the nodes with
low centrality measures, they are the ones to be targeted for immunization.
Unfortunately, there is no general consensus on the definition of centrality
and many measures are proposed. Degree centrality and betweenness cen-
trality are the most influential methods [9, 10]. They are studied extensively
to understand their effect on epidemic dynamics. The degree centrality of a
node is its number of links to other nodes, while the betweenness centrality
2
measures its contribution to the shortest paths between every pair of nodes
in the network. As most real world-networks follow a power law distribution,
it is very efficient to immunize the hubs (i.e., nodes having high degrees)
preferentially. However, many real world networks are more structured than
merely having heterogeneous degree distributions.
Sometimes, there is no information available about the global structure of
the real-world networks. Hence, centrality measures based on locally avail-
able network information are of prime interest. Such strategies rely only
on local information around the selected nodes. The most basic strategy is
random immunization where target nodes are picked at random regardless
of the network topology. In acquaintance immunization, the selected node is
chosen randomly among the neighbors of a randomly picked node. As ran-
domly selected acquaintances have more connections than randomly selected
nodes, this method targets highly connected nodes [11]. It can be viewed as
a local approximation of a global degree based strategy.
The mesoscopic level of organization is mainly concerned by properties
shared by sets of nodes called communities. A community-structured net-
work is organized around different communities such that the number of links
connecting the nodes in the same community is relatively large as compared
to the number of links connecting nodes in different communities. While the
effect on epidemic dynamics of degree distribution is studied extensively, the
community structure of networks has attracted little attention. Its investi-
gation has recently started, despite the fact that many real-world networks
show significant community structure. Results reported in the literature con-
firm that the knowledge of the network degree distribution is not sufficient
to predict epidemic dynamics. Indeed, fundamentally different behaviors are
observed due to variations of the community structure in the networks with
the same degree distribution. Therefore, the design of immunization strate-
gies needs to take into account the community structure. At this level, the
focus is on structural hubs (i.e., the nodes connecting the largest number of
different communities).
Indeed, these nodes act as bridges facilitating the
propagation of the epidemic from one dense community to another [12, 13].
The diffusion over the network is important to study for the epidemic spread-
ing. Samukhin et al. have studied the Laplacian operator of an uncorrelated
random network and diffusion processes on the networks. They have pro-
posed a strict approach for diffusion process [14]. An exact closed set of
integral equations are derived. which provide the averages of the Laplacian
operators resolvent, it initiated to describe the propagation of a random walks
3
on the network. Mitrovic et al. have studied eigenvalue spectra and the dif-
fusion process with random walk in a various class of networks at mesoscopic
level [15]. Arenas et al. have studied the relationship among the topological
scale and dynamic time scale in the networks based on the dynamics closer
to synchronization of coupled oscillators. In their study they have considered
the communities of nodes organized in a hierarchical manner at different time
[16].
Immunization strategies in community-structured populations are previ-
ously investigated. Masuda [17] proposed an immunization strategy based on
the eigenvector centrality for community-structured networks. In this paper,
module based strategy technique is used for measuring the contribution of
the each node to the weighted community network in order to preferentially
immunize nodes that bridge important communities. The number of links
they share gives the weight of a link between any two communities. The in-
fluence of a node is related to the importance of the community together with
its connectivity to the other communities. The effectiveness of the method
is compared to alternative centrality measures (degree, betweenness, eigen-
vector) in the real and synthetic networks with modular structure. Three
community detection algorithms are used to uncover the non-overlapping
communities. The generated networks used to simulate real-world networks
are made of equal-sized communities with heterogeneous degree distributions.
[12] proposed an immunization strategy and targeted at
nodes that connect to multiple communities, it was called community bridge
finder (CBF). CBF is a local algorithm based on random walk. Starting from
a node chosen randomly, it follows a random path until it reaches a node that
does not connect to more than one of the previously visited nodes. They have
used standard epidemic spreading model, susceptible-infected-resistant (SIR)
[18] for finding the results on both real-world and synthetic networks. The
authors compared three global centrality measures: degree, betweenness and
random walk, and two local strategies: acquaintance and CBF. It is shown
that the random walk centrality is the most successful strategy. Furthermore
CBF outperforms the acquaintance method. In this work, the communities
on the empirical network are defined functionally, and the synthetic data are
generated using the Watts and Strogatz model [19].
Salath´e et al.
However, there are some major issues associated with these contributions
to the problem. First of all, the community structure of real-world networks
is often not known, and one must rely on a community detection algorithm in
4
order to uncover it. Therefore, it is therefore difficult to measure the influence
of this operation on the results. Indeed, the classes of techniques available
to detect communities are both numerous and diverse, and until now, there
is no consensus on either a community definition or a universal detection
method. Even, when a ground truth based on functional features is avail-
able, the topology of the selected networks can hardly be diverse enough to
represent all types of systems encountered in various applications. To over-
come these limitations, artificial networks can be used. Indeed, a random
model allows generating as many networks as desired, while controlling some
of their topological properties. However, this strategy raises another issue:
the realism of the obtained networks, which should mimic closely real-world
networks in order to get relevant test results. It is worth mentioning that
some attempts are made to develop a theoretical framework for understand-
ing the effects of the modular structure in networks. Unfortunately, models
used in previous work are oversimplified. Simple cases in which modules are
homogeneous and of equal size are considered while in real-world networks,
modules are found to be heterogeneous in various aspects. For example, it is
well established that networks with a community structure are characterized
by a power-law distributed community size [20, 21, 22, 23].
Our investigations, address the above limitations.
In order to under-
stand how community structure affects epidemic dynamics we perform an
extensive investigation using a realistic generative model [24] with controlled
topological properties and a representative set of immunization strategies.
The main goal of this study is to give a clear answer on which immuniza-
tion strategy should be preferred in order to control epidemics in networks
with community structure. Second, the impact of the community structure
is analyzed using the LFR benchmark algorithm [24]. We also perform the
experiments using the proposed method on some real-world networks to fur-
ther validate results on synthetic benchmark. An extensive experimental
evaluation is conducted in order to investigate their efficiency as compared
to global centrality measures, random-walk based stochastic measures as well
as another community-based strategy. The major contributions of this pa-
per are twofold. First, a new local centrality measure based on the network
community structure is introduced. Second, an extensive experimental evalu-
ation is conducted in order to investigate its efficiency as compared to global
centrality measures, random-walk based stochastic measures as well as an
alternative community-based strategy. The impact of the community struc-
ture is analyzed using both controlled synthetic benchmark produced by the
5
LFR algorithm [24] and real-world networks. The SIR epidemic spreading
model [25] is considered in order to test the immunization strategies.
The rest of the paper is organized as follows. In section 2, various cen-
trality measures and immunization strategies are presented. Classic epidemic
spreading model is discussed to understand the diffusion over the heteroge-
neous networks.
In section 4, the benchmark model is introduced and its
main properties are recalled. Section 5 is devoted to the experimental re-
sults. The observations and findings are described in section 7.
2. Immunization Strategies
Targeted immunization strategies can be divided into three categories
based on their requirement about the knowledge of the network topology.
Global strategies exploit the knowledge of the full network structure in order
to find the influential nodes while Community-based strategies are able to
work with a limited amount of information. The third category of immuniza-
tion strategies are stochastic strategies which rely only on local information
around randomly selected nodes. These three types of strategies are de-
scribed below in detail:
2.1. Global Strategies:
These immunization strategies are based on an ordering of the nodes of
the whole network according to an influence measure. Nodes are then tar-
geted (removed) in the decreasing order of their rank. The influence of a node
is computed according to some centrality measure. In this study, two promi-
nent global centrality measures (degree and betweenness) are considered in
order to compare with the proposed strategies.
1. Degree Centrality : Degree centrality denotes the number of imme-
diate neighbors of a node, i.e. which are only one edge away from the node.
It is simple but very coarse. It can be interpreted as the number of walk of
length one starting at the considered node. It measures the local influence of
a node. It has many ties and fails to take into account the influence weight
of even the immediate neighbors (Algorithm 1). Even if it is a local measure,
the immunization strategy is global because it needs to rank all the nodes of
the network according to their degree.
2. Betweenness Centrality : Betweenness centrality defines the influ-
ence of a node based on the number of shortest paths between every pair of
6
Algorithm 1 To calculate Degree Centrality
Input Graph G(V, E)
Output A map/dictionary with (node, centrality value) pairs
Initialize an empty map, M with (node, value) pair.
for each node u in set V : do
Calculate the number, n of adjacent nodes or neighbors of u.
Add the pair (u, n) to the map M.
end for
Return the map M.
nodes that passes through that node. It basically tries to identify the influ-
ence of a node in terms of information flow through the network (Algorithm
2). In this strategy, the nodes are target based on their overall betweenness
centrality. The computation of betweenness has high time complexity.
Algorithm 2 To calculate Betweenness Centrality
Input Graph G(V, E)
Output A map/dictionary with (node, centrality value) pairs
Initialize an empty map, M with (node, value) pair format.
Calculate the number (n) of shortest paths between every pair of nodes
(a, b) in the graph.
Store the result in step 2 in a map, M with pairs ( (a, b), n ).
for each node u in set V : do
Let BC(u) be the betweenness centrality of node u, and initialize it to
zero.
for each node pair (a, b) in the map M do
Count the number (n1) of shortest paths between the nodes a and b,
of which node u is also a part of.
BC(u) = BC(u) + n1/n
end for
end for
Return the map M.
2.2. Stochastic Strategies:
Stochastic strategies do not need any information about the global struc-
ture of the network. They are able to work with a very limited amount of local
7
information about a node. They basically try to find the influential nodes
based on random walks. Such algorithms, agnostic about the full network
structure are necessary in some situations. For example, the full structure
of the contact network relevant to the spread of a disease is generally not
known.
1. Random Acquaintance: Random Acquaintance immunization
[11]. It works as follows: pick a ran-
strategy is proposed by Cohen et al.
dom node v0, and then pick its acquaintance or neighbor, v1 at random.
Immunize the nodes which are picked as acquaintances at least n times. An
acquaintance is immunized immediately in the case of n = 1. This strategy
identifies highly connected individuals without any information about the
global structure of the network.
2. Community Bridge Finder (CBF): The CBF algorithm, pro-
[12], is a random walk based algorithm, aimed at
posed by Salathe et al.
identifying nodes connected to multiple communities. The algorithm begins
with selecting a random node as the starting node. Then a random path is
followed until a node is found that is not connected to more than one of the
previously visited nodes on the random walk. It is based on the idea that the
first node not connecting back to already visited nodes of the current ran-
dom walk is more likely to belong to a different community. This strategy is
completely agnostic about the network structure.
2.3. Community-based Strategies:
These strategies do not require any information about the global struc-
ture of the network. They only require information at the community level.
In the case where the community structure is unknown, it can be uncov-
ered with local community detection algorithms [26, 27]. In a network with
community structure, the degree of a node can be split into two contribu-
tions: the intra-community links connecting it to nodes in its community
and the inter-community links connecting it to nodes outside its commu-
nity. Strength of the community structure of a network depends upon inter
and intra-community links. A network is said to have a strong community
structure if a small fraction of total links in the networks lies between the
communities. It is said to have well defined communities. On the contrary,
if a large fraction of total links lies between the communities, then the net-
work does not contain well-defined communities and it is said to have a weak
community structure.
8
The topology of a network can be fully specified by its adjacency matrix
A. In the case of an undirected, unweighted network, A(i, j) is equal to 1 if
nodes i and j are directly connected to each other otherwise it is equal to
zero. Considering a community C of a network, the total degree of a node i
can be split in to two parts:
ki(C) = kin
i (C) + kout
i
(C).
(1)
The degree ki of a node i is equal to the total number of its connections with
other nodes, ki = Pj A(i, j). The In-degree of a node is equal to the number
of edges connecting it to other nodes of the same community and can be
calculated as kin
i (C) = Pj∈C A(i, j). The out-degree of a node i is equal to
the number of connections to the nodes lying outside the community and can
be calculated as kout
1. Mod Centrality: Masuda [17] proposed to apply the dynamical
importance strategy to the network representing the community structure.
Given a community structure of the original network the community weighted
network is build.
Its nodes are the communities and the weight of a link
between two communities is equal to the number of links they share. Then
node that maximizes the following quantity are sequentially removed:
i
(C) = Pj /∈C A(i, j).
(2uK − x) X
I6=K
dkI uI
(2)
The first factor measures the importance of the module that node k belongs
to (i.e. (2uK − x) ≈ 2uK) where, uK represents the eigen vector correspond-
ing to Kth community. The second quantity in the equation represents the
connectivity of node k to other important modules (i.e., PI6=K dkI uI). On
the basis of the modular structure determined for the original network, uI
is recalculated and nodes are removed one at a time. If all the modules are
isolated, nodes are removed sequentially in the descending order of in-degree,
kin
i of the nodes. In-degree of all the remaining nodes is recalculated after
the removal of each node. This strategy preferentially immunizes globally
important nodes having important inter-community links rather than locally
important ones such as local hubs (Algorithm 3).
This strategy has got several drawbacks. It defines the importance of a
node based on eigenvectors of the network. Calculation of eigenvectors is a
computationally expensive task. Additionally, the centralities of the remain-
ing nodes are re-calculated after the removal of nodes with high centrality.
9
It also needs a coarse global information to which other community nodes
are connected. When the communities are isolated after removing all the
bridge nodes, it reduces to selecting the nodes only on the basis of higher
in-degree. To overcome these drawbacks, we propose a strategy requiring less
information, computationally cheaper and as efficient.
Algorithm 3 To calculate Mod Centrality
Input Graph/Network G(V, E), Community Structure of the network
Output A map/dictionary with (node, centralityvalue) pairs
Initialize an empty map, M with (node, value) pair format.
Build a community weighted network using the community structure as
follows:
Communities of the original network represent the nodes in the community
weighted network.
Total number of links between two communities denotes the weight of the
link between the corresponding nodes in the weighted network.
Build an eigen matrix of the weighted network.
for each node k in the graph do
Let MC(k) be the mod centrality of node k.
Let uK represents the eigen vector corresponding to the community of
node k. dkI represents the number of inter-community links that exist
between node k and community I.
if there are links remaining between any two communities in the network
then
MC(k) = (2uK) X
I6=K
dkI uI
else
MC(k) = dkK i.e. no of intra-connections of node k in its own com-
munity
end if
Add the pair (k, MC(k)) to the map M.
end for
Return the map M.
2. Proposed Commn Centrality: Commn centrality of a node is
the weighted combination of its in-degree and out-degree. This centrality
10
measure takes into account both intra and inter-community links of a node.
It marks hubs or bridges as the influential nodes based on the strength of
the community structure of the network. Let us consider an example of a
network with community structure (Algorithm 4).
Algorithm 4 To calculate Commn Centrality
Input Graph/Network G(V, E), Community Structure of the network with
community list, CL
Output A map/dictionary with (node, centrality value) pairs
Initialize an empty map, M with (node, value) pair format.
for each community C in the list CL do
calculate the fraction, µC of outer connections to the total connections
in the community.
end for
for each node i in the graph do
Calculate the no of intra-community links of node i, kcin
calculate the no of inter-community links of i, kcout
i
i
end for
for each community C in the list CL do
for each node i in community C do
Calculate the Comm Centrality for node i using the equation (refer-
ence to comm equation)
end for
Add the pair (i, CC(i)) to the map M.
end for
Return the map M.
In Fig. 1, it can be seen that node 2 has got many connections with the
other nodes in its own community. It can be called as the hub or leader in its
own community and thus can be labeled as an influential node. This is the
node which will play a major role in spreading any kind of information or
epidemics in its community. If this node is removed, there is very little chance
of epidemic spreading to other nodes in the community. On the other hand,
node 12 has got many connections with the nodes in other communities.
It can be called as a bridge node, which connects its community to other
communities in the network. Hence, it will also be responsible for information
or epidemic propagation to other communities. So, it can be concluded that
both community hubs and bridges are influential nodes in a network and play
11
6
8
7
9
4
1
2
5
3
10
12
11
13
Figure 1: Proposed Centrality Measure
a key role in epidemic propagation. Hence, a centrality measure is needed
which marks those nodes as influential which have got a good balance of
inner and outer connections in the community. In other words, it must be
successful in finding both the community hubs and bridges. We propose new
centrality measure, Commn centrality, defined as follows.
Commn centrality for a node i, belonging to community C can be calcu-
lated as follows:
CC(i) = (1 + µC) ∗
(1 − µC) ∗
max
j
max
j
kin
i
(kin
j ∀j ∈ C)
kout
i
(kout
j
∀j ∈ C)
∗ R
+
∗ R
2
(3)
Here, R is any integer number of choice, to get both in-degree and out-
degree values in the same range i.e.
[0, R]. As usually, out-degree values
of the nodes are very low as compared to their in-degree values. A good
choice for the value of R will be maximum in-degree in the community C i.e.
max
(kin
j ∀j ∈ C).
j
µC is the fraction of outer connections to the total connections in the
community C, and can be calculated as follows:
kout
i /ki
Pi∈C
size(C)
µC =
12
(4)
In equation (3), first in-degree and out-degree of the nodes are normalized by
the maximum in-degree and out-degree, respectively in the community and
brought in the same range. Then the term with out-degree is raised up to
power two where as the term with in-degree is not raised. This is done to give
more importance to out-degree of the nodes than in-degree while calculating
their centrality value. Consider two nodes i and j belonging to the same
community. If we have to mark one node as more influential than the other,
then there can be three possible cases to consider.
• First case, both in-degree and out-degree of one node, say i is larger
than the other node j i.e.
kin
i > kin
j
and kout
i > kout
j
• Second, in-degree (or out-degree) of node i is equal to that of node j,
and out-degree (or indegree) of i is larger than that of j i.e.
(kin
i = kin
j and kout
i > kout
j
) or (kout
i = kout
j
and kin
i > ki1n
j
)
• Third, indegree of one node, say i is larger than that of other node j,
but j has got higher outdegree than node i.
i > kin
kin
j
and kout
i < kout
j
In the first two cases, indisputably, node i will be marked as more in-
fluential. But, in the third case, we mark node j as more central or influ-
ential than node i because of more outer connections of j. The only con-
straint is that the in-degree of node j must not be very smaller than that
of i. That is, node j must also have comparable number of inner connec-
tions. Specifically, as per equation (3), node j is marked more influential if
(kin
)2), otherwise node i is considered more influen-
tial.
j ) ≤ ((kout
)2 − (kout
i − kin
j
i
Also note, in the equation (3), µC and (1 − µC) are assigned as weights
to the in-degree and out-degree terms respectively. This is done to adapt
to the strength of a particular community. For example, if a community is
very cohesive, i.e. there are very less outer connections as compared to total
connections. µC value of this community will be low and hence more weight
13
will be given to the out-degree terms to target the rare nodes with outer
connections in the community. On the other hand, if a community has a lot
of outer connections and accordingly large value of µC, more weight will be
given to the in-degree term.
Nodes are removed sequentially from each community in the decreasing
order of their centrality value in their respective community. Number of
nodes to be removed from a community are kept proportional to the com-
munity size. Hence, more nodes are removed from larger communities than
from the smaller communities. Also note that removing a node can modify
the network topology and hence the centrality of the remaining nodes might
not be the same. So, the centralities of the remaining nodes are recalculated
after removing the node with highest centrality value.
3. Classical epidemic spreading, SIR model
Classical SIR model [25, 28] is one of the most investigated epidemic
spreading model for complex networks. In this model, nodes are in one of
the three compartments —Susceptible (healthy), Infected (those who in-
fected with disease and also actively spread it) and Removed (immunized
or dead). Susceptible nodes represent the individuals which are not yet in-
fected with the disease. Infected nodes are the ones which are infected with
the disease and can spread the disease to the susceptible nodes. Removed
nodes represent the individuals which are infected and are immunized or
died. These nodes are not neither infected again, nor they can transmit
the infection to others. The epidemic is propagated through the nodes by
pairwise contacts between the infected and susceptible nodes in the net-
work. Following the law of mass action, the spreading process evolves with
direct contact of the infected nodes with susceptible nodes in the popula-
tion. The epidemic spreads from one infected node to another susceptible
nodes in a single time step with λ rate, if an undirected edge exists be-
tween them. An infected node become removed node if it is immunized/dead
with rate σ. Here, S(k, t), I(k, t), R(k, t) are the expected values of suscep-
tible, infected and removed nodes in network with degree k at time t. Let
S(k,t) = S(k, t)/N(k), I(k,t) = I(k, t)/N(k), R(k,t) = R(k, t)/N(k) be the
fraction of susceptible, infected and removed nodes, respectively with degree
k at time t. These fractions of the nodes satisfy the normalization condition,
S(k,t) + I(k,t) + R(k,t) = 1, where N(k) represents the total number of nodes
14
with degree k, in the network. Above epidemic spreading process can be
summarized by the following set of pairwise interactions.
λ−→ I1 + I2,
S1 + I2
(when infected meets with the susceptible, it makes them infected
at rate λ)
σ−→ R1,
I1
(spontaneously any infected node will become removed node with rate σ
The formulation of this model for analyzing complex networks as interact-
ing Markov chains. The framework is used to derive from the first-principles,
the mean-field equations for the dynamics of epidemic spreading in the uncor-
related heterogeneous complex networks (scale free networks) with arbitrary
correlations. These are given below.
dS(k,t)
dt
dI(k,t)
dt
dR(k,t)
dt
= −kλS(k,t)X
l
I(l, t)P (lk).
= −σI(k,t) + λS(k, t)X
l
I(l, t)P (lk).
= σI(k,t).
(5)
(6)
(7)
Where the conditional probability P (lk) is the degree-degree correlation
function that is randomly chosen edge emanating from a node of degree k
leads to a node of degree l. Here, it is assumed that the degree of nodes in
the whole network are uncorrelated. Therefore, degree-degree correlation is
P (lk) = lP (l)
for uncorrelated complex networks where P (l) is the degree
hki
distribution and hki is the average degree of the network (the edge will be
biased to fall on vertices of high degree, hence the conditional probability
P (lk) is proportional to kP (k)). Epidemic spreading model is defined for
correlated scale free networks [8]. It is shown that the critical threshold for
epidemic spreading is independent of the removing mechanism. It was found
that the critical threshold as, λc = hki
hk2i . Hence, it implies that epidemic
threshold is absent in large size scale free networks (hk2i → ∞, λc → 0).
This result is not good for epidemic control, since the epidemics will exist in
the real networks for any non zero value of spreading rate λ.
15
4. Synthetic Benchmark Data
Generative models allow to produce large variations of synthetic networks
easily and quickly. These models provide a control on some topological prop-
erties of the generated networks, making it possible to mimic the targeted
system features. The only point of concern is the level of realism of the
generated networks, which is a prerequisite to obtain relevant test results.
To date, the LFR (Lancichinetti, Fortunato and Radicchi) [24] model is the
most efficient solution in order to generate synthetic networks with com-
munity structure. Consequently, it is used to generate the networks with a
non-overlapping community structure. It is based on the configuration model
(CM) [29], which generates networks with power law degree distribution. The
generative process performs in three steps. First, it uses the configuration
model to generate a network with a power-law degree distribution with ex-
ponent γ. Second, virtual communities are defined so that their sizes follow
a power-law distribution with exponent β. Each node is randomly affected
to a community, provided the community size is greater or equal to the node
internal degree. Third, an iterative process takes place in order to rewire cer-
tain links, such that the proportion of intra-community and inter-community
links is changed so that it gets close to the mixing coefficient value µ, while
preserving the degree distribution. This model guarantees to obtain real-
istic features (power-law distributed degrees and community sizes). It also
includes a rich set of parameters which can be tuned to get the desired net-
work topology. These parameters are- the mixing parameter µ, the average
degree k, the maximum degree kmax, the maximum community size cmax,
and the minimum community size cmin.
For small µ values, the communities are distinctly separated because they
share only a few links, whereas when µ increases, the proportion of inter-
community links becomes higher, making community identification a difficult
task. The network has no community structure for a limit value of the mixing
coefficient given by:
µlim > (n − nmax
c
)/n,
(8)
where n and nmax
community, respectively [30].
c
are number of nodes in the network and in the biggest
16
5. Experimental Set-up
To investigate the spread of an infectious disease, the classical SIR model
of epidemic spreading is used. Initially, all the nodes are treated as suscepti-
ble. After this initial set-up, a fraction of nodes are chosen at random to be
infected and the remaining nodes are considered to be susceptible (Algorithm
5).
Algorithm 5 SIR Algorithm
Input:Graph G(V, E), I, λ, σ
Output:Total no of nodes infected during the process, T I
Select I number of nodes at random to be marked as infected and place
them in infected list.
Mark all other nodes as susceptible.
while infected list is not empty do
select one infected node u from the list.
for every node v adjacent to u do
if v is susceptible then
with probability equal to λ:
mark v as infected, and add to the infected list.
increase T I by one.
else
with probability equal to σ:
mark v as recovered, and remove from the infected list.
end if
end for
end while
return T I
The infection spreads through the contact network during each time step,
where λ is the transmission rate of infection being spread from an infected
node to a susceptible node, and I is the number of infected neighboring nodes.
Infected nodes removed with rate σ at each time step. After the recovery
of a node occurs, its state is toggled from infected to resistant. Simulations
are halted if there are no infected nodes left in the network, and the total
number of infected nodes is analyzed. This time foe halting is called steady
state time.
17
To investigate the efficiency of the proposed strategies, synthetic networks
are generated using the LFR algorithm. In order to select appropriate val-
ues for the network parameters, we considered several studies of real-world
networks. For the power-law exponents, we used γ = 3 and β = 2, which
seem to be the most representative values. Concerning the number of nodes
and links, no typical values emerge. Studies show that real-world complex
networks can have very different sizes, defined on a wide range going from
tens to millions of nodes. The average and maximal degrees are also very
variable, so it is difficult to characterize them too. As a result, we selected
some consensual values for these parameters, while considering also the com-
putational aspect of the simulations [31]. The parameters values used for the
generation of the LFR networks in this study are given in the Table 1.
Table 1: Parameters for the LFR network generation
Number of nodes, n
Average degree, hki
Maximum degree, kmax
Mixing parameter, µ
7500
10
180
0.2, 0.3, 0.5
γ
β
Minimum community size, Cmin
Maximum community size, Cmax
3
2
5
180
In order to better understand the influence of the community structure,
networks with various µ values (ranging from 0.2 to 0.5) are generated. For
each µ value, 10 sample networks are generated. Each simulation is run on
these 10 networks and the mean values of the results together with their
standard deviation are reported in the Fig. 2.
After forming the community structure various immunization strategies
are performed on the given network according to the Algorithm 6. The
network obtained after applying immunization is used to study the epidemic
diffusion by using SIR model.
6. Results and Discussion
In the simulations, final population of the removed nodes (R∞) is calcu-
lated to study the epidemic outbreak in the given population (network). As,
18
Algorithm 6 Immunization Algorithm
Input:Graph G(V, E), Centrality measure(C), No of nodes to immunize(n)
Output:Graph with Immunized/Removed Nodes
1. Calculate the centrality of every node in the graph using the measure
C.
2. Sort the nodes in decreasing order of their centrality values.
3. Remove top n nodes with highest centrality values from the graph G.
4. Return graph G with immunized/removed nodes.
R(k, t) represents the size of removed nodes with degree k at time t. Hence,
the final number of removed nodes at t = ∞, time, ∞ is sufficiently large
at which epidemic process will be achieved its steady state. At this time no
more infected nodes will left. The total number of remove nodes are
at t = ∞
Rt = X
k
R(k, t)
R∞ = X
k
R(k, ∞)
(9)
The results of the simulations using various available immunization strate-
gies (degree, betweenness, acquaintance, CBF, mod) and proposed immu-
nization strategies, Commn on LFR generated networks are shown in Fig. 2.
Here, recovering rate σ is kept equal to 0.1 and spreading rate, λ is varied
with two values, 0.1 and 0.9. The removed fraction of nodes (%) is men-
tioned by g. Let us take the case when λ = 0.1 at the left side of the Fig. 2
for all µ values. The global centrality based methods (degree, betweenness)
work efficiently in every case. After removing or immunizing only 30% of
the nodes and epidemic spreading die. This is expected as both the meth-
ods exploit the information about the overall network topology. When the
stochastic strategies (Random Acquaintance and CBF ) are used, 50% nodes
need to be removed in order to stop the epidemic spreading. This is the price
to pay for not knowing the global structure of the network. It is interesting
that the proposed community-based centrality measures, Commn and Mod
strategies are almost as effective as the global centrality methods despite the
fact that they are agnostic about the full network structure. Furthermore,
they perform a lot better than the Acquaintance and CBF strategies, with
just the information about the community structure of the network.
19
The reason why the proposed Commn centrality based strategy is effec-
tive, can be explained by the specific position of the targeted nodes within
the network.
It takes into account, both the in-degree and out-degree of
the nodes. First it tries to remove or immunize the nodes which have more
outer connections to other communities.
In the equation 3, out-degree of
the node is raised up to power two, for this purpose. In a group of people,
these are the individuals which pass all the information contained in their
group to other groups. These nodes can be considered to be the bridges
between the communities. When these nodes are removed, most of the paths
or bridges between different communities are lost. Communities are isolated
and thus the epidemic is not able to spread across the communities. After
removing the nodes with higher out-degrees, nodes are selected which have
lot of connections inside their own community. They can be considered as
the core points of their community. In a network of people, these individuals
are the leaders, representatives or agents of information flow in their com-
munities. These high in-degree nodes are connected to many other nodes in
their community. Most of the regular nodes in a community are not directly
connected to each other. They would be connected to each other through
the paths which would most likely contain these high in-degree nodes. These
nodes if infected from outside, have a greater chance of infecting the whole
community. When these high in-degree nodes are removed from the com-
munities, the communities break from inside.
In other words, the paths
connecting the regular nodes to each other are broken. The remaining nodes
are not able to contact each other and thus the epidemic is not able to affect
a significant part of community, and it dies soon.
The underlying idea in proposing the centrality measure which is sim-
ply based on in-degree and out-degree of the nodes is that they intuitively
represent the global degree and betweenness centralities at the community
level. A node with a high in-degree or out-degree has generally a high overall
degree. Indeed, the total degree of a node is the addition of in-degree and
out-degree. A node with high in-degree is probably a node with a high be-
tweenness measure in its community, as it will be contained in most of the
paths connecting the regular nodes to each other in the community. Simi-
larly, a node with high out-degree is probably a node with high betweenness
measure in the overall network. Indeed, these high out-degree nodes are part
of most of the paths connecting the nodes falling in different communities.
Fig. 2 {(b), (d), (f)} reports the SIR simulation results for λ = 0.9 and
σ = 0.1. The results are very similar except the fact that in this case, a
20
greater g need to be immunized in order to stop the epidemic spreading.
This is true for all the strategies. For example, when λ is equal to 0.1, degree
and betweenness centrality based methods required only 30% of the nodes
to be removed to mitigate the epidemic spreading, whereas now they require
50% of the nodes to be immunized or removed. Indeed, when λ increases,
the probability of an infected node to infect its neighbors gets higher. So,
the epidemic spread at a higher rate, and thus more nodes are needed to be
immunized to prevent the epidemic spreading.
The dynamics of the fraction of susceptible (ρs), infected (ρi) and removed
(ρr ) nodes (in %) for different values of spreading rate λand removing rate
σ are reported in Fig. 3 plots without immunization and with the proposed
community based immunization by considering, g = 20% are given for com-
parative purposes.
The dynamics of of respectively, the fraction of nodes of the total nodes
in % for the susceptible (ρs), infected (ρi) and removed (ρr ) for different
values of spreading rates, λ and removing rate σ is reported in Fig. 3. In
the given Fig. 3, time evolution is plotted without immunization and with
proposed community based immunization, Commn, strategy.
We also used real-world networks to further validate the results on syn-
thetic networks with controlled properties. Statistics of these networks are
given in Table 2. Community structures of the networks are discovered us-
ing local community detection algorithms [26, 27]. Figs. 4(a)-4(d) show the
results of comparison of available and proposed immunization strategies on
these real-world networks.
Table 2: Statistics of Real-World Networks
Dataset
Power Grid Network
PGP Network
Gnutella Network
WWW Network
Nodes
5,004
10,680
62,586
3,52,729
Edges No. of Communities
6,597
24,316
1,47,892
11,17,563
168
153
171
3060
The first network is the Power grid network [19]. Power grid data set
comprises of an undirected, unweighted network representing the topology of
the Western States Power Grid of the United States. Numerical results are
shown in Fig. 4(a). Proposed Commn centrality performs as well as degree
centrality and better than all other centrality measures.
21
The Second example is the social network called Pretty Good Privacy(PGP)
network [32]. This is the interaction network of users of the PGP algorithm.
A link between two persons denotes the sharing of confidential information
using the encryption algorithm on the internet. Results for the network are
shown in Fig. 4(b). Here, Mod centrality works a little better than the
Commn centrality, but at least both takes around 10% of the nodes needed
to be removed from the network in order to lose its giant component.
Fig. 4(c) shows the results for the third network, Gnutella peer-to-peer
network [33]. This is a network of Gnutella hosts from 2002. The nodes rep-
resent Gnutella hosts, and the directed edges represent connections between
them. Again, the network is treated as undirected ignoring the direction
of edges. For this network, Commn and degree centrality work better, but
performance of other centrality measures is also close.
Results of various centrality measures on the fourth network, World Wide
Web [34] are shown in Fig. 4(d). In this network, each node represents a
webpage and a directed link between the nodes shows a hyperlink from a
webpage to another. Direction of the links have been ignored. For this
network, Commn centrality outperforms other centrality measures.
Hence, the proposed centrality measure performs at least as good as the
global degree and in some cases, better than betweenness and community-
based mod centralities with less information about the network structure and
in lesser time.
To quantify the dynamical differences in the epidemic spreading process
when a fraction of nodes is immunized by using the proposed immunization
strategy, time evolution plots are generated. Time evolution plots of, re-
spectively, the fraction of the total nodes in % of susceptable, infected and
recovered population in the network with immunization and without immu-
nization, are displayed in Fig. 3. λ = 0.5 & σ = 0.1 and λ = 1 & σ = 0.1 is
considered for the time evolution plots to understand the dynamical differ-
ences.
The experimental results reveal that, the proposed Commn centrality is
effective in identifying the influential nodes to be selected for immunization
to prevent or mitigate the epidemic spreading. The proposed measure is as
effective as the global degree and betweenness centrality based methods, but
do not require any information about the global structure of the network.
Community-based centrality and Mod centrality also works as well but they
have certain drawbacks as pointed out earlier. We have proposed an alter-
native centrality measure which can be employed to find out the influential
22
nodes in networks with community structure. The investigated strategy also
performs better than the stochastic strategies, Acquaintance and CBF strate-
gies, with only the information about the local (community-wise) structure
of the network. This suggests that the local information is sufficient to design
an immunization strategy.
7. Conclusions
There is no enough information available about the global structure of the
underlying relevant contact network in order to control the epidemic spread-
ing. Therefore, efficient immunization strategies are required that can work
with the information available at the community level. Results of our inves-
tigation, on a realistic synthetic benchmark as well as real-world social net-
works, show that the community structure plays a major role in the epidemic
dynamics. It is observed that the proposed Commn centrality based immu-
nization strategy is effective in controlling the epidemic spreading. It works as
well as the global centrality measures (degree and betweenness), without any
knowledge of the global network structure. This centrality measure defined
at the community level is a good approximation of global centrality mea-
sures. The in-degree part of the Commn centrality of a node represents its
degree and betweenness centralities, relative to its own community, whereas,
the out-degree part represents these global centralities relative to the other
communities of the network. This strategy is also sensitive to the community
structure of the network and hence automatically selects the influential nodes
which have got a good balance of inner and outer connections to their com-
munity. Hence, this strategy is quite efficient as it generalizes to the networks
with varying strength of community structure. Furthermore, unlike global
centrality measures, the proposed measures do not require any knowledge of
the global network topology and thus can be easily and quickly computed.
It also overcomes the drawbacks of the Mod strategy also proposed for net-
works with community structure. Furthermore, it performs better than the
stochastic strategies, Acquaintance and CBF. Finally, the main lesson of this
work is that exploiting the local information on the network topology can
be very effective in order to design efficient immunization strategies that can
be used in large scale networks. These preliminary results pave the way for
more investigations on alternative community topological measures.
23
Acknowledgement
The authors thank Mr. Upendra Singh (B.Tech., MANIT Bhopal, India)
for implementing the SIR model of epidemics, used in this paper.
References
References
[1] M. Barth´elemy, A. Barrat, R. Pastor-Satorras, A. Vespignani, Velocity
and hierarchical spread of epidemic outbreaks in scale-free networks,
Physical Review Letters 92 (17) (2004) 178701.
[2] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, D.-U. Hwang, Complex
networks: Structure and dynamics, Physics reports 424 (4) (2006) 175–
308.
[3] K. Gong, M. Tang, P. M. Hui, H. F. Zhang, D. Younghae, Y.-C. Lai,
An efficient immunization strategy for community networks, PloS one
8 (12) (2013) e83489.
[4] M. E. Halloran, N. M. Ferguson, S. Eubank, I. M. Longini, D. A. Cum-
mings, B. Lewis, S. Xu, C. Fraser, A. Vullikanti, T. C. Germann, et al.,
Modeling targeted layered containment of an influenza pandemic in the
united states, Proceedings of the National Academy of Sciences 105 (12)
(2008) 4639–4644.
[5] R. Pastor-Satorras, A. Vespignani, Epidemic spreading in scale-free net-
works, Physical review letters 86 (14) (2001) 3200.
[6] A. Singh, Y. N. Singh, Rumor spreading and inoculation of nodes in
complex networks, in: Proceedings of the 21st international conference
companion on World Wide Web, ACM, 2012, pp. 675–678.
[7] A. Singh, Y. N. Singh, Nonlinear spread of rumor and inoculation strate-
gies in the nodes with degree dependent tie stregth in complex networks,
Acta Physica Polonica B 44 (1) (2013) 5–28.
[8] A. Singh, Y. N. Singh, Rumor dynamics with inoculations for corre-
lated scale free networks, in: Communications (NCC), 2013 National
Conference on, 2013, pp. 1–5. doi:10.1109/NCC.2013.6488047.
24
[9] M. J. Newman, A measure of betweenness centrality based on random
walks, Social Networks 27 (1) (2005) 39 – 54.
[10] R. Pastor-Satorras, A. Vespignani, Immunization of complex networks,
Phys. Rev. E 65 (2002) 036104.
[11] R. Cohen, S. Havlin, D. Ben-Avraham, Efficient immunization strategies
for computer networks and populations, Physical review letters 91 (24)
(2003) 247901.
[12] M. Salath´e, J. H. Jones, Dynamics and control of diseases in networks
with community structure, PLoS computational biology 6 (4) (2010)
e1000736.
[13] Y. Wang, Z. Di, Y. Fan, Identifying and characterizing nodes important
to community structure using the spectrum of the graph, PloS one 6 (11)
(2011) e27418.
[14] A. Samukhin, S. Dorogovtsev, J. Mendes, Laplacian spectra of, and
random walks on, complex networks: Are scale-free architectures really
important?, Physical Review E 77 (3) (2008) 036115.
[15] M. Mitrovi´c, B. Tadi´c, Spectral and dynamical properties in classes of
sparse networks with mesoscopic inhomogeneities, Physical Review E
80 (2) (2009) 026123.
[16] A. Arenas, A. D´ıaz-Guilera, C. J. P´erez-Vicente, Synchronization reveals
topological scales in complex networks, Physical review letters 96 (11)
(2006) 114102.
[17] N. Masuda, Immunization of networks with community structure, New
Journal of Physics 11 (12) (2009) 123018.
[18] W. O. Kermack, A. G. McKendrick, A contribution to the mathematical
theory of epidemics, in: Proceedings of the Royal Society of London A:
Mathematical, Physical and Engineering Sciences, Vol. 115, The Royal
Society, 1927, pp. 700–721.
[19] D. J. Watts, S. H. Strogatz, Collective dynamics of small-worldnetworks,
nature 393 (6684) (1998) 440–442.
25
[20] G. Palla, I. Der´enyi, I. Farkas, T. Vicsek, Uncovering the overlapping
community structure of complex networks in nature and society, Nature
435 (7043) (2005) 814–818.
[21] R. Guimera, M. Sales-Pardo, L. A. N. Amaral, Modularity from fluc-
tuations in random graphs and complex networks, Physical Review E
70 (2) (2004) 025101.
[22] A. Vespignani, G. Caldarelli, Large scale structure and dynamics of
complex networks: From information technology to finance and natural
science (2007).
[23] A. Clauset, M. E. Newman, C. Moore, Finding community structure in
very large networks, Physical review E 70 (6) (2004) 066111.
[24] A. Lancichinetti, S. Fortunato, F. Radicchi, Benchmark graphs for test-
ing community detection algorithms, Phys. Rev. E 78 (2008) 046110.
[25] Y. Moreno, R. Pastor-Satorras, A. Vespignani, Epidemic outbreaks in
complex heterogeneous networks, Euro. Phy, J B 26 (4) (2002) 521–529.
[26] Q. Chen, M. Fang, An efficient algorithm for community detection in
complex networks, in: the 6th Workshop on Social Network Mining and
Analysis, 2012.
[27] E. L. Martelot, C. Hankin, Fast multi-scale community detection based
on local criteria within a multi-threaded algorithm, arXiv preprint
arXiv:1301.0955.
[28] M. Newman, Spread of epidemic disease on networks, Phys. Rev. E
66 (1) (2002) 016128.
[29] M. Molloy, B. Reed, A critical point for random graphs with a given
degree sequence, Random structures & algorithms 6 (2-3) (1995) 161–
180.
[30] A. Lancichinetti, S. Fortunato, Community detection algorithms: a com-
parative analysis, Physical review E 80 (5) (2009) 056117.
[31] G. K. Orman, V. Labatut, H. Cherifi, Comparative evaluation of com-
munity detection algorithms: a topological approach, Journal of Statis-
tical Mechanics: Theory and Experiment 2012 (08) (2012) P08001.
26
[32] M. Bogu, R. Pastor-Satorras, A. Daz-Guilera, A. Arenas, Models of
social networks based on social distance attachment, Phys. Rev. E 70 (5)
(2004) 056122.
[33] M. Ripeanu, I. Foster, A. Iamnitchi, Mapping the Gnutella network:
Properties of large-scale peer-to-peer systems and implications for sys-
tem design, IEEE Internet Computing J. 6.
[34] R. Albert, H. Jeong, A.-L. Barab´asi, Internet: Diameter of the world-
wide web, Nature 401 (6749) (1999) 130–131.
27
8000
7000
6000
5000
∞
R
4000
3000
2000
1000
0
0
8000
7000
6000
5000
∞
R
4000
3000
2000
1000
0
0
8000
7000
6000
5000
∞
R
4000
3000
2000
1000
0
0
Degree
Betweenness
Acq
CBF
Mod
Comm
20
40
g
60
80
100
(a) µ=0.2, λ=0.1
Degree
Betweenness
Acq
CBF
Mod
Comm
20
40
g
60
80
100
(c) µ=0.3, λ=0.1
Degree
Betweenness
Acq
CBF
Mod
Comm
20
40
g
60
80
100
(e) µ=0.5, λ=0.1
28
8000
7000
6000
5000
∞
R
4000
3000
2000
1000
0
0
8000
7000
6000
5000
∞
R
4000
3000
2000
1000
0
0
8000
7000
6000
5000
∞
R
4000
3000
2000
1000
0
0
Degree
Betweenness
Acq
CBF
Mod
Comm
20
40
g
60
80
100
(b) µ=0.2, λ=0.9
Degree
Betweenness
Acq
CBF
Mod
Comm
20
40
60
g
80
100
(d) µ=0.3, λ=0.9
Degree
Betweenness
Acq
CBF
Mod
Comm
20
40
g
60
80
100
(f) µ=0.5, λ=0.9
Figure 2: Effect of various immunization strategies on the total number of infected nodes
during the SIR simulation on LFR network with σ = 0.1
Without Immunization
After Immunization
100
90
80
70
s
ρ
60
Without Immunization
After Immunization
10
20
t
30
40
(b) λ = 0.5 and σ = 0.1
Without Immunization
After Immunization
10
20
t
30
40
(d) λ = 0.5 and σ = 0.1
Without Immunization
After Immunization
20
t
30
40
s
ρ
i
ρ
r
ρ
100
80
60
40
20
0
0
50
40
30
20
10
0
0
100
80
60
40
20
0
0
t
10
20
30
40
50
(a) λ = 1 and σ = 0.1
Without Immunization
After Immunization
i
ρ
10
20
t
30
40
50
(c) λ = 1 and σ = 0.1
r
ρ
Without Immunization
After Immunization
50
40
30
20
0
35
30
25
20
15
10
5
0
0
80
70
60
50
40
30
20
10
10
20
t
30
40
50
0
0
10
(e) λ = 1 and σ = 0.1
29
(f)λ = 0.5 and σ = 0.1
Figure 3: Dynamical diffusion over the network against time, t. Fraction of the susceptible,
infected and removed nodes (%) in the population respectively, ρs, ρi and ρr nodes without
immunization and with immunization (20%) strategy for different values of λ and σ
5000
4000
3000
2000
1000
t
n
e
n
o
p
m
o
C
d
e
t
c
e
n
n
o
C
t
s
e
g
r
a
L
0
0
5
6
5
4
3
2
1
t
n
e
n
o
p
m
o
C
d
e
t
c
e
n
n
o
C
t
s
e
g
r
a
L
0
0
Degree
Betweenness
Acq
CBF
Mod
Comm
20
25
10
15
5
30
Fraction of nodes removed (%)
(b) PGP network
Degree
Betweenness
Acq
CBF
Mod
Comm
35
35
10
15
20
25
30
Fraction of nodes removed (%)
(a) Power Grid Network
x 104
Degree
Betweenness
Acq
CBF
Mod
Comm
35
Degree
Betweenness
Acq
CBF
Mod
Comm
10000
8000
6000
4000
2000
t
n
e
n
o
p
m
o
C
d
e
t
c
e
n
n
o
C
t
s
e
g
r
a
L
0
0
x 105
3
2.5
2
1.5
1
0.5
t
n
e
n
o
p
m
o
C
d
e
t
c
e
n
n
o
C
t
s
e
g
r
a
L
10
15
20
25
30
5
Fraction of nodes removed (%)
(c) Gnutella network
35
0
0
5
10
15
20
25
30
Fraction of nodes removed (%)
(d) WWW network
Figure 4: Size of Largest Connected Component against the various centrality measures
(a) Power Grid Network (b) PGP Network (c) Gnutella Network (d) WWW Network
30
|
1807.03505 | 1 | 1807 | 2018-07-10T07:48:33 | Automatic Rumor Detection on Microblogs: A Survey | [
"cs.SI"
] | The ever-increasing amount of multimedia content on modern social media platforms are valuable in many applications. While the openness and convenience features of social media also foster many rumors online. Without verification, these rumors would reach thousands of users immediately and cause serious damages. Many efforts have been taken to defeat online rumors automatically by mining the rich content provided on the open network with machine learning techniques. Most rumor detection methods can be categorized in three paradigms: the hand-crafted features based classification approaches, the propagation-based approaches and the neural networks approaches. In this survey, we introduce a formal definition of rumor in comparison with other definitions used in literatures. We summary the studies of automatic rumor detection so far and present details in three paradigms of rumor detection. We also give an introduction on existing datasets for rumor detection which would benefit following researches in this area. We give our suggestions for future rumors detection on microblogs as a conclusion. | cs.SI | cs | Automatic Rumor Detection on Microblogs: A
Survey
Juan Cao, Junbo Guo, Xirong Li, Zhiwei Jin, Han Guo, and Jintao Li
1
8
1
0
2
l
u
J
0
1
]
I
S
.
s
c
[
1
v
5
0
5
3
0
.
7
0
8
1
:
v
i
X
r
a
!
Abstract-The ever-increasing amount of multimedia content on mod-
ern social media platforms are valuable in many applications. While
the openness and convenience features of social media also foster
many rumors online. Without verification, these rumors would reach
thousands of users immediately and cause serious damages. Many
efforts have been taken to defeat online rumors automatically by mining
the rich content provided on the open network with machine learn-
ing techniques. Most rumor detection methods can be categorized in
three paradigms: the hand-crafted features based classification ap-
proaches, the propagation-based approaches and the neural networks
approaches. In this survey, we introduce a formal definition of rumor in
comparison with other definitions used in literatures. We summary the
studies of automatic rumor detection so far and present details in three
paradigms of rumor detection. We also give an introduction on existing
datasets for rumor detection which would benefit following researches
in this area. We give our suggestions for future rumors detection on
microblogs as a conclusion.
Index Terms-rumor detection, fake news detection, microblogs, social
media.
media during the election [4]. These rumors reached
millions of voters via social network promptly and
potentially influenced the election.
• On April 23rd 2013, the official Twitter account of
Associated Press was hacked to sent out a tweet
claiming two explosions happened in the White
House and the president got injured. Even though
this rumor was quickly debunked, it still spread to
millions of users and caused severe social panic,
resulting in a dramatic crash of the stock market
immediately [5].
In March 2014, promptly after the emergency event
"Malaysia Airlines Flight MH370 Lost Contact", 92
different rumor stories were spread widely on Sina
Weibo, the primary microblog service in China [6].
These rumors blocked people from knowing the real
situation of the event and damaged the feelings of
family members related to the missing passengers on
the plane.
•
1 INTRODUCTION
The explosive development of contemporary social media
platforms has witnessed their key role for reporting and
propagating news in the modern society. According to a
recent study from Pew Research, 62 percent of people re-
ceive news from social media, with 18 percent doing so
very often [1]. Social media users not only read news but
also propagate and even produce immediate news on the
social network. With millions of people serving as "news
sensors", news on social media is valuable for opinion
mining and decision making. However, the convenience
of publishing news also fosters the emergence of various
rumors. According to a report in China [2], over one third
of trending events on microblogs contain fake information.
The widespread of rumors can pose a threat to the
internet credibility and cause serious consequences in real
life [3]. Followings are some examples showing rumors
that cause damages to political events, economy and social
stability.
• During the 2016 U.S. presidential election, candidates
and their supporters were actively involved on Face-
book and Twitter to do campaigns and express their
opinions. However, as many as 529 different rumor
stories pertaining to presidential candidates Donald
Trump and Hillary Clinton were spreading on social
Rumors on social media have become a serious con-
cern recently, especially when people are aware of their
capabilities to influence the society. Commercial giants,
government authorities and researchers are all taking great
efforts in defeating the negative impacts of rumors. Figure
1 showcases anti-rumor designs in three major platforms
including Facebook, Twitter and Weibo. Facebook labels
fake news stories with the help of users and outside fact
checkers (Figure 1(a)). Users alert the platform to possible
rumors, which will be sent by the platform to fact-checking
organizations such as AP, FactCheck.org and Snopes.com
for verification. Verified fake story will be publicly flagged
as disputed by a 3rd party fact-checkers whenever it appears
on the social network. Users will get another warning if they
insist on sharing verified fake stories [7]. Twitter employs
a semi-automatic strategy combining automatic evaluation
and crowd-sourcing annotation to flag possible fake tweets
(Figure 1(b)). Each tweet is assigned with a credibility
rating automatically generated by an algorithm [8]. Users
are allowed to give their feedback if they disagree with the
rating. On Weibo, users are encouraged to report possible
fake tweets. These tweets are passed to a commit composed
of elite users to scrutinize and judge them (Figure 1(c)).
Verified fake tweets will be labeled. The above methods
depend on social media users or human experts to detect
rumors. Moreover, these methods mostly focus on defeating
This work has been submitted to the IEEE for possible publication. Copyright may betransferred without notice, after which this version may no longer be accessible.
2
users. The low-quality labels will directly jeopardize
the identification of rumors and fail to meet the
qualification of accurate rumor detection.
Due to the above challenges, most existing applications
aim at simultaneously exploring humans and computers for
rumor detection. In comparison with pure manual labeling,
they are able to provide better results with high efficiency
because labor cost is reduced, as users may not need to label
all the data.
Automatic rumor detection on social media faces many
challenges, as the social multimedia data is numerous
and ever-increasing. What's more, the non-structural, in-
complete and noisy nature of online data makes it very
challenging to process and understand. We summarize the
challenges as follows.
1)
Semantics understanding. Most rumors are deliber-
ately fabricated to misleading the public. Fake infor-
mation is mixed and disguised in a rumor story. It is
very difficult for machine to completely understand
such semantics.
2) Huge variations. Rumors can cover all kinds of
topics and take various language styles. Features
effective to distinguish certain type of rumors may
work poorly on other types. Algorithms trained on
limited labeled data would probably fail on unseen
new rumors.
3) Multimodal data. Rumors on social media often take
the form of images or videos, apart from pure texts.
Although information in different modalities can
provide clues for rumor detection, how to extract
prominent features from each modality and effec-
tively fuse them together is challenging.
4) Heterogeneous propagation structure. During the
diffusion of rumors on the social network, users can
discuss and make comments. The users' behaviors
help to construct an underlying social context for
rumors. Characterizing these behaviors on the prop-
agation network is crucial to identify rumors online.
Facing these challenges, good efforts have been made to
attack the automatic rumor detection problem from different
angles, as visualized in Fig. 2. Most approaches formulate
the automatic rumor detection as a two-class classification
task. We divide these approaches into three categories:
handcrafted features based approaches, propagation-based
approaches and neural networks approaches.
1) Category I: handcrafted features based approaches.
The traditional methods apply hand-crafted fea-
tures to describe the distribution of rumors in high
dimensional space and the separating hyperplane
will be learned by classifiers [11]–[16]. These studies
extract features from the textual and visual content
of rumors. To avoid the variations in content se-
mantics, some social context features are also pro-
posed to capture the characteristics of rumors, so
the feature engineering becomes a fatal step before
classification. However, as some rumors lack of
some crucial features, these methods often lead to
unstable and unreliable results.
(a) Fackebook
(b) Twitter
(c) Weibo
Fig. 1. An illustration of rumor combating strategies in three major social
media platforms: (a) Facebook, (b) Twitter, and (c) Weibo.
rumors during their propagation process on social media,
rather than detecting emerging rumors at an early stage.
Although manual rumor annotation of large-scale social
media data becomes feasible, manual labeling encounters
the following challenges:
1)
Intensive labor and cost of time [9]. Even with a
good motivation, users may be frustrated by the in-
tensive labor and cost of naive manual interactions
to label rumors. Heavy labor and cost of time are
obstacles for manually labeling of large-scale online
data.
2) Label quality. Unlike common human interactive
annotations such as tagging pictures on image shar-
ing websites [10], identifying a fresh rumor involves
much more domain knowledge and elaborative ex-
amination. It is nontrivial for an journalism expert
to fact-check a news story, let alone nonprofessional
3
Fig. 2. Paradigms for automatic rumor detection.
2) Category II: propagation based approaches. To uti-
lize the heterogeneous structure of social network,
Graph-based optimization methods link messages
and users into a whole network and evaluate their
credibilities as a whole [17] [6] [18]. The category
of a unclassified text can be obtained when the
network is convergent. However, it is obviously to
see that these work ignore the textual information
represented by rumors.
3) Category III: neural network approaches. More re-
cently, deep neural networks are proposed to learn
and fuse multi-modal features automatically for ru-
mor detection [9], [19]–[23]. By modeling text data
as time-series, either recurrent neural network or
convolutional neural network can learn the latent
textual representation and improve the accuracy of
classification. Compared to the work that leverage
traditional classifiers, these work can significantly
improve the performance.
Several survey papers exist. Zubiaga et al. propose an
overview of how to develop a rumor detection system,
which consists of four steps: rumor detection, rumor track-
ing, rumor stance classification, and rumor veracity classifi-
cation [24]. As their work pays less attention on analyzing
the feature engineering step and neural network based
algorithms, which can not summarize and compare different
methods from the perspective of algorithms. Boididou et al.
empirically compare three methods on a dataset collected
form Twitter [25], without considering the development of
rumor detection on Weibo, which ignore some prominent re-
searches [6], [12], [16]. To sum up, the previous lacks of com-
prehensive analysis for detection algorithms and ignores the
development of neural network on rumor detection, which
motivates our work. Most rumor detection methods can be
modeled as a two-step work, consisting of feature selection
and binary classification. Depending on the difference in
selecting features and machine learning algorithms among
the present researches, we aim to provide a comprehen-
sive introduction for existing rumor detection algorithms.
Specifically, we categorize the methods described in over
50 papers into three paradigms: hand-crafted feature based
methods, propagation based methods and neural network
based methods. We analyze the advantages and weakness
of each paradigm as well. Such an analysis helps to point
out the application context for each algorithm.
The rest of the article is organized as follows. In Section
2, we introduce the formal detection of rumor detection.
We then introduce the work on the classification-based
approaches for rumor detection in Section 3. We give our
a detailed introduction of categories of prominent features
extracted for rumor detection models followed by classi-
fication methods integrating these features for the rumor
detection task in this section. Two types of state-of-the-
art rumor detection models, propagation-based models and
deep neural networks models are then introduced in section
4 and 5, respectively. In Section 6, we discuss the dataset sta-
tus for the research of rumor detection. Finally, we conclude
the paper and discuss future research directions in Section
7.
2 DEFINITIONS
The definition of a rumor varies over publications. In [26],
for instance, DiFonzo et al. define rumor as a story or
statement in general circulation without confirmation or
Text Image User Event Feature Extraction Textual Visual Context Classification rumor non-rumor Message Network Construction Credibility Propagation Neural Networks Paradigm One: Hand-Crafted Features based Approaches Paradigm Two: Propagation-based Approaches Paradigm Three: Neural Networks Approaches rumor non-rumor certainty to facts. While in [27], a story or a statement whose
truth value id unverified or deliberately false is considered
as rumor. The lack of consistency in this fundamental con-
cept makes a head-to-head comparison between existing
methods difficult. In this section, we first introduce three
typical rumor definitions used in the literature. We then
give a formal definition of the rumor detection problem,
which allows us to interpret existing methods in a unified
framework.
We give an objective definition for rumors discussed in
this survey as follows:
Definition: Objective Rumor This definition of rumor
is strictly equivalent to verified fake information. Once a
statement is confirmed to have false or fabricated content by
authoritative sources, it is labeled as a rumor. This kind of
rumor is also referred as "false rumor" [15] or "fake news"
[6] [18] [20].
Besides objective rumors, there also exist alternative def-
initions such as general rumors and subjective rumors, see
Fig. 3. A traditional definition of rumor is derived from the
social psychology [27]. That is, a rumor is an unconfirmed
statement that widely spread and the truth value of which
is unverified or deliberately false. Under this definition,
the general rumor is deemed as a piece of information,
the veracity of which has not been verified. Unverified
rumors refer to information without official confirmation
from authoritative or credible sources, e.g. authoritative
news agencies or witnesses on site. Another definition for
rumor is from the subjective judgment of users [11], [13],
[17]. An analogy of this definition is that the sentiment
polarity of a statement is often defined based on people's
subjective feelings.
Different definitions are better adopted in different sce-
narios. General rumors are often used in monitoring public
opinions towards controversial stories on social media [28].
General rumors may be gossips of celebrities or a campaign
strategy to slander political opponents [4], which attract
people to spread the story rather than finding out its ve-
racity. Some research [2] also suggests to use this definition
to filter out unrelated posts and then classify the veracity of
remained general rumors. Subjective rumors can be used to
understand users' behavior. Based on this definition, Morris
et al. [29] study what kinds of messages are more likely to
get the trust of the public on Twitter. Rumors with objective
confirmation is widely used for automatic rumor detection
[9], [12], [21], [30], methods for detecting verified rumors
aim to detect false information at the early stage and thus
prevent the hazard of rumors on social media.
Given our focus on detecting the veracity of a statement,
we adopt the objective definition of rumors throughout the
paper. A news story e is defined as a set of n pieces of related
messages M = {m1, m2, ..., mn}. For each messages mi, it
is comprised of a tuple of attributes representing the text,
images, videos and other content it contains. Each message
mi is also associated with a user ui who posted it. The
user ui is represented with a set of attributes, including
name, age, register time and avatar images, etc. The rumor
detection task is then defined as follows:
Definition: Rumor Detection: Given a news story e with
its message set M and user set U, the rumor detection task
aim to determine whether this story can be confirmed as
4
Fig. 3. Three definitions of rumors and their relationships
true or false, i.e to learn a prediction function F (e) → {0, 1}
satisfying:
(cid:26) 1, if e is conf irmed as f alse
F (e) =
(1)
0, otherwise
The definition formulates the rumor detection as a verac-
ity classification task aiming to determine whether a given
story on social media is confirmed as true or false. It reveals
two main challenges in rumor detection: 1) the understand-
ing of contents and social context associating with the story
and 2) the constructing of effective detection algorithms.
As illustrated in Figure 2, three paradigms are proposed
focusing on extracting effective features representing rumor
content or robust prediction algorithms. We summary these
methods in the following three sections.
AP-
BASED
FEATURES
3 HAND-CRAFTED
PROACHES
The basic definition of rumor detection is a binary classi-
fication problem. Most literatures on this task follows the
commonly used learning paradigms of supervised classi-
fication from the machine learning area: 1) extracting fea-
tures representing samples from both classes; 2) training
an appropriate classifier with provided samples; 3) testing
and evaluating on unseen data. The first key step of these
procedures is how to extract prominent features. Moreover,
contents are not independent and from different modalities.
The classification method should be capable of integrating
and interpreting these features for robust rumor detection.
In this section, we first give a review of all kinds of features
used in the rumor detection literatures. We then introduce
typical classifiers applied for rumor detection.
In the scope of social media, a news story e contains
rich multi-modal resources as its content and associated
with certain social context during its spreading, as shown
in Figure 4. Features come from two main aspects of a story:
its content and its social context, see Figure 5.
The content of a news story contains plenty of infor-
mation, so we define content features are those features
extracted from the text and image. The social context reflects
the relationship among different users and describe the
propagating process of a rumor, so we define social context
features are those features extracted from the user behavior
and the propagation network. Two types of features are
going to be detailed in Section 3.1 and 3.2, respectively.
Subjective RumorsThetruthvalueisdeterminedbythesubjectivejudgementofusersGeneral RumorsThe truth value is unverifiedObjective RumorsThetruthvalueisconfirmedbyauthoritativesources5
et al. propose features that describe the fraction of tweets
containing the first person pronoun [13]. Yang et al. focus on
whether the message includes a URL pointing to an external
source.
According to the study by Zhao et al. [2], the informative
part of rumor messages can be of the following two types:
inquiries of the event situation (verification / confirmation
questions) and corrections / disputes of the event. They de-
tect the inquiry and correction patterns of rumor messages
through supervised feature selection on a set of labeled mes-
sages. Specifically, the uni-grams, bi-grams, and tri-grams
lexical parts are extracted from these messages after stan-
dard word segmentation. Frequency features (tf) of each ex-
tracted word or phrase are then calculated. Following that,
Chi-Squared test and information gain ratio method are
utilized to select prominent patterns. The feature selection
methods rank features based on their ability to distinguish
rumor tweets from non-rumor ones. From the ranked list of
features, human experts select event-independent phrases
as final lexical patterns for rumors. Finally, the lexical word
patterns are discovered, including verification patterns ( "is
it real/fake?", "need more evidence/confirmation", etc.) and
correction patterns ( "rumor/false rumor", "spreading/ fab-
ricating rumor", etc.). Once discovered these lexical features
can be used to filter out rumors in real time, such as detect
rumors in live tweet streams [2] [31] or analyzing online
rumors at a large scale [4].
Lexical words expressing specific semantics or senti-
ments are also very important clues to characterize the text.
In [11], emotional marks( question mark and exclamation
mark) and emotion icons are counted as textual features.
In [13], many sentimental lexical features are proposed
based on sentiment dictionary. Specifically, they utilize a
sentiment tool called the Linguistic Inquiry and Word Count
(LIWC) to count words in psychologically meaningful cat-
egories. For each input text, this tool provides sentiment
analysis results on five major categories and a number of
subcategories, such as social, affective, cognitive, perceptual,
and biological processes. After comparative study of these
features, they find that some categories of sentiments are
distinctive features for rumor detection, including positive
affect words, cognitive action words and tentative action
words.
Syntactic features represent rumors at the sentence level.
The basic syntactic features are simple statistics of a
rumor message, such as the number of keywords, the sen-
timent score or polarity of the sentence [11] and part-of-
speech tagging [32].
To represent a document based on the words it contains,
the bag-of-words (BoW) language model is commonly uti-
lized. In this model, each text document is represented as a
v-dimensional vector, where v is the size of the dictionary of
the corpus. Each element in the vector stands for the TF-IDF
score of the corresponding word in the text. TF is the term
frequency. IDF score is the inverse document frequency,
which is calculated on the whole corpus. Some work utilized
BoW for rumor detection [33] or rumor analysis [4].
Recently, semantic embedding algorithms are widely
used in many natural language understanding applications.
The Word2Vec model [34] represents each word in a corpus
with a real-valued vector in a common semantic vector
Fig. 4. An example message on Weibo with some of its key features and
contents marked.
3.1 Content Features
For a news story e, the message set M describes all the key
information of it, which has content from three aspects:
•
• Textual content: a text describing the news event.
They provide details of the event and may contain
certain opinions or sentiments towards the story.
Images/Videos: sometimes a message will provide
visual material to support its story.
• Other content: the specific communication style of
social media would provide other informative con-
tent, such as hashtag topics(#), user references(@),
links to outer sources, and emoj icons, etc.
Various content features are extracted from above primi-
tive content, which can be categorized into two main types:
textual features and visual features.
3.1.1 Textual Features
Compared with non-rumors, rumor texts are fabricated to
mislead the public. Aiming to arouse much attention and
stimulate the public mood, rumor texts tend to have certain
patterns in contrast to non-rumor ones. For example, after
analyzing a large amount of tweet streams, Zhao et al. [2]
discover two types of language patterns in rumors: the
correction type and the enquiry type. Thus, it is possible
to extract features from the textual content, which can
characterize rumors.
From different levels granularity of the language struc-
ture, various textual features are extracted to represent a
rumor from the aspects of words, sentences, messages,
topics and events.
General textual features are derived from the linguistics
of a text, which are widely used in many natural language
understanding tasks. Three categories of general textual fea-
tures are commonly used: lexical features, syntactic features,
and topic features.
Lexical features are features extracted at the word-level
of a rumor, which could be statistics of words, lexical rumor
patterns or sentimental lexicons.
Castillo et al. compute some statistics of rumor texts
based on the words it contains, including the total number
of words and characters, the number of distinctive words
and the average length of word in a rumor, etc [11]. Apart
from simple statistical features, some work extract inter-
esting lexical words by examining their semantics. Kwon
uimi6
during Hurricane Sandy. Some interesting conclusions are
drawn: the original fake images are limited, and 86% of
fake images were re-tweets. These findings could be utilized
to design prominent visual features for rumor detection.
However, their work is mainly based on traditional textual
features.
Aiming to automatically predict whether a tweet that
shares multimedia content is fake or real, Boididou et al.
[38] proposed the Verifying Multimedia Use task that took
place as part of the MediaEval benchmark in 2015 and 2016.
This task attracts attentions for verifying images in tweets
from the research area.
Visual features are features characterizing the visual
content(images or videos) from different aspects. Regarding
the methods of feature extraction, visual features can be
categorized into three types: visual statistical features, visual
content features, and visual embedding features.
Visual statistical features are statistics of images at-
tached in rumors. Similar to the statistical features of tex-
tual content, some basic statistics of images proved to be
distinctive in separating rumors and non-rumors.
Gupta et al. [17] define a feature to record whether the
user has a profile image for evaluating the credibility of
user. A "has multimedia" feature is defined in [15] to record
the status of multimedia attachment of a tweet: whether
the tweet has any picture, video or audio attached. In [14],
the authors point out that the rumors are more likely to
contain outdated images. They propose a time span feature
to capture this time delay. In [36], the relation of images
and health related rumors were studied. The Baidu search
engine is deployed to find the original image for calculating
this time span between the original image and the current
one. According to their results, this feature is quite effective.
However, the sparsity of outdated images and the difficul-
ties to search them limit the usage of this feature.
Summarizing existing statistical features and proposing
several novel features, seven visual statistical features are
presented in [30] from three aspects:
• Count: Users can post zero, one or more than one
images along with a text content in a tweet. To mark
the occurrence of images in rumor messages, they
count the total images in a rumor event and the ratio
of messages containing at least one or more than one
images.
• Popularity: Some images are very popular and gain
more re-tweets and comments than others in an
event. The ratio of the most popular images are
calculated to denote this feature.
Image type: Some images have particular type in
resolution or style. For example, long images are
images with a very large length-to-width ratio. The
ratio of these types of images is also counted as a
statistical feature.
•
Visual content features are extracted to describe image
distributions from a visual perspective, such as visual clar-
ity, diversity and coherence.
In [30], the authors find that images in rumors and non-
rumors are visually distinctive on their distributions. To
describe image distributions based on the visual content,
five image visual features are proposed in their work: visual
Fig. 5. Main categories of features used for rumor detection on mi-
croblogs.
space. This algorithm models words based on their semantic
analogies. Inspired by its success, some recent rumor de-
tection applications [33] [4] also represent texts via word
embedding.
Topic features are extracted from the level at the mes-
sage set, which aim to understand messages and their
underlying relations within a corpus.
Wu et al. [15] define a set of topic features to summaries
semantics for detecting rumors on Weibo. They train a La-
tent Dirichlet Allocation (LDA) [35] model with an 18-topic
distribution on all messages. And each message can belong
to one or more topics. They transform the 18-dimensional
distribution vector into binary vector by setting the top k-
highest probability topics to 1 and the rest of topics to 0.
The size of k is selected based on the coverage of remained
topics.
Jin et al. [16] cluster topics based the event a message
refers to and extract features both at the message level
and the topic level. They assume that messages under a
same topic probably have similar credibility values. Under
this assumption, they cluster messages into different topics
and obtain the topic-level feature by aggregating features
on the message level. They claim that this kind of topic-
level feature can reduces the impact of noisy data while
maintaining most of details on the message level.
Towards a more comprehensive understanding of text
on social media, existing work also come up with textual
features derived from the traits of social media platform,
apart from general textual features. For example, features
extracted from outer source links [36].
3.1.2 Visual features
While most work detects rumors depend on textual content,
only some very recent work try to extract features from the
visual content of rumors.
Gupta et al. [37] make a first attempt to understand
the temporal, social reputation and influence patterns for
the spreading of fake images on Twitter. They propose a
classification model to identify the fake images on Twitter
Features for Rumor Detection Content Features Textual Features Lexical Features Syntactic Features Topic Features Visual Features Visual Statistical Features Visual Content Features Social Context Features User Features Individual Features Group Features Propagation Features Temporal Features clarity score, visual coherence score, visual similarity distri-
bution histogram, visual diversity score, and visual cluster-
ing score, which describe image distribution characteristics
from different visual aspects.
• Visual Clarity Score measures the distribution dif-
ference between two image sets: one is the image
set in a certain news event (event set) and the other
is the image set containing images from all events
(collection set) [39]. This feature is designed under
the assumption that a non-rumor event would con-
tain many original images specifically related to this
event, which have a different image distribution in
comparison with the overall image set.
The clarity score is defined as the Kullback-Leibler
divergence [40] between two language models rep-
resenting the target image set and all image set, re-
spectively. The bag-of-word image representation is
employed to define language models for images. To
be specific, local descriptors (e.g. the scale-invariant
feature transform (SIFT) [41] feature) for each im-
age are extracted and then quantized to form a
visual word vocabulary. Each image is represented
by words from the vocabulary.
• Visual Coherence Score measures how coherent im-
ages in a certain news event are [42] [43]. This fea-
ture is computed based on visual similarity among
images and can reflect relevant relations of images in
news events quantitatively. More specifically, the av-
erage of similarity scores between every two images
is computed as the coherence score. In implementa-
tion, the similarity between image pairs is calculated
based on their GIST feature representations [44].
• Visual Similarity Distribution Histogram describes
inter-image similarity in a fine granularity level. It
evaluates image distribution with a set of values
by quantifying the similarity matrix of each image
pair in an event [43]. The visual similarity matrix
is obtained by calculating pairwise image similarity
in an event. The visual similarity is also computed
based on their GIST feature representations. The
image similarity matrix is then quantified into an
H-bin histogram by mapping each element in the
matrix into its corresponding bin, which results in
a feature vector of H dimensions representing the
similarity relations among images.
• Visual Diversity Score measures the visual differ-
ence of the image distribution. Compared with visual
coherence score,
it computes the image diversity
distribution directly and gives more emphasis on
representative images.
The diversity of an image is defined as its minimal
difference with the images ranking before it in the
whole image set [45]. Here images are ranked accord-
ing to their popularity on social media, based on the
assumption that popular images would have better
representation for the news event. The visual diver-
sity score is then calculated as a weighted average
of dissimilarity over all images, where top-ranked
images have larger weights [46]. So that this feature
can reduce the impact of unpopular noisy images.
7
Dissimilarity of an image pair is computed as the
complementary of its similarity.
• Visual Clustering Score evaluates the image distri-
bution from a clustering perspective. It is defined
as the number of clusters formed by all images in
a news event.
To cluster images, the hierarchical agglomerative
clustering (HAC) algorithm [47] is employed, which
merges nearest atomic clusters into larger clusters in
a bottom-up strategy. HAC does not require the num-
ber of clusters to be determined or estimated before
clustering. Thus, the number of clusters yielded by
HAC reveals the diversity feature of images.
In implementation, the single-link strategy is used to
measure the similarity between two clusters, and the
Euclidean distance of image GIST feature vectors is
used as the distance measurement. Very small clus-
ters are considered as outliers and removed before
calculating the final score [30].
Evaluation of these visual content features on a set of
25,513 images from 146 events shows that images in rumors
are more coherentm less diverse and forming less clusters
compared with those in non-rumors. Consequently, these
feature can be useful for detecting rumor events.
3.2 Social context features
One of the key features of social media is the openness for all
kinds of interactions, in comparison with traditional media.
Three types of social interactions universally exit on social
media:
•
Interactions among users, such as "adding friend"
and "following". This kind of interaction forms the
huge and complex underlying network where all
information circulates.
• Links among multimedia content are
formed
through tags, hashtag topics or url links. Online con-
tents are organized into sub-groups with this kind of
links.
Interactions among users and content, such as "post-
ing","commenting", "reposting", and "tagging".
•
Many features are derived from the social connection
characteristic of social media on the rumor detection task.
Three main types of social features are user feature, propa-
gation features and temporal features.
User features are derived from the user social network.
Rumors are created by a few users and spread by many
users. Analyzing their characteristics could provide crucial
clues for rumor detection. User features could describe the
characteristics of a single user or a user group comprised of
multiple related users.
•
Individual features are extracted from single user.
Common individual features are calculated from a
user's profile, such as "register time", "age", "gen-
der"and "occupation" [29], or user's online actions,
such as "number of followers", "number of fol-
lowees" and "number of posted messages" [11].
Yang et al. [12] proposed two features to mark the
user's posting behavior: the "client" feature is the
software that was used by the user and the "location"
feature marks whether the message is sent from from
where the event happened or not.
Liu et al. [48] evaluated a user's reliability from the
perspective of journalists and proposed user features
including the credibility identification, diversity and
location of a source user.
• Group features are overall features of a group whose
members have certain similar behaviors in the rumor
diffusion process [12]. Group features can be gen-
erated by aggregating features of single user, such
as "the ratio of verified users" and "the average
followee count".
Propagation features are derived from the fusion net-
work on which rumors spread. In [11], some statistics of
messages' propagation trees, such as the average depth or
size of propagation trees, were proposed to capture basic
propagation features. The work of Kwon et al. [13] further
extended them with 15 structural features extracted from the
diffusion network as well as the user friendship network,
including the number of nodes and links, the median degree
and density of these networks. Wu et al. [15] proposed a
concise structure to describe the propagation process for
a single message. Yang et al. [49] proposed a set of net-
work features based on network created via the comment
providers. In [50], certain propagation structures are studied
to find the distinctive patterns for rumor detection.
Temporal features mark the import time points or the
life circle pattern about the diffusion of rumors. In [13]
message spikes along the time line are modeled to capture
the spreading patterns of rumors. Ma et al. [51] proposed
a method for discretizing time stream and capturing the
variation of time features. Giasemidis et al. [52] split every
rumor events into 20 time-intervals and extract features for
each subset of messages.
Kwon et al. studied the stability of features over time
[53]. They found that for rumor detection linguistic and
user features are suitable for early stage, while structural
and temporal features tend to have good performance in
the long-term stage.
3.3 Classification Methods
With sufficient features available, many classification meth-
ods are proposed in literatures focusing on finding effective
features for the rumor detection task.
Most work experimented with more than one classifiers
to find the most suitable method, including Decision Tree
[11] [51] [52], Bayesian networks [11], Random Forest [13]
[30], Logistic Regression [52] [36] and SVM [11] [13] [12]
[30] [51].
Some work proposed novel classification algorithms for
better aggregating diverse features. Wu et al. [15] proposed
an SVM with a hybrid kernel technique consisting of ran-
dom walk kernel [54] and an RBF kernel [55]. The random
walk kernel is specifically designed to capture propagation
features from the comments tree of a message, while the RBF
kernel is applied on content and user features. A two-level
classification framework was proposed in [16] to leverage
features at the message-level and topic-level. Regarding
8
rumors as anomalies, Chen et al. [56] initially used anomaly
detection to classify rumors.
4 PROPAGATION-BASED APPROACHES
Hand-crafted features based approaches evaluate each mes-
sage and event individually. However, some underlying
correlations exist among messages and events on social
media. One simple observation is that similar messages
tend to have the same veracity polarity in an event. The
propagation-based approaches are proposed by mining re-
lations among entities and evaluate the credibility of mes-
sages and events as a whole. As illustrated in Figure 2, the
paradigm of propagation-based rumor detection commonly
has two main steps [17] [6] [18]:
1) Constructing a credibility network. Entities in-
volved in rumor detection, such as messages, users,
topics or events, are defined as nodes in the net-
work. Each node has an initial credibility value to
indicate its confidence of truthfulness. Links among
these entities are defined and computed based on
their semantic relation or interaction relation on
social media.
2) Credibility propagation. Under some assumptions
of node consistency and network smoothness, cred-
ibility values are propagated on the constructed
network along weighted links until converge, which
yields the final credibility evaluation for each entity.
This credibility propagation paradigm is inspired by the
work on truth discovery, which aims to find the truth with
conflicting information [57]. The propagation problem is
formed as semi-supervised graph learning task [58] [59] [60].
Compared with direct classification on individual entity,
propagation-based approaches can leverage the inter-entity
relations and achieve robust results. We give a survey of
three typical implementations of propagation-based rumor
detection approaches, namely user-message-event network,
hierarchical content network and conflicting viewpoints net-
work.
4.1 User-Message-Event Network
Gupta et al. [17] first introduced the propagation method .
They constructed a network consists of users, messages and
events under two intuitions:
• Credible users do not offer credibility to rumor
events in general.
• Links between credible messages have larger weights
than those for rumor messages, as messages in an
rumor event don't make coherent claims.
4.1.1 Network structure
As illustrated in Figure 6(a), the structure of this network is
formed as followings:
• Each user is linked to a message if puts up that
message.
• Each message is linked to an event if it belongs to
that event (i.e. containing the same keywords as the
event).
9
(a) User-Message-Event Network (b) Hierarchical Content Network
(c) Conflicting Viewpoints Network
Fig. 6. Three different networks for propagation-based rumor detection.
• Messages are linked with each other to denote the
inter-message relationship.
• Events are linked with other events to denote inter-
event relationship.
The inter-message links denote how a message would
influence other messages. These influence is computed as
semantic similarity between two messages in [17]. The ratio
of shared unigrams is calculated as the link's weight to rep-
resent the influence degree between two linked messages.
Similarly, the links between events are computed as the
shared unigrams in the event keywords representing two
events. As for the weights of the rest two types of links:
links from users to messages and links from messages to
events, are not defined and set as 1 by default.
4.1.2 Credibility propagation
The initial credibility values of each messages are obtained
from the results of a feature-based classifier, similar to that
of [11]. Then they are propagated on this network using
PageRank-like iterations. At each iteration, the credibility
valuses are updated as follows:
•
•
•
For each message, its credibility value is affected by
three aspects: the user and event it links to and other
linked messages. Contributions from these aspects
are weighted to make sure that they are comparable
when updating its credibility.
For each event, its credibility value is affected by two
aspects: the messages it links to and other linked
events. Therefore, its credibility value is updated
accordingly.
For each user, the average credibilities of all the
messages it links to is computed for updating.
After several iterations, this algorithm would converge
and produce the final predictions for each entity.
4.2 Hierarchical Content Network
Inspired by the idea of linking entities altogether and lever-
aging inter-entity implications for credibility propagation,
Jin et al. [6] proposed a three-layer credibility network
constructed from different semantic levels of content of an
event. They firstly pointed out that the involving of users
in the network in [17] is less convincible. Based on their
observation, many users spread rumors unintentionally on
social media and even credible users would be misguided
to spread rumors. They also found that a news event, as
a whole, contains both real and fake information in many
occasions. Thus, without deeper analysis of its components,
it is hard to get a convincing evaluation for the event.
Motivated by these observations, they aimed to minimize
users' influence and focus on an event's deeper semantic
relations by proposing a three-layer credibility propagation
network.
4.2.1 Network structure
The hierarchical content network has three layers of entities:
message layer, sub-event layer and event layer (Figure 6(b)).
They are all content-based, and have direct relations with
news credibility. The sub-event layer is initially introduced
to capture the deeper sematic information within an event.
Sub-events are various point of views of an event which are
message clusters representing major parts or topics of an
event. To be specific, the network is formed as followings: a
message is linked to a sub-vent if it is clustered into that sub-
events; a sub-event is linked to the event; all the messages
are linked with each other so are the sub-events.
Similar to [17], the four types of inter-entity links de-
note how entities would influence each other on credibility
evaluation. In [6], the link weights are mostly determined
by two facts: the semantic similarity and the social impor-
tance. By assuming semantically similar entities would have
similar credibility values, the sematic similarity scores are
computed between entity pairs based on their word repre-
sentation. Meanwhile, the social importance score, which
is calculated from the number of re-tweets or comments
gained by an entity, is incorporated to give emphasis on
more popular content in a sub-event or event.
4.2.2 Credibility propagation
Under the assumption that entities with large link weight
between them should have similar credibility values, the
credibility propagation problem is formulated as a graph
optimization problem. The authors gave a loss function
which are constraints ensure the propagation should not
change too much between entities with large link weight
or from the entities' initial values. They then deduced the
iterative solution for optimizing the loss function with the
gradient descent method. The authors claimed that their for-
mulation of the credibility propagation is a convex problem
UserMessageEventMessageSub-eventEventsupportingopposingConflicting Viewpoints NetworkOriginal NetworkConflicting Viewpoints MingviewpointTopic-viewpoint…Message…which ensures that they can provide the globally optimal
solution with an iterative algorithm. Compared with the
institutive propagation method in [17], this is a theoretical
improvement.
4.3 Conflicting Viewpoints Network
According to [18], there exist two kinds of relations be-
tween messages on microblogs. One relation is supporting,
where messages expressing the same viewpoint support
each others credibility. The other relation is opposing, where
messages expressing conflicting viewpoints decrease each
other's credibility. As microblogs are open media platforms,
people can post their skeptical and even opposing responses
after they read a news event. These opposing voices would
arise against the news along with original supportive voices
in the case of rumors, which are very crucial components
for evaluating the truthfulness of news events.
4.3.1 Network structure
Based on this observation, the authors proposed a credibility
network with both supporting and opposing relations by
exploiting the conflicting viewpoints in microblogs (Figure
6(c)).
• Conflicting viewpoints mining. Conflicting view-
points are mined through a joint topic-viewpoint
model [61]. This model represents each message as
a mixture of topics and a mixture of viewpoints for
each topic. These topic-viewpoint pairs are then clus-
tered under constraints to form the final conflicting
viewpoints.
• Link definition. The link between any two messages
are computed based on the results of mined conflict-
ing viewpoints. The wight of the link is computed as
the distance between the probability representations
of the two messages from the topic model. And the
polarity of the link is defined from the viewpoints
clustering: messages have the same viewpoints form
the positive link, otherwise they form the negative
link.
• Network construction. All messages in an event are
linked with each other. Links between them are com-
puted as above.
4.3.2 Credibility propagation
Similar to that in [6], the credibility propagation on this
network is also defined as a graph optimization problem.
To deal with the negative links in the network, the authors
propose a loss function which can ensure that messages
with supporting relations have similar credibility values and
messages with opposing relations have opposite credibility
values or values both close to zero. Given the loss function,
they also derived the optimal solution to it.
5 DEEP NEURAL NETWORKS APPROACHES
Compared to the traditional classifiers, deep neural net-
works (DNN) have demonstrated clear advantages for
many machine learning problems, such as object detection,
sentiment classification and voice recognition. DNN based
methods aim to learn deep representation of rumor data
10
automatically. Based on the different structures of neural
networks, the neural network methods can be further clas-
sified into the two categories:
• Recurrent Neural Networks: Based on the structure
of RNN, this kind of approach models the rumor
data as sequential data. The key point is that the
connections between units in an RNN form a direct
cycle and create an internal state of the network
that might allow it to capture the dynamic temporal
signals characteristic of rumor diffusion [9], [19]–[21].
• Convolutional Neural Networks: CNN is composed
by stacked convolutional and pooling layers, the
structure of which help model significant semantic
features. The CNN based methods [22] [23] assume
that CNN can not only automatically extract local-
global significant features from an input instance but
reveal those high-level interactions.
We now introduce some representative works for each
category.
5.1 RNN-based methods
Ma et al. first apply recurrent neural network to detect
rumors. They observe that a rumor event consists of an
original post and a group of related posts including reposts
and comments, which create a continues stream of posts.
Thus, they model the rumor data as a variable length time
series. However, a rumor event consists of tens of thousands
of posts, so they batch posts into time intervals and treat
them as a single unit in a time series that is then modeled
using an RNN sequence. In each interval, they use the
tf ∗ idf values of the top-K terms in the vocabulary as
input. Their model aims to learn both temporal and textual
representations from the rumor data under supervision
and extensive experiments demonstrate that their model
achieves outstanding performance compared to those work
utilizing hand-crafted features.
Some malicious words in the content may be strongly
related to the rumor category. To better understand what
words the model pay more attention to, Chen et al. leverage
attention mechanism in their model [19]. One assumption
of their work is that textual features of the rumor data
may change their importance with time and it is crucial
to determine which of them are more important to the
detection task. Similar to [9], they first batch posts into time
intervals and use tf ∗ idf as the representation of the input.
In each timestep, the hidden state will be allocated a weight
parameter to measure its importance and contribution to the
results. The performance of experiments demonstrate the ef-
ficiency of attention mechanism and show that most words
connected with the event itself are given less attention
weight than words expressing users' doubting, esquiring
and anger caused by the rumor, while ignore unrelated
words.
Ruchansky et al. focus on three characteristics of the
rumor data [20]: the text of an article, the user response it
receives, and the source users promoting it. These charac-
teristics represent different aspects of the rumor data, and it
is also challenging to detect rumors based on one of them.
Thus, they propose a hybrid model(CSI) that combines all
three characteristics for a more accurate and automated
prediction. The model is composed of three modules: Cap-
ture, Score, and Integrate. The first module is based on the
response and text; it uses a Recurrent Neural Network to
capture the temporal pattern of user activity on a given
article. The second module learns the source characteristic
based on the behavior of users, and a user is represented
by a vector. In the third module, the result of the first two
modules are integrated to a vector which is used to classify
an article as fake or not. Aside from accurate prediction, the
CSI model also produces latent representations of both users
and articles that can be used for separate analysis.
Jin et al. not only leverage the textual information but
also visual and social information and propose a multi-
modal fusion based model. An increasing number of users
are using images and videos to post news in addition to
texts. Therefore, for given a post, its text and social context
are first fused with an LSTM unit. The joint representation
are then fused with visual features extracted from pre-
trained deep VGG-19. The output of the LSTM at each time
step is employed as the neuron-level attention to coordinate
visual features during the fusion. Extensive experiments
conducted on Weibo and Twitter datasets demonstrate that
their model can effectively detect rumors based on multi-
media content, in comparison with existing feature-based
methods and several multimodal fusion methods based on
neural networks.
5.2 CNN-based methods
Yu et al. find that the RNN is not qualified to the early
detection tasks with limited inputting data and has a bias to-
wards the latest elements of input sequence [22]. To address
those issues, they propose a convolutional neural network
based approach for rumor detection. Specifically, they put
forward a method to split every rumor event into several
phases. Subsequently, all events are split into several groups
of microblog posts. And representation of each group is
learnt though doc2vec, so an input sequence of CAMI is
formed of a group of vectors. Finally, the vectors are fed to a
two-layer convolutional neural networks, obtaining the final
results of two-class classification. Their model can extract
significant features from an input instance and achieve high
performance on the two open dataset.
Nguyen et al. focus on detect rumors at the early stage
of rumor propagation, who proposed a CNN + RNN based
model. In the unified model, the part of CNN is applied for
representation. Each tweet is first formed of a set of word
embeddings which are learnt jointly in the model training
process. Specifically, the model utilizes CNN to extract a
sequence of higher-level phrase representations to learn the
hidden representations of individual rumor-related tweets.
Then the part of RNN is used to process the time series
obtained by CNN. By using limited rumor data, extensive
experiments show the good performance of their model
within the very first hours during the propagation of a
rumor.
6 DATASETS
Since different papers report experimental results utilizing
different datasets, to compare methods fairly on a reason-
TABLE 1
Statistics on the datasets
11
Dataset
Data source
Rumor Non-rumor
KWON
MediaEval
RUMDECT
RUMOURREVAL
MULTI
Twitter
Twitter
Twitter & Weibo
Twitter
Weibo
47
9000
498
145
4749
55
6000
494
74
4779
able scale, a few benchmark datasets have recently been
proposed. We review the following representative datasets
because they were collected from real-world social media
platforms and have been widely used in rumor detection.
KWON dataset. The KWON dataset [13], released in
2013, consists of 47 events of rumor and 55 events of non-
rumor collected from Twitter, each events contains 60 tweets
at least. To ensure all the events are valid, each event is
labeled by four participants and the dataset only contains
those events that are evaluated by at least four participants
and had the majority agreement.
MediaEval dataset. The MediaEval dataset is released
by The Verifying Multimedia Use task at MediaEval [62],
which aims to detect false multimedia content on Twitter. It
contains 9000 tweets of rumor and 6000 non-rumor tweets
related to 17 events in the development set, and 2000 tweets
related to 35 events in the test set.
RUMDECT dataset. The RUMDECT dataset [9], released
in 2016, consists of two types of data from Weibo and
Twitter, respectively. For Weibo data, a group of known ru-
mors are first collected from Sina community management
center and another group of non-rumor events are crawled
from the posts of general threads. Therefore, the Weibo data
contains 2313 rumors and 2351 non-rumors. For the Twitter
data, 778 reported events during March-December 2015 are
collected from Snopes.com. For each event, the keywords
from its Snopes URL are applied as query to search related
posts from Twitter. In order to balance the two classes, some
non-rumor events are added from two another datasets [11],
[13]. The resulting twitter data contains 498 rumor events
and 494 non-rumor events.
RUMOUREVAL dataset. The RUMOUREVAL dataset is
produced for RumourEval 2017 [63], a shared subtask in
SemEval 2017. The training set consists of 297 rumourous
threads collected for 8 events, which include 297 source and
4,222 reply tweets. The testing set includes, in total, 1,080
tweets, 28 of which are source tweets and 1,052 replies.
MULTI dataset. The MULTI dataset [21] released in
2017, includes 4749 posts of rumor and 4779 posts of non-
rumor collected from the official rumor debunking system
of Weibo. Unlike the previous datasets, the MULTI dataset is
the first dataset that focuses on leveraging multimodal con-
tents to detect rumors on Weibo platform, which contains
not only textual information but also visual information.
Table I summarizes the datasets used for rumor detec-
tion. Based on their statistic information, we can observe
that each dataset either consists of a set of events or a set of
messages. Datasets containing rumor events are suited for
classifying a wide spread event on social media platforms,
while datasets composed by rumor messages are suited for
classifying a single message.
7 CONCLUSION AND PERSPECTIVES
Rumors spreading on social media could severely influ-
ence people' daily life. However, most applications still
rely on manual efforts, either by human experts or by
common user, to combat the ever-increasing rumors. Un-
der this circumstances, the research on automatic rumor
detection attracts more and more attention. In this survey,
we attempt to provide a comprehensive survey for exit-
ing studies towards the development of automatic rumor
detection approaches. Moreover, we have categorized the
existing work into three paradigms, hand-crafted features
based approach, propagation-based approach and neural
networks approach. We start from introducing the features
of rumors and then we analyze the principles of the existing
classification algorithms.
Three different paradigms for rumor detection are elab-
orately described: the feature-based classification approach,
the credibility propagation approach and the neural net-
works approaches. For each method in these paradigm, it
aims to tow goals: one is to extract prominent features to
representing the multimedia content comprise rumors and
the social context generated by rumors on social network,
the other goal is to build robust machine learning algorithms
to separate rumors from common stories.
Moreover, we introduce several public datasets and give
the statistic details for each of them. All the datasets are
collected from Weibo or Twitter platform. Each sample in
event based dataset refers to a group of messages with one
topic, while the sample in message based dataset refers to
a single message . We can observe an encouraging trend
that some works, begin to build large datasets. But in most
works, the datasets are still not large enough. A main
difficulty in collecting dataset is that rumor are those news
debunked by authorities, the number of which is less than
that of nonrumor samples.
Apart from finding more efficient features or algorithms,
we summary the four main challenges for future studies:
Early detection. The life circle of a story propagating
on social networks is quite short, some studies suggested
it is less than three days. What's more, rumors become viral
in seconds or minutes [3]. It is crucial to detect rumors at
their very early stage. However, most existing studies detect
rumors by assuming they have all content in all life time
of the rumor. The resource on the beginning of a rumor is
such limited that it is very challenging to detect it at the
early stage. Although Yu et al. propose a method to solve
this problem, the performance is unable to meet the need of
early detection.
Explanatory detection. Exiting rumor detection methods
only give a final decision of whether a story is a rumor.
Little information is revealed why they make the decision.
However, unlike simple object classification, finding the
evidences supporting the decision would be beneficial in
debunking the rumor and prevent its further spreading. The
explanatory rumor detection requires algorithms to monitor
much more closely into every components in rumors, which
is a challenge to be resolved.
12
Long text rumor detection. The objects of rumor detec-
tion methods at present are short text spread on social me-
dia. However, more and more long text news such as blogs
and passages are generated on some online communities,
which arise a growing demand for verification. Different
from short text rumors, long text rumors have affluent
semantic information which poses an obvious obstacle for
comprehensive understanding. Moreover,
in most cases,
only part of a given long text rumor contains false informa-
tion, while the rest of which is true. So it is unfair to classify
the whole passage as a rumor or not. More efforts should
be addressed not only on improving the performance for
detecting long text rumor but also on pointing out the
precise position of false information in a passage.
Multimodal rumor detection. The fact that an increasing
number of rumors consisting of multimodal data are prop-
agating on social media brings difficulties for traditional
detection methods. Therefore, analyzing the relationships
among data with multiple modalities and developing ad-
vanced fusion based models to utilize these data can be the
key to detect rumors in more complex scenarios. Though
Jin et al. proposed a fusion based model to detection ru-
mors with multiple modalities [21], the complex relation-
ship among different modalities should be modeled more
accurately.
REFERENCES
[1]
J. Gottfried and E. Shearer, "News use across social media plat-
forms 2016," Pew Research Center, 2016.
[2] Z. Zhao, P. Resnick, and Q. Mei, "Enquiring minds: Early detection
of rumors in social media from enquiry posts," in Proceedings of
the 24th International Conference on World Wide Web.
International
World Wide Web Conferences Steering Committee, 2015, pp. 1395–
1405.
[3] A. Friggeri, L. A. Adamic, D. Eckles, and J. Cheng, "Rumor
cascades," in Proceedings of the Eighth International AAAI Conference
on Weblogs and Social Media, 2014.
[4] Z. Jin, J. Cao, H. Guo, Y. Zhang, Y. Wang, and J. Luo, "Detection
and analysis of 2016 US presidential election related rumors on
twitter," in Social, Cultural, and Behavioral Modeling - 10th Interna-
tional Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8,
2017, Proceedings, 2017, pp. 14–24.
[5] P. Domm, "False rumor of explosion at white house causes stocks
to briefly plunge; ap confirms its twitter feed was hacked," 2013.
[6] Z. Jin, J. Cao, Y.-G. Jiang, and Y. Zhang, "News credibility evalua-
tion on microblog with a hierarchical propagation model," in 2014
IEEE International Conference on Data Mining (ICDM).
IEEE, 2014,
pp. 230–239.
"Facebook to begin flagging fake news in response to mount-
ing criticism," https://www.theguardian.com/technology/2016/
dec/15/facebook-flag-fake-news-fact-check, 2016, [Online; Ac-
cessed 15-December-2016].
[8] A. Gupta, P. Kumaraguru, C. Castillo, and P. Meier, TweetCred:
Springer
Real-Time Credibility Assessment of Content on Twitter.
International Publishing, 2014, pp. 228–243.
J. Ma, W. Gao, P. Mitra, S. Kwon, B. J. Jansen, K.-F. Wong, and
M. Cha, "Detecting rumors from microblogs with recurrent neural
networks," in Proceedings of IJCAI, 2016.
[10] M. Wang, B. Ni, X.-S. Hua, and T.-S. Chua, "Assistive tagging: A
survey of multimedia tagging with human-computer joint explo-
ration," ACM Comput. Surv., vol. 44, no. 4, pp. 25:1–25:24, Sep.
2012.
[11] C. Castillo, M. Mendoza, and B. Poblete, "Information credibility
on twitter," in Proceedings of the 20th international conference on
World Wide Web (WWW). ACM, 2011, pp. 675–684.
[12] F. Yang, Y. Liu, X. Yu, and M. Yang, "Automatic detection of rumor
on sina weibo," in Proceedings of the ACM SIGKDD Workshop on
Mining Data Semantics. ACM, 2012, pp. 1–7.
[7]
[9]
[13] S. Kwon, M. Cha, K. Jung, W. Chen, and Y. Wang, "Prominent
features of rumor propagation in online social media," in Data
Mining (ICDM), 2013 IEEE 13th International Conference on.
IEEE,
2013, pp. 1103–1108.
[14] S. Sun, H. Liu, J. He, and X. Du, "Detecting event rumors on
sina weibo automatically," in Web Technologies and Applications.
Springer, 2013, pp. 120–131.
[15] K. Wu, S. Yang, and K. Q. Zhu, "False rumors detection on sina
weibo by propagation structures," in IEEE International Conference
on Data Engineering, ICDE, 2015.
[16] Z. Jin, J. Cao, Y. Zhang, and Z. Yongdong, "Mcg-ict at mediaeval
2015: Verifying multimedia use with a two-level classification
model," in Proceedings of the MediaEval 2015 Multimedia Benchmark
Workshop, 2015.
[17] M. Gupta, P. Zhao, and J. Han, "Evaluating event credibility on
twitter," in Proceedings of the SIAM International Conference on Data
Mining. Society for Industrial and Applied Mathematics, 2012, p.
153.
[18] Z. Jin, J. Cao, Y. Zhang, and J. Luo, "News verification by exploit-
ing conflicting social viewpoints in microblogs," in Proceedings of
the Thirtieth AAAI Conference on Artificial Intelligence, February 12-
17, 2016, Phoenix, Arizona, USA., 2016.
[19] T. Chen, L. Wu, X. Li, J. Zhang, H. Yin, and Y. Wang, "Call attention
to rumors: Deep attention based recurrent neural networks for
early rumor detection," arXiv preprint arXiv:1704.05973, 2017.
[20] N. Ruchansky, S. Seo, and Y. Liu, "Csi: A hybrid deep model for
fake news detection." CIKM, 2017.
[21] Z. Jin, J. Cao, H. Guo, Y. Zhang, and J. Luo, "Multimodal fu-
sion with recurrent neural networks for rumor detection on mi-
croblogs," in Proceedings of the 2017 ACM on Multimedia Conference,
MM 2017, Mountain View, CA, USA, October 23-27, 2017, 2017, pp.
795–816.
[22] F. Yu, Q. Liu, S. Wu, L. Wang, and T. Tan, "A convolutional
approach for misinformation identification."
[23] T. N. Nguyen, C. Li, and C. Nieder´ee, "On early-stage debunking
rumors on twitter: Leveraging the wisdom of weak learners," in
International Conference on Social Informatics.
Springer, 2017, pp.
141–158.
[24] A. Zubiaga, A. Aker, K. Bontcheva, M. Liakata, and R. Procter,
"Detection and resolution of rumours in social media: A survey,"
arXiv preprint arXiv:1704.00656, 2017.
[25] C. Boididou, S. E. Middleton, Z. Jin, S. Papadopoulos, D.-T. Dang-
Nguyen, G. Boato, and Y. Kompatsiaris, "Verifying information
with multimedia content on twitter," Multimedia Tools and Applica-
tions, pp. 1–27, 2017.
[26] N. DiFonzo and P. Bordia, Rumor psychology: Social and organiza-
tional approaches. American Psychological Association Washing-
ton, DC, 2007, vol. 1.
[27] G. W. Allport and L. Postman, "The psychology of rumor." 1947.
[28] D. E. Alexander, "Social media in disaster risk reduction and crisis
management," Science and engineering ethics, vol. 20, no. 3, pp. 717–
733, 2014.
[29] M. R. Morris, S. Counts, A. Roseway, A. Hoff, and J. Schwarz,
"Tweeting is believing?: understanding microblog credibility per-
ceptions," in Proceedings of the ACM 2012 conference on Computer
Supported Cooperative Work. ACM, 2012, pp. 441–450.
[30] Z. Jin, J. Cao, Y. Zhang, J. Zhou, and Q. Tian, "Novel visual and
statistical image features for microblogs news verification," IEEE
Trans. Multimedia, vol. 19, no. 3, pp. 598–608, 2017.
[31] Z. Jin, J. Cao, J. Luo, and Y. Zhang, "Image credibility analysis
with effective domain transferred deep networks," CoRR, vol.
abs/1611.05328, 2016.
[32] A. Hassan, V. Qazvinian, and D. Radev, "What's with the atti-
tude?: identifying sentences with attitude in online discussions,"
in Proceedings of the 2010 Conference on Empirical Methods in Natural
Language Processing. Association for Computational Linguistics,
2010, pp. 1245–1255.
[33] B. Ma, D. Lin, and D. Cao, "Content representation for microblog
rumor detection," in Advances in Computational Intelligence Systems.
Springer, 2017, pp. 245–251.
[34] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean,
"Distributed representations of words and phrases and their com-
positionality," in Advances in neural information processing systems,
2013, pp. 3111–3119.
[35] D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation,"
Journal of machine Learning research, vol. 3, no. Jan, pp. 993–1022,
2003.
13
[36] Z. Zhang, Z. Zhang, and H. Li, "Predictors of the authenticity
of internet health rumours," Health Information & Libraries Journal,
vol. 32, no. 3, pp. 195–205, 2015.
[37] A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi, "Faking sandy:
characterizing and identifying fake images on twitter during
hurricane sandy," in Proceedings of the 22nd international conference
on World Wide Web companion.
International World Wide Web
Conferences Steering Committee, 2013, pp. 729–736.
[38] C. Boididou, K. Andreadou, S. Papadopoulos, D.-T. Dang-
Nguyen, G. Boato, M. Riegler, and Y. Kompatsiaris, "Verifying
multimedia use at mediaeval 2015," in MediaEval 2015 Workshop,
Sept. 14-15, 2015, Wurzen, Germany, 2015.
[39] C. Hauff, V. Murdock, and R. Baeza-Yates, "Improved query
difficulty prediction for the web," in Proceedings of the 17th ACM
conference on Information and knowledge management. ACM, 2008,
pp. 439–448.
[40] S. Kullback and R. A. Leibler, "On information and sufficiency,"
The annals of mathematical statistics, pp. 79–86, 1951.
[41] D. G. Lowe, "Distinctive image features from scale-invariant key-
points," International journal of computer vision, vol. 60, no. 2, pp.
91–110, 2004.
[42] J. He, M. Larson, and M. De Rijke, "Using coherence-based
measures to predict query difficulty," in Advances in Information
Retrieval. Springer, 2008, pp. 689–694.
[43] X. Tian, Y. Lu, and L. Yang, "Query difficulty prediction for web
image search," IEEE Transactions on Multimedia, vol. 14, no. 4, pp.
951–962, 2012.
[44] A. Oliva and A. Torralba, "Modeling the shape of the scene:
A holistic representation of the spatial envelope," International
journal of computer vision, vol. 42, no. 3, pp. 145–175, 2001.
[45] M. Wang, K. Yang, X. S. Hua, and H. J. Zhang, "Towards a
relevant and diverse search of social images," IEEE Transactions
on Multimedia, vol. 12, no. 8, pp. 829–842, Dec 2010.
[46] T. Deselaers, T. Gass, P. Dreuw, and H. Ney, "Jointly optimising
relevance and diversity in image retrieval," in Proceedings of the
ACM international conference on image and video retrieval. ACM,
2009, p. 39.
[47] B. King, "Step-wise clustering procedures," Journal of the American
Statistical Association, vol. 62, no. 317, pp. 86–101, 1967.
[48] X. Liu, A. Nourbakhsh, Q. Li, R. Fang, and S. Shah, "Real-time
rumor debunking on twitter," in Proceedings of the 24th ACM In-
ternational on Conference on Information and Knowledge Management.
ACM, 2015, pp. 1867–1870.
[49] Y. Yang, K. Niu, and Z. He, "Exploiting the topology property
of social network for rumor detection," in Computer Science and
Software Engineering (JCSSE), 2015 12th International Joint Conference
on.
IEEE, 2015, pp. 41–46.
[50] S. Wang and T. Terano, "Detecting rumor patterns in streaming
social media," in Big Data (Big Data), 2015 IEEE International
Conference on.
IEEE, 2015, pp. 2709–2715.
[51] J. Ma, W. Gao, Z. Wei, Y. Lu, and K.-F. Wong, "Detect rumors
using time series of social context information on microblogging
websites," in Proceedings of the 24th ACM International on Conference
on Information and Knowledge Management. ACM, 2015, pp. 1751–
1754.
[52] G. Giasemidis, C. Singleton, I. Agrafiotis, J. R. Nurse, A. Pilgrim,
C. Willis, and D. V. Greetham, "Determining the veracity of
rumours on twitter," in International Conference on Social Informatics.
Springer, 2016, pp. 185–205.
[53] S. Kwon, M. Cha, and K. Jung, "Rumor detection over varying
time windows," PloS one, vol. 12, no. 1, p. e0168344, 2017.
[54] K. M. Borgwardt, C. S. Ong, S. Schonauer, S. Vishwanathan, A. J.
Smola, and H.-P. Kriegel, "Protein function prediction via graph
kernels," Bioinformatics, vol. 21, no. suppl 1, pp. i47–i56, 2005.
[55] M. D. Buhmann, Radial basis functions: theory and implementations.
Cambridge university press, 2003, vol. 12.
[56] W. Chen, C. K. Yeo, C. T. Lau, and B. S. Lee, "Behavior deviation:
An anomaly detection view of rumor preemption," in Information
Technology, Electronics and Mobile Communication Conference (IEM-
CON), 2016 IEEE 7th Annual.
IEEE, 2016, pp. 1–7.
[57] V. Vydiswaran, C. Zhai, and D. Roth, "Content-driven trust prop-
agation framework," in Proceedings of the 17th ACM SIGKDD inter-
national conference on Knowledge discovery and data mining. ACM,
2011, pp. 974–982.
[58] X. Zhu and Z. Ghahramani, "Learning from labeled and unlabeled
data with label propagation," 2002.
[59] X. Zhu, Z. Ghahramani, and J. D. Lafferty, "Semi-supervised learn-
ing using gaussian fields and harmonic functions," in Proceedings
of the 20th International conference on Machine learning (ICML-03),
2003, pp. 912–919.
[60] D. Zhou, O. Bousquet, T. N. Lal, J. Weston, and B. Scholkopf,
Juan Cao Institute of Computing Technol-
ogy,Chinese Academy of Sciences, Center for
Advanced Computing Research, Beijing, China.
University of Chinese Academy of Sciences, Bei-
jing, China
Juan Cao received the Ph.D. degree from
the Institute of Computing Technology, Chinese
Academy of Sciences, Beijing, China, in 2008.
She is currently working as an Associate Profes-
sor with the Institute of Computing Technology,
Chinese Academy of Sciences. Her research
interests include large scale social media analysis.
Junbo Guo Institute of Computing Technol-
ogy,Chinese Academy of Sciences, Center for
Advanced Computing Research, Beijing, China
Junbo Guo received the Ph.D. degree from
the Institute of Computing Technology, Chinese
Academy of Sciences, Beijing, China, in 2010.
He is currently working as an Senior Engineer
with the Institute of Computing Technology, Chi-
nese Academy of Sciences. His research inter-
ests include social media analysis and retrieval.
Xirong Li received the B.S. and M.E. degrees
from Tsinghua University, Beijing, China, in 2005
and 2007, respectively, and the Ph.D. degree
from the University of Amsterdam, Amsterdam,
The Netherlands, in 2012, all in computer sci-
ence.
He is currently an Associate Professor with
the Key Lab of Data Engineering and Knowl-
edge Engineering, Renmin University of China,
Beijing, China. His research includes image and
video retrieval.
Prof. Li was an Area Chair of ACMMM 2018 and ICPR 2016, Publi-
cation Co-Chair of ICMR 2015 and Publicity Co-Chair of ICMR 2013.
He was the recipient of the ACM Multimedia 2016 Grand Challenge
Award, the ACM SIGMM Best Ph.D. Thesis Award 2013, the IEEE
TRANSACTIONS ON MULTIMEDIA Prize Paper Award 2012, the Best
Paper Award of the ACM CIVR 2010, the Best Paper Runner-Up of PCM
2016 and PCM 2014 Outstanding Reviewer Award.
14
"Learning with local and global consistency," in Advances in neural
information processing systems, 2004, pp. 321–328.
[61] A. Trabelsi and O. R. Zaiane, "Mining contentious documents
using an unsupervised topic model based approach," in Data
Mining (ICDM), 2014 IEEE International Conference on.
IEEE, 2014,
pp. 550–559.
[62] C. Boididou, S. Papadopoulos, Y. Kompatsiaris, S. Schifferes, and
N. Newman, "Challenges of computational verification in social
multimedia," in Proceedings of the 23rd International Conference on
World Wide Web. ACM, 2014, pp. 743–748.
[63] L. Derczynski, K. Bontcheva, M. Liakata, R. Procter, G. W. S. Hoi,
and A. Zubiaga, "Semeval-2017 task 8: Rumoureval: Determin-
ing rumour veracity and support for rumours," arXiv preprint
arXiv:1704.05972, 2017.
Zhiwei Jin Institute of Computing Technol-
ogy,Chinese Academy of Sciences, Center for
Advanced Computing Research, Beijing, China.
University of Chinese Academy of Sciences, Bei-
jing, China
Zhiwei Jin received the B.S. degree in
software engineering from Wuhan University,
Wuhan, China, in 2012, and is currently work-
ing toward the Ph.D. degree at
the Institute
of Computing Technology, Chinese Academy of
Sciences, Beijing, China, under the supervision
of Prof. Y. Zhang. His research interests include multimedia content
analysis and data mining.
Han Guo Institute of Computing Technol-
ogy,Chinese Academy of Sciences, Center for
Advanced Computing Research, Beijing, China.
University of Chinese Academy of Sciences, Bei-
jing, China
Han Guo received the B.S. degree in software
engineering from Shandong University, Jinan,
China, in 2015, and is currently working toward
the Master degree at the Institute of Computing
Technology, Chinese Academy of Sciences, Bei-
jing, China, under the supervision of Prof. J. Li.
His research interests include multimedia content analysis.
Jintao Li
Jintao Li
Institute of Computing Technol-
ogy,Chinese Academy of Sciences, Center for
Advanced Computing Research, Beijing, China.
received the Ph.D. degree from
the Institute of Computing Technology, Chinese
Academy of Sciences, Beijing, China, in 1989.
He is currently a Professor with the Institute
of Computing Technology, Chinese Academy of
Sciences. His research interests focus on multi-
media technology, virtual reality technology, and
pervasive computing
|
1603.04447 | 1 | 1603 | 2016-03-14T20:00:43 | On the Efficiency of the Information Networks in Social Media | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | Social media sites are information marketplaces, where users produce and consume a wide variety of information and ideas. In these sites, users typically choose their information sources, which in turn determine what specific information they receive, how much information they receive and how quickly this information is shown to them. In this context, a natural question that arises is how efficient are social media users at selecting their information sources.
In this work, we propose a computational framework to quantify users' efficiency at selecting information sources. Our framework is based on the assumption that the goal of users is to acquire a set of unique pieces of information. To quantify user's efficiency, we ask if the user could have acquired the same pieces of information from another set of sources more efficiently. We define three different notions of efficiency -- link, in-flow, and delay -- corresponding to the number of sources the user follows, the amount of (redundant) information she acquires and the delay with which she receives the information. Our definitions of efficiency are general and applicable to any social media system with an underlying information network, in which every user follows others to receive the information they produce.
In our experiments, we measure the efficiency of Twitter users at acquiring different types of information. We find that Twitter users exhibit sub-optimal efficiency across the three notions of efficiency, although they tend to be more efficient at acquiring non-popular than popular pieces of information. We then show that this lack of efficiency is a consequence of the triadic closure mechanism by which users typically discover and follow other users in social media. Finally, we develop a heuristic algorithm that enables users to be significantly more efficient at acquiring the same unique pieces of information. | cs.SI | cs | On the Efficiency of the Information Networks
in Social Media
Mahmoudreza Babaei
MPI-SWS, Germany
Przemyslaw Grabowicz
MPI-SWS, Germany
Isabel Valera
MPI-SWS, Germany
Krishna P. Gummadi
MPI-SWS, Germany
Manuel
Gomez-Rodriguez
MPI-SWS, Germany
6
1
0
2
r
a
M
4
1
]
I
S
.
s
c
[
1
v
7
4
4
4
0
.
3
0
6
1
:
v
i
X
r
a
ABSTRACT
Social media sites are information marketplaces, where users pro-
duce and consume a wide variety of information and ideas. In these
sites, users typically choose their information sources, which in
turn determine what specific information they receive, how much
information they receive and how quickly this information is shown
to them. In this context, a natural question that arises is how effi-
cient are social media users at selecting their information sources.
In this work, we propose a computational framework to quantify
users' efficiency at selecting information sources. Our framework
is based on the assumption that the goal of users is to acquire a
set of unique pieces of information. To quantify user's efficiency,
we ask if the user could have acquired the same pieces of informa-
tion from another set of sources more efficiently. We define three
different notions of efficiency -- link, in-flow, and delay -- corre-
sponding to the number of sources the user follows, the amount of
(redundant) information she acquires and the delay with which she
receives the information. Our definitions of efficiency are general
and applicable to any social media system with an underlying in-
formation network, in which every user follows others to receive
the information they produce.
In our experiments, we measure the efficiency of Twitter users
at acquiring different types of information. We find that Twitter
users exhibit sub-optimal efficiency across the three notions of ef-
ficiency, although they tend to be more efficient at acquiring non-
popular pieces of information than they are at acquiring popular
pieces of information. We then show that this lack of efficiency
is a consequence of the triadic closure mechanism by which users
typically discover and follow other users in social media. Thus, our
study reveals a tradeoff between the efficiency and discoverability
of information sources. Finally, we develop a heuristic algorithm
that enables users to be significantly more efficient at acquiring the
same unique pieces of information.
Categories and Subject Descriptors: H.1.2 [Information Sys-
tems]: Models and Principles -- Human information processing
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
WSDM'16, February 22 -- 25, 2016, San Francisco, CA, USA.
c(cid:13) 2016 ACM. ISBN 978-1-4503-3716-8/16/02. . . $15.00
DOI: http://dx.doi.org/10.1145/2835776.2835826
General Terms: Human Factors; Measurement; Performance.
Keywords: Efficiency; information network; social media; infor-
mation; cover set; rewiring algorithm; optimization; lossless.
1.
INTRODUCTION
Over the last decade, the advent of social media has profoundly
changed the way people produce and consume information online.
A characteristic feature of many social media sites (e.g., Twitter
or Pinterest) that distinguishes them from mainstream news me-
dia sites (e.g., CNN.com or NYTimes.com) is the information net-
work created by consumers following their preferred producers of
information [6, 18, 10]. However, the task of selecting informa-
tion sources from potentially tens to hundreds of millions of users
poses serious challenges and raises important questions that have
not yet been addressed. For example, recent studies have observed
that out of fear of missing out on important information, users tend
to follow too many other users [14]. In the process, they receive
a lot of redundant information [4], become overloaded, and effec-
tively miss the information they are interested in [12, 19]. More-
over, it is very hard to ascertain the quality, relevance, and credibil-
ity of information produced by social media users [2, 8, 11]. Also,
many users rely on their network neighborhood for discovering new
sources of information, as observed by the large number of triadic
closures [26, 13, 24] in link creation.
The motivation behind this work originates from two fundamen-
tal questions: 1) How efficient are the users of a social media site
at selecting which other users to follow to acquire information of
their interest? and, 2) can we propose methods to enable a user to
acquire the same pieces of information from another set of users in
the social media site more efficiently? To answer these intertwined
questions, we view the structure of the information networks in so-
cial media sites as the outcome of a network formation game [17],
where a node (i.e., user) links to other nodes to solve a specific task
(i.e., acquire information relevant to the user). In this work, we pro-
pose a general computational framework to quantify and optimize
the efficiency of links created by users to acquire information.
With such a framework in place, we analyze the efficiency of
information networks of social media users, addressing several im-
portant additional questions. For instance, a user might aim to re-
ceive pieces of information of different popularity. However, can
popular information be covered as efficiently as non-popular in-
formation? Additionally, previous studies have identified triadic
closure [26, 13, 24] and information diffusion [28, 23, 3] as salient
mechanisms that trigger new link creation in social networks. How-
ever, how efficient are information networks created with these
mechanisms? Similarly, it has been observed that in information
systems such as Wikipedia [29, 30], links are primarily established
to make related content more easily discoverable, rather than for
some nuanced notion of efficiency.
Is the link creation in user-
generated information networks such as Twitter driven by a similar
goal, i.e., discovering users in the network neighborhood, rather
than for efficiency in acquiring information?
Our computational framework is based on the following key con-
cept: given a set of unique ideas, pieces of information, or more
generally, memes I spreading through an information network, there
is an optimal set of nodes that, if followed, would enable us to get
to know I. Naturally, this concept relies on defining what is an
optimal set. Here, we consider three notions of optimality, which
lead to three types of efficiencies:
I. Link efficiency. The optimal set U l(I) is the one that con-
tains the smallest number of users. Then, we compute link
efficiency by comparing the number of people a user follows,
i.e., the number of followees, with the size of the optimal set
U l(I). Finding the optimal set reduces to a minimum set
cover problem, which can be solved using a well-known and
efficient greedy algorithm with provable guarantees [15].
II. In-flow efficiency. The optimal set U f (I) is the one that
provides the least amount of tweets per time unit. Then,
we compute in-flow efficiency by comparing the amount of
tweets per time unit a user receives from the people she fol-
lows with the amount of tweets per time unit she would have
received by following the users in the optimal set U f (I).
Finding the optimal set reduces to a minimum weighted set
cover problem, which again can be solved efficiently with
provable guarantees [15].
III. Delay efficiency. The optimal set U t(I) is the one that pro-
vides the memes as early as possible. Then, we compute
delay efficiency by comparing the average delay per meme
that the user achieves through the people she follows with
the average delay she would achieve by following the users
in the optimal set. Here, we define the delay at acquiring a
meme in a social media system as the difference between the
time when the user received the meme in her timeline and
the time when the meme was first mentioned by a user in the
social media system. Finding the optimal set reduces to find-
ing the set of users who made the first mention of each of the
memes in the social media system.
Although the concept of link efficiency has been previously in-
troduced by us in [4], here we extend it to account for other def-
initions of efficiency, i.e., in-flow and delay efficiency. Another
study related to ours uses set covers for efficient detection of out-
breaks [21]. However, that related work does not compare the op-
timal sets to the sets encountered in reality.
In this study, we apply the three notions of efficiency to the infor-
mation network of Twitter users. Our analysis does not only show
how efficient users are at acquiring information, but also helps us
in understanding the influence of different factors on efficiency:
1. We find that users acquire information sub-optimally with
respect to the three notions of efficiency. However, the higher
is the coverage of information that they want to acquire, the
higher is the efficiency.
2. While the popular pieces of information are acquired ineffi-
ciently, less popular pieces of information are acquired more
efficiently.
(A) Users per meme
(B) The number of followees
Figure 1: The distributions of (A) the number of users posting a
unique meme and (B) the number of followees posting a specific
type of meme at least once. For (A), a power-law is fitted (solid
lines) and the exponent α is given.
3. Users trade followees' discoverability for information effi-
ciency. While, for a typical Twitter user, many people in her
original ego-network may be discovered by triadic closure,
very few people in the optimized efficient ego-networks can
be discovered in that way.
4. We introduce a heuristic algorithm that considerably increases
both user's inflow and delay efficiencies and delivers to her
the same unique pieces of information, by rewiring user's in-
formation network.
Our empirical findings also shed light on how our notion of effi-
ciency relates to user's ego-network structure (e.g., triangle closure,
clustering coefficient).
2. DATASET
We use a large Twitter dataset, as reported in previous work [9],
which comprises the following three types of information: profiles
of 52 million users, 1.9 billion directed follow links among these
users, and 1.7 billion public tweets posted by the collected users.
The link information of the network is based on a snapshot taken
at the time of data collection, in September 2009. In our work, we
limit ourselves to tweets published during one week, from July 1,
2009 to July 7, 2009, and filter out users that did not tweet before
July 1, in order to be able to consider the social graph to be approx-
imately static. After this filtering, we have 395,093 active users,
39,382,666 directed edges, and 78,202,668 tweets.
Then, we sample 10,000 users at random out of the 395,093
active users and reconstruct their timelines by collecting all tweets
published by the (active) people they follow (among all the 395,093
users), build their ego-networks (i.e., who follows whom among the
people they follow), and track all the unique memes they were ex-
posed to during the observation period. We consider four different
types of memes:
I. Hashtags. Hashtags are words or phrases inside a tweet
which are prefixed with the symbol "#". They provide a
way for a user to generate searchable metadata, keywords
or tags, in order to describe her tweet, associate the tweet
to a (trending) topic, or express an idea. Hashtags have be-
come ubiquitous and are an integral aspect of the social Web
nowadays [25].
II. URLs. We extract all URLs mentioned inside tweets [22].
Since most of URLs in Twitter are shortened, we unwrap
them by calling the API of the corresponding shortening ser-
vice. Here, we considered seven popular URL shorteners:
10−1100101102103104105uniqueposters10−1010−910−810−710−610−510−410−310−210−1100101PDFHashtags,α=-2.16URLs,α=-2.1Newsdomains,α=-1.7YouTube,α=-2.7100101102103104105#followees10−910−810−710−610−510−410−310−210−1100PDFHashtagsURLsNewsdomainsYouTubebit.ly, tinyurl.com, is.gd, twurl.nl, snurl.com, doiop.com and
eweri.com, and discard any URL that could not be unwrapped.
In general, URLs correspond to online articles, posts, links,
or websites.
III. News domains. We extract all domain names mentioned
inside tweets that correspond to mainstream media sites in-
dexed by Google News [20]. News domains correspond to
media outlets, which may be specializing in the coverage of
some topics or perspectives.
IV. YouTube videos. We extract all URLs mentioned inside
tweets that match the pattern www.youtube.com/watch.
Here, each of these URLs corresponds to a different YouTube
video.
The above memes provide different levels of granularity. For
example, news domains are very generic, while YouTube videos
are fairly specific. In more detail, the set of active users mention
286, 219 unique hashtags, 379, 424 URLs, 18,616 news domains,
and 19, 998 YouTube videos. Figure 1A shows the distribution of
the number of unique posters for different types of memes, which
follows a power-law distribution. The tail of the distribution, as
expected, is the heaviest for news domains, while the lightest for
YouTube videos. Moreover, as shown in Figure 1B, the tail of the
distribution of the number of followees tweeting at least one of the
memes is also a power-law. In the remainder, we consider only such
followees.1 Also, we focus on users whose information network is
fairly developed by filtering out any user following less than 20
followees.
Note that, although our methodology does not depend on the par-
ticular choice of meme, it does make two key assumptions. First, it
assumes we can distinguish whether two memes are equal or differ.
Distinguishing certain memes such as hashtags may be trivial but
distinguishing others, such as ideas, may be very difficult. Second,
it assumes that receiving several copies of the same meme from
different users does not provide additional information, even if dif-
ferent users express different opinions about the meme. It would
be interesting to relax the second assumption in future work.
Importantly, in 2009 Twitter did not have features such as "Lists"
and "Personalized Suggestions", so the main way users received
and processed information was through their feed, for which we
have complete data. The drawback of using older data is smaller
number of users and social activity.
3. DEFINITIONS OF EFFICIENCY
In this section, we introduce three different notions of efficiency,
namely, link, in-flow and delay efficiency. For each type of ef-
ficiency, we provide a formal definition and propose a method to
approximately compute it with provable guarantees.2 Then, we use
the methods to investigate the efficiency of Twitter users at acquir-
ing information.
3.1 Link efficiency
Definition: Our definition of link efficiency follows from our
prior definition [4]. Consider a user u and the set of unique memes
Iu she is exposed to through her feed in a given time period, by
following Uu users. Then, we define the optimal set U l(Iu) as
the minimal set of users that, if followed, would expose the user to
1Considering all followees leads to qualitatively similar results, but
lower absolute values of efficiency.
2Delay efficiency, unlike link and in-flow efficiencies, can be com-
puted exactly.
∗
1, u
u. We define link ef-
Figure 2: Our notion of link efficiency, El
ficiency as El
u = U l(Iu)/Uu, where Iu is the set of (unique)
memes (blue circles) a user u receives in her timeline by follow-
ing a set of followees Uu = {u1, . . . , u5} (left), and U l(Iu) =
∗
3} (right) is the minimal set cover (of users) that, if
{u
followed, would provide the same set of memes Iu. In the il-
lustration, each user ui posts the memes within the associated
ellipsoid. Hence, in this example, the link efficiency value is
El
u = 3/5.
∗
2, u
Algorithm 1: Greedy set cover for estimating link efficiency
Input: set of all users U; set of unique memes Iu; followee set
Set U l = ∅;
Set X = Iu;
while X (cid:54)= ∅ do
Uu; set of memes I v posted by user v
∗
= argminv∈U\U l
1
X∩Iv ;
Set v
Set U l = U l ∪ {v
;
Set X = X\I v
∗
∗
};
end
Output: U l
at least Iu, and define the link efficiency of a user u at acquiring
memes as
u = U l(Iu)
El
Uu
,
(1)
where 0 ≤ El
u ≤ 1. If the number of users she follows coincides
with the number of users in the minimal set, then her efficiency
value is El
u = 1. The larger the original number of followees in
comparison with the size of the minimal set, the smaller the link
efficiency. Figure 2 illustrates our definition of link efficiency.
Examples of link inefficiency: Our definition captures two types
of link inefficiency, which we illustrate by two extreme examples.
If a user u follows Uu other users, each of them mentioning differ-
ent (disjoint) sets of memes, and there is another user v /∈ Uu that
cover all the memes the followees cover, then the user's efficiency
will be El
u = 1/Uu. If a user u follows Uu other users and all
these users mention exactly the same memes, then the user's effi-
ciency will be El
u = 0. The former
type of link inefficiency is due to following users that individually
post too few memes, while the latter is due to following users that
collectively produce too many redundant memes.
u = 1/Uu and limUu→∞ El
Computing link efficiency: In practice, computing El
u, as de-
fined by Eq. 1, reduces to finding the minimal set of users U l(Iu),
which can be cast as the classical minimum set cover problem [16].
Although the minimum set cover problem is NP-hard, we can ap-
proximate U l(Iu) using a well-known and efficient greedy algo-
rithm [15], which returns an O(log d) approximation of the min-
u. We define in-
Figure 3: Our notion of in-flow efficiency, Ef
flow efficiency as Ef
u = f (U f (Iu))/f (Uu), where Iu is the set
of (unique) memes (blue circles) a user receives in her timeline
by following a set of followees Uu = {u1, . . . , u5} (left), and
∗
3} (right) is the set cover (of users) with the
U f (Iu) = {u
smallest associated in-flow f (U f (Iu)) that, if followed, would
provide the same set of memes Iu. In the illustration, each user
ui posts the memes within the associated ellipsoid and the red
values in the ellipsoid represent the in-flow of each user. Hence,
in this case, the in-flow efficiency value is Ef
u = 30/60 = 0.5.
∗
1, u
∗
2, u
Algorithm 2: Greedy set cover for estimating in-flow efficiency
Input: set of all users U; set of unique memes Iu; number of
tweets N v posted by user v; set of memes I v posted
by user v
Set U f = ∅;
Set X = Iu;
while X (cid:54)= ∅ do
∗
end
Output: U f
= arg minv∈U\U f
N v
Iv∩X ;
Set v
Set U f = U f ∪ {v
Set X = X\I v
∗
∗
};
In-flow efficiency
imum size set cover, where d = maxv∈U I v is the maximum
number of memes posted by any user. Refer to Algorithm 1 for a
full description of our procedure to approximate link efficiency.
3.2
Definition: Consider a user u and the set of unique memes Iu
she is exposed to through her feed in a given time period, by follow-
ing Uu users. Then, we define the optimal set U f(Iu) as the set of
users that, if followed, would expose the user to, at least, Iu, while
providing the least amount of tweets per time unit, i.e., the mini-
mum tweet in-flow. In particular, we define the in-flow efficiency
of a user u at acquiring memes as
Ef
u =
f (U f(Iu))
f (Uu)
,
(2)
where f (Uu) denotes the amount of tweets produced by the set of
users Uu per time unit (user u's in-flow) and 0 ≤ Ef
u ≤ 1. The
in-flow efficiency Ef
u = 1 if user u's in-flow coincides with the
amount of tweets per time unit posted by the users in the optimal
set U f(Iu). Here, the larger is user u's in-flow in comparison with
the amount of tweets per time unit posted by the users in the opti-
mal set, the lower is her in-flow efficiency. Figure 3 illustrates our
definition of in-flow efficiency using an example.
Examples of in-flow inefficiency: As in the case of link ineffi-
ciency, this definition captures several types of in-flow inefficiency.
u = 1/(1 + (cid:104)ti − t0
Figure 4: Our notion of delay efficiency, Et
u. We define delay
i(cid:105)i∈Iu ), where ti is the time
efficiency as Et
in which a user receives meme i in her timeline, t0
i is the time
when the meme is first mentioned by a user in the whole social
media system, Iu is the set of (unique) memes (blue circles) a
user receives in her timeline by following a set of followees Uu =
∗
{u1, . . . , u5} (left), and U t(Iu) = {u
5} (right) is the
set cover (of users) that, if followed, would provide the same
set of memes Iu as early as possible. In the illustration, each
user ui adopts the memes within the associated ellipsoid for the
first time after a delay indicated by the red number. Hence, the
delay efficiency is Et
u = 1/(1 + 30/13).
∗
1, . . . , u
First, it is easy to see that the example of extreme link inefficiency
due to following users posting exactly the same memes, also leads
to in-flow inefficiency.
Second, there is another type of in-flow inefficiency, which we il-
lustrate by an additional extreme example. Consider user u that fol-
lows Uu other users and the amount of tweets produced by these
followees has a divergent mean, e.g., it has a Pareto distribution (a
power law) with exponent α ≤ 1. Then, if there exists another set
of Uu users mentioning the same unique memes and the amount
of tweets produced by them has a non-divergent mean, e.g., it is
a Pareto distribution with exponent α > 1, the user's efficiency
will converge to zero as Uu increases, i.e., limUu→∞ El
u = 0.
Asymptotically, an infinite in-flow could be replaced with a finite
in-flow that include the same set of unique memes.
Computing in-flow efficiency: In practice, computing the opti-
mal set of users U f(Iu) reduces to solving the weighted set cover
problem, which is also NP-hard. Analogously, we can find an ap-
proximate solution to U f(Iu) using a greedy algorithm [15], which
returns an O(log d) approximation to the set cover with minimum
in-flow, where d = maxv∈U I v is the maximum number of memes
posted by any user. Refer to Algorithm 2 for a full description of
our procedure to approximate in-flow efficiency with an approxi-
mation factor O(log d).
3.3 Delay efficiency
Definition: Consider a user u and the set of unique memes Iu
she is exposed to through her feed in a given time period, by fol-
lowing Uu users. Then, we define the optimal set U t(Iu) as the
set of users that, if followed, would expose the user to, at least,
Iu, with the smallest time delay. Here, we define the delay at ac-
quiring a meme provided by a set Uu as the difference between the
time when a user in Uu first mentions the meme and the time when
the meme was first mentioned during the given time period by any
user in the whole social media system. We then define the delay
efficiency of a user u at acquiring memes as
Et
u =
1
1 + (cid:104)ti − t0
i(cid:105)i∈Iu
,
(3)
(A) Link efficiency
(B) In-flow efficiency
(C) Delay efficiency
Figure 5: The distributions of link, in-flow, and delay efficiencies for the four types of memes.
Figure 6: The distribution of the ratio between the number of
received tweets and unique memes.
i is the
where ti is the time a user in Uu first mentions meme i, t0
time when the meme is first mentioned by a user in the whole social
media system, and (cid:104)ti−t0
i(cid:105)i∈Iu is an average delay over all memes
received by user u, measured in days. The delay efficiency Et
u = 1
if the followees of the user u are the first to post the set of memes
Iu in the whole system. The delay efficiency becomes lower than
1 when the user is exposed to the memes at later times than their
time of birth. The larger is the average delay of received memes,
the smaller is the delay efficiency. Figure 4 illustrates our definition
of delay efficiency using an example.
Computing delay efficiency: In this case, we can compute the
delay efficiency directly by finding when each of the memes ap-
peared for the first time in the system, without resorting to approx-
imation algorithms, as in the case of link and in-flow efficiencies.
One can query the first time of appearance for each meme in O(1)
by building a mapping between memes and their first time of ap-
pearance in a hashtable.
3.4 Efficiency of Twitter users
Once we have the three definitions of users' efficiency defined by
Eqs. 1-3, we use them to investigate how efficient Twitter users are
at acquiring four different types of memes: hashtags, URLs, news
domains and YouTube videos.
First, we estimate the empirical probability density function3
(PDF) for each type of efficiency and meme. We show the results
in Figure 5, in which we find several interesting patterns. First, all
PDFs resemble a normal distribution, however, their peaks (modes)
and widths (standard deviations) differ across efficiencies and type
of memes. For most users and most types of memes, the effi-
ciency value is significantly below one, giving empirical evidence
that users are typically sub-optimal. Second, while the PDFs for
3The PDFs have been empirically estimated using kernel density
estimation [7].
(A) Link efficiency
(B) Inflow efficiency
Figure 7: The average link and in-flow efficiencies versus the
percentage of covered memes.
link (Figure 5A) and delay (Figure 5C) efficiencies look quite sim-
ilar, the in-flow efficiency differs significantly (Figure 5B). Third,
users are most efficient at acquiring YouTube videos, followed by
URLs and hashtags, and news domains. This order coincides with
the ordering of the exponents of the corresponding power-law dis-
tribution of memes' popularity (Figure 1A), i.e., the exponent of
the power-law (its absolute value) is the highest for YouTube links,
followed by URLs and hashtags, and finally for news domains.
Note that the higher the exponent is, the higher the proportion of
non-popular memes with respect to the popular ones, and thus one
can conclude that users are more efficient at acquiring non-popular
memes than popular memes. A plausible explanation is that users
posting non-popular memes are likely to be included in the opti-
mal set, since there is nobody else who posts these memes and,
as a consequence, the optimal set differs less from the original set
of followees. Moreover, note that in Figure 5B, the in-flow ef-
ficiency of both news domains and YouTube videos is shifted to
the left (i.e., presents much lower efficiency values) compared to
the link efficiency in Figure 5A. This shift is due to the fact that,
as shown in Figure 6, ratio between the total number of received
tweets and unique memes is much larger for unique news domains
and YouTube video memes than for hashtags and URLs, which in
turn, translates into a lower in-flow efficiency.
In the above measurements, we estimated the probability density
functions of user's efficiency considering full coverage of the re-
ceived memes. Importantly, it is straightforward to extend our def-
initions of link and in-flow efficiencies to account for partial cov-
erage, by simply considering a set of users that, if followed, would
expose the user to, at least, a percentage of the unique memes Iu,
by stopping the greedy algorithm whenever the given percentage is
reached. Note, however, that computing the efficiency for a partial
0.00.20.40.60.81.0LinkEfficiency,El0123456789PDFHashtagsURLsNewsdomainsYouTube0.00.20.40.60.81.0InflowEfficiency,Ef10−1100101102PDFHashtagsURLsNewsdomainsYouTube0.00.20.40.60.81.0DelayEfficiency,Eδ024681012PDFHashtagsURLsNewsdomainsYouTube10−210−1100101102103104In-flow/#uniquecontagions10−710−610−510−410−310−210−1PDFHashtagsURLsNewsdomainsYouTube20%40%60%80%100%Coverage0.00.20.40.60.81.0LinkEfficiencyHashtagsURLsNewsdomainsYouTube20%40%60%80%100%Coverage0.00.20.40.60.81.0InflowEfficiencyHashtagsURLsNewsdomainsYouTube(A) Hashtags, URLs, news
(B) YouTube videos
(A) Effect of in-flow efficiency
optimization on link efficiency
(B) Effect of delay efficiency
optimization on link efficiency
Figure 8: The average popularity of covered memes as a func-
tion of the percentage of covered memes.
(A) 100% Coverage
(B) 80% Coverage
Figure 9: In-flow efficiency measured for hashtags appearing
in the time periods of different lengths. The results for other
efficiencies and meme types are qualitatively the same.
coverage based on the full set of followees would be unfair, since
some of the followees in Uu may be not tweeting any of the covered
memes. Thus, for the purpose of computing the efficiencies for par-
tial coverage, we take into account only the users in Uu who tweet
at least one of the covered memes. Figure 7 shows the average link
and in-flow efficiencies against coverage for the same four memes.
As one may have expected, the higher the coverage, the higher the
link and in-flow efficiency, since the memes that are covered first
by the greedy algorithm are the popular ones, as shown in Figure 8.
This result confirms that users are more efficient at acquiring less
popular information, but less so at acquiring more popular infor-
mation. A plausible explanation is that less popular information
is produced by only a handful of users and so the optimization is
limited to this set of users.
Finally, we investigate if our results are consistent across differ-
ent time periods. In particular, we measure user efficiency based on
time periods of different lengths: one, two, four and eight weeks.
In Figure 9A, we can observe that as we increase the period, there
are more unique memes there to cover, which results in an increase
in the efficiency. However, the distribution of efficiency is nearly
unchanged for 80% coverage (Figure 9B). Thus, the findings pre-
sented in this study are qualitatively robust to the choice of time
period. Additionally, we find that the choice of the week does not
influence the distributions of efficiency, however, these results are
not shown due to space limitation.
4. CROSS-EFFICIENCY
In our definitions of efficiency, the optimal set for a given user
is the set of users that minimizes the number of links, in-flow or
delay, while covering the same set of unique memes. However,
this naturally raises the question as to how efficient the optimal sets
for a given definition of efficiency are in terms of the other defini-
(C) Effect of link efficiency
optimization on in-flow eff.
(D) Effect of delay efficiency
optimization on in-flow eff.
(E) Effect of link efficiency
optimization on delay eff.
(F) Effect of in-flow efficiency
optimization on delay eff.
Figure 10: The effect of optimization of one of the efficiencies
on another efficiency, plotted as the ratio of the efficiency in the
optimized network and the original network against the num-
ber of followees. The dashed line marks the ratio equal to 1,
which corresponds to the lack of change in the efficiency due to
the respective optimization.
tions. For example, how efficient is the link-optimal set with re-
spect to in-flow or delay efficiency? In this section, we first address
this question, then introduce the idea of finding sets of users that
jointly optimize multiple notions of efficiency, and finally develop
a heuristic algorithm that simultaneously improves both in-flow and
delay efficiency of users.
4.1 Cross-efficiency of optimal sets
Given a user u and the set of unique memes Iu she is exposed
to in a given time period, our definitions of efficiency compare the
original set of followees with the optimal sets U l(Iu), U f(Iu) and
U t(Iu) in terms of number of links, in-flow and average delay,
respectively. Here, we assess the efficiency of the optimal sets for
each definition of efficiency in terms of the other definitions, which
we call cross-efficiencies. More specifically, we compute the link
efficiency of the optimal sets for in-flow and delay efficiency, i.e.,
the in-flow efficiency of the optimal sets for link and delay effi-
u,t = U l(Iu)
U t(Iu)
,
u,f = U l(Iu)
El
U f(Iu)
and El
20%40%60%80%100%Coverage02000400060008000100001200014000AveragepopularityHashtagURLsNewsdomains20%40%60%80%100%Coverage405060708090100AveragepopularityYouTube0.00.20.40.60.81.0Efficiency,Ef0.00.51.01.52.02.5PDF1week2weeks4weeks8weeks0.00.20.40.60.81.0Efficiency,Ef0123456789PDF1week2weeks4weeks8weeks101102103104105Numberoffollowees2−22−120212223242526Elu,f/EluHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−22−120212223242526Elu,t/EluHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−22−12021Efu,l/EfuHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−32−22−12021222324Efu,t/EfuHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−22−12021Etu,l/EtuHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−22−12021Etu,f/EtuHashtagsURLsNewsdomainsYouTubeciency, i.e.,
Ef
u,l =
f (U f(Iu))
f (U l(Iu))
and Ef
u,t =
f (U f(Iu))
f (U t(Iu))
,
and the delay efficiency of the optimal sets for link and in-flow
efficiency, i.e.,
Et
u,l =
1
i − t0
and Et
u,f =
1
i − t0
,
i
i(cid:105)i∈Iu
1 + (cid:104)tf
1 + (cid:104)tl
i(cid:105)i∈Iu
where tl
i is the time a user in U l(Iu) first mentions meme i and tf
is the time a user in U f(Iu) first mentions meme i.
Typically, we would like to know if an efficiency of an optimized
information network is increased in comparison with the efficiency
of the original network. Thus, in the reminder of this section we
focus on measuring the ratio of an efficiency of the optimized and
original networks. If the ratio is higher than one for the given opti-
mization algorithm, then the corresponding efficiency is improved
by that algorithm with respect to the original set of followees. If
the ratio is below one then the respective efficiency is decreased by
the optimization algorithm.
We measure the ratio between the efficiency of the optimal sets
and the original set of followees for the three definitions of effi-
ciency (see Figure 10). The ratio tends to be below one or close
to one for most meme types, which indicates that optimizing for
one definition of efficiency generally results in decreased efficiency
with respect to the other two definitions.
However, there are a few exceptions. For example, in terms of
link and in-flow efficiency, the optimal sets for news domains are
more efficient than the original sets (diamonds in Figures 10A, 10B,
and 10D). This observation may happen due to the following rea-
son: news domains tend to be more popular than the other types
of memes (as shown in Figure 1). As a consequence, a user may
receive multiple copies of the same news domain from various fol-
lowees, and it is very easy to find efficient sets in terms of in-flow;
it is enough to simply remove some of their followees from the
network to improve both link and in-flow efficiencies.4
Finally, in Figures 10A-10D, we note that the improvement in
the link and in-flow efficiencies tends to grow with the number of
followees due to the increased number of redundant (non-unique)
information received by the users who follow many other people.
However, in Figures 10E-10F, the improvement in the delay effi-
ciency tends to drop with the number of followees because it is
likely that users who receive many copies of the same meme re-
ceive it early on. Thus, for users with many followees, it is harder
to improve the delay efficiency.
4.2 Joint-optimization of efficiencies
So far, we have looked for optimal sets of users in terms of a
single efficiency (be it link, in-flow or delay). Moreover, in the
previous section, we have shown that optimal sets in terms of a
single efficiency typically decrease the other efficiencies. There-
fore, one could imagine developing an algorithm a looking for sets
of users that are optimized with respect to several efficiencies; in
other words, a multi-objective algorithm. Given such an algorithm
a, we could compute the efficiency of the optimal set Ua(Iu) with
4In fact, over 85% of users receive less unique news domains than
they have followees.
Algorithm 3: Greedy set cover for jointly optimizing in-flow
and delay efficiencies
Input: set of all users U; set of unique memes Iu; set of
Set U * = ∅;
Set X = Iu;
while X (cid:54)= ∅ do
memes I v posted by user v
= arg minv∈U\U f
v T β
N α
Iv∩X ;
v
∗
Set v
Set U * = U * ∪ {v
Set X = X\I v
∗
∗
};
end
Output: U *
respect to single quantities, i.e.,
u,a = U l(Iu)
El
U a(Iu)
Et
u,a =
, Ef
u,a =
1
i − t0
1 + (cid:104)ta
f (U f(Iu))
f (U a(Iu))
i(cid:105)i∈Iu
and
where ta
i is the time a user in U a(Iu) first mentions meme i. Ideally,
we would like to find optimal sets that are efficient with respect to
the considered quantities. Here, as a proof of concept, we next de-
velop a heuristic method to find sets of users optimized with respect
to both in-flow and delay.
Joint optimization of in-flow and delay efficiency
We leverage the greedy algorithm from the weighted set cover prob-
lem to design a heuristic method that finds sets of users with high
in-flow and delay efficiencies, while delivering the same unique
In particular, in the
memes to the user (refer to Algorithm 3).
heuristic method, the weights are powers of tweets in-flow N α
v and
average delay T β
v over all unique memes produced by the user v.
The exponents α and β can be readily adjusted to induce higher
or lower in-flow efficiency and delay efficiency, respectively. Here,
we experiment with α = 1 and β = 0.5, which achieves a good
balance between in-flow and delay efficiency.
We summarize the ratio of link, in-flow and delay efficiency of
the set of users provided by our heuristic method and the original
set of followees in Figure 11. We discus several interesting obser-
vations. First, since the algorithm does not optimize with respect
to the number of links, the link efficiency is not improved by this
algorithm, i.e., the ratio between the link efficiency of the set pro-
vided by the heuristic method and the link efficiency of the original
set of followees ratio is around or below 1 for three out of four
meme types. Second, we find that both in-flow and delay efficien-
cies are significantly increased over the efficiency of the original set
of followees for all types of memes. The in-flow efficiency is, on
average, 7.4-times higher for news domains, 1.8-times higher for
hashtags, 1.3-times higher for URLs, 1.2-times higher for YouTube
videos. The delay efficiency is, on average, 1.8-times higher for
news domains, 1.4-times higher for hashtags, 1.4-times higher for
URLs, 1.2-times higher for YouTube videos. There is always an in-
crease in in-flow and delay efficiencies independently of the num-
ber of followees that the users have originally. However, while the
improvement in the in-flow efficiency tends to be larger for users
with many followees, the improvement in the delay efficiency is
larger for users with fewer followees. Thus, we conclude that our
algorithm increases both in-flow and delay efficiency of users.
(A) Effect on link efficiency
(B) Effect on in-flow efficiency
(C) Effect on delay efficiency
Figure 11: The effect of optimization of both in-flow and delay efficiencies on different types of efficiencies, plotted as the ratio of the
affected efficiency of the optimized network and the original network against the number followees.
(A) Original
(B) Minimal set cover
Figure 12: Ego-networks for a Twitter user (red node). Some
users (black nodes) only belong to one of the ego-networks
while others (gray nodes) belong to both. The original ego-
network contains more triangles than the ego-network induced
by the minimal set cover, whose structure is closer to a star.
5. STRUCTURE OF EGO NETWORKS:
ORIGINAL VS. OPTIMIZED
In the previous sections, we have introduced three meaningful
definitions of efficiency and applied them to show that Twitter users
tend to choose their information sources inefficiently. In this sec-
tion, we investigate the rationale behind this sub-optimal behavior
by comparing the structure of the user's ego-networks associated
with both the original set of followees and the sets optimized for
efficiency. Here, we define a user's ego-network as the network
of connections (who-follows-whom) between the ego user and her
followees.
First, as an example, we take one particular user and illustrate
the structure of her original ego-network and the ego-network of
an optimal set in terms of link efficiency (Figure 12). By visual
comparison of both ego-networks, we can see that while the ego-
network induced by the optimal set displays a structure much closer
to a star, the original ego-network contains many more triangles
and higher clustering coefficient. Due to its proportionally lower
number of triangles, the optimal set is not discoverable by triadic
closure [26, 13, 24] or information diffusion [5], which have been
recently shown to be two major driving forces for link creation in
social networks [28, 23, 3].
Remarkably, this phenomenon happens systematically across all
users, efficiency definitions, and types of memes, as displayed in
Figure 13, which shows the distribution of local clustering coef-
ficient (LCC) for the users' original ego-networks and the ego-
(A) Hashtags
(B) URLs
(C) News domains
(D) YouTube videos
Figure 13: The distributions of local clustering coefficient
(LCC) of the original ego-network (green circles) and the ego-
networks optimized for link (blue circles), in-flow (red cir-
cles), delay (teal circles), and inflow-delay efficiency (black cir-
cles) for: (A) hashtags, (B) URLs, (C) news domains, (D) and
YouTube videos.
networks induced by different optimized sets. We find that while
the LCC distribution for the original ego-networks is well spread
and centered at 0.15 − 0.30, the LCC distributions for the ego-
networks induced by the optimal sets are skewed towards zero.5
One could still think that this is simply a consequence of differ-
ences in the number of followees, i.e., the size of the ego-network.
However, Figure 14 rules out this possibility by showing a striking
difference of several orders of magnitude between the LCC of the
original ego-networks and the ego-networks induced by the opti-
mal sets across a wide range of number of followees. These find-
ings suggest that the way in which social media users discover new
people to follow (e.g., triadic closure or information diffusion) or
5Note that the distribution of clustering coefficient of inflow-delay
optimized network is located between distributions of in-flow opti-
mized and delay optimized ego-networks.
101102103104105Numberoffollowees2−22−120212223242526Elu,a/EluHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees202122232425Efu,a/EfuHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees202122Etu,a/EtuHashtagsURLsNewsdomainsYouTube0.00.20.40.60.81.0LCC01020304050PDFOriginalego-networksLinkoptimizedego-networksIn-flowoptimizedego-networksDelayoptimizedego-networksInflow-delayoptimizedego-networks0.00.20.40.60.81.0LCC05101520253035PDFOriginalego-networksLinkoptimizedego-networksIn-flowoptimizedego-networksDelayoptimizedego-networksInflow-delayoptimizedego-networks0.00.20.40.60.81.0LCC10−1100101102PDFOriginalego-networksLinkoptimizedego-networksIn-flowoptimizedego-networksDelayoptimizedego-networksInflow-delayoptimizedego-networks0.00.20.40.60.81.0LCC10−1100101PDFOriginalego-networksLinkoptimizedego-networksIn-flowoptimizedego-networksDelayoptimizedego-networksInflow-delayoptimizedego-networks(A) Hashtags
(B) URLs
(A) Hashtags
(B) URLs
(C) News domains
(D) YouTube videos
(C) News domains
(D) YouTube videos
Figure 14: Average local clustering coefficient versus the num-
ber of followees in the original ego-network (green circles) and
the ego-networks optimized for link (blue squares), in-flow (red
triangles), delay (teal triangles), and inflow-delay efficiency
(black triangles).
Figure 15: Local clustering coefficient of the optimized ego-
networks versus the overlap between the original ego-network
and the ego-networks optimized for link (blue squares), in-
flow (red triangles), delay (teal triangles), and inflow-delay effi-
ciency (black triangles).
receive recommendations (e.g., pick people in a 2-hop neighbor-
hood [1]) can lead to sub-optimal information networks in terms of
(link, in-flow and delay) efficiency.
We have argued that optimal sets typically differ from the orig-
inal set of followees due to their low number of triangles in the
associated ego-networks, and thus lack of discoverability. How-
ever, are optimal sets with higher number of triangles in efficient
ego-networks easier to discover for users? Figure 15 answers this
question positively by showing the average local clustering coef-
ficient in the ego-network induced by the optimal set against the
overlap between the users in the optimal set and the original set of
followees. Here, by overlap we mean the fraction of users in the
optimal set that are also in the original set of followees. In partic-
ular, we find a positive correlation (Pearson's 0.07 < r < 0.55,
−10) between the local clustering coefficient and the over-
p < 10
lap, which indicates that if the nodes in the optimal set are discov-
erable through triadic closure, the user may be more likely to find
them and decide to follow them.
6. DISCUSSION
We have defined three intuitive notions of user's efficiency in so-
cial media -- link, in-flow and delay efficiency -- to assess how good
users are at selecting who to follow within the social media system
to acquire information. Our framework is general and applicable
to any social media system where every user follows others within
the system to receive the information they produce. We have then
leveraged our notions of efficiency to help us in understanding the
relationship between different factors, such as the popularity of re-
ceived information and the users' ego-networks structure.
Here, we have focused on three definitions of efficiency (link,
in-flow, and delay). However, we could leverage this idea to de-
fine more complex notions of efficiency. For example, we could
define efficiency in terms of diversity, i.e., it would be interesting
to find the set of users that, if followed, would cover the same
unique memes while maximizing the diversity of topics or per-
spectives that are delivered with the memes, and then compare this
set with the original set of followees in terms of diversity. This
would provide a framework to mitigate the effects of the filtering
bubble and echo chamber present in current social media systems.
Moreover, some of the memes could be treated preferentially over
other memes. This could be achieved by means of covering a list
of non-unique memes favoring repetitions of a preferential subset
of memes, e.g., memes matching the user's interests should be de-
livered to the user more often. Remarkably, these more complex
notions of efficiency can often be expressed as integer linear pro-
grams, similarly to the minimal set cover problem, which can be
solved using relaxation methods with provable guarantees [27].
Additionally, we have introduced a heuristic method that im-
proves both in-flow and delay efficiency of users, while still de-
livering them the same unique memes. Similar heuristics can be
naturally designed to optimize efficiency with respect to multiple
quantities (be it link, in-flow, delay, or diversity). In this context,
it would be very interesting to design methods with provable guar-
antees to find sets of users that are optimal with respect to multiple
quantities.
Our work also opens other interesting venues for future work.
For example, we have defined and computed a measure of effi-
ciency for each user independently. However, one could also think
on global notions of efficiency for the Twitter information network
as a whole, perhaps using a multi set cover approach. Finally, since
we have applied our framework to study information efficiency
only on Twitter, it would be interesting to study information effi-
ciency of other microblogging services (Weibo, Pinterest, Tumblr)
and social networking sites (Facebook, Google+).
7. REFERENCES
101102103104Numberoffollowees10−510−410−310−210−1100LCCOriginalLinkIn-flowDelayInflow-delay101102103104Numberoffollowees10−510−410−310−210−1100LCCOriginalLinkIn-flowDelayInflow-delay100101102103104Numberoffollowees10−510−410−310−210−1100LCCOriginalLinkIn-flowDelayInflow-delay101102103104Numberoffollowees10−510−410−310−210−1100LCCOriginalLinkIn-flowDelayInflow-delay0.00.20.40.60.81.0OverlapN∗∩N/N10−410−310−210−1100LCCLink,r=0.56In-flow,r=0.5Delay,r=0.18Inflow-delay,r=0.120.00.20.40.60.81.0OverlapN∗∩N/N10−410−310−210−1100LCCLink,r=0.54In-flow,r=0.47Delay,r=0.32Inflowdelay,r=0.280.000.050.100.150.200.250.30OverlapN∗∩N/N10−410−310−210−1100LCCLink,r=0.23In-flow,r=0.0Delay,r=0.8Inflow-delay,r=0.70.00.20.40.60.81.0OverlapN∗∩N/N10−310−210−1100LCCLink,r=0.64In-flow,r=0.53Delay,r=0.62Inflow-delay,r=0.52International Conference on World Wide Web, pages
591 -- 600, 2010.
[19] K. Lerman and T. Hogg. Leveraging position bias to improve
peer recommendation. PLoS One, 9(6), 2014.
[20] J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking
and the dynamics of the news cycle. In Proceedings of the
15th ACM SIGKDD international conference on Knowledge
discovery and data mining, pages 497 -- 506, 2009.
[21] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos,
J. VanBriesen, and N. Glance. Cost-effective outbreak
detection in networks. In Proceedings of the 13th ACM
SIGKDD international conference on Knowledge discovery
and data mining, pages 420 -- 429. ACM, 2007.
[22] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and
B. Bhattacharjee. Measurement and analysis of online social
networks. In Proceedings of the 7th ACM SIGCOMM
conference on Internet measurement, pages 29 -- 42, 2007.
[23] S. A. Myers and J. Leskovec. The bursty dynamics of the
twitter information network. In Proceedings of the 23rd
International Conference on World Wide Web, pages
913 -- 924, 2014.
[24] D. M. Romero and J. Kleinberg. The directed closure process
in hybrid social-information networks, with an analysis of
link formation on twitter. In Proceedings of the 4th
International AAAI Conference on Weblogs and Social
Media, 2010.
[25] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in
the mechanics of information diffusion across topics: idioms,
political hashtags, and complex contagion on twitter. In
Proceedings of the 20th International Conference on World
Wide Web, pages 695 -- 704, 2011.
[26] G. Simmel. The Sociology of Georg Simmel. Free Press of
Glencoe, 1950.
[27] V. V. Vazirani. Approximation algorithms. Springer, 2001.
[28] L. Weng, J. Ratkiewicz, N. Perra, B. Gonçalves, C. Castillo,
F. Bonchi, R. Schifanella, F. Menczer, and A. Flammini. The
role of information diffusion in the evolution of social
networks. In Proceedings of the 19th ACM SIGKDD
international conference on Knowledge discovery and data
mining, pages 356 -- 364, 2013.
[29] R. West and J. Leskovec. Automatic versus human
navigation in information networks. In Proceedings of the
6th International AAAI Conference on Weblogs and Social
Media, 2012.
[30] R. West and J. Leskovec. Human wayfinding in information
networks. In Proceedings of the 21st International
Conference on World Wide Web, pages 619 -- 628, 2012.
[1] L. A. Adamic and E. Adar. Friends and neighbors on the
web. Social networks, 25(3):211 -- 230, 2003.
[2] E. Agichtein, C. Castillo, D. Donato, A. Gionis, and
G. Mishne. Finding high-quality content in social media. In
Proceedings of the 1st International Conference on Web
Search and Data Mining, pages 183 -- 194, 2008.
[3] D. Antoniades and C. Dovrolis. Co-evolutionary dynamics in
social networks: A case study of twitter. arXiv preprint
arXiv:1309.6001, 2013.
[4] M. Babaei, P. Grabowicz, I. Valera, and
M. Gomez-Rodriguez. On the users' efficiency in the twitter
information network. In Proceedings of the 9th International
AAAI Conference on Weblogs and Social Media, 2015.
[5] E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The role of
social networks in information diffusion. In Proceedings of
the 21st international conference on World Wide Web, pages
519 -- 528, 2012.
[6] R. Bosagh Zadeh, A. Goel, K. Munagala, and A. Sharma. On
the precision of social and information networks. In
Proceedings of the first ACM conference on Online social
networks, pages 63 -- 74. ACM, 2013.
[7] A. W. Bowman and A. Azzalini. Applied smoothing
techniques for data analysis. Clarendon Press, 2004.
[8] C. Castillo, M. Mendoza, and B. Poblete. Information
credibility on twitter. In Proceedings of the 20th
International Conference on World Wide Web, pages
675 -- 684, 2011.
[9] M. Cha, H. Haddadi, F. Benevenuto, and P. K. Gummadi.
Measuring User Influence in Twitter: The Million Follower
Fallacy. In Proceedings of the 4th International AAAI
Conference on Weblogs and Social Media, pages 10 -- 17,
2010.
[10] N. A. Christakis and J. H. Fowler. Social network sensors for
early detection of contagious outbreaks. PloS one,
5(9):e12948, 2010.
[11] M. Farajtabar, M. Gomez-Rodriguez, N. Du, M. Zamani,
H. Zha, and L. Song. Back to the past: Source identification
in diffusion networks from partially observed cascades. In
Proceedings of the 18th International Conference on
Artificial Intelligence and Statistics, 2015.
[12] M. Gomez-Rodriguez, K. Gummadi, and B. Schoelkopf.
Quantifying Information Overload in Social Media and its
Impact on Social Contagions. In Proceedings of the 8th
International AAAI Conference on Weblogs and Social
Media, pages 170 -- 179, 2014.
[13] M. S. Granovetter. The strength of weak ties. American
journal of sociology, pages 1360 -- 1380, 1973.
[14] N. Hodas and K. Lerman. How visibility and divided
attention constrain social contagion. In Proceedings of the
2012 ASE/IEEE International Conference on Social
Computing, pages 249 -- 257, 2012.
[15] D. S. Johnson. Approximation algorithms for combinatorial
problems. In Proceedings of the fifth annual ACM symposium
on Theory of computing, pages 38 -- 49. ACM, 1973.
[16] R. M. Karp. Reducibility among combinatorial problems.
Springer, 1972.
[17] M. Kearns. Experiments in social computation.
Communications of the ACM, 55(10):56 -- 67, 2012.
[18] H. Kwak, C. Lee, H. Park, and S. Moon. What is twitter, a
social network or a news media? In Proceedings of the 19th
|
1604.03454 | 1 | 1604 | 2016-04-12T15:50:11 | GenPerm: A Unified Method for Detecting Non-overlapping and Overlapping Communities | [
"cs.SI",
"physics.soc-ph"
] | Detection of non-overlapping and overlapping communities are essentially the same problem. However, current algorithms focus either on finding overlapping or non-overlapping communities. We present a generalized framework that can identify both non-overlapping and overlapping communities, without any prior input about the network or its community distribution. To do so, we introduce a vertex-based metric, GenPerm, that quantifies by how much a vertex belongs to each of its constituent communities. Our community detection algorithm is based on maximizing the GenPerm over all the vertices in the network. We demonstrate, through experiments over synthetic and real-world networks, that GenPerm is more effective than other metrics in evaluating community structure. Further, we show that due to its vertex-centric property, GenPerm can be used to unfold several inferences beyond community detection, such as core-periphery analysis and message spreading. Our algorithm for maximizing GenPerm outperforms six state-of-the-art algorithms in accurately predicting the ground-truth labels. Finally, we discuss the problem of resolution limit in overlapping communities and demonstrate that maximizing GenPerm can mitigate this problem. | cs.SI | cs |
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
1
GenPerm: A Unified Method for Detecting
Non-overlapping and Overlapping Communities
Accepted in IEEE TKDE
Tanmoy Chakraborty∗, Suhansanu Kumar, Niloy Ganguly, Animesh Mukherjee, Sanjukta Bhowmick
Abstract-
Detection of non-overlapping and overlapping communities are essentially the same problem. However, current algorithms focus either
on finding overlapping or non-overlapping communities. We present a generalized framework that can identify both non-overlapping
and overlapping communities, without any prior input about the network or its community distribution. To do so, we introduce a vertex-
based metric, GenPerm, that quantifies by how much a vertex belongs to each of its constituent communities. Our community detection
algorithm is based on maximizing the GenPerm over all the vertices in the network. We demonstrate, through experiments over synthetic
and real-world networks, that GenPerm is more effective than other metrics in evaluating community structure. Further, we show that due
to its vertex-centric property, GenPerm can be used to unfold several inferences beyond community detection, such as core-periphery
analysis and message spreading. Our algorithm for maximizing GenPerm outperforms six state-of-the-art algorithms in accurately
predicting the ground-truth labels. Finally, we discuss the problem of resolution limit in overlapping communities and demonstrate that
maximizing GenPerm can mitigate this problem.
Index Terms-GenPerm, non-overlapping communities, overlapping communities, community scoring metric, algorithm
!
1 INTRODUCTION
C OMMUNITY detection is one of the intensely studied
problems in network science. In general terms, a com-
munity is a set of vertices that have more internal connec-
tions (connections to vertices within the community), than
external connections (connections to vertices outside the
community). A real life analogy would be groups of people
with similar interests, such as in music or in sports. This
description assumes a strict boundary where a vertex can
belong to only one community. However, as often occurs
in real world, a person might be interested in both music
and sports. When vertices can belong to more than one
community, then the boundaries of communities overlap.
These communities are called overlapping communities as
opposed to the previously mentioned non-overlapping com-
munities.
it
From the description,
is easy to see that non-
overlapping communities generalize to overlapping com-
munities. However, the existing state-of-the-art algorithms
for detecting overlapping communities are so tuned to find
overlaps that they output overlapping regions even when
the communities are non-overlapping. On the other hand,
most algorithms for finding non-overlapping communities
cannot easily be extended to their overlapping counterparts.
Therefore, even though they essentially have the same ob-
jective, detecting overlapping and non-overlapping commu-
nities are treated as very different problems.
• TC is with University of Maryland, College Park, USA. NG and AM
are with Indian Institute of Technology Kharagpur, India. SK is with
University of Illinois at Urbana-Champaign, USA. SB is with University
of Nebraska, Omaha, Nebraska, USA.
E-mail: [email protected]
that
We posit
this illusory division between non-
overlapping and overlapping communities is only due to
the limitations of the algorithms. Most of the current algo-
rithms evaluate the communities as a whole and do not take
into account the properties of the individual vertices. There is
an implicit assumption that a vertex completely belongs to
its community, and in the overlapping case, belongs equally
to all its constituent communities. This premise might not
be true for all the cases. A person can be interested in both
music and sports, but she may like music slightly more
than sports or vice-versa. A vertex-centric evaluation, that
focuses on an individual's relation to the community, would
be able to model this non-uniformity in belonging more
realistically.
for non-overlapping communities
Recently, we proposed a vertex-centric metric, called
"permanence"
[1].
The permanence of a vertex ranges from 1 (completely
belonging to its community) to -1 (assigned to a completely
wrong community) and provides a quantitative measure
of how much the vertex belongs to its community. It was
also theoretically proved that identifying communities by
maximizing permanence reduces the problem of resolution
limit. There was however a caveat to this proof, namely that
the vertices should be tightly connected to at most one of its
neighboring communities. In other words, resolution limit
is mitigated only when the communities in the network are
clearly separated from each other. When a vertex becomes
more tightly connected to more than one neighboring
community, the communities might become overlapped.
In such case, permanence fails to handle the resolution limit.
Our contributions. This observation motivated us to gen-
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
eralize the concept of permanence such that it is applicable
to both overlapping and non-overlapping communities. We
develop a vertex-centric metric called "Generalized Per-
manence" (abbreviated as GenPerm) (Section 2). GenPerm
provides a quantitative value of how much a vertex belongs
to each of its constituent communities. Unlike permanence
which does not consider the membership of the adjacent
edges of a node, GenPerm penalizes the membership value
of the node if its adjacent edges share multiple community
memberships. This consideration leads to a more gener-
alized version of the metric – although GenPerm is de-
signed for overlapping community analysis, it can easily
be reduced to permanence if the underlying community
structure is non-overlapping. We show that GenPerm is very
effective at evaluating goodness of communities compared
to other metrics because: (i) community distributions with
high GenPerm exhibit high correlation with the ground-
truth, and (ii) GenPerm is more sensitive to perturbations
in the network (Section 4). Our main contributions are as
follows:
• Algorithm for unified community detection: We shall
present an algorithm, based on maximizing Gen-
Perm over all vertices, for unified community detec-
tion, i.e., the algorithm can detect both overlapping
and non-overlapping communities. In contrast to
other algorithms, our method does not require prior
information whether the network has overlapping
or non-overlapping communities or the expected
number of communities. Experimental results show
that our method outperforms six state-of-the-art al-
gorithms in identifying ground-truth communities.
Inferences drawn from GenPerm: We shall show that
GenPerm can be used in unfolding inferences be-
yond community detection, including understanding
the core-periphery structure of the communities and
identifying good initiators for message spreading.
Study of resolution limit for overlapping communities:
We shall conduct the first study of resolution limit
in overlapping communities and demonstrate that
maximizing GenPerm can mitigate the resolution
limit in overlapping communities.
•
•
The remainder of the paper is arranged as follows.
In Section 2, we illustrate our rationale for formulating
GenPerm. In Section 3, we present other metrics and algo-
rithms with which we shall compare GenPerm and a test
suite of networks on which we shall conduct our empirical
evaluations. In Section 4, we show GenPerm is superior
in evaluating the quality of a detected community and
is appropriately sensitive under different perturbations. In
Section 5, we study how the different parameters in the
GenPerm formula change with community structure. We
also demonstrate how GenPerm can be used to analyze the
core-periphery structure and select good initiator vertices
for message spreading. In Section 6, we provide a heuristic
to maximize GenPerm for overlapping community detec-
tion and show how this algorithm be used for detecting
non-overlapping communities depending on the network
under consideration. We also show how our method is more
stable under vertex orderings and outputs more accurate
communities. In Section 7 we demonstrate that maximiz-
2
Fig. 1. (Color online) Toy example depicting GenPerm of a vertex v
which belongs to both C1 and C2 and has two external neighboring
communities, C3 and C4. The red-colored edge shares membership in
both C1 and C2.
ing GenPerm can reduce the effect of resolution limit. We
provide a review of related work in this area in Section 8
and conclude in Section 9 with an overview of our future
research plans.
2 FORMULATION OF GENERAL PERMANENCE
We first provide a brief description of the formula for
permanence for non-overlapping communities [1], and then
discuss how we extend it for the generalized case.
Notations and Preliminaries. Consider a vertex v with
degree D(v). The vertex v belongs to the community X. Let
the number of internal connections, i.e., the connections to
other vertices in community X, of v be I(v)1. Let cin(v) be
the internal clustering coefficient, i.e., clustering coefficient2
among the neighbors of v that also belong to the commu-
nity X. The vertex v might have external connections to
communities other than X. Let Emax(v) be the number
of maximum connections that v has to a single external
community. Given these factors, permanence of vertex v,
P (v) is given as follows:
P (v) =
I(v)
Emax(v)
× 1
D(v)
− (1 − cin(v))
(1)
I(v)
Emax(v) × 1
Permanence is composed of two factors. The first factor
(Pull),
D(v) , measures by how much v is "pulled"
within its community versus how much it is pulled by the
next contending community. The novelty of this measure
is that it does not consider all the external connections,
but only the connections to the community to which v is
likely to move. If Emax(v) is zero, it is set as 1. The second
factor (Connectedness), (1−cin(v)), measures how tightly the
vertex v is connected in its own community. If the number
of internal neighbors is less than two, then cin(v) is set to
one.
Formulating GenPerm. To create a generalized version of
permanence, we assume that the distinction between in-
ternal and external communities still holds, and there is
no overlap between any internal and external community.
However, among the internal connections, vertex v does not
belong to just one community, but to a super-community,
1. The internal connections of a node is measured in the context of a
subgraph induced by the nodes belonging to a community, i.e., I(v) =
I(v, G[C]), where C is a set of nodes and G[C] is the induced subgraph.
2. The clustering coefficient for a vertex is given by the proportion
of links between the vertices within its neighborhood divided by the
number of links that could possibly exist between them.
gggJOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
3
Properties of the real-world networks. N: number of nodes, E: number of edges, C: number of communities, ρ: average edge-density per
community, S: average size of a community, ¯Om: average number of community memberships per node.
TABLE 1
Networks
LiveJournal
Amazon
Youtube
Orkut
Flickr
Coauthorship
Node type
User
Product
User
User
User
Researcher
Edge type
Friendship
Co-purchased products
Friendship
Friendship
Friendship
Collaborations
Community type
User-defined group
Product category
User-defined group
User-defined group
Joined group
Research area
N
3,997,962
334,863
1,134,890
3,072,441
80,513
391,526
E
34,681,189
925,872
2,987,624
117,185,083
5,899,882
873,775
C
310,092
151,037
8,385
6,288,363
171
8,493
ρ
0.536
0.769
0.732
0.245
0.046
0.231
S
40.02
99.86
43.88
34.86
470.83
393.18
¯Om Reference
3.09
14.83
2.27
95.93
18.96
10.45
[2]
[2]
[2]
[2]
[3]
[4]
C, consisting of several overlapping communities. The for-
mulation of GenPerm concerns quantifying how much the
vertex v belongs to each of these overlapping communities.
Figure 1 shows an example of a vertex belonging to more
than one community. From a permanence perspective, ver-
tex v belongs to the super-community consisting of vertices
A, B, C, D and H. The objective of GenPerm is to quantify
by how much v belongs to the subgroups C1 and C2.
I(v)
Emax(v) × 1
Generalizing Pull. Let us consider the first factor in per-
manence,
D(v) . The terms Emax(v) and D(v)
remain unchanged because the possible overlaps within C
will not effect the maximum external connections or the total
degree of the vertex. The internal connections, however, can
now be grouped into two classes: (i) the non-shared connec-
tions where an edge belongs completely to one community,
such as the edge < v, C > in Figure 1, and (ii) the shared
connections, such as the edge < v, B >, where the edge falls
in the overlap.
v
We posit that the internal pull a vertex experiences in a
smaller community will be the sum of the non-shared edges
(as in the original permanence) plus the sum of the shared
edges normalized by the number of communities over
which they are shared. The normalization is necessary so
that the effect of the shared edges is counted in proportion
to their commitment to the different communities. Given
this, the effective internal connections of v in community c,
v denotes the
total set of internal edges of v in community c, and xe is the
number of communities in C that contains the edge e.
where c ∈ C is I c(v) = (cid:80)
, where Γc
e∈Γc
1
xe
Generalizing Connectedness. The second part of the for-
mula concerns how tightly connected v is with its internal
neighbors. The permanence formulation computes this as a
penalty factor, as one minus the internal clustering coeffi-
cient. The computation of the clustering coefficient remains
the same, because we are still computing the connectedness
of the neighbors. However, if the neighbors are endpoints
to a shared edge, they may not belong equally to the com-
munity. To take this into account, we normalize the internal
clustering coefficient by the fraction of the effective internal
connections of the vertex v. Therefore the connectedness of
v in community c, where c ∈ C is (1 − cc
1
xe
.
e∈Γc
v
I(v)
Taking these two factors together, we compute GenPerm,
P c
g (v) of v in community c as follows:
(cid:80)
in(v)) ·
(cid:80)
(cid:80)
P c
g (v) =
e∈Γc
1
xe
Emax(v)
v
× 1
D(v)
− (1 − cc
in(v)) ·
1
xe
(2)
e∈Γc
I(v)
v
This formula can be written as,
× 1
D(v)
g (v) =
Emax(v)
I c(v)
P c
− (1 − cc
in(v)) · I c(v)
I(v)
(3)
As shown in Equation 3, the values of GenPerm still
maintain the bounds of permanence, i.e, between 1 (vertex
is completely integrated within a clique) and -1 (vertex is
wrongly assigned). The GenPerm over the network is given
by the mean of the GenPerm values of the vertices. A high
GenPerm indicates that most of the vertices in the network
are assigned to their correct communities. Therefore, a good
or accurate community assignment is the one that maxi-
mizes GenPerm.
communities C can be computed as Pg(v) =(cid:80)
The total GenPerm of a vertex over all its associated
g (v).
(cid:80)
The total GenPerm of a network G, with the vertex set V ,
is the average of the GenPerm values of all the vertices,
v∈V Pg(v). Note that when C = 1,
i.e., Pg(G) = 1V
i.e., the super-community consists of only one community,
Pg(v) = P (v). These derivations show that GenPerm is
indeed a generalization of permanence. It can break down
the belongingness of a vertex to the smaller communities
within the super-community. Under special boundary cases,
when the super-community is just one community, Gen-
Perm translates to the same formula as permanence. There-
fore, GenPerm is a rare metric that can be useful for both
non-overlapping and overlapping community detection.
c∈C P c
3 EXPERIMENTAL SETUP
We shall now present our empirical results where we com-
pare communities obtained through maximizing GenPerm
with the ground-truth communities from our test suite.
Since GenPerm is a generalized metric, it should be equally
successful in finding both non-overlapping and overlapping
communities. However, we observed that almost all net-
works have some degree of overlapping communities, even
the ones claiming to have (or create) only non-overlapping
communities. The ground-truth provided by the apparent
non-overlapping communities merely ignore the overlaps
that occur. In these cases, the ground-truth cannot be accu-
rately compared with the communities produced by Gen-
Perm, because GenPerm identifies the hidden overlaps as
well.
Therefore, for an equitable comparison against ground-
truth, we shall conduct experiments on datasets that are
known to have overlapping communities, and use met-
rics for evaluating overlapping communities to assess our
results. To demonstrate that maximizing GenPerm is also
successful in identifying non-overlapping communities, we
show its performance on idealized networks consisting of
loosely connected cliques.
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
3.1 Test Suite of Networks
Our synthetic test set consists of LFR3 benchmark networks
[5]. LFR provides a rich set of parameters to control the
network topology, including the percentage of overlapping
nodes On, number of communities to which a node belongs
Om, the number of nodes n, the mixing parameter µ, the
average degree ¯k, the maximum degree kmax, the maximum
community size cmax, and the minimum community size
cmin. Unless otherwise stated, we generate LFR graphs
with the following configuration: µ = 0.2, N=1000, Om=4,
On=5%; other parameters are set to their default values4.
Note that for each parameter configuration, we generate
100 LFR networks, and the values in all the experiments
are reported by averaging the results.
We also use six real networks whose underlying
ground-truth community structures are known a priori.
The properties of these networks are summarized in Table 1.
Sampling real-world networks. Most of the baseline com-
munity detection algorithms (Section 3.3) do not scale to
large networks. Therefore, we use the technique from [2] to
obtain subnetworks with overlapping community structure
from larger networks. We pick a random node u in graph G
that belongs to at least two communities. We then take the
subnetwork to be the induced subgraph of G consisting of
all the nodes that share at least one ground-truth community
membership with u. In our experiments, we created 500
different subnetworks for each of the six real-world datasets,
and the results are averaged over these 500 samples5. The
properties of the sampled graphs are reported in SI Text.
3.2 Overlapping Community Scoring Metrics
We compare GenPerm with the following metrics for evalu-
ating quality of the overlapping community structure.
• Modularity: Shen et al. [6] introduced EQ, an adaptation
of modularity function [7] for overlapping communities:
(cid:88)
(cid:88)
(cid:20)
(cid:21)
EQ =
1
2m
1
Aij − kikj
2m
c∈C
i∈c,j∈c
OiOj
(4)
where, Aij indicates (i, j) entry in the adjacency matrix
A, m is the number of edges in the graph, C is the set
of communities, and Oi is the number of communities to
which the node i belongs.
L´az´ar et al. [8] provided a more complex formulation of
modularity for overlapping community structure:
(cid:34)(cid:80)
i∈c
(cid:88)
(cid:80)
j∈c,i(cid:54)=j
Aij−(cid:80)
j /∈c
di·si
c∈C
nc
(cid:19)(cid:35)
(5)
Aij
c(cid:18)nc
· ne
2
Qov =
1
C
where C is the set of communities, nc and ne
c are the
number of nodes and edges that community c contains
respectively, di is the degree of node i, and si is the number
of communities to which i belongs.
3. http://sites.google.com/site/andrealancichinetti/files.
4. https://sites.google.com/site/santofortunato/inthepress2
5. Note that in the rest of the paper while reporting the average
results over many samples, we notice that the variance is significantly
less. Therefore, we omit reporting the variance for the sake of brevity.
4
• Community Coverage (CC): This metric [9] counts the
fraction of nodes that belong to at least one community
of three or more nodes. A size of three is chosen since it
constitutes the smallest non-trivial community structure.
• Overlap Coverage (OC): This metric [9] counts the aver-
age number of node memberships in non-trivial communi-
ties (of size at least three).
3.3 Baseline Algorithms
We compare our method with the following state-of-the-art
overlapping community detection algorithms. These algo-
rithms together cover the types of overlapping community
detection heuristics mentioned in [10]: (a) Local expansion
and optimization: OSLOM [11], EAGLE [6] (b) Agent-based dy-
namical algorithms: COPRA [12], SLPA [13] (c) Fuzzy detection
using mixture model: MOSES [14], BIGCLAM [2].
3.4 Community Validation Metrics
We use the following metrics that quantify the level of
correspondence between the ground-truth communities and
those obtained from an algorithm: (a) Overlapping Normal-
ized Mutual Information (ONMI) [15], (b) Omega (Ω) Index
[16], (c) F-Score [2]. The higher the value of the metrics, the
closer the match with the ground-truth (see SI Text).
4 GENPERM FOR COMMUNITY EVALUATION
We now demonstrate that GenPerm is a better metric for
evaluating the quality of communities than the metrics
listed in Section 3.2.
4.1 Correspondence to Ground-truth Structure
We show using rank correlation (following the approach in
[17]) that communities with high GenPerm best correspond
to the ground-truth. To do so, we perform the following
steps (Table 2 is used to illustrate this experiment):
(i) For each network, we execute six algorithms from Section
3.3 and obtain the communities; (ii) For each of these com-
munities, we compute the GenPerm value and the scoring
metrics discussed in Section 3.2; (iii) The algorithms are then
ranked based on the value of these metrics, with the highest
rank given to the highest value (as an example, in the second
column of Table 2, we show the values for GenPerm and the
corresponding ranks of the algorithms); (iv) The community
structures are compared with the ground-truth labels in
terms of the validation metrics, ONMI, Omega Index and
F-score; (v) The algorithms are again ranked based on the
values of each of the validation metrics (highest value/best
match has the best rank) (in the third column of Table 2, the
algorithms are ranked based on the values of ONMI); (vi)
Finally, we obtain Spearman's rank correlation between the
rankings obtained for a scoring metric (step (iii)) and each
of the ground-truth validation metric (step (v)).
We posit that since these two types of measures are
orthogonal, and because the validation metrics generally
provide a stronger measure of correctness due to direct cor-
respondence with the ground-truth structure, the ranking
of a good community scoring metric should "match" with
those of the validation metrics. We compare the relative
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
5
Fig. 2. (Color online) Spearman's rank correlation between five scoring metrics with three validation measures for LFR by varying (a) µ (where
N=1000, Om=4, On=5%), (b) Om (where N=1000, µ=0.2, On=5%), (c) On (where N=1000, µ=0.2, Om=4) and (d) real-world networks. Note that
the values of On are expressed in % of N.
For Amazon network, the values of average GenPerm of the network
on the output obtained from different algorithms and ONMI with respect
to the ground-truth community. The ranks of the algorithms (using
TABLE 2
dense ranking) are shown within parenthesis.
Algorithms
OSLOM
EAGLE
COPRA
SLPA
MOSES
BIGCLAM
Pg
0.63 (1)
0.53 (4)
0.60 (2)
0.56 (3)
0.41 (5)
0.60 (2)
ONMI
0.73 (1)
0.52 (4)
0.70 (3)
0.70 (3)
0.50 (5)
0.71 (2)
ranks instead of the absolute values, because the range of
the values is not commensurate across the quantities and
therefore the rank order is a more intrinsic measure.
Figure 2 shows the correlation values for different LFR
networks (where µ, Om and On are varied) and six real-
world networks (the values are reported by averaging
over 500 subnetworks in each case). The vertical panel
corresponds to a validation measure. Each line in a panel
corresponds to an evaluation function. For all the cases,
the lines corresponding to Pg (average GenPerm of the
network) is higher than the other metrics, which is mostly
followed by Qov, EQ, CC and OC. Therefore, we conclude
that GenPerm can evaluate communities better than other
metrics. We also notice that with the increase in µ, the
line corresponding to GenPerm tends to decrease due to
the deterioration of the ground-truth community structure.
However, the GenPerm-based rank correlation is almost
consistent with the increase of Om and On, which is not as
consistent for the other metrics. This indeed indicates that
GenPerm does not get affected much with the extent of over-
lap among communities as long as the explicit community
structure is retained in the network.
4.2 Robustness to Perturbations
So far we have examined the ability of different scoring
metrics to rank algorithms according to their goodness. In
this section, we evaluate the metrics on their robustness
under perturbations to the network. A metric is robust if
its value is commensurate with the change in ground-truth
communities. This means that under small perturbations to
the ground-truth, the results change slightly. However, if the
ground-truth labels are highly perturbed such that the un-
derlying community structure gets largely deformed, then
a good community scoring metric should produce a low
score. Given a graph G=<V,E> and perturbation intensity p,
we start with the ground-truth community S and modify it
by using the following strategies (as used in [1]).
(i) Edge-based perturbation selects an inter-community
edge (u, v) where u ∈ S and v ∈ S(cid:48) (S (cid:54)= S(cid:48)) and assigns u
to S(cid:48) and v to S. This continues for p · E iterations.
(ii) Random perturbation selects two random nodes u ∈
S and v ∈ S(cid:48) (S (cid:54)= S(cid:48)) and then swaps their memberships.
This continues for p · V iterations.
(iii) Community-based perturbation takes each commu-
nity s from the ground-truth structure S and swaps p · s
constituent nodes in s with non-constituent nodes.
We perturb different networks using these three strate-
gies for values of p ranging between 0.01 to 0.5, and compute
five community scoring metrics, i.e., Pg, EQ, Qov, CC,
CC. Figure 3 shows the representative results only for one
LFR (µ = 0.2, N=1000, Om=4, On=5%) and all real-world
networks. For all three strategies, the value of the scoring
metrics tends to decrease with the increase in p; the effect
is most pronounced in community-based strategy. For each
network, once p has reached a certain threshold, the de-
crease is much faster in GenPerm. This happens because the
internal structure of a community completely breaks down
if the perturbation is taken beyond a point and thus has
an avalanche effect on the value of the clustering coefficient
(cc
5 INFERENCES DRAWN FROM GENPERM
We show how, due to its vertex-centric view, GenPerm can
help us understand the distribution of nodes in the con-
stituent communities. We also show how ranking vertices
in(v) in Equation 3).
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
6
Fig. 3. (Color online) Change in the value of five overlapping community scoring functions with the increase of perturbation intensity (p) in three
perturbation strategies: edge-based (top panel), random (middle panel) and community-based (bottom panel) strategies for a LFR and six real-world
networks. Each data point is the average over 500 simulations. The values of each function are normalized by the maximum value obtained from
that function. Most of the cases, the lines for community coverage (CC) and overlap coverage (OC) are starkly juxtapose because of their high
similarity.
in increasing order of GenPerm can be used to explore the
core-periphery structure of a community, and in selecting
initiator nodes during message spreading in networks. Fi-
nally, we show how the layered structure obtained from
GenPerm can affect the performance of the community
detection algorithms.
5.1 Understanding the Community Structure
We study the distribution of GenPerm for each node-
community pair. We compute P c
g of each vertex on the
ground-truth communities of the benchmark networks. In
Figure 4, we divide the values of P c
g ranging from -1 to 1
into 20 bins on x-axis where the low (high) numbered bins
contain nodes with lower (higher) P c
g . On the y-axis we plot
different features as described below.
Fraction of vertices. In Figure 4(a) - 4(b), we plot in y-
axis the fraction of vertices present in the network. This
curve follows a Gaussian-like distribution, i.e., there are
few vertices with very high or very low P c
g values, and
the majority have intermediate values. In Figure 4(a), the
peak shifts from left to right with the decrease of µ (other
parameters of LFR are constant). The shift in the peak
shows that as the structure of the communities gets more
well-defined, most vertices move towards higher values of
GenPerm. The real-world networks, except Flickr show a
similar Gaussian distribution in Figure 4(b), where most of
the vertices fall in medium P c
g range. For Flickr network,
we notice in Table 1 that the communities are large (high
S) and their edge density is low (low ρ). Moreover, most of
the vertices in Flickr have low internal clustering coefficient
(0.12, where the average for the other networks is 0.31).
These factors contribute to the very low P c
g .
Number of constituent communities. We plot the number
of communities to which a vertex belongs in Figure 4(c)
- 4(d). This pattern also follows a Gaussian distribution
for LFR networks. This indicates that vertices exhibiting
average P c
g tend to belong to multiple communities, than
vertices with very high or low values. This is because
vertices with very high P c
g values, such as 1, tend to be
tightly integrated within one community and those with
low P c
g values have low degree and therefore are not part of
many communities.
Parameters of GenPerm.
In Figure 4(e) - 4(f) we plot the
average value of the effective internal connections, I c(v), of
vertices for each P c
g bin. For each network, the values of
I c(v) are normalized by the maximum value. We observe
the minimum value of I c(v) is in the middle bins. This
is because the vertices participating in many communities
contribute a small fraction of internal edges to each commu-
nity. Next, we plot the average cc
in(v) of the vertices in each
bin. Here we notice a nearly linear relation. Finally, we plot
the degree in Figure 4(i) - 4(j). We observe that vertices with
higher degree exhibit medium P c
g . This is because vertices
with high degree, but low effective internal connections,
belong to multiple communities.
Taking these results together, we conclude that the effec-
tive internal connections and the degree are good indicators
of the number of communities to which the vertex belongs
and the internal clustering coefficient is a good indicator of
the GenPerm value of the vertex.
5.2 Core-periphery Structure of Community
To study the relation between GenPerm and the core-
periphery of the communities, we use farness centrality (d)
[18] as a measure of the position of a vertex within a com-
munity. To measure farness centrality for each community,
we construct the induced subgraph of all the nodes in the
community and measure average shortest path for each
vertex within this subgraph6. The lower the value of d for a
6. Farness centrality is just the opposite of closeness centrality in a connected
component.
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
7
indicator of the position of the vertex in the community.
We observe that in coauthorship network, at d = 2.8, the
value of GenPerm drops suddenly, the reason being very
less internal clustering coefficient of the nodes at that region
of the community.
We next measure assortativity (r)7 [19] with respect to
GenPerm to evaluate the extent to which the vertices in
a community c to attach to other vertices with similar
GenPerm. For each ground-truth communities, we calculate
P c
g of all the vertices. Then we divide the values of P c
g into
20 bins. Vertices falling in the same bin are assumed to have
similar P c
g , and then we measure the assortativity, r, for
the vertices in the community c. We compare this measure
with the degree-based assortativity of vertices in each com-
munity. We observe, in Table 3, that both the synthetic and
the real-world networks are highly assortative in terms of
GenPerm, i.e., nodes exhibiting same P c
g value are often
connected with each other than the nodes with different
P c
g values. This result presents a new perspective about the
configuration of nodes within a community: vertices in a
community tend to be highly connected within each layer than
across layers. Moreover communities are organized into several
layers, with each layer being composed of vertices with similar
GenPerm.
Average of the assortativity scores, < r > (degree-based and
g -based) of the communities per network.
P c
TABLE 3
< r >
Degree-based
P c
g -based
LFR (µ = 0.1)
-0.045
0.645
LFR (µ = 0.3)
-0.018
0.483
LFR (µ = 0.6)
0.139
0.421
< r >
Degree-based
P c
g -based
LiveJournal Amazon
-0.275
0.497
0.037
0.465
Youtube Orkut
0.221
-0.182
0.438
0.528
Flickr
-0.098
0.402
Coauthorship
0.281
0.469
Fig. 4. (Color online) The relation of average P c
g with (a)-(b) fraction of
vertices, (c)-(d) < Om >, average community memberships per node,
(e)-(f) < I c(v) >, average internal degree (normalized by the maximum
value), (g)-(h) < cc
in(v) >, average internal clustering coefficient, (i)-(j)
< D(v) >, average degree of nodes for LFR and real-world networks.
The value of P c
g of vertices in each community is equally divided into
20 buckets indicated in x-axis (bin 1: −1 ≤ P c
g < −0.9, ..., bin 20:
0.9 ≤ P c
g ≤ 1).
Fig. 5. (Color online) Community-wise average GenPerm, < P c
g > of
vertices as a function of farness centrality d for LFR and real-world
networks.
vertex, the closer the vertex is to the core of the community.
We plot average P c
g of vertices as a function of d in Figure
5. We observe that for both LFR and real-world networks,
average P c
g decreases with the distance from the center of
the community. Therefore, the value of GenPerm is a strong
5.3 Effect on Community Detection Algorithms
In Section 5.2, we have noticed that GenPerm provides
a gradation/ranking of nodes in each community that in
turn produces a layered structure inside the community.
We believe that this layered structure also affects the per-
formance of different community finding algorithms. We
consider the following two overlapping community detec-
tion algorithms – BIGCLAM [2] and SLPA [13], and see
how these algorithms get affected after removing selected
nodes (based on the values of GenPerm) from the network
based. To begin with, we consider the ground-truth com-
munity structure of a network. Then for each community,
we calculate the GenPerm for all the constituent vertices
and divide the range of GenPerm into four equal bins,
representing four layers. Following, we remove x% of nodes
(refer to as set R) from each layer of the community in
isolation (x varies from 1 to 30). At a time, we remove
nodes from one layer in all the communities, run the two
overlapping community finding algorithms and see for each
algorithm, how the community structure obtained from the
resultant graph (refer to as community Cx) matches with the
community structure obtained initially without removing
7. Assortativity (r) lies between -1 and 1. When r = 1, the network is said
to have perfect assortative patterns, when r = 0 the network is non-assortative,
while at r = -1 the network is completely disassortative.
1510152000.10.20.3Real−world networks 1510152000.050.10.150.2Frac. of verticesLFR µ=0.1µ=0.3µ=0.6LiveJournalAmazonYoutubeOrkutFlickrCoauthorship(b)(a)1510152020406080 151015201234 <Om>(d)(c)1510152000.20.40.60.81 510152000.20.40.60.81Normalized <Ic(v)>(f)(e)510152000.20.40.60.81<cinc(v)> 510152000.20.40.60.81(g)(h)g123400.51Farness centrality, d<Pgc>LFR1234500.20.40.60.81Real−world networksLiveJournalAmazonYoutubeOrkutFlickrCoauthorshipµ=0.1µ=0.3µ=0.6JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
any nodes (refer to as community C1). We measure the
correspondence between two community structures using
ONMI. Note that for fair comparison, we first remove the
set of nodes R from the initial community structure C1 and
then compare two communities C1 and Cx. For each value
of x, the simulations are done 100 times and the average
value is reported. Figure 6 shows the change in the value
of ONMI with the increase in the percentage of removed
nodes, x from each layer for Amazon network (the results
are identical for other networks). We observe that the rate
of decrease in ONMI tends to increase when the nodes are
removed from inner layers. This result indicates that the
nodes in the inner layers are mostly responsible to form the
community structure. The removal of nodes from the core of
a community results in producing amorphous community
structure. We believe that this information is quite helpful
in the context of community-centric immunization [20] and
targeted attacks [21] in the network.
Fig. 6. (Color online) Change in the value of ONMI with the removal of
nodes from different layers within the communities for Amazon network.
Layer 1 corresponds to the outer-most layer, and layer 4 correspon-
dences to the inner-most layer. Each point in the line is an average of
100 simulations.
5.4 Initiator Selection for Message Spreading
In message spreading [22], a set of source vertices (initia-
tors) start sending a message. At every time step, a vertex
containing the message transfers the message to one of its
neighbors who does not have the message. The algorithm
terminates when all vertices have received the message.
The selection of the initiators is critical to how quickly the
message spreads.
A fundamental issue in message spreading is the se-
lection of initiators. The traditional practice is to select
initiators based on the degree of nodes, which was proved
to be more useful than the random node selection in terms
of average time steps required to broadcast the message
[23]. We posit that initiator selection based on P c
g would
help in disseminating the message more quickly. For our
experiments, we create LFR network with the number of
nodes from 1,000 to 90,000, keeping the other parameters
constant. We select initiators based on the following criteria
separately: (i) random, (ii) highest degree, (iii) highest P c
g
as per ground-truth communities and (iv) highest P c
g based
on communities obtained by our proposed algorithm, Max-
GenPerm (described in Section 6). For each network config-
uration, we run 500 simulations. Figure 7 shows the average
number of time steps required for the message to reach all
the vertices. We observe that P c
g -based initiator selection
from ground-truth communities requires minimum time
steps and P c
g -based initiator selection for the communities
obtained from MaxGenPerm is a close second. These results
thus highlight the importance of P c
g -based ranking within a
community.
8
Fig. 7. (Color online) Number of time steps required to spread a mes-
sage in LFR network by varying the number of nodes.
6 COMMUNITY DETECTION BY MAXIMIZING GEN-
PERM
We develop MaxGenPerm (pseudocode in Algorithm 1), an
iterative method for maximizing GenPerm (the objective
function of the algorithm). Such iterative methods have
shown to be very effective in optimizing metrics for finding
non-overlapping communities such as modularity [24] and
permanence [1]. Here the challenge is to update the values
based on one or more communities.
Initialization: The algorithm starts with initializing each
edge of a network as a separate community. Thus a vertex
can belong to more than one community.
Update: For each iteration, GenPerm of vertex v, P c
g (v),
in each of its neighboring communities c is computed. If the
value of P c
g (v) is greater than zero, vertex v is assigned to
the community c. This creates a new set of communities,
T empComm, to which v belongs. If the total GenPerm of
the new community set, T empComm, is greater than the
previous community set CurComm, to which v belonged
then the community set of v is updated. In this manner, the
communities of v are updated per iteration. In this process,
one might encounter singleton communities (communities
with single node); we retain the singleton communities
without merging them further. The algorithm ends when
there is no further improvement in the total GenPerm for
all the vertices or the maximum number of iterations is
reached.
Convergence: There is no theoretical guarantee of the
convergence of the algorithm. However we noticed that for
both synthetic and large (complete) real-world networks,
the algorithm converges before reaching the maximum
number of iterations (we set it to 15) as follows: LFR
(n=10,000, µ=0.2, On=5%, Om=4): 4, LiveJournal: 12, Ama-
zon: 6, Orkut: 10, Youtube: 9, Flickr: 5, and Coauthorship:
6.
Complexity analysis. Let a vertex v has degree dv and C i
number of neighboring communities at iteration i; out of
these C i
v are communities to which v belongs.
v number of communities. Let this time be T.C i
At each iteration for vertex v, we add its GenPerm over
all C i
v. At
each iteration for vertex v, we go through all the com-
munities C i, to compute the update of GenPerm. Let the
internal degree of v in a community c ∈ C i
v be Ic. The time
to compute GenPerm in c is dominated by computational
110203000.10.20.30.4% of nodes removedONMIBIGCLAM11020300.20.30.4SLPA Layer 1Layer 2Layer 3Layer 4123456789x 1041015202530# of nodesTime stepsRandomDegreeGround−truth+PgcMaxGenPerm+PgcJOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
time of the clustering coefficient. It is therefore O(I 2
c ). We
compute this over all the neighboring communities. So the
total time is O(C i
v) · O(I 2
c ).
However, the sum of Ic from all the communities will be
less than equal to Rdv, where R is the maximum number
of times an edge is shared between communities. Therefore,
the time to update can be written as the square of sum of
components that together add to Rdv. Since sum of squares
of elements is less than the square of the sum of the element,
therefore, an upper bound on the time is O(Rdv
Therefore the total operation on v is O(T C i
2),
which can be rounded to the more expensive operation
O(Rd2). It is done over every vertex and for (say,) Iter
iterations. So total time is O(Iter · n · (Rd2)) (where d is
the average degree of the vertices ans n is the number of
nodes).
v) + O(Rdv
2).
In order to make a comparison, we also report the
complexity of all the competing algorithms in Table 4.
TABLE 4
Time complexity of the competing overlapping community finding
algorithms (n: number of nodes, m: number of edges, T : maximum
number of iterations, d: average degree of the nodes).
Algorithm
OSLOM
COPRA
SLPA
EAGLE
MOSES
Complexity
O(n2)
O(v3n) plus O(vn log(v)) per iteration, where v is
maximum number of communities per vertex)
O(T nk) or O(T m)
O(n2 + (h + n)T ), where h is the number of cliques
O(mn2)
O(m) per iteration
BIGCLAM
MaxGenPerm O(n · (Rd2)) per iteration, where R is the
maximum number of communities shared by an edge
6.1 Performance Analysis
In order to evaluate MaxGenPerm, we (i) compare the
detected community with the ground-truth community and
measure the similarity, and (ii) check whether the algorithm
is stable under different vertex orderings.
6.1.1 Comparison with ground-truth communities
We run MaxGenPerm along with six other algorithms men-
tioned in Section 3.3 and compare their performance with
networks whose ground-truth communities are known. We
further consider MaxPerm (permanence maximization) [1]
as another competing method in order to see what extent
it captures the underlying community structure. Since the
baseline methods do not scale for large-size real networks,
we use the sampled subnetworks as mentioned in Section
3.1. For the LFR benchmark, however, the results are re-
ported on the entire networks. In the interest of space,
the results are shown for the following setting of the LFR
network: n=1000, µ=0.2, On=5% and Om=4. For each real
network, we measure the average value of each validation
metric for 500 different samples.
For each validation metric (ONMI, Ω Index, F-Score), we
separately scale the scores of the methods so that the best
performing community detection method has the score of
1. Finally, we compute the composite performance by sum-
ming up the 3 normalized scores. If a method outperforms
all the other methods in all the scores, then its composite
performance is 3.
Figure 8 displays the composite performance of the
methods for different networks (actual values are reported
in SI Text). On an average, the composite performance
g
(v) ← 0.0
P temp
T empComm ← ∅
for each community c in CN eigh do
Temporarily assign v to community c
Calculate P c
if P c
g (v), GenPerm of v in c
(v) ← P temp
g (v) > 0 then
P temp
T empComm ← T empComm ∪ c
g
(v) + P c
g (v)
g
end if
end for
if P temp
g
P cur
CurComm ← T empComm
(v) > P cur
(v) ← P temp
(v)
g
g
end if
SumP erm ← SumP erm + P cur
g
(cid:46) Update CurComm if overall GenPerm is higher.
g
(v) then
Algorithm 1 MaxGenPerm: GenPerm Maximization
Input: A connected graph G = (V, E)
Output: Detected overlapping communities and GenPerm of G, GenP erm G
9
Initialization:
Assign each edge (two end vertices) to a separate community
GenP erm G ← 0.0, SumP erm ← 0.0
OldP erm ← −1.0
Set the value of maximum number of allowable iteration as M axIter
Iter ← 0
Update:
while Iter < M axIter or SumP erm (cid:54)= OldP erm do
Iter ← Iter + 1
OldP erm ← SumP erm
for each vertex v do
CurComm is the set of communities to which v belongs
Find P cur
g
if P cur
(v) == 1 then
(v), the GenPerm of v in CurComm
g
SumP erm ← SumP erm + P cur
(v)
g
(cid:46) CurComm represents the highest GenPerm value of v.
(cid:46) No need to continue further.
else
Determine CN eigh, the set of neighboring communities of v
(cid:46) Find overlapping permanence of v in CN eigh
end if
end for
end while
GenP erm G ← SumP erm/V
return GenP erm G
(v)
(cid:46) GenPerm of the graph
of MaxGenPerm (2.88) significantly outperforms other
competing algorithms: 6.27% higher than that of BIGCLAM
(2.71), 18.03% higher than that of SLPA (2.44), 101.3%
higher than that of OSLOM (1.43), 36.4% higher than that
of COPRA (2.11), 48.4% higher than that of MOSES (1.94),
70.41% higher than that of MaxPerm (1.69), and 77.8%
higher than that of EAGLE (1.62). The absolute average
ONMI of MaxGenPerm for one LFR and six real networks
taken together is 0.85, which is 4.93% and 26.8% higher than
the two most competing algorithms, i.e., BIGCLAM8 (0.81),
and SLPA (0.67) respectively. In terms of absolute values of
scores, MaxGenPerm achieves the average F-Score of 0.84
and average Ω Index of 0.83. Overall, MaxGenPerm gives
the best results, followed by BIGCLAM, SLPA, COPRA,
MOSES, EAGLE, MaxPerm and OSLOM.
Comparison with BIGCLAM for large networks: As most
of the baseline algorithms except BIGCLAM do not scale
for large real networks [2], we separately compare MaxGen-
Perm with BIGCLAM (which is also the most competing
algorithm) on actual large real datasets. The table in Figure
8 shows the percentage improvement of MaxGenPerm over
8. We did two experiments: first, we fixed the number of communities
of BIGCLAM same as that in the ground-truth structure, and second,
we retained the default values to the parameters used in BIGCLAM and
it automatically computed the number of communities on the fly. We
observed that the second case produced comparatively better results,
and therefore we report these value here.
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
10
Fig. 8. (Color online) Performance of various competing algorithms (ranging from 0 to 3) to detect the ground-truth communities. The table shows
the performance improvement of MaxGenPerm over BIGCLAM in detecting communities in large real networks.
BIGCLAM for different real networks. On average, Max-
GenPerm achieves 17.67% higher ONMI, 14.96% higher Ω
Index, and 10.78% higher F-Score. Overall, MaxGenPerm
outperforms BIGCLAM in every measure and for every
network. The absolute values of the scores of MaxGenPerm
averaged over all the networks are 0.81 (ONMI), 0.82 (Ω
Index), and 0.81 (F-Score). Therefore, the improvement of
MaxGenPerm over BIGCLAM is higher considering the en-
tire network in comparison to that in the sampled networks.
current
implementation of MaxGenPerm (BIGCLAM10) for large
real networks are as follows: LiveJournal: 108,000 (86,198);
Amazon: 9,145 (7,632); Orkut: 92,998 (72,806); Youtube:
31,650 (28,763); Flickr: 2,072 (1,876); and Coauthorship:
9,572 (7,983). One of the future task would be to make
MaxGenPerm algorithm fast with efficient data structures.
seconds)
times9
of
The
running
(in
Identifying non-overlapping communities: As discussed
earlier, all real-world networks contain some degree of
overlaps in their communities. Therefore, we generate two
examples, shown in Figure 9, to demonstrate the ability
of MaxGenPerm to identify non-overlapping groups. We
compare MaxGenPerm with BIGCLAM which was the clos-
est competitor. For Figure 9(a), BIGCLAM produces three
community structures: {0,1,2,3}, {4,5,6,7}, {1,2,3,5,4,7};
whereas MaxGenPerm detects two non-overlapping com-
munities: {0,1,2,3}, {4,5,6,7}. Similarly,
for Figure 9(b),
BIGCLAM detects six communities: {0,1,2,3}, {4,5,6,7},
{8,9,10,11}, {12,13,14,15}, {2,4,8}, {2,8,12}; whereas Max-
GenPerm produces four disjoint communities: {0,1,2,3},
{4,5,6,7}, {8,9,10,11}, {12,13,14,15}. Note that one can obtain
the same community structure by using MaxPerm (perma-
nence maximization) [1] as obtained from MaxGenPerm.
Although these examples are on idealized networks, this
experiment demonstrates that MaxGenPerm can detect non-
overlapping communities, without including non-intuitive
overlapping structures.
9. All the experiments that we report here were run on a 64bit Linux
machine (Ubuntu 10.04.4 LTS) with 4X 2.27 GHz i3 CPU and 3GB of
RAM.
10. Note other baseline algorithms are not scalable and can not run
on large networks.
Fig. 9. Networks containing non-overlapping community structure.
6.1.2 Effect of vertex ordering
Most of the community detection algorithms are based on
optimizing certain functions (such as modularity), and the
values are heavily dependent on the order in which vertices
are processed [25], [26]. Hence an intrinsic goodness of
an algorithm can be measured in terms of its (resistant
to) change in output (communities) with change in initial
vertex ordering. Such changes in community structure due
to vertex ordering have been observed earlier in the case
of non-overlapping communities [25], [26]. This can be
more specifically measured in terms of number of invariant
groups of vertices which stay in the same output community
in spite of the fluctuation. These groups have been termed
as "constant communities" [25]. In our earlier work, we
showed that despite such fluctuations in the final outcome,
there exist few such constant communities which always
remain same across different vertex orderings.
We measure the ratio (φ) of the number of constant
communities to the total number of nodes. In the worst
case, the number of constant communities would be equal to
the number of nodes with each node being a community. If
the value of φ for an algorithm remains constant and small
over different vertex orderings, then the algorithm is less
sensitive to vertex ordering.
By comparing the value of φ for different vertex order-
ings (Figure 10), we observe that MaxGenPerm is the least
sensitive algorithm, followed by BIGCLAM, SLPA, COPRA,
MOSES, EAGLE and OSLOM. These results unfold another
major characteristic of our algorithm that by producing
lesser number of competing solutions, our algorithm is
(a)(b)132465700123456789101115131412JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
11
two criteria for identifying small but distinct groups of
vertices in overlapping communities.
1)
2)
Small communities that are loosely connected to
larger communities will remain distinct and do not
fall into the overlap between the larger communities
If all the vertices in a community belong to overlap
regions, the community should still be identified as
a separate community by itself.
These criteria are illustrated in Figure 13. Figure 13(a)
shows a circle of cliques, where two consecutive cliques are
connected by a bridging vertex. All the baseline algorithms
output communities where the bridging vertex is an over-
lapping vertex and part of two neighboring cliques (shown
by the community structure marked through solid lines).
However, maximum value of GenPerm is obtained when
each bridging vertex forms a separate singleton community
along with the individual cliques (shown by the community
structure marked through broken lines), as required by
Criterion 1.
In Figure 13(b), we have a central clique, and four other
cliques sharing one edge each with the central clique. Most
baseline algorithms detect four communities (indicated by
the four colors) and vertices a, b, c and d are treated
as overlapping vertices. However, there are actually five
cliques including the one in the center (shown by the com-
munity structure marked by the broken lines). Maximizing
GenPerm is able to detect these five cliques as separate
communities, with overlap at the corners of the central
clique. This satisfies the second criterion.
We can generalize these examples to the following two
theorems, over cliques of any given size as follows (see SI
Text for detailed discussion):
THEOREM 1. Given three cliques X, Y and Z, such that
X and Z are not connected to each other and Y is connected to
X and Z by two edges (ux, vx) and (uz, vz) respectively where
ux ∈ X, uz ∈ Z and vx, vz ∈ Y , the highest GenPerm is
obtained, if X, Y and Z are three separate communities with no
overlap.
Proof. We prove the theorem using the example given in
Figure 13(c). The detailed proof is mentioned in SI Text.
Let the size of cliques X, Y and Z be nx, ny and nz
respectively. We consider the following scenarios where Y
forms an overlap with X and Z. In every scenario, we only
consider the sum of GenPerm of ux, vx, uz and vz because
all other vertices are unaffected by any kind of community
assignment and have GenPerm equal to 1.
In Case 1 (shown in Figure 13(d)), X has an overlap
with part of Y (community C1), Y has an overlap with part
of X (community C2), Y also has an overlap with part of
Z (community C3) and Z has an overlap with part of Y
(community C4). The overlaps are such that ux ∈ C1, ux ∈
C2; vx ∈ C1, vx ∈ C2, vx ∈ C3; vz ∈ C2, vz ∈ C3, vz ∈ C4;
uz ∈ C3, uz ∈ C4. This represents the most general case of
overlap between the cliques.
Note that all the vertices in the network except ux,
vx, uz and vz are unaffected for any kind of community
assignment and they have Pg as 1.
Vertex ux has no external connection in C1 and C2.
In that case, we assume Emax = 1 to avoid the "divide
Fig. 10. (color online) The φ value for each algorithm across 2000
different vertex orderings. The x-axis is rescaled by a constant factor
of 100. For better visualization, we rescale φ with the minimum value for
each algorithm so that the sensitivity of all the algorithms starts from 1.
able to significantly reduce the problem of "degeneracy of
solutions" [27].
Fig. 11. (Color online) Examples comparing the behavior of permanence
and GenPerm. Vertices of the same color represent the communities
given by maximizing permanence. Vertices within the same dotted circle
represent the communities given by maximizing GenPerm.
7 MITIGATION OF RESOLUTION LIMIT BY GEN-
PERM
Resolution limit [27], [28] occurs when communities smaller
than a certain size get merged into larger communities. In
[1], we theoretically proved that communities obtained by
maximizing permanence can mitigate the resolution limit
problem. However, maximizing permanence still experi-
ences resolution limit if a vertex is tightly connected to more
than one community. In such cases, finding communities by
maximizing GenPerm provides a better solution.
Figure 11(a) shows two loosely connected communities.
In this case, both permanence and GenPerm give the
same communities upon maximization. Figure 11(b) shows
tightly connected communities. Maximum permanence is
obtained when all the vertices are in the same community
and therefore fails to overcome the resolution limit. In
contrast, maximizing GenPerm, produces three overlapping
communities.
Resolution limit in overlapping communities: The exam-
ple discussed above demonstrates that maximizing Gen-
Perm can mitigate the resolution limit
for both non-
overlapping and overlapping communities. To the best of
our knowledge, resolution limit in overlapping communi-
ties has not been studied before. We define the following
510152015101520Flickr510152014080Number of different orderings of vertices (rescaled by 100)Normalized sensitivityLFR (µ=0.3)OSLOMCOPRA MOSES EAGLESLPAMaxGenPerm BIGCLAMJOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
12
Fig. 12. (Color online) Toy examples used to demonstrate the theorems (Kx: clique of size x).
2n2
x
by zero" case for computing Pg. Therefore, Pg(ux) =
P C1
g (ux) + P C2
g (ux) = (nx−2)(2nx−1)
.
Similarly for vx, there is no external connection in any
of its assigned communities C1, C2 and C3. Therefore,
Pg(vx) = 2ny−3
. The connectivity of vz is similar to vx.
Therefore, Pg(vz) = 2ny−3
. Further, the connectivity of
vertex uz is similar to that of ux except the degree of uz
being nz. Therefore, Pg(uz) = (nz−2)(2nz−1)
2ny
2ny
.
Now combining GenPerm of the affected vertices, we
2n2
z
obtain:
P 1
g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz)
1
n2
z
= 4 − 5
2nx
− 5
2nz
− 3
ny
1
n2
x
+
+
(6)
In Case 2, as shown in Figure 13(e), X has complete
overlap with Y , and Z also has a complete overlap with
Y . Therefore ux ∈ C1; vx ∈ C1, vx ∈ C2; vz ∈ C1, vz ∈ C2;
uz ∈ C2.
g (ux) = nx−2
For vertex ux which belongs to community C1 only,
there is no external connection, and no internal edges are
shared. Therefore, Pg(ux) = P C1
. For vertex
vx belonging to both C1 and C2, the internal edges in clique
y−ny−1
n2
.
Y are shared by two communities. So, Pg(vx) =
Similarly, GenPerm of vz is similar to that of vx. Therefore,
Pg(vz) =
degree of uz being nz. Therefore, Pg(uz) = nz−2
The connectivity of uz is similar to that of ux, except the
y−ny−1
n2
n2
y
n2
y
nx
.
.
Now combining GenPerm of all the affected vertices, we
nz
obtain:
P 2
g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz)
− 2
n2
y
= 4 − 2
nx
− 2
ny
− 2
nz
(7)
In Case 3, as shown in Figure 13(f), each of ux, vx, vz and
uz have one external neighbor and the internal clustering
− (1−
coefficient is 1. Therefore, Pg(ux) = P C1
, Pg(vz) = ny−1
1) · nx−1
and Pg(uz) = nz−1
. Similarly, Pg(vx) = ny−1
g (ux) = nx−1
= nx−1
nx
nx
nx
ny
ny
.
Therefore, combining GenPerm of the affected vertices,
nz
we obtain:
P 3
g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz)
− 1
nz
= 4 − 1
nx
− 2
ny
(8)
When comparing P 1
g , P 2
g and P 3
g , the last scenario gives
the highest GenPerm value. Thus the theorem is proved.
THEOREM 2. Given a central clique X and n surrounding
cliques such that each shares exactly one edge with X, the highest
GenPerm is obtained if each of the surrounding cliques and X are
identified as a separate community (total n+1 communities) with
the vertices of X forming an overlap with X and the two other
communities to which it is connected.
Proof. Let us assume the toy example shown in Figure 13(b),
a generalized version of which is shown in Figure 13(g).
Assume that there is a central clique X of size n which is
surrounded by n cliques, C1, C2, ...., Cn with size n1, n2,...,
nn respectively such that each of the surrounding cliques
share one edge with X.
Now let us assume the community structure as shown
by the broken lines in Figure 13(b) where there are n + 1
communities, namely X, C1, C2, ...., Cn, and the nodes in
X such as a, b, c, d, ... are overlapping nodes and each of
them belong to two communities (we call these overlapping
nodes together as set Vov). One can measure GenPerm of the
graph in this setting. It is simple to show that the vertices
except Vov have Pg as 1. However, we calculate Pg of each
vertex in Vov as follows. Note that each node in Vov has
equal Pg value.
Let us consider vertex a (∈ Vov) which shares C1, C2 and
X communities. The degree of a is D(a) = n1 + n2 + n − 5.
In community C1, a has n1 − 2 internal connections which
are not shared, but edge (a, d) is shared with both C1 and
X. It has no external connection and its internal clustering
coefficient in this community is 1. Therefore, P C1
g (a) =
n1−3/2
n1+n2+n−5 . Similarly, P C2
In community X, a has n−1 internal connections among
which two edges, namely (a, b) and (a, d) are part of two
communities. It has no external connection and the internal
clustering coefficient is 1. Therefore, P X
n1+n2+n−5 .
Combining all these cases, we obtain the overall Gen-
Perm of vertex a as Pg(a) = n1+n2+n−5
g (a) = n2−3/2
n1+n2+n−5 .
g (a) =
n1+n2+n−5 = 1.
Similarly, one can show that GenPerm of each vertex in
Vov is 1. Since the maximum value of Pg for a vertex is 1,
this configuration is the best community assignment one can
obtain using maximizing Pg. Therefore, this arrangement
gives the highest GenPerm.
8 RELATED WORK
There exist many different methods for identifying non-
overlapping communities. For details on different commu-
nity detection methods, readers are referred to following
reviews: [29].
n−2
When the true community structure is not known, a
quality function such as modularity [7] is used to evalu-
ate the performance of the clustering algorithms. Shen et
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
13
al. [6] introduced a variant of modularity for overlapping
communities, which was later modified by L´az´ar et al. [8].
Shen et al. [30] proposed another variant on the basis that
a maximal clique only belongs to one community. Nicosia
et al. [31] extended the definition to directed graphs with
overlapping communities. Chen et al. [32] proposed an
extension of modularity density for overlapping community
structure. Several other extensions of modularity [16], [33]
have also been proposed. It is worth mentioning that the
formulation of GenPerm is an extension of our earlier work,
where we proposed permanence, a new scoring metric for
non-overlapping community [1].
There has been a class of algorithms for network clus-
tering, which allow nodes belonging to more than one
community. Palla proposed "CFinder" [34], the seminal
and most popular method based on clique-percolation tech-
nique. However, due to the clique requirement and the
sparseness of real networks, the communities discovered
by CFinder are usually of low quality [35]. The idea of
partitioning links instead of nodes to discover community
structure has also been explored [9]
On the other hand, a set of algorithms utilized local
expansion and optimization to detect overlapping commu-
nities. For instance, Baumes et al. [36] proposed "RankRe-
moval" using a local density function. MONC [37] uses
the modified fitness function of LFM which allows a single
node to be considered a community by itself. OSLOM [11]
tests the statistical significance of a cluster with respect
to a global null model (i.e., the random graph generated
by the configuration model) during community expansion.
Chen et al. [33] proposed selecting a node with maximal
node strength based on two quantities – belonging degree
and the modified modularity. EAGLE [6] and GCE [38]
use the agglomerative framework to produce overlapping
communities.
Few fuzzy community detection algorithms have been
proposed that quantify the strength of association between
all pairs of nodes and communities [16]. Nepusz et al. [39]
modeled the overlapping community detection as a nonlin-
ear constrained optimization problem which can be solved
by simulated annealing methods. Due to the probabilistic
nature, mixture models provide an appropriate framework
for overlapping community detection [40]. MOSES [14] uses
a local optimization scheme in which the fitness function
is defined based on the observed condition distribution.
Ding et al. [41] employed the affinity propagation clustering
algorithm for overlapping community detection. Whang
et al. [42] developed an overlapping community detection
algorithm using a seed set expansion approach. Recently,
BIGCLAM [2] algorithm is also built on NMF framework.
The label propagation algorithm has been extended to
overlapping community detection by allowing a node to
have multiple labels. In COPRA [12], each node updates
its belonging coefficients by averaging the coefficients from
all its neighbors at each time step in a synchronous fashion.
SLPA [13], [43] spreads labels between nodes according to
pairwise interaction rules. A game-theoretic framework is
proposed by Chen et al. [44] in which a community is
associated with a Nash local equilibrium.
Beside these, Zhang et al. [45] proposed an iterative pro-
cess that reinforces the network topology and proximity that
is interpreted as the probability of a pair of nodes belonging
to the same community. Istv´an et al. [46] proposed an
approach focusing on centrality-based influence functions.
Gopalan and Blei [47] proposed an algorithm that naturally
interleaves subsampling from the network and updating an
estimate of its communities. Recently, Sun et al. [48] pro-
posed fuzzy clustering based non-overlapping community
detection technique that can be extended to overlapping
case. However, none of these algorithms can work equally
well for both overlapping and non-overlapping cases.
9 CONCLUSION AND FUTURE WORK
We proposed a novel vertex-based metric, called GenPerm
which provides a quantitative measure of how much a
vertex belongs to each of its constituent communities, and
to the whole network. Experimental results showed that our
metric qualifies as a better community scoring metric. Our
work has several implications: First, our metric is a gener-
alized formulation that can be used evaluate the quality of
a community structure. Second, MaxGenPerm is the first
generalized algorithm that can identify both overlapping
and non-overlapping communities, without any prior infor-
mation. Third, to the best of our knowledge, the issue related
to resolution limit in the context of overlapping community
structure is discussed for the first time in this work. We
showed that maximizing GenPerm, quite significantly, re-
duces the effect of resolution limit. Fourth, we showed that
GenPerm suitably explains the position of vertices within
a community, and provides a ranking scheme of vertices
that has been shown to be effective for initiator selection
in message spreading. Finally, being a vertex-based metric,
overlapping permanence is fine-grained, therefore allows
partial estimation of communities in a network whose entire
structure is not known.
We plan to extend our metric to evaluating dynamic
communities and for detecting local communities around
a specified vertex. We also plan to explore other uses of
GenPerm such as in identifying critical vertices during
spread of epidemics.
Tanmoy Chakraborty is currently a postdoc-
toral fellow at Dept. of Computer Science, Uni-
versity of Maryland, College Park, USA. Prior to
this, he completed his Ph.D. as a Google India
fellow from Dept. of CSE, IIT Kharagpur, India
in 2015. His primary research interests include
Complex Networks, Social Media, Data Mining
and NLP. More details: https://sites.google.com/
site/tanmoychakra88/
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
14
Suhansanu Kumar is a graduate student in the
Department of Computer Science, University of
Illinois at Urbana-Champaign. He received his
B.Tech degree in 2014 from IIT Kharagpur, India.
His primary research interests include Social
Networking, Machine Learning and Game The-
ory. More details: http://illinois.academia.edu/
SuhansanuKumar.
Supplementary Materials
10 SAMPLED NETWORKS
Since all the baseline algorithms (except BIGCLAM) are
not suitable to run on the large networks, we adopt a
community-centric sampling strategy [2] to get small net-
works from each real-world network. The strategy is de-
scribed in Section 3.1 of the main text. Here we report the
properties of the sampled networks corresponding to each
real-world network in Table 5.
Niloy Ganguly is a Professor in the Department
of CSE, IIT Kharagpur, India. His primary re-
search interests include Online Social Network-
ing, Peer to peer networking and Machine Learn-
ing. More details: http://www.facweb.iitkgp.ernet.
in/∼niloy/.
TABLE 5
Average properties of the sampled real-world networks. ¯N: avg.
number of nodes, ¯E: avg. number of edges, ¯C: avg. number of
communities, ¯ρ: avg. edge-density per community, ¯S: avg. size of a
community, ¯Om: avg. number of community memberships per node.
Network
LiveJournal
Amazon
Youtube
Orkut
Flickr
Coauthorship
¯N
874.50
357.93
856.78
623.43
763.21
976.76
¯E
2463.09
1345.45
3180.34
2645.12
2897.65
3219.87
¯C
96.73
12.76
261.94
87.54
88.74
145.87
¯ρ
0.32
0.34
0.12
0.45
0.24
0.19
¯S
10.34
14.34
13.63
7.54
8.98
12.55
¯Om
4.80
15.56
5.19
48.34
8.76
9.45
11 EXPERIMENTAL SETUP
11.1 Community validation metrics
The availability of ground-truth communities allows us to
quantitatively evaluate the performance of community de-
tection algorithms. For evaluation, we use metrics that quan-
tify the level of correspondence between the detected and
the ground-truth communities. Given a network G(V, E),
we consider a set of ground-truth communities C and a
set of detected communities C∗ where each ground-truth
community Ci ∈ C and each detected community C∗
i ∈ C∗
is defined by a set of its member nodes. To quantify the level
of correspondence of C to C∗, we consider the following
three validation metrics.
Animesh Mukherjee is an Assistant Professor
in the Department of CSE, IIT Kharagpur, India,
and a Simons Associate in the Abdus Salam
International Centre for Theoretical Physics, Tri-
este, Italy. His main research interests center
around applying complex system approaches to
different problems in (a) human language evolu-
tion, web social media, and NLP. More details:
cse.iitkgp.ac.in/∼animeshm/.
Sanjukta Bhowmick is an Associate Professor
in the Department of Computer Science, Univer-
sity of Nebraska, Omaha. Her research interests
include Network Analysis, HPC and Graph The-
ory. More details: http://faculty.ist.unomaha.edu/
sbhowmick/.
• Overlapping Normalized Mutual
Information
(ONMI) [15] adopts the criterion used in infor-
mation theory to compare the detected communi-
ties and the ground-truth communities. We use the
ONMI implementation written by the authors and
is available at https://github.com/aaronmcdaid/
Overlapping-NMI.
• Omega (Ω) Index [16] is the accuracy on estimating
the number of communities that each pair of nodes
shares:
(cid:88)
u,v∈V
1
V 2
1{Cuv = C∗
uv}
(9)
•
where Cuv is the set of ground-truth communities
that u and v share, and C∗
uv is the set of detected
communities that u and v share.
F-Score measures a correspondence between each
detected community to one of the ground-truth com-
munities. To compute it, we need to determine which
i ∈ C∗ corresponds to which Ci ∈ C. We define
C∗
F-Score to be the average of the F-Score of the best-
matching ground-truth community to each detected
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
15
community, and the F-score of the best-matching de-
tected community to each ground-truth community
as follows:
1
2
F (Ci, C∗
(cid:88)
(cid:88)
1
C∗
g(i)) +
1
C
F (Cg
(
Ci∈C
i ∈C∗
C∗
(cid:48)
(i), C∗
i ))
(10)
is defined
(i) =
j ) is the harmonic
j ), g
(cid:48)
(cid:48)
where the best matching g and g
as follows: g(i) = arg maxj F (Ci, C∗
arg maxj F (Cj, C∗
mean of Precision and Recall.
i ), and F (Ci, C∗
Performance of various overlapping community detection algorithms in
terms of three validation measures to detect ground-truth communities
from LFR networks.
TABLE 7
Algorithms
OSLOM
COPRA
SLPA
MOSES
EAGLE
BIGCLAM
MaxGenPerm
ONMI
0.237
0.974
0.987
0.852
0.149
0.908
0.984
LFR
Ω Index
0.903
0.976
0.978
0.972
0.913
0.851
0.978
F-Score
0.086
0.731
0.945
0.803
0.108
0.785
0.968
12 COMPARING MAXGENPERM WITH OTHER
BASELINE ALGORITHMS
In this section, we show the performance of all the al-
gorithms in terms of three validation measures (ONMI,
Omega Index and F-Score) on various synthetic and real-
world networks. As mentioned in the main text, we run
each algorithm on 500 different samples of each real-world
network and the average performance is reported in Table
6. However, for LFR network we retain the original size
with the following parameters: n=1000, µ=0.2, On=5% and
Om=4; and the results are reported in Table 7. As we can ob-
serve in both the tables, for most of the cases, MaxGenPerm
outperforms other competing algorithms.
13 RESOLUTION LIMIT IN OVERLAPPING COMMU-
NITY
In this section, we theoretically prove that using maximizing
GenPerm, one can reduce the effect of resolution limit in
overlapping community detection.
PROOF OF THEOREM 1
Let us assume that there are three cliques X, Y and Z
(shown in Figure 13(c)) of size nx, ny, and nz respectively,
such that X and Z are not connected to each other. Y is
connected to X and Z by two edges (ux, vx) and (uz, vz)
respectively, where ux ∈ X, uz ∈ Z and vx, vz ∈ Y . There
can be three possible ways mentioned below by which one
can group nodes into different overlapping communities.
Case 1. The overlapping community structure shown in
Figure 13(d). In this case, one can compute Pg of the net-
work. Note that all the vertices in the network except ux,
vx, uz and vz are unaffected for any kind of community
assignment and they have Pg as 1.
Vertex ux has no external connection in C1 and C2. In
that case, we assume Emax = 1 to avoid the "divide by
zero" case for computing Pg.
g (ux) = nx−1+1/2
P C1
(nx−2)(2nx−1)
1 − (nx−1)(nx−2)
nx(nx−1)
− (cid:16)
(nx−1+1/2)
(cid:17) ·
nx
nx
=
2
2
2n2
x
,
P C2
g (ux) = 1/2
nx
Therefore,
− (1 − 0) · 1/2
nx
= 0.
Pg(ux) = P C1
g (ux) + P C2
g (ux) =
(nx − 2)(2nx − 1)
2n2
x
(11)
Similarly for vx, there is no external connection in any of
− (1 −
its assigned communities C1, C2 and C3. P C1
0) · 1/2
g (vx) = 1/2
ny
= 0;
−(cid:16)
1 − (ny−1)(ny−2)
ny (ny−1)
ny−1
2
2
− (1 − 1)
2
ny
=
ny−1
2ny .
ny /2
ny
ny−1
2
ny
(cid:17) · ny /2
ny
ny−2
2ny
=
ny
P C2
g (vx) =
P C3
g (vx) =
Therefore,
Pg(vx) =
ny − 2
2ny
ny − 1
2ny
+
=
2ny − 3
2ny
(12)
(13)
P C2
g (vz) =
P C3
g (vz) =
g (vz) = 0.
P C4
Therefore,
The connectivity of vz is similar to vx.
ny−1
2
ny
ny /2
ny
− (1 − 1) · ny−1
−(cid:16)
1 − (ny−1)(ny−2)
ny (ny−1)
2
ny
=
2
ny−1
2ny ;
(cid:17) · ny /2
ny
ny−2
2ny ;
=
2
Pg(vz) =
ny − 1
2ny
+
ny − 2
2ny
+ 0 =
2ny − 3
2ny
Further, the connectivity of vertex uz is similar to that of
ux except the degree of uz being nz. Therefore,
Pg(uz) =
(nz − 2)(2nz − 1)
2n2
z
(14)
Now combining the GenPerm of the affected vertices
shown in Equations 11, 12, 13 and 14, we obtain:
(nx − 2)(2nx − 1)
g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz)
2(2ny − 3)
(nz − 2)(2nz − 1)
P 1
=
+
2n2
x
2n2
z
− 5
2nz
+
− 3
ny
+
(15)
2ny
1
n2
x
+
1
n2
z
= 4 − 5
2nx
Case 2. The overlapping community structure shown in
Figure 13(e). We again calculate Pg for the affected vertices
as follows.
For vertex ux which belongs to community C1 only, there
is no external connection, and no internal edges are shared.
Therefore,
Pg(ux) = P C1
g (ux) =
nx
nx
−(cid:16)
1 − (nx−1)(nx−2)
nx (nx−1)
2
2
=
(cid:17) · nx
nx
nx − 2
nx
(16)
For vertex vx belonging to both C1 and C2, the internal
edges in clique Y are shared by two communities. Therefore,
P C1
g (vx) =
y−ny−2
n2
− (1 − ny−2
(ny +1)(ny−2)
) · (
ny−1
ny−1
2
ny
2
ny
) =
2n2
y
ny
=
+1
+1
;
2n2
y
P C2
g (vx) =
Therefore,
ny−1
2
ny
− (1 − 1) · ny−1
2
ny
ny−1
2ny .
=
Pg(vx) = P C1
g (vx) + P C2
g (vx) =
y − ny − 1
n2
n2
y
(17)
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
16
Performance of various overlapping community detection algorithms in terms of three validation measures to detect ground-truth communities
TABLE 6
from six real-world networks.
Algorithms
OSLOM
COPRA
SLPA
MOSES
EAGLE
BIGCLAM
MaxGenPerm
Algorithms
OSLOM
COPRA
SLPA
MOSES
EAGLE
BIGCLAM
MaxGenPerm
ONMI
0.741
0.593
0.535
0.433
0.690
0.780
0.789
ONMI
0.436
0.410
0.650
0.387
0.516
0.821
0.831
LiveJournal
Ω Index
0.609
0.760
0.801
0.756
0.728
0.719
0.775
Youtube
Ω Index
0.426
0.683
0.832
0.612
0.584
0.759
0.821
F-Score
0.557
0.775
0.821
0.641
0.622
0.606
0.782
F-Score
0.307
0.639
0.570
0.448
0.531
0.801
0.912
ONMI
0.052
0.028
0.273
0.473
0.010
0.766
0.854
ONMI
0.489
0.459
0.729
0.433
0.816
0.806
0.883
Amazon
Ω Index
0.131
0.190
0.173
0.301
0.209
0.954
0.904
Flickr
Ω Index
0.464
0.745
0.908
0.668
0.637
0.908
0.849
F-Score
0.388
0.689
0.865
0.566
0.518
0.412
0.887
F-Score
0.279
0.583
0.292
0.409
0.484
0.703
0.831
ONMI
0.643
0.757
0.731
0.447
0.177
0.738
0.767
ONMI
0.416
0.521
0.799
0.548
0.711
0.740
0.817
Orkut
Ω Index
0.671
0.676
0.788
0.667
0.487
0.598
0.812
Coauthorship
Ω Index
0.521
0.712
0.772
0.562
0.665
0.756
0.782
F-Score
0.528
0.569
0.947
0.528
0.502
0.958
0.904
F-Score
0.403
0.409
0.580
0.418
0.556
0.768
0.778
Fig. 13. (Color online) Toy examples used to demonstrate the theorems (Kx: clique of size x).
Similarly, the GenPerm of vz is similar to that of vx.
Therefore,
Case 1 vs. Case 3: Subtracting Equation 21 from Equation
15, we obtain
The connectivity of uz is similar to that of ux, except the
degree of uz being nz. Therefore following Equation 16,
Pg(vz) =
y − ny − 1
n2
n2
y
Pg(uz) =
nz − 2
nz
(18)
g − P 3
P 1
g = − 3
2nx
− 3
2nz
− 1
ny
+
1
n2
x
+
1
n2
z
(22)
Now, P 1
> 1
3
n2
x
g − P 3
g < 0, if
3
,
. Note that
. So the above condition always holds.
2nx
Therefore, GenPerm will always prefer case 3 in comparison
to case 1 during maximization.
> 1
n2
z
> 1
n2
x
+ 3
2nz
+ 1
n2
z
+ 1
ny
2nz
3
2nx
(19)
Now combining the GenPerm of all the affected vertices,
we obtain:
Case 2 vs. Case 3: Subtracting Equation 21 from Equation
20, we obtain
P 2
g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz)
y − ny − 1)
nx − 2
nz − 2
2(n2
=
nx
+
nz
= 4 − 2
nx
+
− 2
ny
n2
y
− 2
nz
− 2
n2
y
(20)
Case 3. The community structure shown in Figure 13(f).
Note that in this case, each of ux, vx, vz and uz have one
external neighbor and the internal clustering coefficient is
= nx−1
1. Therefore, Pg(ux) = P C1
nx .
Similarly, Pg(vx) =
− (1 − 1) · nx−1
and Pg(uz) = nz−1
nz .
g (ux) = nx−1
nx
ny−1
ny
ny−1
ny , Pg(vz) =
Therefore, combining the GenPerm of the affected ver-
nx
tices, we obtain:
P 3
g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz)
nz − 1
2(ny − 1)
nx − 1
=
nx
+
ny
= 4 − 1
nx
+
− 2
ny
(21)
nz
− 1
nz
g − P 3
P 2
g = − 1
nx
− 1
nz
− 4
n2
y
< 0
(23)
Therefore, maximum value of Pg will always be obtained
for case 3 in comparison to case 2.
From this two comparison, we observe that the highest
Pg is obtained when X, Y and Z are three separate com-
munities as shown in Figure 13(f). Note that there can be
other scenarios as well such as Case 4 where any of the
two consecutive cliques are combined together to form a
community along with the remaining clique as separate
community, thus forming two non-overlapping communi-
ties, or Case 5 where all three cliques are combined to
form one single community. In case of permanence [1], the
author showed that if one can maximize permanence, case
3 always wins with respect to cases 4 and 5. Therefore,
we can conclude that for the network shown in Figure
13(c), maximizing Pg always yields the community structure
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
shown in Figure 13(f), thus reducing the effect of resolution
limit in community detection irrespective of the community
size.
PROOF OF THEOREM 2
Let us assume the toy example shown in Figure 13(b),
a generalized version of which is shown in Figure 13(g).
Assume that there is a central clique X of size n which is
surrounded by n cliques, C1, C2, ...., Cn with size n1, n2,...,
nn respectively such that each of the surrounding cliques
share one edge with X.
Now let us assume the community structure as shown
by the broken lines in Figure 13(b) where there are n + 1
communities, namely X, C1, C2, ...., Cn, and the nodes in
X such as a, b, c, d, ... are overlapping nodes and each of
them belong to two communities (we call these overlapping
nodes together as set Vov). One can measure the GenPerm
of the graph in this setting. It is simple to show that the
vertices except Vov have Pg as 1. However, we calculate Pg
of each vertex in Vov as follows. Note that each node in Vov
has equal Pg value.
Let us consider vertex a (∈ Vov) which shares C1, C2 and
X communities. The degree a is D(a) = n1 + n2 + n − 5.
In community C1, a has n1 − 2 internal connections which
are not shared, but edge (a, d) is shared with both C1 and
X. It has no external connection and its internal clustering
coefficient in this community is 1. Therefore,
P C1
g (a) =
n1 − 2 + 1/2
n1 + n2 + n − 5
− (1 − 1) · (
=
n1 − 2 + 1/2
n1 + n2 + n − 5
n1 − 3/2
n1 + n2 + n − 5
)
(24)
Similarly, the GenPerm of a in community C2 is as
follows.
P C2
g (a) =
n2 − 3/2
n1 + n2 + n − 5
(25)
In community X, a has n−1 internal connections among
which two edges, namely (a, b) and (a, d) are part of two
communities. It has no external connection and the internal
clustering coefficient is 1. Therefore,
P X
g (a) =
n − 3 + 1/2 + 1/2
n1 + n2 + n − 5
n1 + n2 + n − 5
n − 2
=
(26)
Combining Equations 24, 25 and 26, we obtain the over-
all GenPerm of vertex a as follows:
g (a) + P C2
Pg(a) = P C1
g (a) + P X
n1 + n2 + n − 5
n1 + n2 + n − 5
g (a)
= 1
=
(27)
Similarly, one can show that the GenPerm of each vertex
in Vov is 1. Since the maximum value of Pg for a vertex is
1, this configuration is the best community assignment one
can obtain using maximizing Pg.
REFERENCES
[1] T. Chakraborty, S. Srinivasan, N. Ganguly, A. Mukherjee, and
S. Bhowmick, "On the permanence of vertices in network com-
munities," in SIGKDD, New York, USA, 2014, pp. 1396–1405.
J. Yang and J. Leskovec, "Overlapping community detection at
scale: A nonnegative matrix factorization approach," in WSDM.
New York, USA: ACM, 2013, pp. 587–596.
[2]
17
[3] X. Wang, L. Tang, H. Liu, and L. Wang, "Learning with multi-
resolution overlapping communities." Knowl. Inf. Syst., vol. 36,
no. 2, pp. 517–535, 2013.
[4] G. Palla, I. J. Farkas, P. Pollner, I. Der´enyi, and T. Vicsek, "Fun-
damental statistical features and self-similar properties of tagged
networks," New J. Phys., vol. 10, no. 12, p. 123026, 2008.
[5] A. Lancichinetti, S. Fortunato, and F. Radicchi, "Benchmark graphs
for testing community detection algorithms," Phys. Rev. E, vol. 78,
no. 4, p. 046110, Oct. 2008.
[6] K. C. H. Shen, X. Cheng and M. B. Hu, "Detect overlapping and
hierarchical community structure in networks," Physica A, vol. 388,
no. 8, pp. 1706–1712, 2009.
[7] M. E. J. Newman and M. Girvan, "Finding and evaluating com-
munity structure in networks," Phys. Rev. E, vol. 69, no. 026113,
2004.
[8] A. L´az´ar, D. ´Abel, and T. Vicsek, "Modularity measure of networks
with overlapping communities," Europhys. Lett., vol. 90, no. 1, p.
18001, 2010.
[9] Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann, "Link communities reveal
multiscale complexity in networks," Nature, vol. 466, pp. 761–764,
2010.
[10] J. Xie, S. Kelley, and B. K. Szymanski, "Overlapping commu-
nity detection in networks: The state-of-the-art and comparative
study," ACM Comput. Surv., vol. 45, no. 4, pp. 43:1–43:35, Aug.
2013.
[11] A. Lancichinetti, F. Radicchi, J. J. Ramasco, and S. Fortunato,
"Finding statistically significant communities in networks," PLoS
ONE, vol. 6, no. 4, p. e18961, 2011.
[12] S. Gregory, "Finding overlapping communities in networks by
label propagation," New J. Phys., vol. 12, no. 10, p. 103018, 2010.
[13] J. Xie and B. K. Szymanski, "Towards linear time overlapping
community detection in social networks," in PAKDD, 2012, pp.
25–36.
[14] A. McDaid and N. Hurley, "Detecting highly overlapping com-
munities with model-based overlapping seed expansion," in
ASONAM, Washington, DC, USA, 2010, pp. 112–119.
[15] A. F. McDaid, D. Greene, and N. J. Hurley, "Normalized mutual
information to evaluate overlapping community finding algo-
rithms," CoRR, vol. abs/1110.2515, 2011.
[16] S. Gregory, "Fuzzy overlapping communities in networks," J. Stat.
Mech., vol. 2011, no. 02, p. P02017, 2011.
[17] K. Steinhaeuser and N. V. Chawla, "Identifying and evaluating
community structure in complex networks," Pattern Recognition
Letters, vol. 31, no. 5, pp. 413–421, 2010.
[18] J. Yang and J. Leskovec, "Overlapping communities explain core-
periphery organization of networks," Proceedings of the IEEE, vol.
102, pp. 1892 – 1902, 2014.
[19] M. E. J. Newman, "Mixing patterns in networks," Phys. Rev. E,
vol. 67, no. 2, p. 026126, Feb. 2003.
[20] R. Pastor-Satorras and A. Vespignani, "Immunization of complex
networks," Phys. Rev. E, vol. 65, p. 036104, Feb 2002.
[21] R. Albert, H. Jeong, and A. Barabasi, "Error and attack tolerance of
complex networks," Nature, vol. 406, no. 6794, pp. 378–382, 2000.
[22] F. Chierichetti, S. Lattanzi, and A. Panconesi, "Rumour spreading
and graph conductance," in SODA. SIAM, 2010, pp. 1657–1663.
[23] A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker,
H. Sturgis, D. Swinehart, and D. Terry, "Epidemic algorithms
for replicated database maintenance," in PODC, New York, USA,
1987, pp. 1–12.
[24] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast
unfolding of communities in large networks," J. Stat. Mech., vol.
2008, no. 10, p. P10008, Oct. 2008.
[25] T. Chakraborty, S. Srinivasan, N. Ganguly, S. Bhowmick, and
A. Mukherjee, "Constant Communities in Complex Networks,"
Sci. Rep., vol. 3, 2013.
[26] A. Lancichinetti and S. Fortunato, "Consensus clustering in com-
plex networks," Sci. Rep., vol. 2, 2012.
[27] S. Fortunato and M. Barthelemy, "Resolution limit in community
detection," PNAS, Jan. 2007.
[28] B. Good, Y. D. Montjoye, and A. Clauset, "Performance of mod-
ularity maximization in practical contexts," Phys. Rev. E, vol. 81,
no. 4, p. 046106, 2010.
[29] M. A. Porter, J. P. Onnela, and P. J. Mucha, "Communities in
networks." Notices of the American Mathematical Society, vol. 56,
no. 9, 2009.
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016
18
[30] H.-W. Shen, X.-Q. Cheng, and J.-F. Guo, "Quantifying and identi-
fying the overlapping community structure in networks," J. Stat.
Mech. Theor. Exp., vol. 2009, no. 07, p. P07042, 2009.
[31] V. Nicosia, G. Mangioni, V. Carchiolo, and M. Malgeri, "Extending
the definition of modularity to directed graphs with overlapping
communities," J. Stat. Mech. Theor. Exp., vol. 2009, no. 03, p. P03024,
2009.
[32] M. Chen, K. Kuzmin, and B. K. Szymanski, "Extension of mod-
ularity density for overlapping community structure," in SNAA
Workshop, ASONAM, 2014.
[33] D. Chen, M. Shang, Z. Lv, and Y. Fu, "Detecting overlapping
communities of weighted networks via a local algorithm," Physica
A, vol. 389, no. 19, pp. 4177 – 4187, 2010.
[34] G. Palla, I. Der´enyi, I. Farkas, and T. Vicsek, "Uncovering the
overlapping community structure of complex networks in nature
and society," Nature, vol. 435, no. 7043, pp. 814–818, June 2005.
[35] S. Fortunato and A. Lancichinetti, "Community detection algo-
rithms: A comparative analysis: Invited presentation, extended
abstract," in Fourth International ICST Conference on Performance
Evaluation Methodologies and Tools, ICST, Brussels, Belgium, Bel-
gium, 2009, pp. 27:1–27:2.
[36] J. Baumes, M. K. Goldberg, M. S. Krishnamoorthy, M. Magdon-
Ismail, and N. Preston, "Finding communities by clustering a
graph into overlapping subgraphs." in IADIS AC.
IADIS, 2005,
pp. 97–104.
[37] F. Havemann, M. Heinz, A. Struck, and J. Glser, "Identification
of overlapping communities and their hierarchy by locally calcu-
lating community-changing resolution levels," JSTAT, vol. 2011,
no. 01, p. P01023, 2011.
[38] C. Lee, F. Reid, A. McDaid, and N. Hurley, "Detecting highly-
overlapping community structure by greedy clique expansion," in
ACM KDD-SNA, 2010, pp. 33–42.
[39] T. Nepusz, A. Petr´oczi, L. N´egyessy, and F. Bazs´o, "Fuzzy commu-
nities and the concept of bridgeness in complex networks," Phys.
Rev. E, vol. 77, p. 016107, Jan 2008.
[40] M. E. J. Newman and E. A. Leicht, "Mixture models and ex-
ploratory analysis in networks," PNAS, vol. 104, no. 23, pp. 9564–
9569, 2007.
[41] F. Ding, Z. Luo, J. Shi, and X. Fang, "Overlapping community
detection by kernel-based fuzzy affinity propagation," in ISA,
2010, pp. 1–4.
[42] J. J. Whang, D. F. Gleich, and I. S. Dhillon, "Overlapping commu-
nity detection using seed set expansion," in CIKM. ACM, 2013,
pp. 2099–2108.
[43] J. Xie and B. Szymanski, "Community detection using a neighbor-
hood strength driven label propagation algorithm," in IEEE NSW,
2011, pp. 188–195.
[44] W. Chen, Z. Liu, X. Sun, and Y. Wang, "A game-theoretic frame-
work to identify overlapping communities in social networks,"
Data Min. Knowl. Discov., vol. 21, no. 2, pp. 224–240, Sep. 2010.
[45] Y. Zhang, J. Wang, Y. Wang, and L. Zhou, "Parallel community
detection on large networks with propinquity dynamics." in KDD.
ACM, 2009, pp. 997–1006.
[46] A. Istv´an, R. Palotai, M. S. Szalay, and P. K. Csermely, "Community
landscapes: An integrative approach to determine overlapping
network module hierarchy, identify key nodes and predict net-
work dynamics," PLoS ONE, vol. 5, no. 9, p. e12528, 09 2010.
[47] P. K. Gopalan and D. M. Blei, "Efficient discovery of overlapping
communities in massive networks," Proceedings of the National
Academy of Sciences, vol. 110, no. 36, pp. 14 534–14 539, 2013.
[48] P. G. Sun, L. Gao, and S. S. Han, "Identification of overlapping
and non-overlapping community structure by fuzzy clustering in
complex networks," Information Sciences, vol. 181, no. 6, pp. 1060–
1071, 2011.
|
1507.07017 | 2 | 1507 | 2015-11-18T01:27:16 | Stability of Spreading Processes over Time-Varying Large-Scale Networks | [
"cs.SI",
"math.DS",
"math.OC",
"physics.soc-ph",
"q-bio.PE"
] | In this paper, we analyze the dynamics of spreading processes taking place over time-varying networks. A common approach to model time-varying networks is via Markovian random graph processes. This modeling approach presents the following limitation: Markovian random graphs can only replicate switching patterns with exponential inter-switching times, while in real applications these times are usually far from exponential. In this paper, we introduce a flexible and tractable extended family of processes able to replicate, with arbitrary accuracy, any distribution of inter-switching times. We then study the stability of spreading processes in this extended family. We first show that a direct analysis based on It\^o's formula provides stability conditions in terms of the eigenvalues of a matrix whose size grows exponentially with the number of edges. To overcome this limitation, we derive alternative stability conditions involving the eigenvalues of a matrix whose size grows linearly with the number of nodes. Based on our results, we also show that heuristics based on aggregated static networks approximate the epidemic threshold more accurately as the number of nodes grows, or the temporal volatility of the random graph process is reduced. Finally, we illustrate our findings via numerical simulations. | cs.SI | cs |
Stability of Spreading Processes over
Time-Varying Large-Scale Networks
Masaki Ogura, Member, IEEE, and Victor M. Preciado, Member, IEEE
1
Abstract—In this paper, we analyze the dynamics of spreading processes taking place over time-varying networks. A common
approach to model time-varying networks is via Markovian random graph processes. This modeling approach presents the following
limitation: Markovian random graphs can only replicate switching patterns with exponential inter-switching times, while in real
applications these times are usually far from exponential. In this paper, we introduce a flexible and tractable extended family of
processes able to replicate, with arbitrary accuracy, any distribution of inter-switching times. We then study the stability of spreading
processes in this extended family. We first show that a direct analysis based on Ito’s formula provides stability conditions in terms of the
eigenvalues of a matrix whose size grows exponentially with the number of edges. To overcome this limitation, we derive alternative
stability conditions involving the eigenvalues of a matrix whose size grows linearly with the number of nodes. Based on our results, we
also show that heuristics based on aggregated static networks approximate the epidemic threshold more accurately as the number of
nodes grows, or the temporal volatility of the random graph process is reduced. Finally, we illustrate our findings via numerical
simulations.
Index Terms—Dynamic random graphs, complex networks, epidemics, stochastic processes, random matrix theory.
!
1 INTRODUCTION
U NDERSTANDING spreading processes in complex net-
works is a central question in the field of Network
Science with applications in rumor propagation [1], mal-
ware spreading [2], epidemiology, and public health [3].
In this direction, important advances in the analysis of
spreading processes over time-invariant (TI) networks have
been made during the last decade (see [4] and [5] for
recent surveys). Under the time-invariance assumption, we
find several recent breakthroughs in the literature, such
as the rigorous analysis of mean-field approximations [6],
the connection between the eigenvalues of a network and
epidemic thresholds [7], [8], [9], new modeling tools for
analysis of multilayer networks [10], and the use of control
and optimization tools to contain epidemic outbreaks [11],
[12], [13], [14].
In practice, most spreading processes of practical interest
take place in networks with time-varying (TV) topologies,
such as human contact networks, online social networks,
biological, and ecological networks [15]. A naive, but com-
mon, approach to analyze dynamic processes in TV net-
works is to build an aggregated static topology based on
time averages. When the time scales of the network evo-
lution are comparable to those of the spreading process,
the static aggregated graph is not well-suited to study the
dynamics of TV networks, as pointed out in [16], [17]. Using
extensive numerical simulations, it has been observed that
the speed of spreading of a disease in a TV network can be
substantially slower than in its aggregated static representa-
tion [18]. This observation is also supported by the study
of spreading processes in a real TV network constructed
from a mobile phone dataset [19]. More recent studies point
• The authors are with the Department of Electrical and Systems Engineer-
ing at the University of Pennsylvania, Philadelphia, PA 19104.
out the key role played by the addition and removal of
links [20], as well as the distribution of contact durations
between nodes [21] in the dynamics of the spread. The
works mentioned above provide empirical evidence about
the nontrivial effect that the dynamics of the network has
on the behavior of spreading processes.
Apart from these empirical studies, we also find several
works providing theoretical support to these numerical
observations. The authors in [22], [23] derived the value of
the epidemic threshold in particular types of TV networks,
assuming that all nodes in the network present a homo-
geneous infection and recovery rates. In [24], Perra et al.
proposed a model of temporal network, called the activity-
driven model, able to replicate burstiness in node/edge
activity and analyzed contagion processes taking place in
this model in [25]. Karsai et al. proposed in [26] a time-
varying network using a reinforcement process able to
replicate the emergence of strong and weak ties observed
in a mobile call dataset. A wide and flexible class of TV
network model, called edge-Markovian graphs, was proposed
in [27] and analyzed in [28]. In this model, edges appear
and disappear independently of each other according to
Markov processes. Edge-Markovian graphs have been used
to model, for example, intermittently-connected mobile net-
works [29], [30] and information spread thereon [31]. Taylor
et al. derived in [32] the value of the epidemic threshold
in edge-Markovian graphs and proposed control strategies
to contain an epidemic outbreak, assuming homogeneous
spreading and recovery rates.
It is worth remarking that, although most existing anal-
yses of spreading processes over dynamic networks rely on
the assumption that nodes present homogeneous rates and
the Markov processes used to generate edge-switching sig-
nals are identical, these assumptions are not satisfied in real-
world networks. Furthermore, most theoretical analyses
mentioned above assume that edges appear and disappear
in the network according to exponential distributions. How-
ever, as was found in several experimental studies [33], [34],
[35] utilizing radio-frequency identification devices (RFID),
the probability distribution of contact durations in human
proximity networks is far from exponential. Therefore, it is
of practical interest to develop tools to analyze spreading
processes in TV networks with heterogenous rates and
non-identical edge-switching signals able to replicate non-
exponential switching patterns.
In this paper, we study spreading processes over TV
networks with heterogeneous rates and non-identical edge-
switching signals. First, we propose a wide class of TV
networks where edges appear and disappear following ag-
gregated Markov processes [36]. Since the class of aggregated
Markov processes contains all Markov processes, the pro-
posed class includes all edge-Markovian graphs [27]. We
furthermore observe that, due to the modeling flexibility
of aggregated Markov processes, the proposed class of TV
networks can replicate human-contact durations following
non-exponential distributions with an arbitrary accuracy.
Second, we theoretically analyze the dynamics of spreading
process over the proposed class of dynamic graphs. We
model the dynamics of spreading processes on this class us-
ing a set of stochastic differential equations, which is a time-
varying version of the popular N-intertwined SIS model [9].
Third, we derive conditions for these stochastic differential
equations to be globally exponentially stable around the
infection-free equilibrium, i.e., the infection ‘dies out’ ex-
ponentially fast over time. One of the main challenges in
this analysis is to derive computationally tractable stability
conditions. For example, as will be illustrated later, if we
simply apply a recently proposed stability condition [37]
based on the direct application of Ito’s formula for jump
processes (see, e.g., [38]), we obtain a stability condition
that requires the computation of the largest eigenvalue of
a matrix whose size grows exponentially with the number
of edges in the network. Hence, this condition is hard (if
not impossible) to verify for large-scale networks. In this
paper, we use spectral graph theory [39] to derive stability
conditions for the set of stochastic difference equations in
terms of the largest eigenvalues of a matrix whose size
grows linearly with the number of nodes in the network.
This paper is organized as follows. In Section 2, we
introduce the notation and preliminary facts used in the
paper and, then, introduce a flexible model of TV networks
model called aggregated-Markovian random graph process.
In Section 3, we state computationally tractable stability con-
ditions for spreading processes taking place in this dynamic
network model. In Section 4, we illustrate our results with
some numerical examples. The proofs of the theorems are
presented in Section 5.
2 PRELIMINARIES AND PROBLEM STATEMENT
This section starts by introducing notation in Subsection 2.1.
Then, in Subsection 2.2, we review preliminary facts about
spreading processes over static networks. In Subsection 2.3,
we introduce the class of TV network models under consid-
eration. We finalize this section by stating the problem to be
studied in Subsection 2.4.
2
2.1 Notation
For a positive integer n, define the set [n] = {1, . . . , n}.
For c ∈ R, define c− = (c − c)/2. Let sgn(·) denote the
sign function over R, which can be extended to matrices by
entry-wise application. The Euclidean norm of x ∈ Rn is
denoted by (cid:107)x(cid:107). Let In denote the n × n identity matrix.
A square matrix is said to be Metzler if its off-diagonal
entries are nonnegative. The spectral abscissa of a square
matrix A, denoted by η(A), is defined as the maximum real
part of its eigenvalues. We say that A is Hurwitz stable if
η(A) < 0. Also, we define the matrix measure [40] of A by
µ(A) = η(A + A(cid:62))/2. For a square random matrix X, its
expectation is denoted by E[X] and its variance is defined
by Var(X) = E[(X − E[X])2]. The diagonal matrix with
diagonal elements a1, . . . , an is denoted by diag(a1, . . . , an).
A directed graph is defined as the pair G = (V,E), where
V = {v1, . . . , vn} is a set of nodes1 and E ⊆ V × V is a
set of directed edges (also called diedges or arcs), defined as
ordered pairs of nodes. By convention, we say that (vj, vi) is
a directed edge from vj pointing towards vi. The adjacency
matrix A = [aij] of a directed graph G is defined as the
n × n matrix such that aij = 1 if (vj, vi) ∈ E, and aij = 0
otherwise.
A stochastic process σ taking values in a set Γ is said to
be an aggregated Markov process (see, e.g., [36]) if there exists
a time-homogeneous Markov process θ taking values in a
set Λ and a function f : Λ → Γ such that σ = f (θ). Through-
out the paper, it is assumed that Λ is finite, f is surjective,
and all the Markov processes are time-homogeneous. We
say that a Markov process θ is irreducible if all the states
in Λ can be reached from any other state in Λ (see, e.g.,
[41] for more details). We say that an aggregated Markov
process σ = f (θ) is irreducible if θ is irreducible. We will use
the next lemma in our proofs.
Lemma 2.1 ([41]). Let θ be an irreducible Markov process
taking values in a finite set Λ. Then, θ has a unique
stationary distribution π. Moreover,
π(λ) = lim
t→∞ Pr(θ(t) = λ),
for every λ ∈ Λ and θ(0) ∈ Λ.
2.2 Spreading Process over Static Networks
In this subsection, we review a model of spreading processes
over static networks called the Heterogeneous Networked SIS
(HeNeSIS) model, which is an extension of the popular
N-intertwined SIS model [9] to the case of nodes with
heterogeneous rates. This model can be described using
a continuous-time Markov process, as follows. Let G be
a directed graph, where nodes in G represent individuals
and diedges represent interactions between them (which we
consider to be directed). At a given time t ≥ 0, each node
can be in one of two possible states: susceptible or infected.
We define the variable Xi(t) as Xi(t) = 1 if node i is
infected at time t, and Xi(t) = 0 if i is susceptible. In the
HeNeSIS model, when a node i is infected, it can randomly
transition to the susceptible state according to a Poisson
process with rate δi > 0, called the recovery rate of node i.
1. For simplicity in notation, we sometimes refer to node vi as i.
(cid:80)n
On the other hand, if node i is in the susceptible state, it
can randomly transition to the infected state according to a
i=1 aijXj(t), where βi > 0
Poisson process with rate βi
is called the infection rate of node i. In other words, the
rate of transition of node i from susceptible to infected is
proportional to the number of its infected neighbors.
Since the above Markov process has a total of 2n possible
states (two states per node), its analysis is very hard for
arbitrary contact networks of large size. A popular approach
to simplify the analysis of this type of Markov process is
to consider upper-bounding linear models. Let A denote
the adjacency matrix of G, and define p = (p1, . . . , pn)(cid:62),
P = diag(p1, . . . , pn), B = diag(β1, . . . , βn), and D =
diag(δ1, . . . , δn). Then, it is known that the solutions pi(t)
(i = 1, . . . , n) of the linear differential equation
p = (BA − D)p
(1)
upper-bounds the evolution of E[Xi(t)] (i = 1, . . . , n) from
the exact Markov process with 2n states [9]. Thus, if the
dynamics in (1) is globally exponentially stable, the infection
dies out exponentially fast in the exact Markov process [6],
[13]. In the case of homogeneous infection and recovery
rates, i.e., βi = β and δi = δ for all i, the dynamics (1)
is globally exponentially stable if and only if [9]
β
δ
<
1
η(A)
.
(2)
Apart from the continuous-time Markov process de-
scribed above, we can also model the dynamics of a spread
using a discrete-time networked Markov chain with an
exponential number of states [8]. As in the continuous-
time case, we can show [8] that the solution of the linear
difference equation
p(k + 1) = (BA + I − D)p(k),
(3)
where p = (p1, . . . , pn)(cid:62), upper-bounds the probabili-
ties Pr(i is infected at time k) (i = 1, . . . , n). As in the
continuous-time case, it turns out that if the discrete-time
linear system in (3) is globally exponentially stable, the
infection dies out exponentially fast in the exact Markov
process [6]. In the case of homogeneous infection and re-
covery rates, the system in (3) is stable if and only if (2)
holds [8].
2.3 Aggregated-Markovian Random Graph Processes
In this subsection, we introduce two new models of TV
networks: the aggregated-Markovian edge-independent (AMEI)
and the aggregated-Markovian arc-independent (AMAI) mod-
els. As we mentioned above, these models generalize the
class of edge-Markovian time-varying networks [27]. Let
G = {G(t)}t≥0 be a stochastic graph process taking values
in the set of directed graphs with n nodes. Let A(t) denote
the adjacency matrix of G(t) for each t ≥ 0. The class of
dynamic random graphs studied in this paper is defined as
follows.
Definition 2.2. Consider a collection of aggregated Markov
processes σij = gij(θij) where gij are {0, 1}-valued
functions and θij are stochastically independent Markov
processes for 1 ≤ i < j ≤ n. An aggregated-Markovian
3
c1
p1 /
c2
p2
··· pn−1 /
/ cn
q1
q2
sm
qn
s1
s2
dm
rm−1
···
r2
d2
r1
d1
Fig. 1. A Markov process described in Example 2.3.
edge-independent (AMEI) network is a random graph pro-
cess in which Aij = Aji = σij for i < j and Aii = 0 for
all i ∈ [n]. If σij is irreducible for all possible pairs (i, j),
then we say that G is irreducible.
In other words, the upper-triangular entries of the time-
varying adjacency matrix A(t) of an AMEI graph are in-
dependent aggregated Markov processes. The lower trian-
gular entries are constructed via symmetry and the diag-
onal entries are zero. Hence, the graph is undirected by
construction and does not contain self-loops. AMEI graphs
extend the class of edge-Markovian graphs [27] and allow
us to model a wider class of edge processes. For exam-
ple, in an edge-Markovian graph, the time it takes for an
edge to switch from connected to disconnected (or vice
versa) follows an exponential distribution. In contrast, in
an AMEI graph, we can design the function gij and the
Markov process θij to fit any desired distribution for the
contact durations with arbitrary precision, as illustrated in
the following example:
Example 2.3. Let θ be the Markov process over the state
space S = {c1, . . . , cn, d1, . . . , dm} presenting the state-
transition diagram shown in Fig. 1. Consider an edge
modeled by the aggregated Markov process σ = f (θ),
where the function f : S → {0, 1} is defined by f (ci) = 1
and f (dj) = 0 for all i ∈ [n] and j ∈ [m]. Therefore,
the edge is active if and only if θ is in one of the states
c1, . . . , cn. From the diagram in Fig. 1, we see that the
edge is active from the time θ enters c1 until the time
θ arrives to d1. It can be proved that the time elapsed
between these two events follows a Coxian probability
distribution, which forms a dense subset in the set of
nonnegative random variables [42]. Therefore, by appro-
priately choosing the transition rates p1, . . . , pn−1, q1,
. . . , qn, it is possible to tune the distribution followed
by the time the edge is active in order to follow any
distribution with an arbitrary accuracy (when n is large
enough). From the symmetry of the diagram in Fig. 1,
we can also tune the parameters r1, . . . , rm−1, s1, . . . ,
sm so that the time the edge is inactive follows any given
probability distribution with an arbitrary accuracy.
In the following definition, we introduce a directed
version of AMEI graphs.
Definition 2.4. Consider a collection of aggregated Markov
processes σij = gij(θij) where gij are {0, 1}-valued
functions and θij are stochastically independent Markov
processes for i, j ∈ [n] and i
(cid:54)= j. An aggregated-
Markovian arc-independent (AMAI) network is a random
graph process in which Aij = σij for i (cid:54)= j and Aii = 0
/
!
!
/
/
C
C
o
o
o
o
S
S
o
o
a
a
for all i ∈ [n]. If σij is irreducible for all possible
pairs (i, j), then we say that G is irreducible.
Once the class of aggregated-Markovian networks is
introduced, we analyze spreading processes taking on these
random graph processes.
2.4 Problem Statement
In this paper, we address the following question: Under what
conditions does a spreading process taking place in a TV network
with aggregated-Markovian link dynamics die out exponentially
fast? In other words, we consider the problem of analyzing
the stability of the upper-bounding linear model (1) when
the graph is an aggregated-Markovian network. In this case,
the entries of the adjacency matrix are random processes
and, therefore, (1) is the following stochastic linear differen-
tial equation:
Σ : p(t) = (BA(t) − D) p(t),
where A(t) is a random matrix process. In the following
section, we will derive conditions under which the disease-
free equilibrium of Σ is stable, i.e., the infection probabilities
converge to zero as t → ∞ exponentially fast,
in the
following sense:
Definition 2.5. Consider a random graph process G defined
by either an AMEI or AMAI graph. We say that the
disease-free equilibrium of Σ is almost surely exponentially
stable if there exists λ > 0 such that
(cid:18)
log(cid:107)p(t)(cid:107)
t
lim sup
t→∞
Pr
(cid:19)
≤ −λ
= 1,
for all initial states p(0) = p0 and σij(0) = σij,0. The
supremum of λ satisfying the above condition is called
the decay rate.
3 STABILITY OF SPREADING PROCESSES IN RAN-
DOM GRAPH PROCESSES
In this section, we state the main results in this paper. In
particular, we derive conditions for the spreading model Σ
to be stable when the network structure varies according
to an AMEI (or AMAI) random graph process. In Subsec-
tion 3.1, we apply a stability condition [37] based on the
direct application of the Ito formula for jump processes to
derive stability conditions in terms of the largest eigenvalue
of a matrix whose size depends exponentially on the num-
ber of edges in the graph. Due to the exponential size of
this matrix, this condition is hard (if not impossible) to
apply in the analysis of large-scale networks. Motivated by
this limitation, we propose in Subsection 3.2 an alternative
approach using tools from the theory of random matrices.
In particular, we derive stability conditions in terms of the
largest eigenvalue of a matrix whose size depends linearly
on the number of nodes. In Subsection 3.3, we extend our re-
sults from continuous-time Markov processes to spreading
processes modeled as discrete-time Markov chains.
4
3.1 Stability Conditions: Exponential Matrix Size
In this subsection, we show that the result in [37, Theo-
rem 7.1] based on the direct application of the Ito formula
for jump processes results in stability conditions that are
not well-suited for large-scale graphs. We illustrate this idea
through the analysis of the stability of the spread when
G is an AMAI random graph process. For simplicity in
our exposition, we here temporarily assume that all the
processes σij are Markovian; i.e., the mappings gij are the
identities.
To state our claims, we need to introduce the follow-
ing notations. Let G be an AMAI random graph process
(Definition 2.4). Let E be the set of (time-varying) directed
edges in G (i.e., those directed edges such that σij is not
the zero stochastic process). Let m = E be the number of
diedges in G and label the diedges using integers 1, . . . , m.
Recall that these edges are not always present in the graph,
but they appear (link is ‘on’) and disappear (link is ‘off’)
according to a collection of aggregated-Markov processes.
Therefore, at a particular time instant, only a subset of the
edges in E are present in the graph. The set of present edges
can be represented by an element of {0, 1}m, since we have
m possible edges that can be either ‘on’ of ‘off’. In other
words, at a particular time, the contact network is one of the
2m possible subgraphs of G.
To analyze the resulting dynamics, we consider the
set of 2m possible subgraphs of G and label them using
integers {1, . . . , 2m}. We define the one-to-one function
χ : {1, . . . , 2m} → {0, 1}m, as the function that maps a
particular subgraph of G into the binary string in {0, 1}m
that indicates the subset of present edges in the subgraph.
For the subgraph labeled (cid:96), we denote by χ(cid:96) the corre-
sponding binary sequence and by χ(cid:96)(k) the k-th entry in
this sequence. In other words, χ(cid:96)(k) = 1 means that the
edge labeled k in G is present in the subgraph labeled (cid:96).
Furthermore, we denote by F(cid:96) ∈ {0, 1}n×n the adjacency
matrix representing the structure of the subgraph labeled (cid:96).
Given two labels (cid:96), (cid:96)(cid:48) ∈ [2m], define the edit dis-
tance d((cid:96), (cid:96)(cid:48)) to be the minimum number of links that
must be added and/or
removed from the subgraph
the subgraph labeled (cid:96)(cid:48),
labeled (cid:96) to construct
i.e.,
d((cid:96), (cid:96)(cid:48)) = {k ∈ [m] : χ(cid:96)(k) (cid:54)= χ(cid:96)(cid:48)(k)}. If d((cid:96), (cid:96)(cid:48)) = 1 (i.e.,
the subgraphs differ in a single diedge), we define k(cid:96),(cid:96)(cid:48) as
the (only) index k such that χ(cid:96)(k) (cid:54)= χ(cid:96)(cid:48)(k) (i.e., the label of
the single edge that must added/removed). Finally, assume
that the transition probabilities of the Markov process σij
((i, j) ∈ E) are given by
Pr(σij(t + h) = 1 σij(t) = 0) = uijh + o(h),
Pr(σij(t + h) = 0 σij(t) = 1) = vijh + o(h),
for some nonnegative constants uij and vij. We define
u(k) = uikjk and v(k) = vikjk for each k ∈ [m].
Under the above notations, the following stability condi-
tion readily follows from [37, Theorem 7.1]:
Proposition 3.1. Let G be an AMAI random graph process.
Define Π ∈ R2m×2m entry-wise, as follows. For (cid:96) (cid:54)= (cid:96)(cid:48),
if d(χ(cid:96), χ(cid:96)(cid:48)) = 1 and χ(cid:96)(k(cid:96),(cid:96)(cid:48)) = 0,
if d(χ(cid:96), χ(cid:96)(cid:48)) = 1 and χ(cid:96)(k(cid:96),(cid:96)(cid:48)) = 1,
otherwise.
u(k(cid:96),(cid:96)(cid:48)),
v(k(cid:96),(cid:96)(cid:48)),
0,
Π(cid:96)(cid:96)(cid:48) =
For (cid:96) = (cid:96)(cid:48), we let Π(cid:96)(cid:96) = −(cid:80)
(cid:96)(cid:48)(cid:54)=(cid:96) Π(cid:96)(cid:96)(cid:48). Then, for every i,
the probability that i is infected at time t in the HeNeSIS
model converges to zero exponentially fast as t → ∞ if
the (n2m) × (n2m) matrix
2m(cid:77)
Π ⊗ In +
(4)
where ⊗ denotes the Kronecker product of matrices, is
Hurwitz stable.
As stated before, this stability condition is not applicable
to large-scale networks, since it requires the computation of
the eigenvalue with the largest real part of a matrix whose
size increases exponentially with the number of edges in the
graph G. In the following subsection, we present alternative
stability conditions that are better-suited for stability analy-
sis of large networks.
(BF(cid:96) − D),
(cid:96)=1
3.2 Stability Analysis: Linear Matrix Size
In this subsection, we present sufficient conditions for al-
most sure exponential stability of the disease-free equilib-
rium of Σ when the underlying time-varying network is
described by an AMEI (or AMAI) random graph process.
For clarity in our exposition, we state and discuss our main
results in this section, leaving the details of the proofs for
Subsections 5.1 and 5.2.
We now state our main results. Let us consider two pos-
itive constants b and d, and define the decreasing function
κb,d : [0,∞) → (0, n] by
(cid:18) bs + d
(cid:19)− bs+d
b2
κb,d(s) = nes/b
d
,
(5)
where n is the number of the nodes in the network. The fol-
lowing theorem provides conditions for a spreading process
taking place in an AMAI random graph process to be almost
surely exponentially stable.
Theorem 3.2. Let G be an irreducible AMAI random graph
process and define ¯A ∈ Rn×n component-wise, as fol-
lows
Let ¯β = max1≤i≤n βi,
∆1 = max
1≤i≤n
¯Aij = lim
t→∞ Pr(Aij(t) = 1).
δ = min1≤i≤n δi, and
¯
¯Aij(1 − ¯Aij) + β2
j
¯Aji(1 − ¯Aji)(cid:1) ,
(cid:0)β2
i
(6)
n(cid:88)
j=1
c1 = µ(B(sgn ¯A) − D) − κ−1
(1)
,
¯β,∆1
2
δ + 2c−
¯s1 = 2
1 .
¯
Define
τA = maximize
s∈(κ
−1
¯β,∆1
(1),¯s1]
(cid:32)
− s + 2c1κ ¯β,∆1(s)
2(1 − κ ¯β,∆1(s))
If
µ(B ¯A − D) < τA,
(cid:33)
.
(7)
(8)
then the disease-free equilibrium of Σ is almost surely
exponentially stable with a decay rate greater than or
equal to
−µ(B ¯A − D)(cid:0)1 − κ ¯β,∆1(s∗)(cid:1) − (s∗/2) − c1κ ¯β,∆1 (s∗),
5
where s∗ denotes the optimal value of s in the maximiza-
tion problem (7).
Proof: See Subsection 5.1.
Remark 3.3. The existence of the limit in (6) is guaran-
teed by the irreducibility of G as will be discussed
in Subsection 5.1, where we will also give an explicit
representation of the limit.
The major computational cost for checking the stability
condition in (8) comes from that of finding the matrix
measure µ(B ¯A − D). Since the matrix B ¯A − D has size n,
we can compute µ(B ¯A − D) in O(nm2) operations using
Lanczos’s algorithm [43], where n and m are the number of
nodes and diedges in G. In contrast, computing the dom-
inant eigenvalue of the n2m-dimensional matrix in (4) re-
quires O(nm22m) operations, since this matrix has O(m2m)
nonzero entries. Therefore, the result in Theorem 3.2 (based
on random graph-theoretical results) represents a major
computational improvement with respect to the result in
Proposition 3.1 (based on a direct application of the Ito
formula for jump processes [37]).
Above, we have analyzed the stability of spread-
ing processes in aggregated-Markovian arc-independent
(AMAI) networks. In the rest of the subsection, we derive
stability conditions for spreading processes taking place
in aggregated-Markovian edge-independent (AMEI) net-
works. The next theorem is the AMEI counterpart of The-
orem 3.2.
Theorem 3.4. Let G be an irreducible AMEI random graph
process. Let
n(cid:88)
(cid:0)βiβj ¯Aij(1 − ¯Aij)(cid:1) ,
j=1
∆2 = max
1≤i≤n
c2 = η(B(sgn ¯A) − D) − κ−1
¯β,∆2
¯s2 =
δ + c−
2 .
¯
(1),
(cid:32)
(9)
(cid:33)
.
(10)
(11)
Define
If
τE = maximize
s∈(κ
−1
¯β,∆2
(1),¯s2]
− s + c2κ ¯β,∆2 (s)
1 − κ ¯β,∆2(s)
η(B ¯A − D) < τE,
then the disease-free equilibrium of Σ is almost surely
exponentially stable with a decay rate greater than or
equal to
− η(B ¯A− D)(cid:0)1 − κ ¯β,∆2(s∗)(cid:1)− s∗ − c2κ ¯β,∆2 (s∗), (12)
where s∗ denotes the optimal value of s in the maximiza-
tion problem (10).
Proof: See Subsection 5.2.
Theorems 3.2 and 3.4 provide threshold conditions for
stability of spreading processes in time-varying networks
when agents present heterogeneous infection and recovery
rates, βi and δi, respectively. In the particular case of net-
works with homogeneous rates, i.e., βi = β and δi = δ
for all i, our results have an appealing interpretation that
can be related with existing results in the literature. The
following theorem states a threshold stability condition in
the homogeneous case:
Theorem 3.5. Let G be an irreducible AMEI random graph
process. Assume that βi = β > 0 and δi = δ > 0 for all
i ∈ [n]. Let
n(cid:88)
(cid:0) ¯Aij(1 − ¯Aij)(cid:1) ,
∆3 = max
1≤i≤n
c3 = η(sgn ¯A) − κ−1
j=1
(1),
1,∆3
(13)
¯s3 =
+ c−
3 .
δ
β
Define
ξH = maximize
s∈(κ
−1
1,∆3
(1),¯s3]
If
1 − (β/δ) (s + c3κ1,∆3(s))
1 − κ1,∆3 (s)
.
(14)
β
δ
<
ξH
η( ¯A)
,
(15)
then the disease-free equilibrium of Σ is almost surely
exponentially stable with decay rate greater than or
equal to
(δ/β) − η( ¯A) − s∗ − (c3 − λ3)κ1,∆3 (s∗),
where s∗ denotes the optimal value of s in the optimiza-
tion problem (14). Moreover, if
≥
β
δ
1
η(sgn ¯A)
,
(16)
then ξH < 1.
Proof: See Subsection 5.2.
Remark 3.6. Since A(t) ≤ sgn ¯A entry-wise for every
t ≥ 0, the solution of Σ is always upper-bounded
the deterministic differential equation
by that of
p(t) = (β sgn ¯A − δI)p(t), whose solution converges to
zero as t → ∞ if and only if β/δ < 1/η(sgn ¯A). There-
fore, if the inequality (16) is false, then the disease-free
equilibrium of Σ is almost surely exponentially stable
and, hence, we do not need to check condition (15).
In other words, condition (16) guarantees that stability
analysis of Σ is not a trivial problem.
As shown in Subsection 2.2, the epidemic threshold in a
static network of agents with homogeneous rates is given by
β/δ < 1/η(A). Condition (15) provides a similar epidemic
threshold for time-varying networks in terms of the spectral
abscissa of ¯A, which can be interpreted as an aggregated
static network based on long-time averages. Furthermore,
ξH is a multiplicative factor that modifies the epidemic
threshold corresponding to the aggregated static network.
Below, we derive explicit expressions of η( ¯A) for a few
particular examples of time-varying graph models found in
the literature:
Example 3.7 (Dynamic small-world networks). We con-
sider a time-varying version of the small-world network
model studied in [44]. The network consists of n nodes
and n static edges in the set E0 = {(1, 2), (2, 3), . . . , (n −
1, n), (n, 1)} (see Fig. 2). Apart from these static edges,
we also consider a collection of dynamic edges that
switch on and off over time. In particular, we allow
(cid:54)= j) to be
any other pair of nodes (i, j) /∈ E0 (i
6
Fig. 2. Dynamic small-world network. Solid lines represent static edges,
while dashed lines represent
temporarily active edges modeled by
aggregated-Markov processes.
dynamically connected according to an irreducible ag-
gregated Markov process aij = gij(θij). For simplicity
in our analysis, we assume that the stationary proba-
bility of an edge (i, j) /∈ E0 being active, defined by
rij = limt→∞ Pr(aij(t) = 1), equals a constant r > 0
independent of i and j. In this case, the matrix ¯A takes
the form
0,
¯Aij =
if i = j,
if (i, j) ∈ E0,
1,
r, otherwise.
The spectral abscissa of ¯A is given by 1 + r(n− 2). There-
fore, the stability condition (15) reads β/δ < ξH /(1 +
r(n − 2)).
Example 3.8 (Edge-Markovian graph). In this example, we
consider the edge-Markovian graph model proposed
in [27]. In this model, all the undirected edges (i, j)
(i < j) are time-varying and modeled by independent
{0, 1}-valued Markov processes θij sharing the same
activation rate q > 0 and de-activation rate r > 0. In
this case, we have
(cid:40)
¯Aij =
0,
q/(q + r), otherwise,
if i = j,
and therefore η( ¯A) = (n − 1)q/(q + r). The stability
condition (15) hence reads β/δ < ξH (q + r)/((n − 1)q).
In what follows, we elaborate on the behavior of the
factor ξH. In particular, we will analyze its dependence on
∆3 defined in (13). Notice that ∆3 is zero when ¯Aij is either
0 or 1 for all pairs (i, j), which corresponds to the case of
a static, deterministic graph G. In contrast, the maximum
value of ∆3 is achieved when ¯Aij = 1/2, i.e., edges are
either ‘on’ or ‘off’ with equal probability (asymptotically).
Therefore, the term ∆3 can be interpreted as a measure
of structural variability,
in the long run. In Fig. 3, we
illustrate the behavior of the factor ξH as we modify the
network size n, the epidemic ratio δ/β, and the uncertainty
measure ∆3. We observe that the smaller the value of ∆3,
the larger the value of ξH. In other words, as we reduce
the structural variability (i.e., we reduce ∆3), we obtain a
better approximation using an aggregated static model (i.e.,
ξH approaches 1). Furthermore, notice that the value of ξH
tends to 1 as n increases. This indicates that the aggregated
static network approximates the epidemic threshold more
accurately as the network grows.
7
(a)
(b)
(c)
Fig. 3. Plots of ξH as δ/β and ∆3 vary for the following cases: (a) n = 100 and η(sgn ¯A) = 10, (b) n = 1, 000 and η(sgn ¯A) = 100, and (c)
n = 10, 000 and η(sgn ¯A) = 1, 000.
In this section, we have introduced our main theoretical
results, namely, we have studied the epidemic threshold in
the wide class of aggregated-Markovian random graph pro-
cesses. Before we illustrate our results with some numerical
simulations in Section 4, we will discuss the case when the
epidemics is modeled as a discrete-time stochastic process.
3.3 Discrete-Time Epidemic Dynamics
In this subsection, we briefly present a discrete-time ver-
sion of the stability analysis provided above. We define a
discrete-time dynamic random graph as a stochastic pro-
cess G = {G(k)}∞
k=0 taking values in the set of directed
graphs with n nodes. In the discrete-time case, aggregated-
Markovian edge- and arc-independent dynamic random
graphs are defined in the same way as in the continuous-
time case. Let us consider the discrete-time epidemic model
in (3) taking place in the dynamics random graph G. The
resulting dynamics is described in the following stochastic
difference equation:
Σd : p(k + 1) = (BA(k) + I − D)p(k),
where A(k) denotes the adjacency matrix of G(k).
We define almost sure exponential stability of
the
disease-free equilibrium of Σd in the same way as we did
for the continuous-time case:
Definition 3.9. Let G be a discrete-time edge-independent
dynamic random graph. We say that the disease-free
equilibrium of Σd is almost surely exponentially stable if
there exists λ > 0 such that
(cid:18)
Pr
log(cid:107)p(k)(cid:107)
k
lim sup
k→∞
≤ −λ
= 1
(cid:19)
for all p(0) = p0 ∈ [0, 1]n and σij(0) = σij,0 (1 ≤ i <
j ≤ n). We call the supremum of λ satisfying the above
condition the decay rate.
For simplicity in our exposition, we focus only on the
edge-independent case (AMEI graph process), since the
analysis is identical for the arc-independent case. The next
theorem provides a sufficient condition for almost sure
exponential stability of the disease-free equilibrium of Σd.
Theorem 3.10. Consider an irreducible and aperiodic2 AMEI
random graph process G in discrete-time. Let λ4 =
η(B ¯A + I − D) and Mmax = B(sgn ¯A) + I − D. Define
(cid:19)κ ¯β,∆2
(cid:33)
(s) − s
,
(17)
τD = maximize
0≤s≤1−λ4
λ4
η(Mmax)
(cid:32)(cid:18)
where ∆2 is defined in (9). If
λ4 < τD,
(18)
then the disease-free equilibrium of Σd is almost surely
exponentially stable with decay rate greater than or
equal to
γD = − log(λ4 + s∗) − κ ¯β,∆2(s∗) log
(19)
where s∗ denotes the value of s giving the solution to
the optimization problem (17).
η(Mmax)
λ4
,
Proof: See Subsection 5.3.
4 NUMERICAL SIMULATIONS
In this section, we illustrate the effectiveness of our results
with numerical simulations. In our illustrations, we consider
a discrete-time edge-independent dynamic random graph G
with n nodes. This random graph process is specified by the
two following rules:
2)
1) Construct an undirected Erdos-R´enyi random graph
over the nodes of G [45]. Denote the resulting n × n
adjacency matrix by A.
If Aij = 1, then nodes i and j are connected in G
via a stochastic link described by a {0, 1}-valued
time-homogeneous Markov chain σij. The transi-
tion probability from 0 to 1 in this Markov process
is given by qij ≥ 0; while the transition probability
from 1 to 0 is given by rij ≥ 0. If Aij = 0, then
nodes i and j are not connected in G at any time.
One can easily deduce that, according to the second rule,
¯Aij = ¯Aji = qij/(rij + qij) if Aij = 1. In the following
simulations, we let n = 500 and consider a realization of an
2. We say that an AMEI random graph process in discrete-time is
aperiodic if all the aggregated Markov processes in the adjacency matrix
of the graph are the images of aperiodic Markov chains.
δ/β0510ξH00.51∆30510152025δ/β050100ξH00.51∆3050100150200250δ/β05001000ξH00.51∆3050010001500200025008
Fig. 4. The upper bound γD of decay rates. Red dashed line shows the
epidemic threshold given by Theorem 3.10.
Fig. 5. The averaged numbers of the infected nodes at time k = 1000
versus β. Red dashed line: Epidemic threshold predicted by Theo-
rem 3.10. Blue dotted line: Epidemic threshold predicted by using ag-
gregated static network ¯A.
(a) β = 6.0 × 10−4
(b) β = 7.5 × 10−4
(c) β = 9.0 × 10−4
Fig. 6. Sample paths of the number of infected nodes for different values of β.
the Erdos-R´enyi graph with an edge probability of 0.2 (in
step 1 above). The values of the transition probabilities rij
(in step 2 above) are heterogeneous over the links of the
Erdos-R´enyi graph. In particular, we have chosen for rij a
collection of random values from the Gaussian N (1/2, 1/8),
where we have truncated those values rij > 1 to rij = 1,
and rij < 0 to rij = 0. Finally, we let qij = 1 − rij.
We consider a discrete-time spreading process with ho-
mogeneous infection and recovery rates, i.e., βi = β and
δi = 0.05 for all i. Using Theorem 3.10, we deduce that the
disease-free equilibrium of Σd is almost surely exponentially
stable if β < 6.32 × 10−4. The upper bound γD of the
decay rate versus β is shown in Fig. 4. In order to check
the accuracy of this epidemic threshold, we compare this
threshold with the one obtained from the following simula-
tion. We simulate the spreading process over the dynamic
random graph described above for various values of β.
For each value of β, we generate 500 sample paths of the
spreading process. In this simulation, we prevent a spread-
ing process from dying out by re-infecting a randomly
chosen node immediately after the infection process dies
(i.e., when all the nodes become susceptible). A similar re-
infection mechanism is employed for simulating spreading
processes over static networks [46]. After the simulation, we
compute the averaged number of infected nodes y∗ at time
k = 1, 000. This is the meta-stable number of infected nodes
when re-infection of nodes is allowed. We then determine
the metastable number of infected nodes in the original
spreading process without reinfection as z∗ = y∗ − 1, where
the subtraction of one compensates the effect of re-infection.
Finally, we define the empirical epidemic threshold β∗ as
the maximum value of β such that z∗ < 1.
Fig. 5 shows the value of z∗ as β varies. We see that
the above defined empirical threshold β∗ lies between
7.2 × 10−4 and 7.5 × 10−4, confirming that our condition
indeed gives a sufficient condition for stability. On the other
hand, the epidemic threshold based on the aggregated static
network ¯A (i.e., the supremum of β such that β/δ < 1/η( ¯A))
is 9.95 × 10−4 and, therefore, overestimates the actual epi-
demic threshold. In Fig. 6, we show multiple realizations of
the sample paths used to obtain Fig. 5 for β = 6.0 × 10−4,
7.5 × 10−4, and 9.0 × 10−4.
5 PROOFS OF MAIN RESULTS
This section presents the proofs of the theorems presented
in Section 3.
5.1 Proof of Theorem 3.2
We begin by recalling a basic result on the stability analysis
of a class of stochastic differential equations called switched
linear systems. Let σ = f (θ) be an aggregated Markov
process defined by the mapping f : Λ → Γ and a Markov
process θ with state space Λ. For each γ ∈ Γ, there is an
associated state matrix Aγ ∈ Rn×n. An aggregated Markov
β×10-412345678γD00.10.20.3β×10-434567891011z∗0102030k05001000Infectednodes01002003004008001000050k05001000Infectednodes01002003004008001000050k05001000Infectednodes01002003004008001000050jump linear system is defined by the following stochastic
differential equation
x(t) = Af (θ(t))x(t),
(20)
where x(0) = x0 ∈ Rn and θ(0) = θ0 ∈ Λ. We remark
that, if f is the identity mapping, then the system in (20) is
a Markov jump linear system [47]. We say that the system
in (20) is almost surely exponentially stable if there exists λ > 0
such that Pr(lim supt→∞ t−1 log(cid:107)x(t)(cid:107) ≤ −λ) = 1 for all x0
and θ0. The supremum of λ satisfying the above condition
is called the decay rate. In order to prove Theorem 3.2, we
will need the following criterion for almost sure exponential
stability of aggregated Markov jump linear systems.
Lemma 5.1. Assume that θ is an irreducible Markov process
and let π be its unique stationary distribution. Assume
that
E(cid:2)µ(Af (π))(cid:3) < 0.
(21)
Then, the aggregated Markov jump linear system in (20)
is almost surely exponentially stable with a decay rate
greater than or equal to −E[µ(Af (π))].
Proof: The above statement is known to be true for
Markov jump linear systems [48, Theorem 4.2], i.e., when f
is the identity mapping. Let us now consider an arbitrary
function f. Define Bλ = Af (λ) for each λ ∈ Λ. Then, we
see that the system in (20) is equivalent to the Markov jump
linear system x(t) = Bθ(t)x(t), for which we can guarantee
almost sure exponential stability with decay rate grater than
or equal to −E[µ(Bπ)] > 0 via the condition E[µ(Bπ)] < 0
[48, Theorem 4.2]. This condition is equivalent to (21) by the
definition of Bλ.
Using Lemma 5.1, we can prove the following prelimi-
nary result, which will be useful in the proof of Theorem 3.2.
Proposition 5.2. Consider an irreducible AMAI random
graph process G. For all distinct and ordered pairs
(i, j) ∈ [n]2, let hij be an independent Bernoulli random
variable with mean ¯Aij. Define the random matrix
M1 = −D +
βihijEij,
(22)
n(cid:88)
(cid:88)
i=1
j(cid:54)=i
where Eij denotes the {0, 1}-matrix whose entries are
all zero except its (i, j)-entry. If E[µ(M1)] < 0, then,
the infection-free equilibrium of Σ is almost surely ex-
Proof: Define the direct product θ = (cid:78)n
ponentially stable with decay rate greater than or equal
to −E[µ(M1)].
(cid:78)
(cid:78)n
j(cid:54)=i θij,
which is a stochastic process with state space Λ =
j(cid:54)=i Λij. Define f : Λ → {0, 1}n(n−1) by (f (λ))ij =
fij(λij). Also, for γ = (γij)i,j ∈ {0, 1}n(n−1), define the
matrix
(cid:78)
i=1
i=1
Fγ =
γijEij.
(23)
j(cid:54)=i
i=1
i=1
Then,
(cid:80)
(cid:80)n
from Definition 2.4, we
that A(t) =
j(cid:54)=i σij(t)Eij = Fσ(t) = Ff (θ(t)). Therefore, we can
rewrite ¯Σ as the aggregated Markov jump linear system
Σ1 : p(t) = (BFf (θ(t)) − D)p(t).
By the irreducibility of G, each time-homogeneous
Markov process θij has a unique stationary distribu-
tion πij on Λij. Then, the unique stationary distribution
see
n(cid:88)
(cid:88)
9
of θ is π =(cid:78)n
(cid:78)
i=1
j(cid:54)=i πij. Therefore, by Lemma 5.1, if
E[µ(BFf (π) − D)] < 0, then Σ1 = Σ is almost surely
exponentially stable with decay rate greater than or equal
to −E[µ(BFf (π) − D)]. Therefore, to complete the proof of
the proposition, we need to show that
BFf (π) − D = M1,
(24)
in the sense that the random matrices appearing in the both
sides of the equation share the same probability distribution.
From (23) and the definition of the matrix B, we have
βifij(πij)Eij.
(25)
BFf (π) − D = −D +
(cid:16)
Pr (fij(πij) = 1) = πij
n(cid:88)
(cid:88)
i=1
j(cid:54)=i
(cid:17)
(cid:16)
ij ({1})
f−1
Since fij maps into {0, 1}, the random variable fij(πij) is
the Bernoulli random variable with mean equal to
(cid:17)
= lim
θij(t) ∈ f−1
t→∞ Pr
t→∞ Pr(σij(t) = 1)
ij ({1})
= lim
= ¯Aij,
where we used Lemma 2.1. Moreover, all the random vari-
ables fij(πij) (i, j ∈ [n], i (cid:54)= j) are independent of each other
because G is arc-independent. From these observations and
the equation (25), we obtain (24), as desired.
In order to complete the proof of Theorem 3.2, we need
the following result from the theory of random graphs
concerning the maximum eigenvalue of the sum of random
symmetric matrices.
Proposition 5.3 ([49]). Let X1, . . . , XN be independent ran-
dom n × n symmetric matrices. Let C be a nonnegative
constant such that (cid:107)Xk − E[Xk](cid:107) ≤ C for every k ∈ [N ]
k=1 Var(Xk)(cid:107).
with probability one. Also let v2 = (cid:107)(cid:80)N
Then the sum X =(cid:80)N
k=1 Xk satisfies
Pr (η(X) > η(E[X]) + s) ≤ κC,v2(s)
(26)
for every s ≥ 0 (where κb,d(s) was defined in (5)).
(cid:18)
Proof: Let s ≥ 0 be arbitrary. Under the assumptions
(cid:19)
stated in the proposition, it is shown in [49] that, for every
θ > 0,
Pr (η(X) > η(E[X]) + s) ≤ n exp
,
where g is defined by g(x) = 2x−2(ex − x − 1) for
x > 0. It is easy to show that the right hand side of the
inequality takes its minimum value with respect to θ when
θ = (1/C) log(1 + (Cs/v2)). Substituting this particular
value of θ into the inequality, we readily obtain (26).
g(Cθ)θ2v2
−θs +
1
2
In order to complete the proof of Theorem 3.2, we also
need the next lemma concerning Metzler matrices.
Lemma 5.4 ([50, Lemma 2]). Let A and B be Metzler
matrices. If A ≤ B, then we have η(A) ≤ η(B) and
µ(A) ≤ µ(B).
We can now provide a proof of Theorem 3.2.
Proof of Theorem 3.2: Let λ1 = µ(B ¯A − D) and define
X = M1 + M(cid:62)
1 − 2λ1I − κ−1
¯β,∆1
(1)I. Notice that
η(E[X]) = −κ−1
¯β,∆1
(1),
(27)
1 ]) = 2µ(E[M1]) = 2µ(B ¯A − D) =
because η(E[M1 + M(cid:62)
2λ1 by (24). Also, from the definition of M1 in (22), we have
(cid:16)−2λ1I − 2D − κ−1
X =
(cid:17)
n(cid:88)
(cid:88)
i=1
j(cid:54)=i
(1)I
+
¯β,∆1
Xij,
where Xij = βi(Eij + Eji)hij (i, j ∈ [n] and i (cid:54)= j)
are random, independent symmetric matrices. We then ap-
ply Proposition 5.3 to the random matrix X, for which
we choose C = ¯β. Clearly, the first constant term of X
has zero variance, while a simple computation shows that
Var(Xij) = β2
i
v2 =
=
i=1
β2
i
j(cid:54)=i
(cid:13)(cid:13)(cid:13)(cid:13)
¯Aij(1 − ¯Aij)(Eii + Ejj)
(cid:13)(cid:13)(cid:13)(cid:13) n(cid:88)
¯Aij(1 − ¯Aij)(Eii + Ejj). Therefore
(cid:88)
(cid:13)(cid:13)(cid:13)(cid:13) n(cid:77)
(cid:18) n(cid:88)
Pr(cid:0)η(X) > −κ−1
(1) + s(cid:1) ≤ κ ¯β,∆1 (s)
¯Aij(1 − ¯Aij) + β2
¯Aji(1 − ¯Aji)
β2
i
j=1
j
¯β,∆1
i=1
= ∆1.
Combining (26), (27), and (28), we obtain the estimate
(28)
(29)
(cid:19)(cid:13)(cid:13)(cid:13)(cid:13)
(1).
for s > κ−1
¯β,∆1
Let (Ω,F, Pr) be the fundamental probability space and
(1) + s}
consider the set Ωs = {ω ∈ Ω : η(X) > −κ−1
¯β,∆1
(1). If ω /∈ Ωs, then η(X) ≤ −κ−1
for s > κ−1
(1) + s
¯β,∆1
¯β,∆1
vacuously. On the other hand, if ω ∈ Ωs, then Lemma 5.4
gives the obvious estimate
η(X) ≤ 2µ(B(sgn ¯A) − D) − 2λ1 − κ−1
¯β,∆1
(1)
because M1 ≤ −D +(cid:80)n
= 2c1 − 2λ1
i=1
(cid:80)
j(cid:54)=i βiEij = B(sgn ¯A) − D.
Therefore, from (29) it follows that
E[η(X)]
≤(−κ−1
¯β,∆1
≤ − κ−1
¯β,∆1
(1) + s) Pr(Ω\Ωs) + (2c1 − 2λ1) Pr(Ωs)
(1) + s + (2c1 − 2λ1)κ ¯β,∆1 (s).
(30)
(31)
2(cid:0)1 − κ ¯β,∆1(s∗)(cid:1) λ1 < −s∗−2c1κ ¯β,∆1(s∗). Therefore, when
By the definition of the random matrix X, this inequality
implies that
2E[µ(M1)] ≤ 2λ1(1 − κ ¯β,∆1(s)) + s + 2c1κ ¯β,∆1(s).
Now we assume that condition (8)
in the theo-
rem holds. Then, there exists s∗ > κ−1
(1) such that
¯β,∆1
s = s∗, the inequality (31) yields that E[µ(M1)] ≤ λ1(1 −
κ ¯β,∆1(s∗)) + (s∗/2) + c1κ ¯β,∆1(s∗) < 0 and hence we can
complete the proof of Theorem 3.2 by Proposition 5.2.
Remark 5.5. The upper bound ¯s1 of the interval in the
maximization problem (7) does not play any role in
the proof of Theorem 3.2. In fact, the theorem holds
true even if we replace the interval with the infinite
(1),∞). The reason why we introduce the
interval (κ−1
¯β,∆1
upper bound is that 1) it makes it easy for us to find
the maximum and 2) it does not introduce conserva-
tiveness. To prove the second statement, it is sufficient
to show that the objective function in (7) is less than
µ(B ¯A − D) if s > κ−1
(1) and s > ¯s1. From the
¯β,∆1
former inequality, we obtain 0 < κ(s) < 1. Also, notice
the that from Lemma 5.4 there follows the inequality
−
δ = µ(−D) ≤ µ(B ¯A − D). Therefore, we can estimate
¯
the objective function as
10
− s + 2c1κ ¯β,∆1(s)
2(1 − κ ¯β,∆1 (s))
< − s
2
− ¯s1
+ c−
2
− c1κ ¯β,∆1 (s) ≤
1 = −
δ ≤ µ(B ¯A − D),
¯
as desired. We can justify the upper bounds ¯s2 and ¯s3
in the maximization problems (10) and (14) in the same
way.
Remark 5.6. It can be easily verified that the proof of
Theorem 3.2 still holds true even if we define c1 to
be µ(B(sgn ¯A) − D). However, the inclusion of the
term −κ−1
(1)/2 into c1, as was done in the theorem,
¯β,∆1
makes the maximum in condition (8) larger, and hence
can reduce the conservativeness of this condition.
5.2 Proof of Theorems 3.4 and 3.5
In this subsection, we prove Theorems 3.4 and 3.5 for the
edge-independent case in this subsection. We begin with the
following analogue of Proposition 5.2.
Proposition 5.7. Consider an irreducible AMEI random
graph process G. Let hij (1 ≤ i < j ≤ n) be independent
Bernoulli random variables with mean ¯Aij. Define the
random matrix
n(cid:88)
(cid:88)
(cid:113)
M2 = −D +
If
βiβj(Eij + Eji)hij.
i=1
j>i
E[η(M2)] < 0,
(32)
n(cid:88)
(cid:88)
then, the disease-free equilibrium of Σ is almost surely
Proof: Define the direct product θ = (cid:78)n
exponentially stable with decay rate greater than or
equal to −E[η(M2)].
(cid:78)
(cid:78)n
j>i θij,
which is a Markov process having the state space Λ =
j>i Λij. Also, define g : Λ → {0, 1}n(n−1)/2 by
(g(λ))ij = gij(λij). For γ = (γij)i,j ∈ {0, 1}n(n−1)/2, define
the matrix
(cid:78)
i=1
i=1
(33)
Gγ =
Then, we can show that A = (cid:80)n
i=1
j>i
(cid:80)
γij(Eij + Eji).
i=1
j>i σij(Eij + Eji) =
Gσ = Gg(θ) by Definition 2.2. Moreover, g(θ) is an aggre-
gated Markov process, since θ is a Markov process. Hence,
we can rewrite Σ as the aggregated Markov jump linear
system p(t) = (BGg(θ(t))− D)p(t). The state transformation
−1/2
x (cid:55)→ B−1/2x, where B−1/2 = diag(β
),
n
shows that almost sure exponential stability of this system
is equivalent to almost sure exponential stability of the
following aggregated Markov jump linear system:
Σ2 : p(t) = (B1/2Gg(θ(t))B1/2 − D)p(t).
−1/2
1
, . . . , β
prove
almost
sure
it
To
of
Σ2, by Lemma 5.1,
to prove that
E[η(B1/2Gg(π)B1/2 − D)] < 0, where we have used
the fact that η(A) = µ(A) for a symmetric matrix A. On
the other hand, in the same way as we did in the proof
exponential
sufficient
stability
is
of Proposition 5.2, we can prove that random matrices
B1/2Gg(π)B1/2 − D and M2 have the same probability
distribution. Therefore, condition (32)
to
guarantee almost sure exponential stability of Σ2 and
hence of Σ. Moreover, from the above argument,
it is
straightforward to see that the decay rate of the almost sure
exponential stability is greater than or equal to −E[η(M2)].
This completes the proof of the proposition.
is sufficient
Let us prove Theorem 3.4.
Proof of Theorem 3.4: Let λ2 = η(B ¯A − D) and define
X = M2 − λ2I − κ−1
¯β,∆2
(1)I
(cid:16)−λ2I − D − κ−1
(cid:17)
n(cid:88)
(cid:88)
=
i=1
j>i
+
(1)I
Xij,
¯β,∆2
where Xij = (cid:112)βiβj(Eij + Eji)hij. We now apply Propo-
(1) + s(cid:1) ≤ κ ¯β,∆2(s).
from (26) we obtain Pr(cid:0)η(X) > −κ−1
sition 5.3 to the random matrix X, for which we choose
C = ¯β. Also,
in the same way as we derived (28),
we can show v2 = ∆2. Since η(E[X]) = −κ−1
(1),
¯β,∆2
Then, in the same way as we derived (30), we can show
E[η(X)] ≤ −κ−1
(1)+s+(c2−λ2)κ ¯β,∆2 (s), which implies
¯β,∆2
E[η(M2)] ≤ λ2(1 − κ ¯β,∆2 (s)) + s + c2κ ¯β,∆2 (s). Using this
inequality and Proposition 5.7, in the same way as we did in
the proof of Theorem 3.2, we can show that condition (11) in
the theorem is indeed sufficient for almost sure exponential
stability of the disease-free equilibrium of Σ with decay rate
greater than or equal to (12).
¯β,∆2
Finally, we give an outline of the proof of Theorem 3.5
for M3 = (cid:80)n
below.
Proof of Theorem 3.5: Consider an irreducible AMEI
random graph process G. Assume homogeneous spreading
and recovery rates, βi = β > 0 and δi = δ > 0 for all
i. In the same way as we did in the proofs of Proposi-
tions 5.2 and 5.7, we can show that if η(E[M3]) < δ/β
j>i(Eij + Eji)hij, then the disease-free
equilibrium of Σ is almost surely exponentially stable with
decay rate greater than or equal to (δ/β) − η(E[M3]). Let
λ3 = η( ¯A) and define X = M3 − λ3I − κ−1
(1). Applying
Proposition 5.3 to the random matrix X, we obtain
(cid:80)
1,∆3
i=1
E[η(X)] ≤ −κ−1
1,∆3
(1) + s + (c3 − λ3)κ1,∆3(s).
Therefore, E[η(M3)] ≤ λ3 +s+(c3−λ3)κ1,∆3(s). Using this
inequality and the assumption (15), we can actually show
η(E[M3]) < δ/β and therefore the almost sure exponential
stability of Σ in the same way as the proofs of Theorems 3.2
and 3.4. We omit the details of the derivation of the lower
bound (19) of the decay rate. Also, it is straightforward to
show that (16) implies ξH < 1. This completes the proof of
the theorem.
5.3 Proof of Theorem 3.10
In this subsection, we give the proof of Theorem 3.10 for
spreading processes running in discrete-time. In order to
prove this theorem, we need to recall some facts regarding
the stability of switched linear systems. Let σ = f (θ) be an
aggregated Markov chain defined by the mapping f : Λ →
Γ and a Markov chain σ with state space Λ. Let us define
a state matrix Aγ ∈ Rn×n for each γ ∈ Γ. A discrete-time
aggregated-Markov jump linear system is described by the
stochastic difference equation
x(k + 1) = Af (θ(k))x,
(34)
11
where x(0) = x0 and θ(0) = θ0. We say that the system
in (34) is almost surely exponentially stable if there exists λ > 0
such that Pr(lim supk→∞ k−1 log(cid:107)x(k)(cid:107) ≤ −λ) = 1 for all
x0 and θ0. The supremum of λ satisfying the above condi-
tion is called the decay rate. To prove Theorem 3.10, we need
the following criterion for almost sure exponential stability
of aggregated-Markov jump linear systems in discrete-time.
Lemma 5.8. Consider an irreducible Markov chain θ and
denote its unique stationary distribution by π. Assume
that Aγ is nonnegative and symmetric for every γ ∈ Γ. if
E(cid:2)log(η(Af (π)))(cid:3) < 0, then the discrete-time aggregated
Markov jump linear system in (34) is almost surely ex-
ponentially stable with decay rate greater than or equal
to −E[log(η(Af (π)))].
Proof: Let (cid:107)A(cid:107) denote the maximum singular value
of a matrix A. Since η(A) = (cid:107)A(cid:107) for a nonnegative
and symmetric matrix A,
it is sufficient to show that
E[log(cid:107)Af (π)(cid:107)] < 0 implies almost sure exponential stability
of the aggregated Markov jump linear system (34) with
decay rate smaller than or equal to −E[log(cid:107)Af (π)(cid:107)]. This
claim is known to be true if f is the identity mapping, i.e., if
f (θ) itself is a Markov chain [51, Proposition 2.1]. The proof
for the general case where f (θ) is not necessarily a Markov
chain has the same structure as the proof of Lemma 5.1. We
omit the details.
Using this lemma, we prove the next proposition.
Proposition 5.9. Consider an irreducible and aperiodic
AMEI random graph process G in discrete-time. Let hij
(1 ≤ i < j ≤ n) be independent Bernoulli random
variables with mean ¯Aij. Define the random matrix
n(cid:88)
(cid:88)
(cid:113)
M4 = I − D +
βiβj(Eij + Eji)hij.
i=1
j>i
If
E [log(η(M4))] < 0,
(35)
then the disease-free equilibrium of Σd is almost surely
exponentially stable with decay rate greater than or
equal to −E[log(η(M4))].
Proof: For each k ≥ 0, let A(k) denote the adjacency
matrix of G(k). Define the product process θ on the state
space Λ in the same way as in the proof of Proposition 5.7.
For γ = (γij)i,j ∈ {0, 1}n(n−1)/2, consider the matrix Gγ
defined in (33). Then, in the same way as in the proof of
Proposition 5.7, we can show A(k) = Gg(θ(k)). Therefore
Σ is equivalent to the following discrete-time aggregated
Markov jump linear system p(k + 1) = (BGg(θ(k)) + I −
D)p(k). Furthermore, the state transformation x (cid:55)→ B−1/2x
shows that almost sure exponential stability of this system is
equivalent to that of the following aggregated-Markov jump
linear system
Σ4 : p(k + 1) = (B1/2Gg(θ(k))B1/2 + I − D)p(k).
Since the matrix B1/2Gg(θ(k))B1/2 + I − D is nonnegative
and symmetric, by Lemma 5.8, the system Σ4 is almost
Pr
> 1 +
≤ κ ¯β,∆2(s)
(cid:19)
s
λ4
(cid:18) η(M4)
(cid:18)
(cid:21)
λ4
surely stable if E[log(η(B1/2Gg(π)B1/2 + I − D))] < 0,
where π denotes the stationary distribution of the irre-
ducible and aperiodic Markov chain θ. On the other hand, in
the same way as in the proof of Proposition 5.7, we can show
that the random matrices B1/2Gg(π)B1/2 + I − D and M4
have the same probability distribution. Therefore, condition
(35) is indeed sufficient for almost sure exponential stability
of Σ4, which implies almost sure exponential stability of
the disease-free equilibrium of Σd as we observed above.
Also, from the above discussion, it is easy to verify that
−E[log(η(M4))] gives a lower bound on the decay rate of
stability.
We are now in condition to prove Theorem 3.10.
Proof of Theorem 3.10: Applying Proposition 5.3
to the random matrix M4, we obtain the inequality
Pr (η(M4) > η(E[M4]) + s) ≤ κ ¯β,∆2 (s). Since λ4 =
η(B ¯A + I − D) = η(E[M4]), this inequality implies that
for every s ≥ 0. Therefore, in the same way as we derived
(cid:20)
(30), we can show that
≤ log
η(Mmax)
η(M4)
(cid:19)
1 +
+ κ ¯β,∆2(s) log
log
E
s
λ4
λ4
λ4
λ4
η(Mmax)
and, hence,
E [log(η(M4))] ≤ log(λ4 +s)+κ ¯β,∆2(s) log
. (36)
Therefore, if there exists s ∈ [0, 1 − λ4] such that the right
hand side of this inequality is negative, then disease-free
equilibrium of Σd is almost surely exponentially stable by
Proposition 5.9. A simple algebra shows that the existence
of such s ≥ 0 is equivalent to (18). Notice that we do not
need to consider any s larger than 1 − λ4 because, for such
s, the right hand side of (36) is positive. Moreover, the upper
bound (19) of the decay rate immediately follows from (36).
This completes the proof of the theorem.
6 CONCLUSION AND DISCUSSION
In this paper, we have analyzed the dynamics of spreading
processes taking place over time-varying networks. First,
we have proposed the family of aggregated-Markovian ran-
dom graph processes as a flexible and analytically tractable
dynamic random graph able to replicate, with arbitrary
accuracy, any distribution of inter-switching times. We have
then studied spreading processes in aggregated-Markovian
random graph processes and derived conditions to guar-
antee that the disease-free equilibrium is almost surely ex-
ponentially stable. A direct analysis based on Ito’s formula
for jump processes results in stability conditions in terms of
the eigenvalues of a matrix whose size grows exponentially
with the number of edges in the network. Using tools
from random graph theory, we have derived alternative
stability conditions in terms of the eigenvalues of a matrix
whose size grows linearly with the number of nodes in the
graph. Based on our theoretical results, we have shown that
(i) aggregated static networks approximate the epidemic
threshold more accurately as the number of nodes in the
network grows, and (ii) aggregated static networks provide
12
a better approximation as we reduce the degree of temporal
variability in the random graph process.
A possible direction for future research is containment of
epidemic outbreaks over time-varying networks. Although
several optimization frameworks have been recently pro-
posed in the literature to find the cost-optimal allocation of
medical resources to prevent epidemic outbreaks in static
networks [11], [12], [13], [14], these results cannot be readily
applied to the case of time-varying networks.
REFERENCES
[1] K. Lerman and R. Ghosh, “Information contagion: An empirical
study of the spread of news on Digg and Twitter social networks,”
in Proceedings of the Fourth International AAAI Conference on Weblogs
and Social Media, 2010, pp. 90–97.
[2] M. Garetto, W. Gong, and D. Towsley, “Modeling malware spread-
ing dynamics,” in IEEE INFOCOM 2003. Twenty-second Annual
Joint Conference of the IEEE Computer and Communications Societies,
vol. 3, 2003, pp. 1869–1879.
[3] M. Tizzoni, P. Bajardi, C. Poletto, J. J. Ramasco, D. Balcan,
B. Gonc¸alves, N. Perra, V. Colizza, and A. Vespignani, “Real-time
numerical forecast of global epidemic spreading: case study of
2009 A/H1N1pdm.” BMC medicine, vol. 10, p. 165, 2012.
[4] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespig-
nani, “Epidemic processes in complex networks,” Reviews of Mod-
ern Physics, vol. 87, pp. 925–979, 2015.
[5] C. Nowzari, V. M. Preciado, and G. J. Pappas, “Analysis and
control of epidemics: A survey of spreading processes on complex
networks,” IEEE Control Systems Magazine (accepted), 2015.
[6] H. J. Ahn and B. Hassibi, “On the mixing time of the SIS Markov
chain model for epidemic spread,” in 53rd IEEE Conference on
Decision and Control, 2014, pp. 6221–6227.
[7] A. Ganesh, L. Massouli´e, and D. Towsley, “The effect of network
topology on the spread of epidemics,” in Proceedings - IEEE INFO-
COM, vol. 2, 2005, pp. 1455–1466.
[8] D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos,
“Epidemic thresholds in real networks,” ACM Transactions on
Information and System Security, vol. 10, 2008.
[9] P. Van Mieghem, J. Omic, and R. Kooij, “Virus spread in net-
works,” IEEE/ACM Transactions on Networking, vol. 17, pp. 1–14,
2009.
[10] F. Darabi Sahneh, C. Scoglio, and P. Van Mieghem, “Generalized
epidemic mean-field model for spreading processes over multi-
layer complex networks,” IEEE/ACM Transactions on Networking,
vol. 21, pp. 1609–1620, 2013.
[11] Y. Wan, S. Roy, and A. Saberi, “Designing spatially heterogeneous
strategies for control of virus spread.” IET systems biology, vol. 2,
pp. 184–201, 2008.
[12] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. Pap-
pas, “Optimal vaccine allocation to control epidemic outbreaks
in arbitrary networks,” in 52nd IEEE Conference on Decision and
Control, 2013, pp. 7486–7491.
[13] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and
G. J. Pappas, “Optimal resource allocation for network protection
against spreading processes,” IEEE Transactions on Control of Net-
work Systems, vol. 1, pp. 99–108, 2014.
[14] K. Drakopoulos, A. Ozdaglar, and J. Tsitsiklis, “An efficient curing
policy for epidemics on graphs,” IEEE Transactions on Network
Science and Engineering, vol. 1, pp. 67–75, 2014.
[15] P. Holme and J. Saramaki, “Temporal networks,” Physics Reports,
vol. 519, pp. 97–125, 2012.
[16] N. Fefferman and K. Ng, “How disease models in static networks
can fail to approximate disease in dynamic networks,” Physical
Review E, vol. 76, p. 031919, 2007.
[17] N. Masuda and P. Holme, “Predicting and controlling infectious
disease epidemics using temporal networks.” F1000prime reports,
vol. 5:6, 2013.
[18] A. Vazquez, B. R´acz, A. Luk´acs, and A.-L. Barab´asi, “Impact of
non-Poissonian activity patterns on spreading processes,” Physical
Review Letters, vol. 98, p. 158702, 2007.
[19] M. Karsai, M. Kivela, R. K. Pan, K. Kaski, J. Kert´esz, A.-L. Barab´asi,
and J. Saramaki, “Small but slow world: How network topology
and burstiness slow down spreading,” Physical Review E, vol. 83,
p. 025102, 2011.
[20] P. Holme and F. Liljeros, “Birth and death of links control disease
spreading in empirical contact networks.” Scientific reports, vol. 4,
p. 4999, 2014.
[21] C. L. Vestergaard, M. G´enois, and A. Barrat, “How memory gen-
erates heterogeneous dynamics in temporal networks,” Physical
Review E, vol. 90, p. 042805, 2014.
[22] E. Volz and L. A. Meyers, “Epidemic thresholds in dynamic
contact networks.” Journal of the Royal Society, Interface / the Royal
Society, vol. 6, pp. 233–241, 2009.
[23] Y. Schwarzkopf, A. R´akos, and D. Mukamel, “Epidemic spreading
in evolving networks,” Physical Review E, vol. 82, p. 036112, 2010.
[24] N. Perra, A. Baronchelli, D. Mocanu, B. Gonc¸alves, R. Pastor-
Satorras, and A. Vespignani, “Random walks and search in time-
varying networks,” Physical Review Letters, vol. 109, p. 238701,
2012.
[25] N. Perra, B. Gonc¸alves, R. Pastor-Satorras, and A. Vespignani,
“Activity driven modeling of time varying networks.” Scientific
reports, vol. 2:469, 2012.
[26] M. Karsai, N. Perra, and A. Vespignani, “Time varying networks
and the weakness of strong ties.” Scientific reports, vol. 4, p. 4001,
2014.
[27] A. E. Clementi, C. Macci, A. Monti, F. Pasquale, and R. Silvestri,
“Flooding time in edge-Markovian dynamic graphs,” in Proceed-
ings of the twenty-seventh ACM symposium on Principles of distributed
computing - PODC ’08, 2008, pp. 213–222.
[28] I. Z. Kiss, L. Berthouze, T. J. Taylor, and P. L. Simon, “Modelling
approaches for simple dynamic networks and applications to
disease transmission models,” Proceedings of the Royal Society A:
Mathematical, Physical and Engineering Sciences, vol. 468, pp. 1332–
1355, 2012.
[29] J. Whitbeck, V. Conan, and M. D. de Amorim, “Performance
of opportunistic epidemic routing on edge-Markovian dynamic
graphs,” IEEE Transactions on Communications, vol. 59, pp. 1259–
1263, 2011.
[30] L. Maggi and F. De Pellegrini, “Not always sparse: Flooding
time in partially connected mobile ad hoc networks,” 2014 12th
International Symposium on Modeling and Optimization in Mobile, Ad
Hoc, and Wireless Networks, WiOpt 2014, pp. 413–420, 2014.
[31] H. Baumann, P. Crescenzi, and P. Fraigniaud, “Parsimonious
flooding in dynamic graphs,” Proceedings of the 28th ACM sym-
posium on Principles of distributed computing - PODC ’09, p. 260,
2009.
[32] M. Taylor, T. J. Taylor, and I. Z. Kiss, “Epidemic threshold and
control in a dynamic network,” Physical Review E, vol. 85, p.
016103, 2012.
[33] C. Cattuto, W. van den Broeck, A. Barrat, V. Colizza, J. F. Pinton,
and A. Vespignani, “Dynamics of person-to-person interactions
from distributed RFID sensor networks,” PLoS ONE, vol. 5, pp.
1–9, 2010.
[34] J. Stehl´e, N. Voirin, A. Barrat, C. Cattuto, L. Isella, J. F. Pinton,
M. Quaggiotto, W. van den Broeck, C. R´egis, B. Lina, and P. Van-
hems, “High-resolution measurements of face-to-face contact pat-
terns in a primary school,” PLoS ONE, vol. 6, 2011.
[35] J. Stehl´e, N. Voirin, A. Barrat, C. Cattuto, V. Colizza, L. Isella,
C. R´egis, J.-F. Pinton, N. Khanafer, W. Van den Broeck, and P. Van-
hems, “Simulation of an SEIR infectious disease model on the
dynamic contact network of conference attendees.” BMC medicine,
vol. 9, p. 87, 2011.
[36] D. R. Fredkin and J. A. Rice, “On aggregated Markov processes,”
Journal of Applied Probability, vol. 23, pp. 208–214, 1986.
[37] M. A. Rami, V. S. Bokharaie, O. Mason, and F. R. Wirth, “Stability
criteria for SIS epidemiological models under switching policies,”
Discrete and Continuous Dynamical Systems - Series B, vol. 19, pp.
2865–2887, 2014.
[38] R. W. Brockett, “Stochastic Control,” 2009. [Online]. Available:
http://www.eeci-institute.eu/pdf/M015/RogersStochastic.pdf
[39] F. Chung, L. Lu, and V. Vu, “Spectra of random graphs with given
expected degrees,” Proceedings of the National Academy of Sciences of
the United States of America, vol. 100, pp. 6313–6318, 2003.
[40] C. Desoer and H. Haneda, “The measure of a matrix as a tool to
analyze computer algorithms for circuit analysis,” IEEE Transac-
tions on Circuit Theory, vol. 19, pp. 480–486, 1972.
[41] E. C¸ inlar, “Exceptional paper–Markov renewal theory: A survey,”
Management Science, vol. 21, pp. 727–752, 1975.
[42] R. Schassberger, “On the waiting time in the queuing system
GI/G/1,” The Annals of Mathematical Statistics, vol. 41, pp. 182–
187, 1970.
13
[43] C. Lanczos, “An iteration method for the solution of the eigen-
value problem of linear differential and integral operators,” Journal
of Research of the National Bureau of Standards, vol. 45, pp. 255–282,
1950.
[44] J. Saramaki and K. Kaski, “Modelling development of epidemics
with dynamic small-world networks.” Journal of theoretical biology,
vol. 234, pp. 413–21, 2005.
[45] L. Erdos and A. R´enyi, “On random graphs. I,” Publicationes
Mathematicae, vol. 6, pp. 290–297, 1959.
[46] E. Cator and P. Van Mieghem, “Susceptible-infected-susceptible
epidemics on the complete graph and the star graph: Exact analy-
sis,” Physical Review E, vol. 87, p. 012811, 2013.
[47] O. L. V. Costa, M. D. Fragoso, and M. G. Todorov, Continuous-time
Markov Jump Linear Systems. Springer, 2013.
[48] Y. Fang and K. Loparo, “Stabilization of continuous-time jump
linear systems,” IEEE Transactions on Automatic Control, vol. 47,
pp. 1590–1603, 2002.
[49] F. Chung and M. Radcliffe, “On the spectra of general random
graphs,” The Electronic Journal of Combinatorics, vol. 18, #P215, 2011.
[50] N. K. Son and D. Hinrichsen, “Robust stability of positive continu-
ous time systems,” Numerical Functional Analysis and Optimization,
vol. 17, pp. 649–659, 1996.
[51] P. Bolzern, “On almost sure stability of discrete-time Markov jump
linear systems,” in 43rd IEEE Conference on Decision and Control,
2004, pp. 3204–3208.
ACKNOWLEDGMENTS
This work was supported in part by the NSF under grants
CNS-1302222 and IIS-1447470. A part of this research was
performed while the first author was visiting the Center
for BioCybernetics and Intelligent Systems at Texas Tech
University. He would like to thank Professor Bijoy Ghosh
for his hospitality during this visit.
Masaki Ogura received his B.Sc. degree in en-
gineering and M.Sc. degree in informatics from
Kyoto University, Japan, in 2007 and 2009, re-
spectively, and his Ph.D. degree in mathemat-
ics from Texas Tech University in 2014. He is
currently a Postdoctoral Researcher in the De-
partment of Electrical and Systems Engineering
at the University of Pennsylvania. His research
interest
includes dynamical systems on time-
varying networks, switched linear systems, and
stochastic processes.
Victor M. Preciado received his Ph.D. degree
in Electrical Engineering and Computer Science
from the Massachusetts Institute of Technology
in 2008. He is currently the Raj and Neera Singh
Assistant Professor of Electrical and Systems
Engineering at the University of Pennsylvania.
He is a member of the Networked and Social
Systems Engineering (NETS) program and the
Warren Center for Network and Data Sciences.
His research interests include network science,
theory, and convex
dynamic systems, control
optimization with applications in socio-technical systems, technological
infrastructure, and biological networks.
|
1411.1132 | 7 | 1411 | 2016-06-05T16:19:24 | Are you going to the party: depends, who else is coming? [Learning hidden group dynamics via conditional latent tree models] | [
"cs.SI"
] | Scalable probabilistic modeling and prediction in high dimensional multivariate time-series is a challenging problem, particularly for systems with hidden sources of dependence and/or homogeneity. Examples of such problems include dynamic social networks with co-evolving nodes and edges and dynamic student learning in online courses. Here, we address these problems through the discovery of hierarchical latent groups. We introduce a family of Conditional Latent Tree Models (CLTM), in which tree-structured latent variables incorporate the unknown groups. The latent tree itself is conditioned on observed covariates such as seasonality, historical activity, and node attributes. We propose a statistically efficient framework for learning both the hierarchical tree structure and the parameters of the CLTM. We demonstrate competitive performance in multiple real world datasets from different domains. These include a dataset on students' attempts at answering questions in a psychology MOOC, Twitter users participating in an emergency management discussion and interacting with one another, and windsurfers interacting on a beach in Southern California. In addition, our modeling framework provides valuable and interpretable information about the hidden group structures and their effect on the evolution of the time series. | cs.SI | cs | Are you going to the party: depends, who else is
[Learning hidden group dynamics via conditional latent tree models]
coming?
6
1
0
2
n
u
J
5
]
I
S
.
s
c
[
7
v
2
3
1
1
.
1
1
4
1
:
v
i
X
r
a
Forough Arabshahi∗, Furong Huang†, Animashree Anandkumar‡, Carter T. Butts§ and Sean M. Fitshugh¶
∗farabsha, †furongh, ‡a.anandkumar, §buttsc, ¶sean.fitzhugh @uci.edu
University of California, Irvine
Abstract-Scalable probabilistic modeling and prediction in
high dimensional multivariate time-series is a challenging prob-
lem, particularly for systems with hidden sources of dependence
and/or homogeneity. Examples of such problems include dynamic
social networks with co-evolving nodes and edges and dynamic
student
learning in online courses. Here, we address these
problems through the discovery of hierarchical latent groups. We
introduce a family of Conditional Latent Tree Models (CLTM), in
which tree-structured latent variables incorporate the unknown
groups. The latent tree itself is conditioned on observed covariates
such as seasonality, historical activity, and node attributes. We
propose a statistically efficient framework for learning both the
hierarchical tree structure and the parameters of the CLTM.
We demonstrate competitive performance in multiple real world
datasets from different domains. These include a dataset on stu-
dents' attempts at answering questions in a psychology MOOC,
Twitter users participating in an emergency management discus-
sion and interacting with one another, and windsurfers interacting
on a beach in Southern California. In addition, our modeling
framework provides valuable and interpretable information about
the hidden group structures and their effect on the evolution of
the time series.
Keywords: Multivariate time series, conditional latent tree
models, hierarchical latent groups, dynamic networks.
I.
INTRODUCTION
In this work we address the problem of modeling and
predicting high dimensional time-series with latent dependence
and/or unobserved heterogeneity. Such time series arise in
numerous important applications, including dynamic social
networks with co-evolving nodes and edges, and dynamic
student learning in MOOCs. Of particular interest in modeling
such high dimensional series is the problem of predicting their
evolution. Such predictions can in turn be used to provide use-
ful feedback such as recommendations to network participants
or students to improve their experience in the network and
help them learn the course material (respectively). Modeling
and tracking such high dimensional series jointly, however, is a
greatly challenging task since each sequence can interact with
others in unknown and complex ways. Before delving into the
details of the prediction model, we thus first identify several
factors that influence the dynamics of high-dimensional time
series in a social context.
First and foremost, individual-level behavioral variables in
a multivariate time series are strongly influenced by group
dynamics. For example, the nodes in a social network tend to
participate in communities, and the evolution of node behavior
can be captured in part by the dynamics of those communities.
In some cases, the resulting dependence is endogenous: for
instance, a network attendee might wonder who else is going
to attend a social event (e.g., a party) before deciding whether
to attend him or herself. In other cases, group-level dependence
may stem from unobserved heterogeneity: in the student learn-
ing scenario, for instance, students may be divided into groups
of strong and weak learners whose learning curves evolve
in drastically different ways. Hence, finding such underlying
groupings and considering their dynamics for predicting the
evolution of each individual sequence is of great importance.
A second challenge for modeling in this context (as implied
by the first example above), is that the dynamic behavior of
each random variable affects the dynamics of other random
variables, making the individual sequences dependent on one
another. Treating each individual sequence independently ig-
nores such interdependence and results in poor predictions.
A third challenge for modeling in this context is the need to
account for the impact of relevant external factors (covariates)
that are predictive of dynamics. Seasonal or period effects
are examples of covariates whose states can be predictive of
the evolution of the series. E.g. in weekly social events, the
day of week is a highly predictive factor of the attendance
dynamics of the participants. Another example of relevant
covariates in the context of student learning is the topic of
each lesson or problem being studied, as each student has
topic specific learning strengths and weaknesses. Last but not
least, consecutive time points are highly correlated in typical
time-series contexts. Therefore, knowing the previous state of
the variables (and appropriately handling inertia) is vital for
making good predictions.
the effect of all
Here, we introduce a parametric model class, namely
the Conditional Latent Tree Models (CLTM), that takes into
account
the above factors for predicting
high-dimensional time-series. The effect of the covariates and
previous time points is captured via Conditional Random
Fields (CRF's). More specifically, conditioned on exogenous
covariates and previous time points, the dependency structure
among the variables is modeled via a latent
tree whose
hidden nodes represent the unobserved hidden groupings in
the data. Therefore, CLTM represents the joint distribution
of the observed and latent random variables which factorizes
according to a Markov latent tree conditioned on the covariates
and previous time points. This model is versatile in its ability
to model group structure and provide the ability to carry out
exact inference through the simple belief propagation (BP)
algorithm [5] that makes the model potentially scalable. We
provide a statistically efficient algorithm for learning the struc-
ture of the latent tree, and estimate the parameters of the model
using a Maximum Likelihood (ML) approach. Therefore, our
goal in the sequel is to learn unobserved groups of similar
behavior and incorporate them into prediction of the evolution
of high dimensional time-series conditioned on some relevant
covariates.
It is worth mentioning that like many common alterna-
tives (e.g., hidden Markov models), the latent tree structural
assumption used here is a reasonable approximation to the
true dependence structure underlying the random variables
arising from typical social settings. This approximation is
obviously more realistic than a purely independent model, but
also captures subtle hierarchical features that are missed or
obscured by alternatives such as latent state models. It is also
denser and more flexible than a simple tree over the observed
variables due to the presence of the latent variables (since if
we marginalize out the latent variables, the structure will not
remain a tree anymore). Although we do not claim that latent
tree structures are perfect representations of the myriad sources
of dependence in large, complex social systems, we thus do
regard the CTLM as an effective "middle ground" between
simple independence and/or latent state models and difficult-
to-scale models with unbounded dependence (e.g. full temporal
ERGMs with endogenous attributes [11]). As we show here,
predictive results obtained by applying these models to several
real-world data sets provide further evidence for their efficacy.
answered daily. Our model automatically learns groups of stu-
dents who demonstrate similar evolution of learning behavior.
Such information can be valuable to an instructor, since it gives
him/her the ability to target different groups of students, and
tune the instruction accordingly. Our approach is in contrast
to earlier modeling frameworks for this MOOC dataset, which
fit a different latent variable model for each student separately,
treating the students independently, in order to model the
learning progress [2].
We quantitatively compare the prediction of student per-
in
formance under our method with a chain CRF model
Table III, in which the chain is over time and the students
are treated as independent
time sequences similar to [2].
We observe a significant improvement in predicting the stu-
dent performance. Similarly, we also demonstrate a strong
improvement on Twitter and beach data for predicting the
conditional presence of vertices and edges over time. This is
especially relevant, since these datasets are highly sparse with
a small number of participants at any given time. Moreover,
we observe that our method has higher improvement on the
Twitter dataset compared to the beach data, since the beach
dataset has covariates that are carefully collected by a team of
sociologists. Thus, our method is highly effective in predicting
multivariate time series across multiple domains, particularly
where covariate information is present but limited.
A. Summary of Results
B. Related Work
In this paper we introduce CLTMs and propose a frame-
work for learning them efficiently. This framework has the
potential to be applied to large scale data sets. We first estimate
the latent group structure among the variables, and then learn
the parameters of the CLTM, which describe quantitatively
how the hidden variables affect the observed outcomes. We
then employ CLTM's to efficiently track the evolution of time
series.
We apply our approach to three challenging real-world
datasets involving students' performance in a psychology
MOOC, Twitter users' activities and interactions, and wind-
surfers' participation in and interactions during activity on a
southern California beach. In all these data sets our goal is to
predict the dynamics of the users (either the students in the
class or the network attendees) for which we need to extract
relevant covariates that will be used in CLTM.
For the MOOC data, for example, In order to acquire
predictive covariates for student prediction we first learn a
conditional latent tree model over the knowledge components.
Each question answered by any student incorporates a cer-
tain knowledge component. By learning the CLTM over the
knowledge components, we can automatically find hierarchi-
cal groups of concepts that are learnt similarly by students.
We demonstrate that the learned tree structure captures in-
terpretable groupings. For instance, knowledge components
related to different anxiety disorders are grouped together.
Note that we only use these labels of knowledge components
for validation, and not during the learning phase. We then
incorporate these knowledge groupings as covariates in a
CLTM used for tracking the learning of individual students
over time. In this CLTM over the students, each observed
node indicates the performance of one student on questions
Previous works on multi-variate time series typically do not
consider latent groups, e.g. [10]. This results in too many un-
known parameters and results in the problem of overfitting and
computational intractability in the high dimensional regime.
The alternative is to first learn the groups through standard
clustering techniques such as agglomerative clustering [13],
and then use them as covariates for prediction. However, this
two step process is not optimal for prediction. In contrast, our
CLTM is a statistical model which simultaneously learns the
groups and their effect on time evolution, leading to efficient
performance.
Another interesting line of related work considers com-
munity models such as stochastic block models and mixed
membership models [1], [8], [21]–[23] for modeling the un-
known vertex groups. However, these models only consider
the edge data and do not incorporate node state information
and exogenous factors. In our datasets, we also have node
activity information (such as number of tweets by a user),
and we exploit this information to learn about the unknown
node groups. We then incorporate the group structure for
learning the edge dynamics. Further, the aforementioned works
mostly assume data samples to be independent and identically
distributed (except for [8] or [6]), whereas we consider time
varying data.
CLTM belongs to the class of Conditional random fields
(CRF). Various CRFs have been considered before, e.g. CRFs
on linear chains [19], trees [3], [16], grids [14], and so on.
However, only a few works address the issue of structure
learning of CRFs, e.g. [3], [17], [20]. Moreover, not many
publications assume CRFs with latent variables, e.g [16] has
latent variables, but with a fixed structure. Our work, on the
other hand, does not make such strong assumptions. We learn
the latent tree structure through efficient methods and also
incorporate covariate effects, leading to highly effective models
in practice.
II. MODEL
Let us denote random variables with y(t)
∈ R where
i = 1, 2, . . . , n indicates the index of the random variable
and t = 1, 2, . . . , T is the time index. We use the terms
"random variable" and "node" interchangeably as the random
variables can be represented as nodes in a dependency graph.
An example of such a dependency graph is shown in Fig 1.
i
Each random variable's behavior is dependent upon other
random variables' behavior, as well as a set of covariates.
Examples of covariates include network users' group mem-
berships, seasonal effects (e.g. the day of the week). There
are three types of covariates we consider in this paper: the
individual covariates which are node specific, e.g. membership
of a specific node in an observed group (red nodes in Fig 1);
the shared covariates which indicate the dependency among the
nodes; and the global covariates which simultaneously affect
every node in the conditional latent tree, such as seasonality
(the black node in Fig 1). Let x(t)
i ∈ R(1×Kn) indicate the
(t)
set of node specific and global covariates, and x
ij ∈ R(1×Ke)
indicate the shared covariates. In this case, Kn indicates the
number of covariates of y(t)
and Ke indicates the number of
shared covariates between nodes y(t)
and y(t)
i
i
.
j
A. Conditional Latent Tree Models (CLTM)
Our goal is to perform structured prediction when there
are temporal dynamics in the data. Consider an online social
network such as Twitter as an example. Let the the network
users be the random variables whose Tweeting activity is
tracked over time. If two users are similar (say, both belong
to a subgroup with similar demographic and social charac-
teristics), it is more likely for them to have similar activity.
Additionally, we claim that the users' attendance behavior
depends on their previous activity, the behavior of other users
and some relevant covariates. Note that throughout the paper,
previous observations are contained in the prediction model
as a subset of the covariates. Therefore, we learn a latent
tree dependence model over the users conditioned on the
covariates and previous observations and we predict users'
attendance dynamics according to the learned structure. As
another example, we predict the performance of students in
a course. Based on the students' performance on their exams
throughout the semester we find groups of students who share
similar learning behaviors using CLTMs. We will see that
finding these similarities and hidden groupings can greatly help
in predicting students' learning performance.
Let us first look at what the latent tree structure looks
like and why we are assuming such a dependence structure.
Consider the Twitter network in which yi's are the Twitting
activity of network users, or an online education system in
which yi's are the performance of the students on various
course material such as problems and quizzes. The latent nodes
in the tree are denoted by hj where j = 1, 2, . . . , m. They
represent hidden groupings in the dependence structure of the
random variables yi. Let zk be the union of the observed nodes
yi and latent nodes hj where k = 1, 2, . . . , n+m. Let us denote
the latent tree by Td = (Zd, Ed) where Zd indicates the node
set consisting of all the random variables and Ed denotes the
edge set containing the edges of the latent tree. There are two
main advantages in making latent tree structural assumptions.
Firstly, a latent tree allows for more complex structures of
dependence compared to a fully observed tree - specifically, it
allows for latent groups of individuals whose behaviors jointly
covary. Secondly, inference on it is tractable, and therefore, it
will be scalable.
Once the dependency structure is achieved, we should
specify the generative distribution that the data is drawn from.
The distribution of the random variables in CLTM belongs
to the exponential family conditioned on observed covariates
X. Covariates are observable external factors that affect the
dynamics of the data. For example, in the Twitter network,
relevant covariates are seasonality, regularity of network users,
their popularity, and their previous activity. Fig 1 demonstrates
the CLTM structure conditioned on the covariates X. As one
can see in the figure, the joint structure of the observed and
hidden variables are that of a tree conditioned on the covari-
ates. Now let us give more details about the data distribution.
Exponential family distributions are a broad family of
distributions including the normal, Gamma, Poisson and many
other distributions [9]. Conditioned on covariates X, the dis-
tribution of Z over tree Td is given in Equation (1).
Pr(ZX, θ)=exp Xk∈Zd
φk(X, θ)zk+Xkl∈Ed
φkl(X, θ)zkzl−A(X, θ)!,
(1)
where A(X, θ) is the term that normalizes the distribution, also
known as the log partition function. φk(X, θ) and φkl(X, θ)
indicate the node and edge potentials of the exponential
family distribution, respectively. Let's assume for the sake
of simplicity that the potentials are linear functions of the
covariates and previous observation as shown below.
φk(X, θ) = c0 + c1x1,k + ... + cKnxP,k,
φkl(X, θ) = e0 + e1x1,kl... + eKe xP,kl,
(2)
(3)
Learning the graphical model involves two steps: learning
the dependence structure over the nodes, and estimating the
probability distribution the data is generated from. In the
following paragraphs we provide detailed description of these
two steps.
The details of estimating the distribution is presented in
Section III-B. It should be noted that the random variables in
this model can either be discrete or continuous and we will
cover both variables in the structure learning and parameter
estimation sections.
B. Exploiting Inferred Hidden Groups
A problem of frequent current interest is that of modeling
the dynamics of data on social interactions, as e.g. occur in
online social networks. E.g., in the context of the Twitter
network a social tie (an edge) can represent any form of
communication between the users while they are active. We
learn these dynamics by using the information from the learnt
CLTM model for node activity. It is reasonable to claim that
an edge cannot be formed unless both parties that form it are
xg
h1
h2
y1
y2
y3
y4
available approaches, we build upon RG and LocalCLGrouping
[5] with provable computational efficiency guarantees. These
algorithms are based on a measure of statistical additive tree
distance metric d (a.k.a information distance) which is given
below for discrete random variables:
xh1
x1
x2
x3
x4
xh2
dij := − log
,
(6)
det J(yi, yj)
pdet M(yi) det M(yj)
where J(yi, yj) is the joint probability matrix between yi and
yj and M(yi) is the diagonal marginal probability matrix
of node yi. In practice, we employ empirical estimates of
J(yi, yj), M(yi) and M(yj) based on sampled data. For con-
tinuous Gaussian random variables the information distances
are the log of their correlation coefficient:
dij := − log
.
(7)
Cov(yi, yj)
pVar(xi) Var(xj )
The distance measure given in Equations (6) and (7) are not
valid for conditional settings, which is the case in our study.
However, since the tree structure is fixed through time samples,
we can define the notion of conditional distance given in
Equation (8) as the weighted average of all the individual
distances given the covariates.
[dijX] :=
KnXk=1
wk,ij dk,ij ,
(8)
where wk,ij's are the empirical probability matrices of covari-
ate pairs (Xk,i, Xk,j), such thatPstates wk,ij = 1, Kn is the
total number of observed covariates for each node, i.e.:
wk,ij = Pr(xk,i, xk,j ).
(9)
For instance, if the covariates xi and xj are binary random
variables then their joint has 4 possible states and therefore
wk,ij is a 4 × 1 vector whose entries sum to one.
Individual distances dk,ij for discrete and continuous Gaus-
sian random variables are given in Equations (10) and (11),
respectively. It is worth noting that the additive property of
the distance measure will be preserved, due to the fact that
the tree is fixed over time and each individual's distance is
additive over the tree.
Fig. 1: Toy example of the underlying structure over the
random variables. Blue nodes are observable variables, blank
nodes are hidden variables, red nodes denote the individual
covariates and the black node denotes the global covariate. As
shown in the figure, the dependence structure of the random
variables is a tree conditioned on covariates.
present in the network. In that case, if we correctly predict
the active users in the network, our chances of predicting
edge dynamics increase. Therefore, conditioned on the model
learned for the users we predict users' interaction patterns by
regressing on a set of relevant edge covariates and the inferred
state of the hidden variables from the CLTM model.
Let W represent the set of edges (social ties), and wij
denote the presence/absence of an edge between users i and j.
Intuitively, by regressing on the inferred hidden states, we can
incorporate the latent group dynamics into prediction of edges.
Assuming independence between the edges, the generative
model of the edges given user activity, the inferred state of the
hidden variables obtained from the CLTM model, and relevant
edge covariates X is:
(4)
Pr(W Z, X) = Y(i,j)
B(cid:0)wij(cid:12)(cid:12)logit−1 (ξ(Z, X))(cid:1) ,
where ξ(Z, X) is a linear function of the the edge covariates
X, consisting of past network information, current node states
Y and inferred states of the hidden variables of the CLTM
as shown in Equation (5). B is the Bernoulli distribution and
logit−1 is the logistic function. Note that re-use of variable X
for the edge covariates is due to notational simplicity and in
practice, the edge and node covariates are not the same. X (t)
k,ij
in the equation below denotes the kth covariate for the edge
formed between nodes i and j, at time point t.
ξ(Z, X) = d0 + d1X (t)
1,ij + · · · + dKec X (t)
Kec,ij + dnZ.
(5)
III. MODEL ESTIMATION
For discrete variables we have:
In order to be able to do prediction, we first estimate the
underlying model given some observations. Model estimation
can be divided into two general steps: structure learning and
parameter estimation. For structure learning, the target struc-
ture is the structure of a latent tree that will be learned using
a notion of information distances efficiently. For parameter
estimation, we solve the exponential family distribution defined
in Equation (1) using maximum likelihood. EM is used in the
parameter estimation step as latent nodes introduced in the tree
by structure learning step are not observed.
dk,ij := − log(
J(yi, yjxk,i, xk,j )
pM(yixk,i, xk,j)M(yjxk,i, xk,j )
).
(10)
This means that if the covariates are binary then dk,ij will have
four states of "00", "01", "10" and "11" for the (xk,i, xk,j )
pair. We then weight each state by the empirical probability
state of each covariate pair and average over all covariate pairs
and all kn covariates. This conditional distance measure could
be used in, LocalCLGrouping algorithms [5] to learn latent
graph structure from data.
A. Structure Learning
For continuous variables we have:
A large number of scalable structure learning algorithms
for latent tree modeling have been discovered by the phylo-
genetic community on learning latent tree models. Among the
dk,i,j := − log(
E(yiyjxk,i, xk,j )
i xk,i, xk,j )E(y2
j xk,i, xk,j )
qE(y2
).
(11)
B. Parameter Estimation Using EM
Once we get the latent tree structure using CLGrouping,
we use maximum likelihood to estimate the parameters of the
data distribution given in Equation (1) based on the structure.
We use Expectation Maximization (EM) to maximize the
likelihood function due to the latent node in the structure.
EM is an iterative algorithm that iterates between the two
so-called E-step and M-step. It maximizes the lower bound
of the likelihood function in each iteration based on the
parameters estimated in the previous iteration. The lower
bound is the expected complete data log likelihood function
which is presented in Equation 13.
In order to give a sketch of the EM algorithm formulation,
we first present the log likelihood function over the learned
latent tree Td = (Zd, Ed):
TXt=1(cid:16)A(θ, X (t))(cid:17)+
k ! +
φk(X(t), θ)z(t)
ℓ(θX, Z) = −
TXt=1 Xk∈Zd
TXt=1 Xkl∈Ed
φkl(X(t), θ)z(t)
k z(t)
l !
(12)
Variable Z is a union of the observed nodes Y and unobserved
nodes H. Therefore, we cannot maximize the above quantity
directly. In order to achieve maximum likelihood we compute
the expected complete data log likelihood function given
below:
E
HX,Y(cid:0)ℓ(θX, Z)(cid:1) =
TXt=1 Xkl∈Ed
φkl(X (t), θ)E
φk(X (t))E
TXt=1 Xk∈Zd
HX (t) ,Y (t) (zkzl)! −
HX (t) ,Y (t) (zk)!+
TXt=1(cid:16)A(X (t), θ)(cid:17).
(13)
HX,Y is computed from the E-step and then the M-step
E
maximizes Equation (13) through gradient descent.
IV. EXPERIMENTS AND RESULTS
In order to show the capabilities of our CLTM method, we
use 3 different real world datasets. The datasets come from
two categories, namely educational data and network data.
The educational data is a Massive Online Learning Course
(MOOC) dataset [12] from an online course on psychology
offered in Spring 2013. The Network data consists of user
interactions and attendance in two social networks. One is an
online social media of Twitter and the other one is a network
of windsurfers that surf on a beach in Southern California. It
should be noted that acquiring large scale dynamic data with
long enough time duration that has a reasonable density is a
challenging task and most of the available data sets have a
very short time duration.
For performance evaluation, we qualitatively observe the
estimated tree structures for educational data as the nodes are
labeled and can be interpreted. Quantitatively we carry out
cross-validation. We learn the model based on the training data
and predict nodes/edges evolutions on the test data. A set of
scores, which will be defined in the following, are used for
performance evaluation. We compare our CLTM model with
the baseline Chain CRF (CCRF) model in all the experiments
in which the chain is over time. We use the same set of
covariates for CLTM and CRF for a fair comparison
Prediction Scores: We use the covariates and the es-
timated parameters of the model to perform one-step-ahead
prediction of the data at each time point. At each time point,
we take the empirical mean of M samples we predict from the
estimated model and compare the samples to the ground truth
(test data). Repeatedly we carry this out at each time point
t = 1, . . . , T .
We define the following measures to assess the perfor-
mance of the algorithm.
1) CP: the conditional presence (recall) which measures the
accuracy of predicting a node as active given that the node
is indeed active (encoded as 1).
2) CA: the conditional absence, which computes the accu-
racy of predicting a node's absence (encoded as 0).
3) EP: conditional edge presence (recall), where edge indi-
cates a social tie which is oftentimes nodes' interactions.
Presence is encoded as 1.
4) EA: the conditional edge absence. Absence is encoded as
0.
In the node prediction problem, it is challenging to predict CP
since the data is highly sparse. Performing well in predicting
rare appearances of the data is important. The prediction
accuracy is defined as the percentage of nodes predicted
correctly out of the n observed nodes. In the edge prediction,
especially in the case of network data where we want to also
track social tie dynamics, we evaluate the prediction accuracy
defined as the percentage of edges predicted correctly out
of the e possible edges. At the same time, the prediction of
absence should not be degraded significantly.
i
Recall that y(t)
is observed node i and w(t)
ij
is the observed
social tie between nodes i and j at time point t = 1, . . . , T . M
is the number of predictions drawn from the estimated model.
ij,k be the kth
edge prediction between nodes i and j at time point t. Let
y(t)
pred denote the predicted node set at time point t. We define
the prediction scores as:
i,k be our kth prediction of node i and bw(t)
Let by(t)
(14)
(15)
(16)
(17)
ij,k = w(t)
ij w(t)
ij = 1),
ij,k = w(t)
ij w(t)
ij = 0),
i,k = 1y(t)
i = 1),
i,k = 0y(t)
i = 0),
CP(t) :=
CA(t) :=
EP(t) :=
EA(t) :=
1
nM
1
nM
1
eM
1
eM
nXi=1
MXk=1
I(by(t)
nXi=1
MXk=1
I(by(t)
MXk=1 Xi,j∈y(t)
I(bw(t)
MXk=1 Xi,j∈y
I(bw(t)
(t)
pred
pred
where n is the total number of observed nodes, and e is the
total number of possible edges. I(.) is the indicator function
who outputs 1 if its input is true.
50
100
150
200
x
e
d
n
i
t
n
e
d
u
t
S
10
20
30
Time index
40
50
100
150
x
e
d
n
i
200
x
e
t
r
e
300V
250
50
60
70
80
5
10
Time index
15
(a) Education data
(b) Twitter data
10
20
30
40
50
60
70
80
90
x
e
d
n
i
x
e
t
r
e
V
20
25
5
20
25
30
15
10
Time index
(c) Beach data
Fig. 2: Vertex activities in the datasets. White in education data is correct answer and black is incorrect answer and no activity.
In Twitter and beach data, white is active and black is inactive.
In addition to the above metrics, we introduce two other
measures called relative difference of average, RDA, and rela-
tive difference of median, RDM, that indicate the average and
median of the relative improvement of CLTM compared to the
baseline model consisting of Chain CRF (CCRF), respectively.
RDA := PT
t=1 CP(t)CLT M −PT
t=1 CP(t)CCRF
t=1 CP(t)CCRF
,
(18)
PT
RDM :=
mediant(CP(t)CLT M ) − mediant(CP(t)CCRF )
mediant(CP(t)CCRF )
,
(19)
The higher the values of RDA and RDM are, the better our
performance is compared to Chain CRF.
A. Educational Data
The data, gathered from a psychology course in the Stan-
ford Open Learning Library1, records students' problem solv-
ing outcomes, which are grouped as "correct" and "incorrect".
The problems that the students answer come in 226 knowledge
components (KCs). These knowledge components refer to the
different concepts covered in the class throughout the semester.
The multivariate high-dimensional time series data spans 92
days and involves 5,615 students with a total number of 695
problems (2,035 steps). Each problem consists of different
steps/stages. There are a total number of 2,493,612 records
of students' interactions, which are student's attempts to solve
problems, with the server. The course material and problems
can be accessed in any order throughout the course. Students'
learning behavior and performance are tracked: correct answers
are encoded as 1s and the incorrect ones 0s. The ultimate goal
is to track the learning of students and find similar groups of
students that behave similarly in terms of learning. First we
choose a subset of the students with 244 members.
We have two goals for prediction: (1) to learn a latent
tree model over the KCs and (2) to predict student learning
using KCs as covariates. We first learn a latent tree structure
over the KC model that helps us cluster the concepts 2. Then
we use these clusters of KC's as relevant covariates to learn
a CLTM model for the students' learning behaviors. This
process is shown in Figure 3, where figure (a) shows the latent
tree that clusters the KC's, ki, and figure (b) indicates the
CLTM structure whose covariates are the clusters of the KC's
1available on CMU datashop [12]
2The cluster is achieved on the learnt latent tree using standard graph
k1
k2
g1
g2
h2
h1
k3
k4
(a)
xg
h3
xh3
(b)
s1
x1
s2
x2
Fig. 3: (a) Presentation of knowledge component latent tree
result. In this example 2 groups g1 and g2 are recovered. (b)
Student latent tree structure learning using KC latent tree's
grouping as covariates. If student s1 answers problems from
knowledge component k1, then s1's node specific covariate x1
takes value according to k1's grouping results from (a), which
is g1. xg is the global covariate.
extracted from figure (a). The ultimate goal is to track the
learning of students and find groups of students that behave
similarly in terms of learning.
a) Latent Tree Models for Knowledge Components:
The 226 knowledge components have human labels which
we use for qualitative interpretation of the learned structure
(see Figure 4(a) for subset of latent
tree learnt, detailed
interpretation is in the latter paragraph). The nodes in the
learned structure are the KCs and the edges indicate the co-
occurrence of the KC pairs in a day for the same student.
Using daily aggregated time points, we consider all students'
total numbers of correct and incorrect answers for each of the
226 KCs within a day. The counts are transformed to a ratio
by normalizing with the total number of problem solved and
are then transformed to approximate Gaussian by taking the
square root of the ratio [4]. The covariates that we use for
learning this structure are some attributes of the data, such as
seasonality and previous time points' aggregated outcomes on
the KC.
Hierarchical clustering is realized on the knowledge com-
ponents. The complete learned structure will not fit into the
page limits of the paper, but is available online for an interested
reader to explore 3 We demonstrate two parts of the learned
structure in Figure 4. The blank nodes demonstrate the hidden
variables learnt, whereas the colored nodes demonstrate the
knowledge components. Taking a closer look at Figure 4 we
can see that knowledge components related to relationships and
happiness (red), personality(black), sexual attractions(purple),
3Link to the demos will be released in the camera ready version to preserve
partitioning algorithms [18]
anonymity of the authors
eating disorders(golden), and anxiety(blue) are clustered to-
gether. Thus, we find that our recovered latent tree has consid-
erable face validity with respect to known relationships among
topics. Note that none of these labels are input to algorithm,
and we require no labels in our unsupervised algorithm.
b) Predicting Student Learning using learnt groups of
Knowledge Components as Covariates: Now that we have the
clusters each KC falls into, we use them as covariates along
with seasonal information and past observations of the network
to track student learning. A subset of students who loyally
stayed through the semester (244 members) was selected. The
data is again binned daily and each sample is the ratio of
correctly answered problems (aggregating over all KCs) over
the total number of problems answered for a student within
a day. We threshold the values to make the data binary. The
extracted samples are shown in Figure 2a where the horizontal
axis indicates time and the vertical axis indicates the students'
attempts to answer questions.
TABLE I: Prediction scores for educational data. CP and CA
and defined in Equation (14-15). RDA and RDM are defined
in Equation (18) and (19).
RDA
RDM
CP (train)
2.6%
2.68%
CP (test)
52.96%
56.37%
CA (train)
CA (test)
1.66%
1.66%
2.01%
1.99%
Educational data covariate coefficients for students is
shown in Figure 5. As illustrated, cluster 3 which is KC groups
of "active early school's contributions to psychology" and
"physical sci contributions to psychology" is the most relevant
covariate with the highest weight, and smart or hard working
students are relevant through those problems. Cluster 9 and
10 which are groups of KCs on "apply important questions",
"goals psychology real world" and "philosophy contributions
to psychology" are also highly relevant covariates. However,
covariates such as KC's on "brain neuroplasticity", "methods
studying the brain" and "research validity bias ", indicated
as cluster 7 in the figure are less relevant
in terms of
distinguishing student's ability to answer questions in those
category correctly. It is also interesting to notice that Sunday
and Monday happens to be the time that students are most
reluctant to work during the week. Note that the coefficients
for seasonality are negative, however this does not imply that
the data has negative correlation with seasonality. The reason
is that these coefficients are approximately equal, and since at
each time point only one of these variables are on, we think
of them as a bias term. In other words, seasonality is down-
weighting other covariates' effects.
Prediction accuracy curves vs. time, indicating one-step-
ahead prediction is presented in Figure 6. As it is depicted,
our algorithm performs significantly better than Chain CRF in
the test dataset.
Finally, in Figure 7, we demonstrate our ability to automat-
ically find students of similar learning abilities and track their
learning efficiently over time. Among the extracted student
groups we choose a group of "strong" learners, who accurately
answered questions over the time, and "weak" ones who
were mostly inaccurate in their answers (or inactive and did
not answer any questions). We select the group of "strong"
students who were 1.15 times the average overall performance
(over the entire period), and in addition, their neighbors in the
conditional latent tree whose information distance is less than
the mean distance in the tree. In total, we obtain 21 students
for this group. Similarly, for the "weak" student group, we
consider students who are less than 0.85 times the average
performance and also their neighbors in the tree, as described
before. In total, we obtain 26 students for this group. We plot
the actual performance of these two groups on training and
test time periods, as well our predicted performance and the
Chain CRF's predictive performance. We see that we closely
track the actual performances of these two groups. Also, Chain
CRF suffers severely from overfitting as illustrated in this
figure. Note that the actual performances of the two groups
are significantly different, with the stronger group having much
better performance compared to the weaker one.
Thus, our method can automatically find groups of students
with similar learning behavior. This can be valuable informa-
tion for instructors, since they can target these different groups
and provide personalized attention of different forms.
B. Network Data
This data is gathered from two social networks of beach
goers and Twitter users. In Section IV-B1 we present some
statistics of the data and give an overview of both datasets. In
Section IV-B2 we describe the Twitter data and presents its
results and compare it to the baseline and in Section IV-B3
we talk about the beach dataset and present its results.
1) Network Data Description: The vertex activities for
the network datasets are shown in Figures 2b and 2c. The
horizontal axis indicates time index and the vertical axis
indicates vertex index. White represents presence and black
represents absence. Both sets of data have similar covariates:
we use the previous state of the vertices as well as the number
of triads (triplets of nodes which interact with each other) they
were engaged in, the previous day as covariates. We also have
a covariate that indicates whether the attendee is a regular
participant in community activities at the beach, as assessed
ethnographically over a period of several months prior to the
data collection window. The effect of daily seasonality is also
captured by a set of daily fixed effects. We allow for each
node to have its own bias indicating that different nodes have
different attendance tendency. The positive bias indicates a
regular surfer in the beach goers or a regular user among the
Twitter users. The negative bias indicates an irregular surfer
or user. Note that in the case of Twitter data, a social tie is
defined as direct messaging in Tweets and for the Beach data,
a social tie indicates the interaction of surfers while they are
at the beach. An overview of specifications of dataset is given
in Table II. Note that AV and AE denote the average node and
edge presence and are indications of the sparsity of the data.
TABLE II: Data specification and number of used covariates.
NN: size of the vertex set, AV: Average Vertex appearance, AE:
Average Edge appearance NC: number of node covariates and
EC: number of covariates for predicting edges.
Data
Education
Twitter
Beach
NN
244
333
94
AV
37.17%
8.49%
16.66%
AE
N/A
0.036%
0.644%
NC
29
9
11
EC
N/A
36
43
concepts humanistic personality
anxiety dis gad
anxiety dis ocd
optimism self efficacy hardiness
relationships support happiness
relationship money happiness
trait theories personality
inventories tests disorders
critique approaches personality
arousal attraction
drives goals homeostasis intrinsic extrinsic
eating disorders
affective forecasting
sexual behavior orientation
physiology hunger
dsm mental disorder
anxiety dis panic
anxiety dis phobias
future causes anxiety dis
nature causes anxiety dis
groupthink concepts conditions
anxiety dis ptsd
schizophrenia symptoms
schizophrenia causes
Fig. 4: Subgroups of the estimated knowledge component latent tree. Nodes are colored by the topics of knowledges components.
The red nodes talk about relationships and happiness, the black nodes are personality related, the purple nodes are about sexual
attractions, and the golden nodes focus on the eating disorders. On the right subgroup, we see a huge cluster of anxiety related
concepts, from anxiety disorder all the way to serious schizophrenia symptoms.
10
8
6
4
2
0
−2
−4
s
t
n
e
i
c
fi
f
e
o
C
e
t
a
i
r
a
v
o
C
1
0.9
0.8
Clust1
...
...
...
...
...
...
...
... Clust10 Mon
Tue Wed
Thu
Fri
Sat
Sun Prev
... History2 ...
...
...
...
...
...
... History10
Fig. 5: Covariate coefficients/weights learnt for student learning prediction in education data.
1
0.99
0.98
0.97
y
c
a
r
u
c
c
A
0.7
0.6
0.5
0.96
y
c
a
r
u
c
c
A
0.95
0.94
0.4
0.3
CLTM
CCRF
1
1
2
2
3
4
3
5
4
6
7
5
8
6
9
10
7
17
12
18
13
19
14
20
15
16
17
18
19
20
0.93
0.92
0.91
CLTM
CCRF
1
1
2
2
3
4
3
5
4
6
7
5
8
6
9
10 11 12 13 14 15 16 17 18 19 20
7
14
10
11
12
13
9
8
Time points
15
16
17
18
19
20
11
8
9
13
12
Time points
14
10
11
15
16
(a) Conditional presence accuracy boxplots for education data on test
set
(b) Conditional absence accuracy boxplots for education data on test
set
Fig. 6: conditional presence and absence boxplots vs. time for education test data
TABLE III: Prediction scores for both network data. Condi-
tional presence (CP), conditional edge presence (EP), condi-
tional absence (CA) and conditional edge absence (EA) are
defined in Equation (14-17). Relative difference of average
(RDA) and relative difference of median (RDM) are defined
in Equation (18) and (19).
Dataset
Twitter
Twitter
Beach
Beach
CP
EP
CA
EA
37.66%
42.31%
10.61%
14.10%
243.73%
565.98%
60.66%
60.81%
-2.45%
-2.85%
-1.98%
-2.00%
-0.30%
-0.33%
-0.14%
-0.19%
RDA
RDM
RDA
RDM
2) Twitter Network: We have collected this dataset by
observing the tweeting activity of 333 individuals participating
in a discussion on an emergency management topic #smemchat
for a period of 6 months 4. The observation period starts
from Dec 1st 2013 to Apr 29th 2014 We have a total number
of 2313 snapshots of the network which are binned into 26
weekly bins. The vertex set consists of all the nodes that
participated in the topic during the observation period and
vertex presence is indicated by status updates. Vertex activity
peaks on Fridays. Interactions are defined as direct messages
among the users, therefore the network is very sparse in terms
of user interactions.
A user in the Twitter network is defined as a "regular"
if he or she appears on the network more frequently than a
specified threshold A popular user is one whose number of
followers is greater than the median of the number of followers
of all users. A user is fav if their number of favorites is greater
than the median of the number of favorites of all the network
attendees. Other covariates remain the same as discussed in
the data overview.
4We refrain from providing the link to the data to preserve anonymity
The weights learned for the covariates described is shown
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
e
c
n
a
m
r
o
f
r
e
p
t
n
e
d
u
t
s
CCRF predictions
CLTM predictions
actual
0
0
10
20
Train samples
30
40
50
60
70
80
Test samples
(a) Group of "strong" learners
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
e
c
n
a
m
r
o
f
r
e
p
t
n
e
d
u
t
s
0
0
10
20
30
Train samples
40
50
80
CCRF predictions
CLTM predictions
actual
60
70
Test samples
(b) Group of "weak" learners
Fig. 7: Performance of group of "strong" and "weak"
learners over the semester. First 60 time points are training
samples and rest are test. We demonstrate actual performance
in answering questions as well as the predictions from the
learnt CLTM and CCRF.
in Figure 8a. As illustrated, regularity of the user and its past
time activity are the most relevant covariates with the highest
weights. Seasonality covariates are the week number in each
month. As expected different weeks within each month behave
approximately similar. Also, as it was the case with Educa-
tional data, seasonality covariates are down-weighting the other
covariates' effects rather than having negative correlation with
data.
As mentioned in Section II-B, we are also interested
in tracking social interaction dynamics conditioned on the
predicted node state of the network using the inferred state
of the hidden variables in the CLTM model. The idea is
that an edge cannot form unless both nodes that form it are
present. Following the same reasoning for prediction, we limit
edge prediction to the predicted node set; which drastically
reduces the sparsity of the edge set. The covariates used for
edge prediction are seasonality effects, previous state of the
network, number of present nodes in the previous day, number
of K-cycle structures [15], the presence of the edge in the
previous day, whether the edge is between regular-regular,
regular-irregular or irregular-irregular network users. The co-
efficients learned for these covariates are shown in Figure 9a.
We find that regular/regular interactions (interactions between
regular users) have a high weight, whereas the weight of an
irregular/irregular interaction is very low indicating that regular
nodes are more likely to talk to one another compared to
irregular nodes. Also as expected, regular/irregular interactions
are somewhere in between the two. Another interesting point
is that if one of the nodes that form a specific edge are a
frequent and regular attendee of the network, they will have
a very important role in prediction. Previous time state of the
network is also another thing that highly affects prediction.
Figure 9b shows the learnt weights for the covariates
which consist of the inferred hidden variables from the vertex
conditional latent tree model. In other words, after the CLTM
is learnt over the vertices, the configuration of hidden nodes is
inferred through belief propagation. These inferred values are
then incorporated as covariates into the edge model as follows:
for predicting each edge, we incorporate the configuration of
hidden variables which are parents of the endpoints of the
corresponding vertices that form the edge. In Figure 9b, we
see that different hidden nodes affect the presence of edges
to different extents, thus indicating that different groups have
varying tendencies for forming edges.
10a,
Prediction accuracy curves vs. time, indicating one-step-
ahead prediction for both node prediction and edge prediction
are also presented in Figure 10, respectively. As it is depicted
in the Figure
improved vertex prediction accuracy
boosts edge prediction performance, since edge prediction
is conditioned on the predicted node set. Incorporating the
inferred state of the hidden variables of the CLTM model
is another important factor that increases prediction accuracy
compared to the baseline Chain CRF without the inferred
states. As illustrated in Figure 10b, CLTM improves CP while
maintaining a good CA, resulting in a 243.73% improvement
in average EP.
3) Beach Network: This data contains a dynamically evolv-
ing network of interpersonal communications among individ-
uals congregating on a beach in Southern California observed
over a one-month period [7]. The vertex set in this network
is the windsurfers appearance on the beach in this 31 day
period and the edge set is composed of their interpersonal
communications recorded in the data set.
The network was tracked two times a day, for 31 days from
Aug 28, 1986 to Sept 27, 1987 by Freeman et. al. There is
a total number of 94 windsurfers who are divided into two
groups of regulars (with 54 members) and irregulars (with 41
members). The groups of regulars is further categorized into
two groups of "Group 1" with 22 members, "Group 2" with 21
members, leaving 11 individuals in this category as ungrouped.
Vertex appearance on the beach ranges from 3 to 37 in the 31
day tracking period. The number of communication ties per
day ranged from 0 to 96 in this dataset.
The covariates used by the vertex model are the regularity
effect, group terms and all other covariates described in the
network data description. The covariate weights learned by
the algorithm is illustrated in Figure 8b. The highest weight
is given to the previous vertex state and regularity. The same
discussion about the effect of seasonality to the data holds for
the Beach data as well. But here we can see that Saturday
has a slightly higher weight
than the rest of seasonality
covariates, and this indicates that Saturday down-weights the
other parameters less than the other days, which in turn means
that it is more likely that people come to the beach if it is a
Saturday.
V. CONCLUSION
In this paper we propose a framework for modeling and
tracking high-dimensional temporal data via conditional ran-
dom fields. An approximation of latent tree structure in the
conditional random field allows for efficient inference. This
is a step forward towards understanding the high-dimensional
time series with covariate effects. The success application of
3
2
1
0
−1
−2
−3
−4
−5
s
t
n
e
i
c
fi
f
e
o
C
e
t
a
i
r
a
v
o
C
Regularity Popularity
Fav
Week 1 Week 2 Week 3 Week 4 Prev time Triad count
1
0.5
0
−0.5
−1
−1.5
−2
−2.5
s
t
n
e
i
c
fi
f
e
o
C
e
t
a
i
r
a
v
o
C
−3
Group
Reg
Mon
Tue
Wed
Thur
Fri
Sat
Sun
Prev
Triads
(a) Twitter data covariate coefficients
(b) Beach data covariate coefficients
Fig. 8: Node covariate weights/coefficients learnt for predicting node participation in Twitter and beach data.
2
1.5
1
0.5
0
−0.5
−1
−1.5
0
s
t
n
e
i
c
fi
f
e
o
C
e
t
a
i
r
a
v
o
C
y
c
a
r
u
c
c
A
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
bias
rg/rg
irg/irg
rg/irg
rg&frq #of ppl
lag
kCycles Week1 Week2 Week3 Week4
(a) Coefficients of covariates for edge prediction
2
1
0
−1
−2
−3
0
s
a
i
B
c
fi
i
c
e
p
S
e
d
o
N
5
Hidden node index
10
15
20
25
(b) Coefficients of covariates based on inferred hidden states of the
vertex CLTM, used for edge prediction
Fig. 9: Learnt coefficients for various covariates for edge prediction in Twitter data
CLTM CP
CCRF CP
CLTM CA
CCRF CA
y
c
a
r
u
c
c
A
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
CLTM EP
CCRF EP
CLTM EA
CCRF EA
0
0
5
Time Points
10
15
20
25
0
0
5
Time Points
10
15
20
25
(a) Vertex prediction accuracy
(b) edge prediction accuracy
Fig. 10: Vertex and edge prediction accuracy for the Twitter dataset
our proposed method to educational data and network data
reveals potential in applying the method to a wider class of
problems.
ACKNOWLEDGEMENTS
F. Arabshahi and F. Huang are supported by NSF BIG-
DATA grant no. IIS-1251267. F. Arabshahi was also partially
supported by the UCI Data Science Initiative summer fel-
lowship. A. Anandkumar is supported in part by Microsoft
Faculty Fellowship, NSF Career award CCF-1254106, ONR
Award N00014-14-1-0665, ARO YIP Award W911NF-13-1-
0084 and AFOSR YIP FA9550-15-1-0221. C. T. Butts and
S. M. Fitzhugh are supported in part by NSF grants OIA-
1028394, CMMI-1031853 and IIS-1251267 and Army Re-
search Office award ARO-W911NF-14-1-0552.
REFERENCES
[1] A. Anandkumar, R. Ge, D. Hsu, and S. M. Kakade. A tensor spectral
approach to learning mixed membership community models. arXiv
preprint arXiv:1302.2684, 2013.
[2] N. Bier, S. Lip, R. Strader, C. Thille, and D. Zimmaro. An approach to
knowledge component/skill modeling in online courses. Open Learning,
2014.
J. K. Bradley and C. Guestrin. Learning tree conditional random fields.
In International Conference on Machine Learning (ICML 2010), Haifa,
Israel, June 2010.
[3]
[4] L. D. Brown.
In-season prediction of batting averages: A field test
of empirical bayes and bayes methodologies. The Annals of Applied
Statistics, pages 113–152, 2008.
[5] M. J. Choi, V. Y. Tan, A. Anandkumar, and A. S. Willsky. Learning
The Journal of Machine Learning
latent
tree graphical models.
Research, 12:1771–1812, 2011.
J. R. Foulds, C. DuBois, A. U. Asuncion, C. T. Butts, and P. Smyth.
A dynamic relational
infinite feature model for longitudinal social
networks.
In International Conference on Artificial Intelligence and
Statistics, pages 287–295, 2011.
[6]
[7] L. C. Freeman, S. C. Freeman, and A. G. Michaelson. On human social
intelligence. Journal of Social and Biological Structures, 11(4):415–
425, 1988.
[8] M. Goldberg, M. Hayvanovych, M. Magdon-Ismail, and W. A. Wallace.
Extracting hidden groups and their structure from streaming interaction
data. 2015.
[9] R. D. Gupta and D. Kundu. Exponentiated exponential family: an
alternative to gamma and weibull distributions. Biometrical journal,
43(1):117–130, 2001.
J. D. Hamilton. Time series analysis, volume 2. Princeton university
press Princeton, 1994.
[10]
[11] S. Hanneke, W. Fu, and E. P. Xing. Discrete temporal models of social
networks. Electronic Journal of Statistics, 4:585–605, 2010.
[12] K. R. Koedinger, R. S. Baker, K. Cunningham, A. Skogsholm, B. Leber,
and J. Stamper. A data repository for the edm community: The pslc
datashop. Handbook of educational data mining, 43, 2010.
[13] A. Krishnamurthy, S. Balakrishnan, M. Xu, and A. Singh.
Effi-
cient active algorithms for hierarchical clustering.
arXiv:1206.4672, 2012.
arXiv preprint
[14] S. Kumar and M. Hebert. Discriminative fields for modeling spatial
dependencies in natural images. In In NIPS. MIT Press, 2003.
[15] R. M. May et al. Simple mathematical models with very complicated
dynamics. Nature, 261(5560):459–467, 1976.
[16] A. Quattoni, S. Wang, L.-P. Morency, M. Collins, and T. Darrell. Hidden
IEEE Transactions on Pattern Analysis &
conditional random fields.
Machine Intelligence, (10):1848–1852, 2007.
[17] M. Schmidt, K. Murphy, G. Fung, and R. Rosales. Structure learning
in random fields for heart motion abnormality detection. In In CVPR,
2008.
[18] A. Sen, H. Deng, and S. Guha. On a graph partition problem with
application to vlsi layout. Information processing letters, 43(2):87–94,
1992.
[19] F. Sha and F. Pereira. Shallow parsing with conditional random fields.
pages 213–220, 2003.
[20] A. Torralba, K. P. Murphy, and W. T. Freeman. Contextual models for
object detection using boosted random fields. In In NIPS, 2004.
[21] A. White and T. B. Murphy. Mixed-membership of experts stochastic
blockmodel. arXiv preprint arXiv:1404.0221, 2014.
[22] E. P. Xing, W. Fu, and L. Song. A state-space mixed membership
blockmodel for dynamic network tomography. The Annals of Applied
Statistics, 4(2):535–566, 2010.
J. Yang, J. McAuley, and J. Leskovec. Community detection in networks
with node attributes. arXiv preprint arXiv:1401.7267, 2014.
[23]
|
1311.5978 | 1 | 1311 | 2013-11-23T09:07:11 | Event Evolution Tracking from Streaming Social Posts | [
"cs.SI",
"physics.soc-ph"
] | Online social post streams such as Twitter timelines and forum discussions have emerged as important channels for information dissemination. They are noisy, informal, and surge quickly. Real life events, which may happen and evolve every minute, are perceived and circulated in post streams by social users. Intuitively, an event can be viewed as a dense cluster of posts with a life cycle sharing the same descriptive words. There are many previous works on event detection from social streams. However, there has been surprisingly little work on tracking the evolution patterns of events, e.g., birth/death, growth/decay, merge/split, which we address in this paper. To define a tracking scope, we use a sliding time window, where old posts disappear and new posts appear at each moment. Following that, we model a social post stream as an evolving network, where each social post is a node, and edges between posts are constructed when the post similarity is above a threshold. We propose a framework which summarizes the information in the stream within the current time window as a ``sketch graph'' composed of ``core'' posts. We develop incremental update algorithms to handle highly dynamic social streams and track event evolution patterns in real time. Moreover, we visualize events as word clouds to aid human perception. Our evaluation on a real data set consisting of 5.2 million posts demonstrates that our method can effectively track event dynamics in the whole life cycle from very large volumes of social streams on the fly. | cs.SI | cs | Event Evolution Tracking from Streaming Social Posts
Pei Lee
University of British Columbia
Vancouver, BC, Canada
[email protected]
Laks V.S. Lakshmanan
University of British Columbia
Vancouver, BC, Canada
[email protected]
Evangelos Milios
Dalhousie University
Halifax, NS, Canada
[email protected]
3
1
0
2
v
o
N
3
2
]
I
S
.
s
c
[
1
v
8
7
9
5
.
1
1
3
1
:
v
i
X
r
a
ABSTRACT
Online social post streams such as Twitter timelines and forum dis-
cussions have emerged as important channels for information dis-
semination. They are noisy, informal, and surge quickly. Real
life events, which may happen and evolve every minute, are per-
ceived and circulated in post streams by social users. Intuitively,
an event can be viewed as a dense cluster of posts with a life cy-
cle sharing the same descriptive words. There are many previous
works on event detection from social streams. However, there has
been surprisingly little work on tracking the evolution patterns of
events, e.g., birth/death, growth/decay, merge/split, which we ad-
dress in this paper. To define a tracking scope, we use a sliding
time window, where old posts disappear and new posts appear at
each moment. Following that, we model a social post stream as
an evolving network, where each social post is a node, and edges
between posts are constructed when the post similarity is above a
threshold. We propose a framework which summarizes the infor-
mation in the stream within the current time window as a "sketch
graph" composed of "core" posts. We develop incremental update
algorithms to handle highly dynamic social streams and track event
evolution patterns in real time. Moreover, we visualize events as
word clouds to aid human perception. Our evaluation on a real data
set consisting of 5.2 million posts demonstrates that our method
can effectively track event dynamics in the whole life cycle from
very large volumes of social streams on the fly.
1.
INTRODUCTION
In the current social web age, people easily feel overwhelmed
by the information deluge coming from post streams which flow in
from channels like Twitter, Facebook, forums, Blog websites and
email-lists. As of 2009, it was reported [1], e.g., that each Twitter
user follows 126 users on average, and on each day, the received
social streaming posts will cost users considerable time to read,
only to discover a small interesting part. This is a huge overhead
that users pay in order to find a small amount of interesting infor-
mation. There is thus an urgent need to provide users with tools
which can automatically extract and summarize significant infor-
mation from highly dynamic social streams, e.g., report emerging
bursty events, or track the evolution of a specific event in a given
time span. There are many previous studies [19, 22, 24, 25, 12,
7] on detecting new emerging events from text streams; they serve
the need for answering the query "what's happening?" over so-
cial streams. However, in many scenarios, users may want to know
more details about an event and may like to issue advanced queries
like "how're things going?". For example, for the event "SOPA
(Stop Online Piracy Act) protest" happening in January 2012, ex-
isting event detection approaches can discover bursty activities at
each moment, but cannot answer queries like "how SOPA protest
has evolved in the past few days?". An ideal output to such an
evolution query would be a "panoramic view" of the event his-
tory, which improves user experience. In this work, we consider
this kind of queries as an instance of the event evolution tracking
problem, which aims to track the event evolutionary dynamics at
each moment from social streams. Typical event evolution patterns
include emerging (birth) or disappearing (death), inflating (growth)
or shrinking (decay), and merging or splitting of events. Event de-
tection can be viewed as a subproblem of event evolution tracking.
We try to solve the event evolution tracking problem in the paper.
There are several major challenges in the tracking of event evo-
lution. The first challenge is the effective organization of noisy
social post streams into a meaningful structure. Social posts such
as tweets are usually written in an informal way, with lots of ab-
breviations, misspellings and grammatical errors. Even worse, a
correctly written post may have no significance and be just noise.
Recent works on event detection from Twitter [28, 22] recognize
and handle noise in post streams in a limited and ad hoc manner but
do not handle noise in a systematic formal framework. The second
challenge is how to track and express the event evolution behaviors
precisely and incrementally. Most related work reports event ac-
tivity by volume on the time dimension [22, 19]. While certainly
useful, this cannot show the evolution behaviors about how events
are split or merged, for instance. The third challenge is the sum-
mary and annotation of events. Since an event may easily contain
thousands of posts, it is important to summarize and annotate it in
order to facilitate human perception. Recent related works [22, 19,
28] typically show users just a list of posts ranked by importance
or time freshness, which falls short of addressing this challenge.
To handle the above mentioned challenges, we first model so-
cial streams as an evolving post network, and then propose a sketch
graph-based framework to track the evolution of events in the post
network (Section 4.1). Intuitively, a sketch graph can be viewed
as a compact summary of the original post network. The sketch
graph only contains core posts from the post network, where core
posts are defined as posts that play a central role in the network.
Noise posts will be directly pruned by the sketch graph. As we will
discuss in Section 5, evolution behaviors can be effectively and in-
(a) The sketch-based framework
(b) Event evolution tracking
Figure 1: (a) Post network captures the correlation between posts in the time window at each moment, and evolves as time rolls on.
Core nodes and core edges are bolded. (b) From moment t to t + 1, typical event evolution behaviors include birth or death, growth
or decay, merging or splitting of events. Each event is annotated by a topical word cloud.
crementally expressed based on a group of primitive operations in
the sketch graph. Technically, we define an event as a cluster in the
post network, and then summarize and annotate each event by top-
ical word-clouds. We show an overview of major steps for event
tracking from social streams in Figure 1. Note that as time rolls
on, the post network, events and their annotations will be updated
incrementally at each moment.
We notice that at a high level, our definition seemingly resem-
bles previous work on density-based clustering over streaming data,
e.g., DenStream in [9] and cluster maintenance in [2] and [5]. How-
ever, there are several major differences. First, our approach works
on an evolving graph structure and provides users the flexibility
in choosing the scope for tracking and monitoring new events by
means of a fading time window, while the existing work doesn't
provide a tracking scope. Second, the existing work can only pro-
cess the adding of nodes/edges one by one, while our approach can
handle adding, deleting and fading of nodes subgraph by subgraph.
This is an important requirement for dealing with the high through-
put rate of online post streams. Third, the focus of our approach
is tracking and analyzing the evolution dynamics in the whole life
cycle of events. By contrast, they focus on the maintenance of clus-
ters, which is only a sub-task in our problem.
Finally, to compare with traditional topic tracking on news arti-
cle streams, we note that this problem is usually formulated as a
classification problem [4]: when a new story arrives, compare it
with topic features in the training set and if it matches sufficiently,
declare it to be on a topic. Commonly used techniques include de-
cision trees and k-NN [29]. This approach assumes that topics are
predefined before tracking. Thus, we cannot simply apply topic
tracking techniques to event tracking in social streams, since future
events are unknown and may not conform to any previously known
topics. Moreover, traditional topic tracking has difficulties in track-
ing the composite behaviors such as merging and splitting, which
are definitely a key aspect of event evolution.
In summary, the main problem we study in this paper is captured
by the following questions: how to efficiently track the evolution
behavior of social post streams such as Twitter, which are noisy and
highly dynamic? how to do this incrementally? what is an effective
way to express evolution behavior of events? In this paper, we
develop a framework and algorithms to answer all these questions.
Our main contributions are the following:
• We design an effective approach to extract and organize mean-
• We filter noisy posts by introducing sketch graph (Section
4.1)), based on which we define a group of primitive opera-
tions and express evolution behaviors with respect to graphs
and events using these primitive operations (Section 5);
ingful information from noisy social streams (Section 3);
S(p1, p2)
SF (p1, p2)
(δ1, ε0, ε1)
Gt(Vt, Et)
Gt(Vt, Et)
wt(p)
N (p)
C, St
C, St
Nc(p)
E,(cid:101)St
A
the content similarity between p1 and p2
the fading similarity between p1 and p2
density factors for core post, edge and core edge
the weight of post p at time moment t
the sketch graph of the post network at moment t
the post network at moment t
the neighbor set of p in Gt
a component, a component set at moment t
a cluster, a cluster set at moment t
the set of clusters where p's neighboring core posts belong
an event, an event set at moment t
the annotation for an event
Table 1: Notation.
• We propose efficient algorithms cTrack and eTrack to track
the evolution of clusters and events accurately and incremen-
tally, superior in both quality and performance to existing ap-
proaches that find the evolution patterns by matching events
in consecutive time moments (Section 6).
• Our evaluation on a large real data set demonstrates that our
method can effectively track all six kinds of event evolution
behaviors from highly dynamic social post streams in a scal-
able manner (Section 7).
More related work is discussed in Section 2. We summarize the
paper and discuss extensions in Section 8. For convenience, we
summarize the major notations used in the paper, in Table 1.
2. RELATED WORK
Work related to this paper mainly falls in one of these categories.
Topic/Event/Community detection and tracking. Most previous
works detect events by discovering topic bursts from a document
stream. Their major techniques are either detecting the frequency
peaks of event-indicating phrases over time in a histogram, or mon-
itoring the formation of a cluster from a structure perspective. A
feature-pivot clustering is proposed in [12] to detect bursty events
from text streams. Sarma et al. [25] design efficient algorithms to
discover events from a large graph of dynamic relationships. Jin
et al. [15] present Topic Initiator Detection (TID) to automatically
find which web document initiated the topic on the Web. Louvain
method [8], based on modularity optimization, is the state-of-the-
art community detection approach which outperforms others. How-
ever, Louvain method cannot not resist massive noise. None of the
above works address the event evolution tracking problem.
There is less work on evolution tracking. An event-based charac-
terization of behavioral patterns for communities in temporal inter-
action graphs is presented in [6]. A framework for tracking short,
distinctive phrases (called "memes") that travel relatively intact
Time WindowFrequencySocial StreamsPost Network, Sketch GraphExtractMoment tE2E3E4E3Moment t+1E1E5MergeGrowBornthrough on-line text was developed in [19]. Unlike these works,
we focus on the tracking of real world event-specific evolution pat-
terns from social streams.
Social Stream Mining. Weng et al. [28] build signals for individ-
ual words and apply wavelet analysis on the frequency of words to
detect events from Twitter. Twitinfo [22] detects events by keyword
peaks and represents an event it discovers from Twitter by a time-
line of related tweets. Recently, Agarwal et al. [2] discover events
that are unraveling in microblog streams, by modeling events as
dense clusters in highly dynamic graphs. Angel et al. [5] study
the efficient maintenance of dense subgraphs under streaming edge
weight updates. Both [2] and [5] model the social stream as an
evolving entity graph, but suffer from the drawback that post at-
tributes like time and author cannot be reflected. Another draw-
back of [2] and [5] is that they can only handle edge-by-edge up-
dates, but cannot handle subgraph-by-subgraph bulk updates. Both
drawbacks are solved in our paper.
Clustering and Evolving Graphs. In this paper, we summarize an
original post network into a sketch graph based on density parame-
ters. Compared with partitioning-based approaches (e.g., K-Means
[14]) and hierarchical approaches (e.g., BIRCH [14]), density-based
clustering (e.g., DBSCAN [14]) is effective in finding arbitrary-
shaped clusters, and is robust to noise. The main challenge is to ap-
ply density-based clustering on fast evolving post networks. CluS-
tream [3] is a framework that divides the clustering process into an
online component which periodically generates detailed summary
statistics for nodes and an offline component which uses only the
summary statistics for clustering. However, CluStream is based on
K-Means only. DenStream [9] presents a new approach for discov-
ering clusters in an evolving data stream by extending DBSCAN.
This work is related to us in that both employ density based clus-
tering. The differences between our approach and DenStream were
discussed in detail in the introduction. Subsequently, DStream [10]
uses an online component which maps each input data record into a
grid and an offline component which generates grid clusters based
on the density. Another related work is by Kim et al. [16], which
first clusters individual snapshots into quasi-cliques and then maps
them over time by looking at the density of bipartite graphs be-
tween quasi-cliques in adjacent snapshots. Although [16] can han-
dle birth, growth, decay and death of clusters, the splitting and
merging behaviors are not supported.
In contrast, our approach
is totally incremental and is able to track composite behaviors like
merging and splitting in real time.
3. POST NETWORK CONSTRUCTION
In this section, we describe how we construct a post network
from a social post stream. The main challenge is detecting similar-
ity between streaming posts efficiently and accurately, taking the
time of the posts into account. We use a notion of fading similarity
(Section 3.2) and propose a technique called linkage search to effi-
ciently detect posts similar to a post as it streams in (Section 3.3).
3.1 Social Stream Preprocessing
Social posts such as tweets are usually written in an informal
way. Our aim is to design a processing strategy that can quickly
judge what a post talks about and is robust enough to the informal
writing style. In particular, we focus on the entity words contained
in a post, since entities depict the topic. For example, given a tweet
"iPad 3 battery pointing to thinner, lighter tablet?", the entities are
"iPad", "battery" and "tablet". However, traditional Named En-
tity Recognition tools [23] only support a narrow range of entities
like Locations, Persons and Organizations. NLP parser based ap-
proaches [17] are not appropriate due to the informal writing style
of posts and the need for high processing speed. Also, simply treat-
ing each post text as a bag of words [21] will lead to loss of accu-
racy, since different words have different weights in deciding the
topic of a post. To broaden the applicability, we treat each noun
in the post text as a candidate entity. Technically, we obtain nouns
from a post text using a Part-Of-Speech Tagger1, and if a noun is
plural (POS tag "NNS" or "NNPS"), we obtain the prototype of this
noun using WordNet stemmer2. In practice, we find this prepro-
cessing technique to be robust and efficient. In the Twitter dataset
we used in our experiments (see Section 7), each tweet contains 4.9
entities on an average. We formally define a social post as follows.
DEFINITION 1. (Post). A post p is a triple (L, τ, u), where L
is the list of entities in the post, τ is the time stamp of the post, and
u is the user who posted it.
We let pL denote L in the post p for simplicity, and analogously
for pτ and pu. We use pL to denote the number of entities in p.
3.2 Fading Similarity
Post similarity is the most crucial criterion in correlating posts
of the same event together. Traditional similarity measures such
as TF-IDF based cosine similarity, Jaccard Coefficient and Pearson
Correlation [21] only consider the post content. However, clearly
time dimension should play an important role in determining post
similarity, since posts created closer together in time are more likely
to discuss the same event than posts created at very different mo-
ments. We introduce the notion of fading similarity to capture both
content similarity and time proximity. Formally, we define the fad-
ing similarity between a pair of posts pi and pj as
SF (pi, pj ) =
S(pL
D(pτ
i , pL
j )
i − pτ
j )
(1)
i , pL
i and pL
i − pτ
j ) = e
j to the interval [0, 1], and D(pτ
j ) ≥ 1. For example, S(pL
i , pL
j )/(pL
i ∩ pL
i −pτ
pτ
j ) is a set-based similarity measure that maps the
where S(pL
i −
similarity between pL
j ) is a distance measure that is monotonically increasing with
pτ
j and D(pτ
i − pτ
pτ
j ) may be
i ∪ pL
j ),
j ) = (pL
the Jaccard coefficient with S(pL
i , pL
i − pτ
j ) may be D(pτ
i − pτ
and D(pτ
j . We will
compare different measures in experiments. It is known that nouns
are usually more topic relevant than verbs, adjectives, etc [20].
Consequently, entity-based similarity of posts is more appropri-
ate than similarity based on all words. Besides, it has the advan-
tage of smaller computational overhead.
It is trivial to see that
0 ≤ SF (pi, pj) ≤ 1 and that SF (pi, pj) is symmetric.
3.3 Post Network and Linkage Search
To find the implicit correlation between posts as they stream in,
we build a post network based on the following rule: if the fading
similarity between two posts is higher than a given threshold ε0,
we create an edge between them. More formally:
DEFINITION 2. (Post Network). The snapshot of post network
at moment t is defined as a graph Gt(Vt,Et), where each node
p ∈ Vt is a post, and an edge (pi, pj) ∈ Et is constructed iff
SF (pi, pj) ≥ ε0, where 0 < ε0 < 1 is a given parameter.
We monitor social streams using a fading time window, which
will be introduced explicitly in Section 5.3. For now, imagine a
time window of observation and consider the post network at the
beginning of the time window. As we move forward in time, new
1POS Tagger, http://nlp.stanford.edu/software/tagger.shtml
2JWI WordNet Stemmer, http://projects.csail.mit.edu/jwi/
Figure 2: The functional relationships between different types
of objects defined in this paper. Refer to Table 1 for notations.
posts flow in and old posts fade out and Gt(Vt,Et) is dynami-
cally updated at each moment, with new nodes/edges added and
old nodes/edges removed. Removing a node and associated edges
from Gt(Vt,Et) is an easy operation, so let us investigate the case
when a node is added. When a new post p flows in, we need to con-
struct the linkage (i.e., edges) between p and nodes in Vt, following
Definition 2. In a real scenario, since the number of nodes Vt can
easily go up to millions, it is impractical to compare p with every
node in Vt to verify the satisfaction of Definition 2. Below, we pro-
pose Linkage Search to identify the neighbors of p accurately by
accessing only a small subset of nodes in Vt.
Linkage Search. Let N (p) denote the set of neighbors of p that
satisfy Definition 2. The problem of linkage search is finding N (p)
accurately by accessing only a small node set N (cid:48), where N (p) ⊆
N (cid:48) ⊂ Vt and N (cid:48) (cid:28) Vt. To solve this problem, first we con-
struct a post-entity bipartite graph, and then perform a two-step ran-
dom walk process on this bipartite graph and use the hitting counts.
The main idea of linkage search is to let a random surfer start from
post node p and walk to any entity node in pL on the first step, and
continue to walk back to post nodes except p on the second step. All
the post nodes visited on the second step form a set N (cid:48). For any
node q ∈ N (cid:48), q can be hit multiple times from different entities
and the total hitting count H(p, q) can be aggregated. Assuming
the measure of S(pL, qL) in Eq. (1) is Jaccard coefficient, we can
verify the linkage between p and q by checking the condition
≥ ε0
(pL + qL − H(p, q)) D(pτ − qτ)
H(p, q)
SF (p, q) =
(2)
Linkage search supports the construction of a post network on
It is easy to see that for post q (cid:54)∈ N (cid:48), SF (p, q) = 0.
the fly.
Thus, we do not need to access posts that are not in N (cid:48). Since a
post like tweet usually connects to very few entities, N (cid:48) (cid:28) Vt
generally holds, thus making linkage search very efficient. Suppose
the average number of entities in each post is d1 and the average
number of posts mentioning each entity is d2. Then linkage search
can find the neighbor set of a given post in time O(d1d2).
4. SKETCH-BASED SUMMARIZATION
Here we first introduce the notion of sketch graph based on den-
sity parameters, and define events in the post network based on
components of the sketch graph. The relationships between differ-
ent types of objects defined in this paper are illustrated in Figure
2. As an example to explain this figure, the arrow from Gt to Gt
labeled Ske means Gt = Ske(Gt). See Table 1 for notations.
4.1 Sketch Graphs
Many posts tend to be just noise so it is essential to identify those
posts that play a central role in describing events. We formally
capture them using the notion of core posts. On web link graphs,
there is a lot of research on node authority ranking, e.g., HITS and
PageRank [21]. However, most of these methods are iterative and
not applicable to one-scan computation on streaming data.
In this paper, we introduce a sketch graph Gt(Vt, Et) of post
network Gt(Vt,Et) based on density parameters (δ1, ε0, ε1), where
ε1 ≥ ε0. In density-based clustering , δ1 (a.k.a. M inP ts in DB-
SCAN [11]) is the minimum number of nodes in an ε0-neighborhood,
required to form a cluster.
In the post network, we consider δ1
to be the threshold to judge whether a post is important and sim-
ilarly ε1 is a threshold for core edges. The reason we choose
density-based clustering is that, compared with partitioning-based
approaches (e.g., K-Means [14]) and hierarchical approaches (e.g.,
BIRCH [14]), density-based clustering (e.g., DBSCAN) defines
clusters as areas of higher density than the remainder of the data
set, which is effective in finding arbitrary-shaped clusters and is ro-
bust to noise. We adapt the concepts from density-based clustering
and define the post weights as follows.
DEFINITION 3. (Post Weight). Given a post p = (L, τ, a) in
Gt(Vt,Et) and its neighbor set N (p), the weight of p at moment t,
t ≥ pτ , is defined as
(cid:88)
q∈N (p)
wt(p) =
1
D(t − pτ)
SF (p, q)
(3)
Notice, post weight decays as time moves forward, although the
neighbor set N (p) may change. Thus, post weights need to be con-
tinuously updated. In practice, we only store the sum(cid:80)
with p to avoid frequent updates and compute wt(p) on demand
when we need to judge the importance of a post. Based on post
weight, we distinguish nodes in Gt(Vt,Et) into three types, as de-
fined below.
q∈N (p) SF (p, q)
DEFINITION 4. (Node Types).
• A post p is a core post if wt(p) ≥ δ1;
• It is a border post if wt(p) < δ1 but there exists at least one
• It is a noise post if it is neither core nor border, i.e., wt(p) <
core post q ∈ N (p);
δ1 and there is no core post in N (p).
Intuitively, a post is a core post if it shares enough common en-
tities with many other posts. Neighbors of a core post are at least
border posts, if not core posts themselves. In density-based clus-
tering, core posts play a central role: if a core post p is found to
be a part of a cluster C, its neighboring (border or core) posts will
also be a part of C. Analogouly to the notion of core posts, we use
the threshold δ1 to define core edges. An edge (p, q) is a core edge
if SF (p, q) ≥ ε1, where ε1 ≥ ε0. Notice that a core edge may
connect non-core nodes. Core posts connected by core edges will
build a summary of Gt(Vt,Et), that we call the sketch graph (See
Figure 2).
DEFINITION 5. (Sketch Graph). Given post network Gt(Vt,Et)
and density parameters (δ1, ε0, ε1), we define the sketch graph of
Gt as the subgraph induced by its core posts and core edges. More
precisely, the sketch graph Gt(Vt, Et) satisfies the condition that
each node p ∈ Vt is a core post and each edge (p, q) ∈ Et is a
core edge. We write Gt = Ske(Gt).
Intuitively, all important nodes in Gt(Vt,Et) and their relation-
ships are retained in Gt(Vt, Et). Empirically, we found that ad-
justing the granularity of (δ1, ε0, ε1) to make the size Vt roughly
equal to 20% of Vt leads to a good balance between the quality of
the sketch graph in terms of the information retained and its space
complexity. The tuning detail can be found in Section 7.1.
4.2 Event Identification and Annotation
We define events based on post clusters. Recall that if two core
posts are connected by core edges, they should belong to the same
t(cid:31)tGtStSSkeCluCCSkeGenSkeGen(cid:143)(cid:143)tS(cid:4)EAAnn(cid:32)cluster. It implies all core posts in cluster C form a connected com-
ponent C in Gt(Vt, Et) and we write C = Ske(C). Let St denote
the set of connected components in Gt. Notice that St and Gt have
the same node set and the same structure, so we write St = Gt
for simplicity. To generate clusters based on the sketch graph dis-
cussed above, we can start from a connected component C ∈ St
to build a cluster C. See Figure 2 for the functional relationships
between different types of objects. We define cluster C as follows.
DEFINITION 6. (Cluster). Given Gt(Vt,Et) and the correspond-
ing sketch graph Gt(Vt, Et), a cluster C of Gt is a set of core
posts and border posts generated from a connected component C
in Gt(Vt, Et), written as C = Gen(C), and defined as follows:
• All posts in the component C form the core posts of C.
• For every core post in C, all its neighboring border posts in
Gt form the border posts in C.
A core post only appears in one cluster (by definition). If a bor-
der post is associated with multiple core posts in different clusters,
this border post will appear in multiple clusters. Events are defined
based on clusters in Gt. However, not every cluster can form an
event; we treat clusters with a very small size as outliers, since they
do not gain wide popularity at the current moment. We use E and
O to denote an event and an outlier respectively.
DEFINITION 7. (Event). Given a cluster C, the following func-
tion distinguishes between an event and an outlier.
(cid:26)true, if C ≥ ϕ
false, otherwise
(4)
Event(C) =
where ϕ is a size threshold.
We empirically set ϕ = 10 for event identification. Note that
outliers are different from noise; noise is associated at the level
of posts, as opposed to clusters. Besides, an outlier at the current
moment may grow into an event in the future, and an event may
also degrade into an outlier as time passes.
Entity Annotation. Considering the huge volume of posts in an
event, it is important to summarize and present a post cluster as a
conceptual event to aid human perception. In related work, Twit-
info [22] represents an event it discovers from Twitter by a time-
line of tweets. Although the tweet activity by volume over time is
shown, it is tedious for users to read tweets one-by-one to figure out
the event detail. In this paper, we summarize a snapshot of an event
by a word cloud [13]. The font size of a word in the cloud indicates
its popularity. Compared with Twitinfo, a word cloud provides a
summary of the event at a glance and is much easier for a human
to perceive. Technically, given an event E, the annotation A for
E, computed as A = Ann(E), is a set of entities with popularity
score, expressed as A = {(e1, Pe1 ), (e2, Pe2 ),···}.
We take entities as the word candidates in the cloud. Intuitively,
an entity e is popular in an event if many important posts in this
event contain e in their entity list. Formally, the relationship be-
tween posts and entities can be modeled as a bipartite graph. Recall
that the HITS algorithm [18] computes the hub score and authority
score by mutual reinforcement: the hub score Hi of a node i is de-
cided by the sum of authority scores of all nodes pointed by i, and
simultaneously, the authority score Aj of a node j is decided by the
sum of hub scores of all nodes pointing to j. Inspired by HITS, we
let the post weight obtained from the post network be the initial hub
score of posts, and then the authority scores of entities can be com-
puted by one iteration: A = M TH, where M is an adjacency ma-
trix between posts and entities in an event, A = [Pe1 , Pe2 ,··· ]T
is a vector of entity authorities and H = [wt(p1), wt(p2),··· ]T is
a vector of post weights.
5. TRACKING EVENT EVOLUTION
In this section, we discuss the evolution of sketch graph and
events and develop primitive operations, which form the theoret-
ical basis for our algorithms in Section 6. We introduce the fading
time window to serve as a monitor on social streams. Formally, the
problem we try to solve in this paper is shown below.
PROBLEM 1. Given an evolving post network sequence G =
{G1,G2,···}, the event evolution tracking problem is to generate
an event set (cid:101)Si at each moment i, and discover all the evolution
behaviors between events in (cid:101)Si and (cid:101)Si+1, i = 1, 2,··· .
5.1
Incremental Tracking Framework
The traditional approach taken for tracking evolving network re-
lated problems [4, 16] is illustrated in Figure 3(a). Given a post
(marked as step 1(cid:13) in the figure). The network evolves from Gt
to Gt+1 at the next moment (step 2(cid:13)). Again, the events associ-
ated with Gt+1 are identified from scratch (step 3(cid:13)). Finally, the
network Gt at time t, identify the event set (cid:101)St associated with Gt
correspondence between event sets (cid:101)St and (cid:101)St+1 is determined to
extract the evolution behaviors of events from time t to t + 1 (step
4(cid:13)). This traditional approach has two major shortcomings. Firstly,
repeated extraction of events from post networks from scratch is
an expensive operation. Similarly, tracing the correspondence be-
tween event sets at successive moments is also expensive. Sec-
ondly, this step of tracing correspondence, since it is done after the
two event sets are generated, may lead to loss of accuracy. The
method we propose is incremental tracking of event evolution. It
corresponds to step 5(cid:13) in the figure. More precisely, for the very
first snapshot of the post network, say G0, our approach will gen-
applied again. In the steady state, we apply step 5(cid:13), i.e., we incre-
erate the corresponding event set (cid:101)S0. After this, this step is never
mentally derive (cid:101)St+1 from (cid:101)St. Our experiments show that our in-
cremental tracking approach outperforms the traditional baselines
both in quality and in performance.
5.2 Evolution Operators
We analyze the evolutionary process of events at each moment
and abstract them into five primitive operators: +, −, (cid:12), ↑, ↓. We
classify the operators based on the objects they manipulate: nodes
or clusters. Note that both events and outliers are clusters.
The following operators manipulate nodes in a post network.
DEFINITION 8. (Node Operations).
• Gt +p: add a new post p into Gt(Vt,Et) where p (cid:54)∈ Vt. All the
new edges associated with p will be constructed automatically
by linkage search;
• Gt − p: delete a post p from Gt(Vt,Et) where p ∈ Vt. All
the existing edges associated with p will be automatically re-
moved from Et.
• (cid:12)(Gt): update the weight of posts in Gt.
Typically, the adding/deleting of a post will trigger the updating
of post weights. For convenience, we define two composite opera-
tors on post networks.
DEFINITION 9. (Composite Operators).
• Gt ⊕ p = (cid:12)(Gt + p): add a post p into Gt(Vt,Et) where
p (cid:54)∈ Vt and update the weight of posts in Vt;
• Gt (cid:9) p = (cid:12)(Gt − p): delete a post p from Gt(Vt,Et) where
p ∈ Vt and update the weight of posts in Vt.
The following operators manipulate clusters:
DEFINITION 10. (Cluster Operations).
• St + C: add cluster C to the cluster set St;
Figure 3: (a) Illustration of traditional approach vs.
incre-
mental approach to evolution tracking. Steps on edges are de-
scribed in Section 5.1.
(b) An illustration of the fading time
window from time t to t + 1, where post weights fade w.r.t. the
end of time window. Gt will be updated by deleting subgraph
Go and adding subgraph Gn.
• St − C: remove cluster C from the cluster set St;
• ↑ (C, p): increase the size of C by adding a new post p;
• ↓ (C, p): decrease the size of C by removing an old post p.
Each operator defined above on a single object can be extended
to a set of objects, i.e., for a node set X = {p1, p2,··· , pn}, Gt +
X = Gt + p1 + p2 + ··· + pn. This is well defined since + is
associative and commutative.
We use the left-associative convention for '−': that is, we write
A− B− C means (A− B)− C. In particular, we write A− B + C
to mean (A − B) + C and the order in which posts in a set are
added/deleted to Gt does not matter. These operators will be used
later in the formal description of the evolution procedures. Figure
4(a) depicts the role played by the primitive operators in the event
evolution tracking, end to end, from the post network onward.
5.3 Fading Time Window
Fading (or decay) and sliding time window are two common ag-
gregation schemes used in time-evolving graphs [9]. Fading scheme
puts a higher emphasis on newer posts, and this characteristic has
been captured by fading similarity in Eq. (1). Sliding time window
scheme (posts are first-in, first-out) is essential because older posts
are less important and it is not necessary to retain all the posts in the
history. Since events evolve quickly, even inside a given time win-
dow, it is important to highlight new posts and degrade old posts
using the fading scheme. Thus, we combine these two schemes
and introduce a fading time window, as illustrated in Figure 3(b).
In practice, users can specify the length of the time window to ad-
just the scope of monitoring. Users can also choose different fading
functions to penalize old posts and highlight new posts in different
ways. Let ∆t denote the interval between moments. For simplicity,
we abbreviate the moment (t + i · ∆t) as (t + i). When the time
window slides from moment t to t + 1, the post network Gt(Vt,Et)
will be updated to be Gt+1(Vt+1,Et+1). Suppose Go(Vo,Eo) is the
old subgraph (of Gt) that lapses at moment t + 1 and Gn(Vn,En) is
the new subgraph (of Gt+1) that appears (see Figure 3(b)). Clearly,
(5)
Let Len be the length of the time window. We assume Len >
2∆t, which will make Vo ∩ Vn = ∅. This assumption usually
holds in real applications, e.g., we set Len to 1 week and ∆t to
1 day. The following claim shows different ways to compute the
overlapping part in Gt+1 and Gt.
Gt+1 = Gt − Go + Gn
CLAIM 1. Gt+1 − Gn = Gt − Go = Gt+1 (cid:9) Gn = Gt (cid:9) Go
Proof Sketch: From Eq. (5) we know Gt+1 − Gn = Gt − Go. At
the post network level, post weight is orthogonal to node/edge sets,
so we have Gt (cid:9) Go = Gt − Go and Gt+1 (cid:9) Gn = Gt+1 − Gn. 2
5.4 Sketch Graph Evolution
The updating of sketch graphs from Gt to Gt+1 is the core task
in event evolution tracking. We already know from Claim 1 that
Gt+1−Gn = Gt−Go at the post network level. This is the overlap-
ping part between Gt and Gt+1. However, at the sketch graph level,
Ske(Gt+1−Gn) (cid:54)= Ske(Gt−Go): some core posts in Gt−Go may
no longer be core posts due to the removal of edges incident with
nodes in Go or simply due to the passing of time; some non-core
posts may become core posts because of the adding of edges with
nodes in Gn. To measure the changes in the overlapping part, we
define the following three components.
• S−: components of core posts in Gt − Go that become non-
DEFINITION 11. (Updated Components in Overlap).
• S+: components of non-core posts in Gt − Go that become
core posts in Gt+1 − Gn due to the adding of Gn, i.e.,
S+ = Ske(Gt+1 − Gn) − Ske(Gt+1 (cid:9) Gn)
core posts in Gt+1 − Gn due to the removing of Go, i.e.,
S− = Ske(Gt − Go) − Ske(Gt (cid:9) Go)
core posts in Gt+1 − Gn due to the passing of time, i.e.,
S(cid:12) = Ske(Gt (cid:9) Go) − Ske(Gt+1 (cid:9) Gn)
• S(cid:12): components of core posts in Gt − Go that become non-
Based on Definition 11, Theorem 1 shows how the overlapping
parts in Gt and Gt+1 differ at the sketch graph level.
THEOREM 1. From moment t to t+1, the changes of core posts
in the overlapping part, i.e., Gt+1−Gn (equivalently, Gt−Go), can
be updated using the components S+, S− and S(cid:12). That is,
Ske(Gt+1 − Gn) − Ske(Gt − Go) = S+ − S− − S(cid:12)
(6)
Proof Sketch: S+ − S− − S(cid:12) = Ske(Gt+1 −Gn)− Ske(Gt+1 (cid:9)
Gn) − (Ske(Gt − Go) − Ske(Gt (cid:9) Go)) − (Ske(Gt (cid:9) Go) −
Ske(Gt+1 (cid:9) Gn)) = Ske(Gt+1 − Gn) − Ske(Gt − Go).
2
The following theorem shows the iterative and incremental up-
dating of sketch graphs from moment t to t + 1.
THEOREM 2. From moment t to t + 1, the sketch graph evolves
by removing core posts in Go, adding core posts in Gn and updating
core posts in the overlapping part. That is
St+1 = Gt+1 = St − So − S− − S(cid:12) + Sn + S+
(7)
Proof Sketch: S+ − S− − S(cid:12) = Ske(Gt+1 −Gn)− Ske(Gt+1 (cid:9)
Gn) − (Ske(Gt − Go) − Ske(Gt (cid:9) Go)) − (Ske(Gt (cid:9) Go) −
Ske(Gt+1 (cid:9) Gn)) = Ske(Gt+1 − Gn) − Ske(Gt − Go).
2
Theorem 2 indicates that we can incrementally maintain St+1
from St. Since we define events based on connected components in
a sketch graph, this incremental updating of sketch graphs benefits
incremental computation of event evolution essentially.
5.5 Event Evolution
Let Clu(Gt) denote the clustering operation on post network Gt.
The clustering will shift and reorder the nodes in Vt by group-
ing nodes that belong to the same cluster together. We use St =
Clu(Gt) to represent the set of clusters obtained from Gt. Notice
that noise posts in Gt do not appear in any cluster, so the num-
ber of posts in St is typically smaller than Vt. Similarly, we
let Clu(Gn) = Sn and Clu(Go) = So be the cluster sets on the
graphs Gn and Go.
Cluster Evolution. Based on Definition 6, a cluster at moment t is
generated from a component in St. We can apply the Gen function
on sketch graphs to get the iterative computation of clusters.
tS1tSTime DimensionUser Space1ttonLen1totntt1t①②③④(a)(b)⑤(a)
Nc(p)
1
Add a core post p
Delete a core post p − ↓
≥ 2
0
+ ↑ M erge
Split
(b)
Figure 4: (a) The relationships between primitives and evolu-
tions. Each box represents an evolution object and the arrows
between them describe inputs/outputs. (b) The evolutionary be-
havior table for clusters when adding or deleting a core post p.
COROLLARY 1. From moment t to t + 1, the set of clusters can
be incrementally updated by the iterative computation
St+1 = Clu(Gt+1) = St − So − S− − S(cid:12) + Sn + S+
(8)
Proof Sketch: Since the generation of any two clusters from two
different components is independent, by applying Gen function on
both sides of Eq. (7) we get the iterative computation of clusters.2
The basic operations underlying Eq. (8) are the cases when St
is modified by the addition or deletion of a cluster that includes
only one post. In the following, we analyze and show the evolution
of clusters by adding a post pn or deleting a post po. Let Nc(pn)
denote the set of clusters where pn's neighboring core posts belong
before pn is added, and let Nc(po) denote the set of clusters where
po's neighboring core posts belong after po is removed. It should
be noted that Nc(p) = 0 means p has no neighboring core posts.
Notice that M erge and Split are composite operations and can be
composed by a series of cluster primitive operations. The evolution
behaviors of clusters is shown in Figure 4(b) and explained below.
(a) Addition: St + {pn}
If pn is a noise post after being added into Gt, ignore pn. If pn is
a border post, add pn to each cluster in Nc(pn). Else, pn is a core
post and we do the following:
• If Nc(pn) = 0: +C and C = {pn} ∪ N (pn);
• If Nc(pn) = 1: ↑ (C,{pn} ∪ N (pn));
• If Nc(pn) ≥ 2: M erge = +C −(cid:80)
Nc(pn) ∪ {pn} ∪ N (pn).
C(cid:48)∈Nc(pn) C(cid:48) and C =
(b) Deletion: St − {po}
If po is a noise post before being deleted from Gt, ignore po. If
po is a border post, delete po from each cluster in Nc(po). Else, po
is a core post and we do the following:
• If Nc(po) = 0: −C where po ∈ C;
• If Nc(po) = 1: ↓ (C,{po} ∪ N (po));
• If Nc(po) ≥ 2: Split = −C +(cid:80)
C(cid:48)∈Nc(po) C(cid:48), po ∈ C.
Using commutativity and associativity of operator '+' and the
left-associative convention for operator '−', we can rewrite the ex-
pression St − p1 + p2 − p3 as St − (p3 + p1) + p2. While both
expressions are equivalent, in terms of the total number of primi-
tive cluster operations, different ordering of cluster sequences may
have different performance. In the following, we show a theorem to
indicate how to reduce the number of primitive cluster operations
by reordering. As an example, St + p1 − p2 + p3 − p4 can be
reordered as St − (p2 + p4) + (p1 + p3) to reduce the number of
primitive operations during cluster evolution.
THEOREM 3. Suppose posts have an equal probability to join
any cluster. Given an initial set of clusters and an arbitrary se-
quence of node addition and deletions, the number of cluster prim-
itive operations can be reduced by performing all the deletions first.
Proof Sketch: Since posts have equal probability to join clusters,
a smaller N (p) (i.e., the #edges of p) indicates a smaller num-
ber of neighboring clusters. Clearly, if the deletions are performed
first, we can save time because there will be no edges between the
deleted nodes and added nodes. Otherwise, the edges between the
deleted nodes and added nodes need to be constructed first and re-
moved later, which implies a higher N (p) in computation.
2
The Evolution of Events and Outliers. Recall, at any moment, an
outlier may grow into an event and an event may degrade into an
outlier. Based on Definition 7, the evolution procedures of events
and outliers follow the evolution of clusters. That is, the addition
of a new event or outlier as well as the deletion of an existing event
or outlier is exactly the same as for a cluster. The only difference
is that the Event function is applied to check whether the cluster
added/deleted is an event or an outlier. When the size of a cluster
increases (as with ↑ (C, p)) it may correspond to an outlier/event
growing into a larger outlier/event, or to an outlier growing in size,
exceeding the threshold ϕ and turning into an event. Similarly,
when a cluster shrinks (as with ↓ (C, p)) it may be an outlier/event
becoming a smaller outlier/event or an event becoming smaller than
the threshold and turning into an outlier.
6.
INCREMENTAL ALGORITHMS
The approach of decomposing an evolving graph into a series of
snapshots for each moment is a traditional way to tackle evolving
graph related problems [6, 16]. However, this traditional approach
suffers from both quality and performance, since events are gen-
erated from scratch and are matched heuristically. To overcome
these challenges, we propose an incremental tracking framework,
as introduced in Section 5.1 and illustrated in Figure 3(a).
In this section, we leverage our primitive operators for evolution
tracking by proposing Algorithms cTrack and eTrack to track the
evolution of clusters and events respectively. The observation is
that at each moment Vo + Vn (cid:28) Vt, where Vo and Vn are
the set of old and new posts between moments t and t + 1. So
we can save a lot of computation by adjusting clusters and events
incrementally, rather than generating them from scratch.
Bulk Updating. Traditional incremental computation on evolving
graphs usually treats the addition/deletion of nodes or edges one by
one [10, 27]. In Section 5.5, we discussed the updating of St by
adding or deleting a single post. However, in a real scenario, since
social posts arrive at a high speed, the post-by-post incremental
updating will lead to poor performance. In this section, we speed
up the incremental computation of St by bulk updating. We define
a bulk as a cluster of posts and "lift" the one-by-one updating of St
to bulk updating. Recall that Sn and So denote the set of clusters
in the graph Gn = Gt+1 − Gt and Go = Gt − Gt+1 respectively.
Specifically, given a cluster Cn ∈ Sn, let Nc(Cn) denote the set of
clusters in Gt where neighboring core posts of nodes in Cn belong,
i.e., Nc(Cn) = ∪pn∈Cn
Nc(pn). Analogously, given Co ∈ So, we
let Nc(Co) = ∪po∈Co
Nc(po). Clearly, updating St with a single
node {p} is a special case of bulk updating.
cTrack. The steps for incremental tracking of cluster evolution
(cTrack) are summarized in Algorithm 1. cTrack follows the it-
erative computation in Eq. (8) and sequence order in Theorem 3,
that is St+1 = St − So − S− − S(cid:12) + Sn + S+. As analyzed in
Section 5.5, each bulk addition and bulk deletion has three possible
Post NetworkCluOutliersEventEventsEventClustersAddDeleteAddDeletemutual transformationAlgorithm 1: cTrack
Input: St, So, Sn, S−, S+, S(cid:12)
Output: St+1
// Delete So ∪ S−
1 St+1 = St;
2 for each cluster Co in So ∪ S− ∪ S(cid:12) do
Co = Ske(Co);
Nc(Co) = ∪po∈Co
if Nc(Co) = 0 then
Nc(po);
remove cluster Co from St+1;
else if Nc(Co) = 1 then
delete Co from cluster C(cid:48) where C(cid:48) ∈ Nc(Co);
else
remove the cluster that Co belongs to from St+1;
for each cluster C(cid:48) ∈ Nc(Co) do
assign a new cluster id for C(cid:48);
add C(cid:48) into St+1;
// Add Sn ∪ S+
14 for each cluster Cn in Sn ∪ S+ do
Cn = Ske(Cn);
Nc(Cn) = ∪pn∈Cn
if Nc(Cn) = 0 then
Nc(pn);
3
4
5
6
7
8
9
10
11
12
13
15
16
17
18
19
20
21
22
23
24
25
26
27
assign a new cluster id for Cn and add C to St+1;
else if Nc(Cn) = 1 then
add Cn into cluster C(cid:48) where C(cid:48) ∈ Nc(Cn);
else
assign a new cluster id for Cn;
for each cluster C(cid:48) ∈ Nc(Cn) do
Cn = Cn ∪ C(cid:48);
remove C(cid:48) from St+1;
Cn = Cn ∪ Cn;
add Cn into St+1;
28 return St+1;
evolutionary behaviors, decided by the size of Nc(C). Lines 3-13
deal with deleting a bulk Co, where {−, ↓, Split} patterns are han-
dled. Lines 15-27 deal with adding a bulk Cn and handle {+, ↑,
M erge} patterns. The time complexity of cTrack is linear in the
total number of bulk updates.
eTrack. Algorithm eTrack works on top of cTrack. We summa-
rize the steps for incremental event tracking (eTrack) in Algorithm
2. Based on cTrack, eTrack monitors the changes in the cluster set
effected by cTrack at each moment. If the cluster is not changed,
eTrack will take no action; otherwise, eTrack will judge the corre-
sponding cases and invoke Event function to handle the event evo-
lution behaviors (Lines 4-13). Notice that in Lines 5-9, if a cluster
C in Si has ClusterId id, we use the convention that Si(id) = C,
and Si(id) = ∅ means there is no cluster in Si with ClusterId id.
Especially, lines 7-9 mean an event in Si evolves into an event in
Si+1 by deleting the part Si(id) − Si+1(id) first and adding the
part Si+1(id) − Si(id) later.
7. EXPERIMENTS
In this section, we first "tune" the construction of post network
and sketch graph to find the best selection of fading similarity mea-
sures and density parameters. Then, we test the quality and perfor-
mance of event evolution tracking algorithms on two social streams:
Tech-Lite and Tech-Full that we crawled from Twitter. We have
designed two types of baseline algorithms for event detection and
evolution tracking. Our event detection baseline covers the major
Algorithm 2: eTrack
Input: G = {G1, G2, · · · , Gn}, S1
Output: Event evolution behaviors
obtain So, Sn, S−, S+ from Gi+1 − Gi;
Si+1 =cTrack (Si, So, Sn, S−, S+, S(cid:12));
for each cluster C ∈ Si+1 do
1 for i from 1 to n − 1 do
2
3
4
5
6
7
8
9
id = ClusterId(C);
if Si(id) (cid:54)= ∅ then
output ↓ (C, Si(id) − Si+1(id));
output ↑ (C, Si+1(id) − Si(id));
Event(C);
10
11
12
13
else Event(+C);
for each cluster C ∈ Si do
id = ClusterId(C);
if Si+1(id) = ∅ then Event(−C);
Figure 5: Graph schemas of (a) post network and (b) sketch
graph. Rectangles represent nodes and ellipses represent at-
tributes.
"Sim" means similarity edges between posts and
"CoreSim" means core edges. "Weight" is the post weight.
"ExpTime" is the time when a core post expires due to time
passing. "Count" is the number of core posts in a component.
techniques reported in [19, 22, 24, 25]. Our tracking baseline sum-
marizes the state of the art algorithms reported in [6, 16]. All ex-
periments are conducted on a computer with Intel 2.66 GHz CPU,
4 GB RAM, running 64-bit Windows 7. All algorithms are imple-
mented in Java. We use a graph database called Neo4J3 to store and
manipulate the post network and sketch graph.
Datasets. All datasets are crawled from Twitter.com via Twitter
API. Although our event tracking algorithm works regardless of
the domain, we make the data set domain specific in order to fa-
cilitate evaluation of the generated results. We built a technology
domain dataset called Tech-Lite by aggregating all the timelines of
users listed in Technology category of "Who to follow"4 and their
retweeted users. Tech-Lite has 352,328 tweets, 1402 users and the
streaming rate is about 11700 tweets/day. Based on the intuition
that users followed by users in Technology category are most likely
also in the technology domain, we obtained a larger technology so-
cial stream called Tech-Full by collecting all the timelines of users
that are followed by users in Technology category. Tech-Full has
5,196,086 tweets, created by 224,242 users, whose streaming rate is
about 7216 tweets/hour. Both timelines in Tech-Lite and Tech-Full
include retweets and have a time span from Jan. 1 to Feb. 1, 2012.
Since Tech-Lite is a sampled subset of Tech-Full, the parameters
learned from Tech-Lite generally apply to Tech-Full.
Graph Storage Schema. Neo4J provides convenience in manag-
ing a large and fast-evolving data structure that represents a post
network and sketch graph. A database in Neo4J is based on the
3http://neo4j.org/
4http://twitter.com/who to follow/interests
PostIDTimeWeightEntityIDSimCorePostCoreSimIDExpTimeComponentIDCount(a)(b)Figure 6: The changing trends of the number of core posts, core
edges and events when increasing δ1 = ε1 from 0.3 to 0.8. We
set δ1 = ε1 = 0.3 as the 100% basis and keep ε0 = 0.2.
attributed graph model [26], where each node/edge can be associ-
ated with multiple attributes in the form of key-value pairs. Graph
schemas of the post network and sketch graph are shown in Fig-
ure 5 (a) and (b) respectively. Indices are created on attributes to
support fast exact queries and range queries of nodes.
7.1 Tuning Post Network and Sketch Graph
The quality of post network and sketch graph construction will
determine the quality of event generation. Recall from Section 3
that the following factors influence the construction of post net-
works and sketch graphs: (1) entity extraction from post contents;
(2) similarity/distance measures between posts; and (3) density pa-
rameters for the generation of core posts and core edges. We mea-
sure the influence of each factor below to make informed choices.
Post Content Preprocessing. As described in Section 3, we ex-
tract entities from posts by Stanford POS tagger. One alternative
approach to entity extraction is using hashtags. However, only 11%
of the tweets in our dataset have hashtags. This will result in lots
of posts in the dataset having no similarity score between them.
Another approach is simply tokenizing tweets into unigrams and
treating unigrams as entities, and we call it the "Unigrams" ap-
proach. This approach is based on the state of art method for event
detection as discussed in [22]. Table 2(a) shows the comparison
of the three entity extraction approaches in the first time window
of the Tech-Full social stream. If we use "Unigrams", obviously
the number of entities is larger than other two approaches, but the
number of edges between posts tends to be smaller, because tweets
written by different users usually share very few common words
even when they talk about the same event. The "Hashtags" ap-
proach also produces a smaller number of edges, core posts and
events, since it generates a much sparser post network. Overall, the
"POS-Tagger" approach can discover more similarity relationships
between posts and produce more core posts and events given the
same social stream and parameter setting.
Similarity/Distance Measures. Many set-based similarity mea-
sures such as Jaccard coefficient [21] can be used to compute the
similarity S(pL
j ) between posts. Since entity frequency is usu-
ally 1 in a tweet, measures such as Cosine similarity and Pearson
correlation [21] will degenerate to a form very similar to Jaccard, so
we use Jaccard. The distance function D(pτ
j ) along time di-
mension determines how similarity to older posts is penalized, with
respect to recent posts. We compared three different distance func-
j ) =
tions: (1) reciprocal fading ("Reci-Fading") with D(pτ
i − pτ
i −
i − pτ
j + 1, (2) exponential fading ("Exp-Fading") with D(pτ
pτ
i −
j ) = e
j and (3) no fading ("No-Fading") with D(pτ
pτ
pτ
j ) = 1. For any posts pi, pj, clearly e
j + 1 ≥
pτ
1. Since a time window usually contains many moments, Exp-
Fading penalizes the posts in the old part of time window severely
(see Table 2(b)): the number of core posts and events generated by
Exp-Fading is much lower than by other approaches. Since No-
j ≥ pτ
i − pτ
i − pτ
i , pL
i −pτ
i −pτ
pτ
(a) Results of different entity extraction approaches.
Methods
Hashtags
Unigrams
POS-Tagger
#edges
182905
142468
357132
28964
46783
47808
6232
15070
21509
#coreedges
#coreposts
196
430
470
#events
(b) Results of different distance functions.
Methods
No-Fading
Exp-Fading
Reci-Fading
#edges
1159364
327390
357132
#coreposts
57291
7655
21509
#coreedges
32875
46075
47808
#events
510
148
470
(c) Precision and recall of top 50 events.
Precision
Recall
(major events)
(major events)
Methods
HashtagPeaks
UnigramPeaks
Louvain
eTrack
0.40
0.45
0.60
0.80
Precision
(G-Trends)
0.25
0.20
0.75
0.95
0.30
0.40
0.55
0.80
Table 2:
(a) and (b) are in the first time window of Tech-
Lite with 75,849 posts in one week. Density parameters
(δ1, ε0, ε1) = (0.5, 0.2, 0.5) for core posts and threshold ϕ = 10
for event identification. (c) shows the precision and recall of top
20 events generated by Baseline 1a, 1b, Louvain and eTrack.
Figure 7: Examples of Google Trends peaks in January 2012.
We validate the events generated by cTrack by checking the
existence of volume peaks at a nearby time moment in Google
Trends. Although these peaks can detect bursty events, Google
Trends cannot discover the merging/splitting patterns.
Fading does not penalize old posts in the time window, too many
edges and core posts will be generated without considering recency.
Reci-Fading is in between, which is a more gradual penalty func-
tion than Exp-Fading and we use it by default.
Density Parameters. The density parameters (δ1, ε0, ε1) control
the construction of the sketch graph. Clearly, the higher the den-
sity parameters, the smaller and sparser the sketch graph. Figure 6
shows the number of core posts, core edges and events as a percent-
age of the numbers for δ1 = ε1 = 0.3, as δ1 = ε1 increases from
0.3 to 0.8. Results are obtained from the first time window of the
Tech-Lite social stream. We can see the rate of decrease of #events
is higher than the rates of #core posts and #core edges, because
events are less likely to form in sparser sketch graphs. More small
events can be detected by lower density parameters, but the com-
putational cost will increase because of larger and denser sketch
graphs. However, for big events, they are not very sensitive to these
density parameters. We set δ1 = ε1 = 0.5 as a trade-off between
the compactness of events and complexity.
7.2 Event Evolution Tracking
01020304050607080901000.30.40.50.60.70.8Percentage (%) Density Parameters # core posts# core edges# eventsJan 15, 2012Jan 22, 2012Jan 29, 2012SOPA WikipediaSOPA FacebookSOPA MegauploadApple iBooksFigure 8: Lists of top 10 events detected from Twitter Technology streams in January 2012 by baseline HashtagPeaks, UnigramPeaks,
Louvain and our approach eTrack. To adapt for event detection, Louvain method defines events by post communities. We annotate
events generated by both Louvain and eTrack by highly frequent entities. eTrack also shows the birthday of events.
Ground truth. To generate the ground truth, we crawl news ar-
ticles in January 2012 from famous technology websites such as
TechCrunch, Wired, CNET, etc, without looking at tweets. Then
we treat the titles of news as posts and apply our event tracking
algorithm to extract event evolution patterns. Finally, a total of 20
major events with life cycles are identified as ground truth. Typical
events include "happy new year", "CES 2012", "jerry yang yahoo
resignation", "sopa wikipedia blackout", etc.
To find more noticeable events in the technology news domain,
we use Google Trends for Search5, which shows the traffic trends
of keywords that appeared in Google Search along the time dimen-
sion. If an event-indicating phrase has a volume peak in Google
Trends at a specific time, it means this event is sufficiently vali-
dated by the real world. We validate the correctness of an event
Ei generated by our approach by the following process: we pick
the top 3 entities of Ei ranked by frequency in Ei and search them
in Google Trends, and if the traffic trend of these top entities has
a distinct peak at a nearby time to Ei, we consider that Ei corre-
sponds to a real world event widely witnessed by the public. Four
examples of Google Trends peaks are shown in Figure 7.
Baseline 1: Peak-Detection.
In recent works [19, 22, 24, 25],
events are generally detected as volume peaks of phrases over time
in social streams. These approaches share the same spirit that ag-
gregates the frequency of event-indicating phrases at each moment
to build a histogram and generates events by detecting volume peaks
in the histogram. We design two variants of Peak-Detection to cap-
ture the major techniques used by these state-of-the-art approaches.
• Baseline 1a: HashtagPeaks: aggregates frequent hashtags;
• Baseline 1b: UnigramPeaks: aggregates frequent unigrams.
Notice, both baselines above are for event detection only. Lists
of the top 10 events detected by HashtagPeaks and Unigram-
Peaks are presented in Figure 8 (first two columns). Hashtags are
employed by twitter users as a manual way to indicate an event,
but it requires manual assignation by a human. Some highly fre-
quent hashtags like "#opengov" and "#opendata" are not designed
for event indication, hurting the precision. UnigramPeaks uses the
entities extracted from the social stream preprocessing stage, which
has a better quality than HashtagPeaks. However, both of them
are limited in their representation of events, because the internal
structure of events is missing. Besides, although these peaks can
detect bursty words, they cannot discover evolution patterns such
as the merging/splitting of events. For example, in Figure 7, there
is no way to know "Apple announced iBooks" is an event split from
the big event "SOPA" earlier, as illustrated in detail in Figure 9(b).
5http://www.google.com/trends/
Baseline 2: Community Detection. A community in a large net-
work refers to a structure of nodes with dense connections inter-
nally and sparse connections between communities. It is possible
to define an event as a community of posts. Louvain method [8],
based on modularity optimization, is the state-of-the-art approach
which outperforms other known community detection methods in
terms of performance. We design a baseline called "Louvain" to
detect events defined as post communities.
The top 10 events generated by Louvain are shown in Figure 8.
As we can see, not every result is meaningful in Louvain method.
For example, "Apple iphone ipad" and "Internet people time" are
too vague to correspond to any concrete real events. The reason
is, although Louvain method can make sure every community has
relatively dense internal and sparse external connections, it cannot
guarantee that every node in the community is important and has
a sufficiently high connectivity with other nodes in the same com-
munity. It is highly possible that a low-degree node belongs to a
community only because it has zero connectivity with other com-
munities. Furthermore, noise posts are quite prevalent in Twitter
and they negatively impact Louvain method.
Baseline 3: Pattern-Matching. We design a baseline to track the
evolution patterns of events between snapshots. In graph mining,
the "divide-and-conquer" approach of decomposing the evolving
graph into a series of snapshot graphs at each moment is a tradi-
tional way to tackle evolving graph related problems [6, 16]. As
an example, Kim et al. [16] first cluster individual snapshots into
quasi-cliques and then map them in adjacent snapshots over time.
Inspired by this approach, we design a baseline for event evolution
tracking, which detects events from each snapshot of post network
independently, and then characterizes the evolution of these events
at consecutive moments, by identifying certain heuristic patterns:
where Et and Et+1 are any two events detected at moment t and t+
1 respectively, κ% is the minimal commonality to say Et and Et+1
are snapshots of the same event. A higher κ% will result in a higher
precision but a lower recall of the evolution tracking. Empirically
we found that we needed to set κ% = 90% to guarantee the quality.
It is worth noting that this baseline generates the same events as
eTrack, but with a non-incremental evolution tracking approach.
Precision and Recall. To measure the quality of event detection,
we use HashtagPeaks, UnigramPeaks and Louvain as base-
lines to compare with our Algorithm eTrack. It is worth noting
that Baseline 3 is designed for the tracking of event evolution dy-
namics between moments, so we omit it here. We compare the
• If
• If
Et∩Et+1
Et∪Et+1 ≥ κ% and Et ≤ Et+1, Et+1 =↑ Et;
Et∩Et+1
Et∪Et+1 ≥ κ% and Et > Et+1, Et+1 =↓ Et.
Rank HashtagPeaks UnigramPeaks Louvain eTrack 1 #CES google Apple iphone ipad CES conference (Jan 8) 2 #SOPA ces CES ultrabook tablet SOPA PIPA (Jan 17) 3 #EngadgetCES apple Google search privacy Hug new year (Jan 1) 4 #opengov video Week's Android games RIM new CEO (Jan 22) 5 #gov20 sopa Kindle Netflix app Yahoo jerry yang resignation (Jan 17) 6 #CES2012 twitter Internet people time Samsung Galaxy Nexus (Jan 10) 7 #PIPA year Hope weekend Apple iBooks (Jan 19) 8 #opendata facebook SOPA Megaupload Facebook IPO News (Jan 27) 9 #StartupAmerica app SOPA PIPA Wikipedia Martin Luther King Day (Jan 15) 10 #win7tech iphone Facebook IPO Tim Cook Apple stock (Jan 10) (a) The life cycle of "CES Conference"
(b) The merging and splitting of "SOPA" and "Apple"
Figure 9: Tracking the evolution of events by eTrack and baselines. At each moment, an event is annotated by a word cloud.
Baselines 1 and 2 only works for the detection of new emerging events, and is not applicable for the tracking of merging and splitting
dynamics. The evolution trajectories of eTrack and Baseline 3 are depicted by solid and hollow arrows respectively.
precision and recall of top 20 events generated by baselines and
eTrack and show the results in Table 2(c). On the ground truth of
20 major events obtained from news articles in technology web-
sites, HashtagPeaks and UnigramPeaks have rather low preci-
sion and recall scores, because of their poor ability in capturing
event bursts. Notice that the precision and recall may be not equal
even the sizes of extracted events and ground truth are equal, be-
cause multiple extracted events may correspond to the same event
in ground truth. eTrack outperforms the baselines in both preci-
sion and recall. Since there are many events discussed in the social
media but not very noticeable in news websites, we also validate
the precision of the generated events using Google Trends. As
we can see, HashtagPeaks and UnigramPeaks don't gain too
much in Google Trends validation, since the words they generate
are less informative and not very event-indicating. eTrack gains a
precision of 95% in Google Trends, where the only failed result is
"Samsung galaxy nexus", whose volume is steadily high without
obvious peaks in Google Trends. The reason may be social stream
is more dynamic. Louvain is worse than eTrack. The results show
eTrack is significantly better than other baselines in quality.
Life Cycle of Event Evolution. Our approach is capable of track-
ing the whole life cycle of an event: from birth, growth, decay to
death. We illustrate this using the example of "CES 2012", a ma-
jor consumer electronics show held in Las Vegas from January 10
to 13. As early as Jan 6, our approach has already detected some
discussions about CES and generated an event about CES. Figure
9(a) shows the major snapshots of this event, from Jan 8 to Jan 14.
As we can see, on Jan 8, most people talked about "CES predic-
tion", and on Jan 9, the highlighted topic was "CES tomorrow" and
some hearsays about "ultrabook" which would be shown in CES.
After the actual event happened on Jan 10, we can see the event
grew distinctly bigger, and lots of products, news and messages are
spreading over the social network, and this situation continues until
Jan 13, which is the last day of CES. Afterwards, the discussions
become weaker and continue until Jan 14, when "CES" was not
the biggest mention on that day but still existed in some discus-
sions. Compared with our approach, Baselines 1 and 2 can detect
the emerging of "CES" with a frequency count at each moment, but
no trajectory is generated. Baseline 3 can track a very coarse tra-
jectory of this event, i.e., from Jan 10 to Jan 12. The reason is, if an
(a) Varying time window
(b) Varying step length
Figure 10: The running time on two datasets as the adjusting
of the time window length and step length.
event changes rapidly and many posts at consecutive moments can-
not be associated with each other, Baseline 3 will fail to track the
evolution. Since in social streams the posts usually surge quickly,
our approach is superior over the baselines.
Event Merging & Splitting. Figure 9(b) illustrates an example
of event merging and splitting generated by Algorithm eTrack.
eTrack detected the event of SOPA (Stop Online Piracy Act) and
Wikipedia on Jan 16, because on that day Wikipedia announced the
blackout on Wednesday (Jan 18) to protest SOPA. This event grew
distinctly on Jan 17 and Jan 18, by inducing more people in the so-
cial network to discuss about this topic. At the same time, there
was another event detected on Jan 18, discussing Apple's prod-
ucts. On Jan 19, actually the SOPA event and Apple event were
merged, because Apple joined the SOPA protest and lots of Apple
products such as iBooks in education are actually directly related
to SOPA. This event evolved on Jan 20, by adding more discus-
sions about iBooks 2. Apple iBooks 2 was actually unveiled in
Jan 21, while this new product gained lots of attention, people who
talked about iBooks did not talk about SOPA anymore. Thus, on
Jan 21, the SOPA-Apple event was split into two events, which
would evolve independently afterwards. Unfortunately, the above
merging and splitting process cannot be tracked by any of the base-
lines, which output some independent events. The reason for Base-
line 3 is, given the ground truth Et+1 = Et1 + Et2, i.e., Et1 and
Et2∩Et+1
Et2∪Et+1 ≥ κ% is
Et2 merged into Et+1,
most likely invalid, so the ground truth cannot be tracked.
Et1∩Et+1
Et1∪Et+1 ≥ κ% or
Jan 8, 2012 CES prediction Jan 9, 2012 CES tomorrowblogs, etc Jan 10, 2012 CES conference news press, etc Jan 11, 2012 CES video, press, blogs, photo, events, etc Jan 12, 2012 CES video, gadgets, etc Jan 13, 2012 CES video, award, etc growgrow grow decaydecaydecay Jan 14, 2012 CES last day grow Jan 16, 2012 SOPA Wikipedia Protest Jan 16, 2012 SOPA Wikipedia blackout Jan 18, 2012 SOPA PIPA protest Jan 18, 2012 Apple products Jan 19, 2012 SOPA PIPA protest and Apple iBooksJan 20, 2012 SOPA PIPA protest and Apple iBooksJan 21, 2012 SOPA PIPA protest Jan 21, 2012 Apple iBooks grow mergemergedecay split split02468101214161812345678910Running Time (min) Time window length (·Δt) eTrack: Tech-FulleTrack: Tech-Lite02468101214161812345Running Time (min) Step length (·Δt) eTrack: Tech-FulleTrack: Tech-LiteBaseline 3: Tech-FullBaseline 3: Tech-Lite7.3 Running Time
We measure how the baseline and eTrack scale w.r.t. both the
varying time window width and the step length. We use both Tech-
Lite and Tech-Full streams, and set the time step interval ∆t = 1
day for Tech-Lite, ∆t = 1 hour for Tech-Full to track events on
different time granularity. The streaming post rates for Tech-Lite
and Tech-Full are 11700/day and 7126/hour respectively. Figure
10(a) shows the running time of eTrack when we increase the time
window length, and we can see for a time window of 10∆t hours
in Tech-Full, our approach can finish the post preprocessing, post
network construction and event tracking in just 3 minutes. A key
observation is that the running time of eTrack does not depend on
the overall size of the dataset. Rather, it depends on the streaming
speed of posts in ∆t. Figure 10(b) shows if we fix the time win-
dow length as 10∆t and increase the step length of the sliding time
window, the running time of eTrack grows nearly linearly. Com-
pared with our incremental computation, Baseline 3 has to process
posts in the whole time window from scratch at each moment, so
the running time will be steadily high. If the step length is larger
than 4∆t in TechFull, eTrack does not have an advantage in run-
ning time compared with Baseline 3, because a large part of post
network is updated at each moment. However, this extreme case is
rare. Since in a real scenario, the step length is much smaller than
the time window length, our approach shows much better efficiency
than the baseline approach.
8. CONCLUSION
Our main goal in this paper is to track the evolution of events
over social streams such as Twitter. To that end, we extract mean-
ingful information from noisy post streams and organize it into an
evolving network of posts under a sliding time window. We model
events as sufficiently large clusters of posts sharing the same top-
ics, and propose a framework to describe event evolution behaviors
using a set of primitive operations. Unlike previous approaches,
our evolution tracking algorithm eTrack performs incremental up-
dates and efficiently tracks event evolution patterns in real time.
We experimentally demonstrate the performance and quality of our
algorithm over two real data sets crawled from Twitter. As a natu-
ral progression, in the future, it would be interesting to investigate
the tracking of evolution of social emotions on products, with its
obvious application for business intelligence.
9. REFERENCES
[1] The guardian: Average twitter user has 126 followers.
http://www.guardian.co.uk/technology/blog/2009
/jun/29/twitter-users-average-api-traffic.
[2] M. K. Agarwal, K. Ramamritham, and M. Bhide. Real time
discovery of dense clusters in highly dynamic graphs:
Identifying real world events in highly dynamic
environments. PVLDB, 5(10):980–991, 2012.
[3] C. C. Aggarwal, J. Han, J. Wang, and P. S. Yu. A framework
for clustering evolving data streams. In VLDB, pages 81–92,
2003.
[4] J. Allan, editor. Topic detection and tracking: event-based
information organization. Kluwer Academic Publishers,
2002.
[5] A. Angel, N. Koudas, N. Sarkas, and D. Srivastava. Dense
subgraph maintenance under streaming edge weight updates
for real-time story identification. PVLDB, 5(6):574–585,
2012.
[6] S. Asur, S. Parthasarathy, and D. Ucar. An event-based
framework for characterizing the evolutionary behavior of
interaction graphs. In KDD, pages 913–921, 2007.
[7] H. Becker, M. Naaman, and L. Gravano. Learning similarity
metrics for event identification in social media. In WSDM,
pages 291–300, 2010.
[8] V. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre.
Fast unfolding of communities in large networks. J. Stat.
Mech., P10008, 2008.
[9] F. Cao, M. Ester, W. Qian, and A. Zhou. Density-based
clustering over an evolving data stream with noise. In SDM,
2006.
[10] Y. Chen and L. Tu. Density-based clustering for real-time
stream data. In KDD, pages 133–142, 2007.
[11] M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A
density-based algorithm for discovering clusters in large
spatial databases with noise. In KDD, pages 226–231, 1996.
[12] G. P. C. Fung, J. X. Yu, P. S. Yu, and H. Lu. Parameter free
bursty events detection in text streams. In VLDB, pages
181–192, 2005.
[13] M. Halvey and M. T. Keane. An assessment of tag
presentation techniques. In WWW, pages 1313–1314, 2007.
[14] J. Han, M. Kamber, and J. Pei. Data Mining: Concepts and
Techniques. Morgan Kaufmann, 2011.
[15] X. Jin, W. S. Spangler, R. Ma, and J. Han. Topic initiator
detection on the world wide web. In WWW, pages 481–490,
2010.
[16] M.-S. Kim and J. Han. A particle-and-density based
evolutionary clustering method for dynamic networks.
PVLDB, 2(1):622–633, 2009.
[17] D. Klein and C. D. Manning. Accurate unlexicalized parsing.
In ACL, pages 423–430, 2003.
[18] J. M. Kleinberg. Authoritative sources in a hyperlinked
environment. J. ACM, 46(5):604–632, 1999.
[19] J. Leskovec, L. Backstrom, and J. M. Kleinberg.
Meme-tracking and the dynamics of the news cycle. In KDD,
pages 497–506, 2009.
[20] B. Liu, C. W. Chin, and H. T. Ng. Mining topic-specific
concepts and definitions on the web. In WWW, pages
251–260, 2003.
[21] C. D. Manning, P. Raghavan, and H. Schuetze. Introduction
to Information Retrieval. Cambridge University Press, 2008.
[22] A. Marcus, M. S. Bernstein, O. Badar, D. R. Karger,
S. Madden, and R. C. Miller. Twitinfo: aggregating and
visualizing microblogs for event exploration. In CHI, pages
227–236, 2011.
[23] D. Nadeau and S. Sekine. A survey of named entity
recognition and classification. Lingvisticae Investigationes,
30(1):3–26, 2007.
[24] T. Sakaki, M. Okazaki, and Y. Matsuo. Earthquake shakes
twitter users: real-time event detection by social sensors. In
WWW, pages 851–860, 2010.
[25] A. D. Sarma, A. Jain, and C. Yu. Dynamic relationship and
event discovery. In WSDM, pages 207–216, 2011.
[26] S. Srinivasa. Data, storage and index models for graph
databases. In Graph Data Management, pages 47–70. 2011.
[27] L. Wan, W. K. Ng, X. H. Dang, P. S. Yu, and K. Zhang.
Density-based clustering of data streams at multiple
resolutions. TKDD, 3(3), 2009.
[28] J. Weng and B.-S. Lee. Event detection in twitter. In ICWSM,
2011.
[29] Y. Yang, T. Ault, T. Pierce, and C. W. Lattimer. Improving
text categorization methods for event tracking. In SIGIR,
pages 65–72, 2000.
|
1808.02046 | 1 | 1808 | 2018-08-06T18:00:39 | Directed Random Geometric Graphs | [
"cs.SI",
"cond-mat.dis-nn",
"physics.soc-ph"
] | Many real-world networks are intrinsically directed. Such networks include activation of genes, hyperlinks on the internet, and the network of followers on Twitter among many others. The challenge, however, is to create a network model that has many of the properties of real-world networks such as powerlaw degree distributions and the small-world property. To meet these challenges, we introduce the \textit{Directed} Random Geometric Graph (DRGG) model, which is an extension of the random geometric graph model. We prove that it is scale-free with respect to the indegree distribution, has binomial outdegree distribution, has a high clustering coefficient, has few edges and is likely small-world. These are some of the main features of aforementioned real world networks. We empirically observe that word association networks have many of the theoretical properties of the DRGG model. | cs.SI | cs | Directed Random Geometric Graphs
Jesse Michel,1 Sushruth Reddy,1 Rikhav Shah,1 Sandeep Silwal,1 and Ramis Movassagh2, ∗
1Massachusetts Institute of Technology, Cambridge MA, 02139
2IBM Research, MIT-IBM AI Lab, Cambridge MA, 02142
(Dated: August 8, 2018)
Many real-world networks are intrinsically directed. Such networks include activation of genes, hyperlinks on
the internet, and the network of followers on Twitter among many others [1 -- 3]. The challenge, however, is to create
a network model that has many of the properties of real-world networks such as powerlaw degree distributions
and the small-world property [4, 5]. To meet these challenges, we introduce the Directed Random Geometric Graph
(DRGG) model, which is an extension of the random geometric graph model. We prove that it is scale-free with
respect to the indegree distribution, has binomial outdegree distribution, has a high clustering coefficient, has few
edges and is likely small-world. These are some of the main features of aforementioned real world networks. We
empirically observe that word association networks have many of the theoretical properties of the DRGG model.
Contents
I. Introduction
II. Previous work
III. Directed Random Geometric Graph (DRGG) Model
IV. Mathematical results
A. Degree distributions
B. Clustering Coefficient of G(n, α, d)
C. Undirected edges and graph Limits
D. Diameter
V. An Application to real world networks
A. Degree Distribution
B. Other Graph Statistics
C. Analysis of Hubs
VI. Conclusions and Future Work
VII. Acknowledgements
VIII. Appendix
A. Proof of Theorem 2
1. Upper Bound Calculation
2. Lower Bound Calculation
B. Proof of Theorem 3
1. Computing the expectation
2. Computing the integral expression for Cin for odd d
C. Analysis of Hubs
References
2
2
3
4
4
6
9
10
11
12
12
13
13
14
14
14
15
15
16
16
17
18
18
8
1
0
2
g
u
A
6
]
I
S
.
s
c
[
1
v
6
4
0
2
0
.
8
0
8
1
:
v
i
X
r
a
I.
INTRODUCTION
2
The widespread availability of rich data on complex networks has spurred mathematical research into the prop-
erties of such networks. Researchers frequently use random graphs to model real networks [1, 3, 5 -- 9]. There are
many properties of real networks that appear in a diverse set of fields. The most prevalent of these properties are
the following:
Scale-free: the distribution of the degrees of nodes is given by a power law, i.e. P[degree of v = k] ∼ k−γ [7]. In
general, power-laws frequently occur in systems where 'rich' items become richer, though there are many potential
explanations [2, 7]. For networks, this means that nodes with high degree are more likely to attract connections from
additional nodes added to the network. This frequently occurs when the degree is a rough measure of popularity, for
example, websites that are linked to by a lot of other websites are seen as credible, so are linked to by more websites
[10]. In directed graphs, the indegree and outdegree distributions can be examined separately. Networks can exhibit
a power law indegree distribution but a skinny tail (e.g. Gaussian) outdegree distribution [11].
Few-edges: Networks are usually quite sparse [12]. Every node has a small expected degree that doesn't increase
much as the number of nodes scales. For example, if Twitter doubles its number of users, it's unlikely that the
average user would increase the number of users they follow by any constant factor. Real networks tend to have
(cid:101)O(n) edges 1.
Small-world: Most nodes are connected via a relatively short number of hops in the graph [13, 14]. Specifically,
the expected length of the shortest path between two randomly selected points is O(log n). This property is related
to the diameter, which is the longest shortest path in the graph. Clearly, the diameter is an upper bound on the
expected length of a shortest path.
Clustering: The clustering coefficient is the average likelihood that given a node, a randomly selected pair of its
neighbors will be connected via a single edge. Intuitively, agents tend to make connections with those they are
already 'close' to. We can write an expression for the clustering coefficient,
P[v (cid:32) wu (cid:32) v, u (cid:32) w],
1
n
∑
u
where v (cid:32) w is the event that there is a directed edge from v to w. This paper finds a class of random graphs which
satisfies all four of these key properties.
II. PREVIOUS WORK
We briefly describe classes of random graphs that have attracted much mathematical attention. Perhaps the most
prominent are Erdos-Renyi random graphs, denoted G(n, p). It is natural to extend this model to the directed case
by including the directed edges (v, u) and (u, v) independently with probability p. Erdos-Renyi graphs are tractable
and small-world but are not scale-free.
Another well-known network with heavy-tailed power law node degree distributions is the preferential attach-
ment model. While this model exhibits the desired power law distribution for degrees and is mathematically
tractable, this model lacks certain key properties of some real world networks such as a realistic clustering coef-
ficient, which measures the commonality of small communities [15, 16].
Random geometric graphs (RGG) are another class of random graphs that have become more popular in recent
years due to their simple formulation [17]. In the simple RGG model, one uniformly distributes n points over some
space (often taken to be the unit d−dimensional cube or torus), and takes them to be the vertices of a random graph.
One connects any pair of vertices with distance less than a fixed R. Intuitively nodes which are closer are more
connected, which is a desired feature of some real world networks. Much is known about this class of graphs, such
as the sizes of connected components and the minimum value of R which results in a connected graph [18]. These
types of random graphs are commonly used to model radio broadcasting towers and there has been much work on
distributed algorithms on these models (see [8, 9]). Some variations on the basic RGG model have also been studied.
One variant, termed the k-nearest neighbor model, samples points as in the basic RGG model but only connects each
1 (cid:101)O(n) = O(n poly(log n))
point to its k nearest neighbors [19]. Another variant generalizes the RGG model by sampling points as before, but
connecting nodes with a probability dependent on their distance [20].
III. DIRECTED RANDOM GEOMETRIC GRAPH (DRGG) MODEL
Consider n points (nodes/vertices) uniformly distributed on a d-dimensional cube [0, L]d. To make the model fully
translation-invariant, we impose periodic boundary conditions, that is, for any i,
(x1,· · · , xi−1, xi + L, xi+1,· · · , xd) = (x1,· · · , xi−1, xi, xi+1,· · · , xd).
3
This is equivalent considering points on a d-dimensional torus. For simplicity, below we take the unit cube (i.e., set
L = 1), but our results can be extended to a general L. Each point v is assigned a radius rv distributed according to a
Pareto distribution [21],
(cid:40)
f (r) =
η/rα
0
r0 ≤ r ≤ 1/2
otherwise
,
where α > d + 1 is a parameter of the graph and r0 is the minimum allowed radius, chosen based on n so that the
resulting graph is almost surely connected [18],
(cid:18) log n
(cid:19)1/d
Vd n
r0 =
.
where Vd be the volume of the unit ball in d-dimensions (i.e. v1 = 2, v2 = π, v3 = 4π/3). r ≤ 1/2 ensures that balls
of selected radii do not intersect themselves. η is the normalizing factor that ensures(cid:82) 1/2
f (r)dr = 1:
r0
(α − 1)rα−1
1 − (2r0)α−1 .
0
η =
We refer to the ball of radius rv centered at v as "v's circle" and denote the distance on the torus between v and u as
d(u, v) = d(v, u). The directed edges are added as follows. Add a directed edge from u to v (denoted by u (cid:32) v) if u
is in v's circle (i.e. d(v, u) ≤ rv). Intuitively, rv is a measure of the popularity of v. If v is unpopular, then only nodes
close by will connect; conversely very popular nodes attract the attention of nodes that are far away. Lastly, since we
want to model real-world networks, we can think of d as being a small integer, such as 1 ≤ d ≤ 5. See Figures (1)
and (2) for reference.
v
r
v
u
Figure 1: Illustration of u (cid:32) v: There is a directed edge from vertex u to vertex v since u lies inside v's circle of radius rv. There is no directed
edge from v to u since v lies outside of u's circle.
We refer to this as the Directed Random Geometric Graph (DRGG) model, denoted by G(n, α, d). In summary the
notation is:
• G(n, α, d) is a DRGG where n is the number of nodes and d is the dimension of the space.
• f (r) = η/rα probability density function for the selection of radii.
4
Figure 2: Left: Vertices with their respective circles plotted in the same color. Right: The corresponding DRGG.
• [r0, 1/2] is the support of f (r).
IV. MATHEMATICAL RESULTS
For any class of random graphs, there are a variety of properties of theoretical and practical interests as outlined
in the introduction. In this section, we prove that the indegree distribution of DRGGs is given by a power law with
parameter α−1
n ) where n is the number of
vertices. We also show that the total number of edges in DRGGs is Θ(n log n) and show that the clustering coefficient
of DRGGs approaches a constant as n → ∞. Finally, we show how the standard geometric random graphs can be
thought of as a graph limit of the DRGG model. We end with a conjecture about the diameter of DRGGs.
d + 1 while the outdegree distribution is a binomial with parameter Θ( log n
A. Degree distributions
As explained in Section I, motivated by real-world networks, we want a graph model whose indegree distribution
follows a power law, and whose outdegree distribution decays exponentially. Here we prove that indeed in DRGG,
the indegrees follow a power law distribution, and outdegrees a binomial distribution.
Theorem 1. Let δin(k) and δout(k) be the density function for the indegree and outdegree of the random graph G(n, α, d)
respectively. Then, asymptotically as n → ∞,
for fixed d, α > d + 1, and α−1
d (cid:28) k (cid:28) n and
d −1
δin(k) ∝ k− α−1
(cid:19)
(cid:18)n − 1
zk(1 − z)n−1−k
δout(k) =
k
(1)
(2)
where z = Θ(log n/n).
Proof. We first prove the indegree case. Consider the probability that a vertex v has indegree k. For this to happen,
there must be exactly k other vertices in v's circle (of radius rv). The probability of this is
(cid:90) 1/2
(cid:18)n
(cid:19)(cid:90) 1/2
k
r0
(3)
Since the points are distributed uniformly on the plane, P[δin(v) = k rv = r] is the binomial random variable that
describes the probability of exactly k points lying within the volume of the d-dimensional sphere. This gives
P[δin(v) = k] =
r0
P[rv = r] P[δin(v) = k rv = r] dr.
P[δin(v) = k] = η
(Vdrd)k(1 − Vdrd)n−k dr.
1
rα
(4)
Making the substitution u = Vdrd gives us
P[δin(v) = k] =
(cid:18)n
(cid:19)
k
η
d
α−1
V
d
d
(cid:90) Vd/2d
Vdrd
0
uk−1− α−1
d (1 − u)n−k du.
5
(5)
We let β = α−1
d
for convenience and express the integrand in terms of the exponential function obtaining
(cid:20)
(cid:19)
(cid:90) Vd/2d
(cid:18) k − β − 1
(cid:18)n
k
n ) ln(1 − u) so that the integrand is of the form en f (u). Treating n as the large part
ln u + (1 − k
n
) ln(1 − u)
(cid:19)(cid:21)
V β
d
Vdmd
exp
n
du.
n
P[δin(v) = k] =
η
d
ln u + (1 − k
Now let f (u) = k−β−1
and setting f (cid:48)(u) = 0, the saddle point is usp = k−β−1
n
n−β−1 and
Note that for large n, f (cid:48)(cid:48)(usp) approaches a negative constant. The steepest descent method gives (see [22])
f (cid:48)(cid:48)(usp) = −
.
(n − β − 1)3
(cid:115)
n(k − β − 1)(n − k)
(cid:19)
d en f (usp)
V β
(cid:18)n
k
2π
n f (cid:48)(cid:48)(usp) ,
P[δin(v) = k] ≈ η
d
(cid:19)
(cid:18)n
√
(6)
(7)
which after inserting f (usp) and f (cid:48)(cid:48)(usp) reads
P[δin(v) = k] ≈ η
d
V β
d
k
2π(k − β − 1)k−β−1/2(n − k)n−k+1/2
(n − β − 1)n−β+1/2
.
In fact, as n → ∞, the two sides of Eq. (6) become asymptotically equivalent [23]. As show in figure 3, the steepest
descent result gives an excellent approximation. One can ignore the term η
d since it do not depend on k so they only
contribute to the normalizing constant for δin. We now show that for large n, Eq. (7) gives rise to a power law in k.
Using Stirling's approximation one obtains
(cid:19)β+1 ≤
(cid:18)n
(cid:19) (k − β − 1)k−β−1/2(n − k)n−k+1/2
k
(n − β − 1)n−β+1/2
(cid:16) n
(cid:17)β+1
.
≤
√
1
2π (n − β − 1)
k
(cid:18)
√
1
2π (n − β − 1)
n
k − β − 1
Ignoring factors that do not depend on k, we see that P[δin(v) = k] ∝ k−β−1 as desired.
vertices. Now consider any other vertex u (cid:54)= v. The probability that v lies inside u(cid:48)s circle is given by
We now analyze the outdegree case. Consider a vertex v. v has outdegree k if it lies in exactly k circles of other
(cid:90) 1/2
r0
z =
P[v in u(cid:48)s ballru = r] P[ru = r] dr,
where P[v in u(cid:48)s ballru = r] = Vdrd and P[ru = r] = η/rα. Note that z does not depend on v or u. Since the radii of all
circles are picked independently, it follows that the probability that the outdegree of vertex v is k is (n−1
k )zk(1− z)n−k.
One can calculate z exactly to be
Defining α = βd + 1 for β > 1 the above expression reads
(cid:90) 1/2
r0
z =
(cid:18) 1
2d−α+1 − rd−α+1
0
(cid:19)
.
ηVd
η
rα Vd rd dr =
d − α + 1
(cid:32)
z =
βVd
β − 1
0 2−d − 2−βdrd
rβd
0 − 2−βd
rβd
0
(cid:33)
.
Using Taylor expansion, and recalling that β = α−1
z =
and we are done.
d and 1 (cid:29) z, the equation above reduces to
(cid:19) log n
(cid:18) log n
(cid:19)β−1
(cid:18) α − 1
α − 1 − d
+ O
n
n
6
Figure 3: Illustration of the approximation of Eq. (7) for 100, and 500 vertices for G(n, α, d). The approximation is very accurate for both cases. For
100 nodes we see that the fit is tight except at the head and tail, which aligns with the fact that steepest descent makes a Gaussian approximation.
We see a tighter fit for n = 500, which aligns with the asymptotic nature of our approximation in 1. A heavy tail distribution can also be seen
which numerically confirms the results proven in 1.
Corollary 1. The expected number of edges in G(n, α, d) is Θ(n log n).
Proof. To find the total number of edges, it suffices to count all the outdegrees edges. Since there are n − 1 nodes
that v can connect to with independent probabilities, Theorem 1 implies that the expected outdegree of any vertex is
Θ(log n). Hence, the total number of edges is Θ(n log n).
B. Clustering Coefficient of G(n, α, d)
The clustering coefficient of G(n, α, d) is discussed in this section. This metric is important because it measures
the propensity of nodes with common neighbors to themselves be connected [4, 24, 25]. Hence, real world networks
often exhibit large clustering coefficients. We being by showing that G(n, α, d) is rich in triangles, namely, G(n, α, d)
has Θ(n log2(n)) triangles. Triangles are important because they are a measure of connectivity and contribute to the
clustering coefficient that will be discussed later in this section. In addition, counting the total number of triangles in
a network is itself a well-studied problem [26]. In a directed graph, there are fundamentally two types of triangles:
Type 1 and Type 2 triangles. These triangles are shown in Figure (4). Due to the geometric nature of G(n, α, d), it
w
v
w
v
u
u
Figure 4: A type 1 triangle on the left and a type 2 triangle on the right.
turns out that we do not need to account for both types of triangles. Say that vertices u, v, w form a type 1 or 2
triangle if the edge relationships between u, v and w match Figure (4). Note that we say v (cid:32) w if there is a directed
edge from v to w.
7
Lemma 1. If vertices u, v and w form a type 2 triangle in G(n, α, d), then they also form a type 1 triangle.
Proof. We note that if u, v and w form a type 2 triangle then d(w, v) ≤ rw, d(v, u) ≤ rv, d(u, w) ≤ ru. Without loss of
generality, suppose that rv is the minimum radius: rv = min(ru, rv, rw). Then, we have rv ≤ ru so it follows that
d(v, u) ≤ rv ≤ ru.
Hence, there must also be a directed edge from v to u. That is, u, v and w also form a type 1 triangle, as desired.
Note that type 1 triangles measure the following phenomenon in real networks: If two people follow the same
person, what is the probability that one follows the other? Indeed, in real world networks, the number of triangles
is 'large', which indicates that models such as preferential attachment do not accurately model real world networks
[4]. However, the total number of triangles of type 1 in G(n, α, d) is quite 'large.'
Theorem 2. The expected number of directed, acyclic (type 1) triangles in a graph, S, for S = {u, v, w : v (cid:32) u, w (cid:32) u, v (cid:32)
w}, is E[S] = Θ(n log2(n)) as n → ∞ for fixed α, d under the constraint that α > 2d.
Proof. We give an abridged version of the proof. Please see the appendix for full details. Throughout the proof, P[·]
denotes the probability of an event while p(·) denotes the probability density of a random variable. By linearity of
expectation,
E[S] = n(n − 1)(n − 2) P(v (cid:32) u, w (cid:32) u, v (cid:32) w)
for randomly selected vertices u, v, w. Without loss of generality, we may take u to be located at the origin. Then
condition on the locations of v and w, denoted by xv and xw, as well as the radii of circles centered at u and w,
denoted by ru and rw.
It is clear that the radii of circles corresponding to u and w, along with the locations of v and w are independent.
Additionally, edges are conditionally independent given these radii and their locations. The probability density of
the points xv and xw is 1 since v, w are chosen uniformly over the unit torus: i.e. p(xv) = p(xw) = 1. Furthermore,
P[v (cid:32) uxv, ru] = 1[d(xv, 0) < ru], as we draw an edge from v to u if and only if xv is inside the circle of radius ru
centered at u (the origin). Similarly, P[w (cid:32) uxw, ru] = 1[d(xw, 0) < ru]. Finally, we have that P[v (cid:32) wxw, xv, rw] =
1[d(xv, xw) < rw], as we draw an edge from v to w if and only if the distance between their coordinates is less than
the radius of w's circle. Note that 1[d(xv, xw) < rw] ≤ 1 is always true. Using these ideas, we arrive at the following
inequality
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≤ V2
d η
r2d−α
u
= V2
d η
(cid:90) 1
2
r0
(cid:34)
r2d−α+1
u
2d − α + 1
(cid:35) 1
2
.
r0
As n becomes large, for any fixed d we have that r0 goes to 0. This then implies (for α > 2d) that the dominant term
in the above (and a valid, asymptotically tight upper bound) is:
r2d−α+1
α − 2d − 1
0
V2
d η
= C1
log2(n)
n2
where C1 is some constant independent of n. Using similar reasoning as above, we can get a lower bound on
P[v (cid:32) u, w (cid:32) u, v (cid:32) w]. Specifically, in the appendix, it is shown that
(cid:34)
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ V2
=
V2
d η2
α − 1
2−α r2d−2α−2
α − d − 1
0
(cid:90) 1
4
(cid:18) (2ru)1−α − (1/2)1−α
(cid:19)
1 − (4r0)α−1−2d(cid:17)(cid:35)
(cid:16)
.
(cid:16)
drur2d−α
u
d η2
1 − (4r0)2(α+1)−2d(cid:17) − 2α−1 r2d−α+1
α − 1
r0
0
α − 2d − 1
For fixed d, as n goes to infinity, r0 goes to 0, so that the leading order term here is the one containing the factor
r2d−2α−2
0
(as α > 2d > d − 1). Thus, we have the lower bound
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ (C2 − )
log2(n)
n2
8
for any > 0, for large enough n. This proves that, for fixed α, d:
C1
log2(n)
n2 ≥ P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ (C2 − )
log2(n)
n2
.
Multiplying by n(n − 1)(n − 2), we get:
C1n log2(n) ≥ E[S] ≥ (C2 − )n log2(n)
for any , given that n is sufficiently large. This proves that E[S] ∈ Θ(n log2(n)), as desired.
We now turn to the clustering coefficient. For a directed graph, there exist many different possible definitions of
the clustering coefficient [24, 25]. One natural choice is Cin, which is defined as:
Cin =
1
V ∑
v∈V
cv
where cu is the local clustering coefficient for vertex u and is defined as:
cu =
{v, w : v (cid:32) u, w (cid:32) u, v (cid:32) w}
du(du − 1)
where du is the degree of vertex u.
In this section, we find the asymptotic expectation value of this clustering
coefficient as n → ∞, and show it approaches a constant (dependent on d and α). Note that the expectation is over
all possible generated graphs. This is in contrast to other random graph models such as Erdos-Renyi random graphs
and preferential attachment graphs where the clustering coefficient are very small or approach 0 as n → ∞ [16, 27].
We then examine the case α → ∞, and show that it matches results from the random geometric graph model with
radius r0. This is in line with the correspondence outlined in the previous section, as in this limit, all edges become
undirected and the radius concentrates at r0, as in the case of random geometric graphs. Our main theorem is as
follows:
Theorem 3. As n → ∞ for fixed d, α satisfying α > 2d + 1, the expectation of the clustering coefficient approaches a constant
which is independent of n (the number of vertices). For odd d, the constant can be calculated exactly:
1
(α − 1)2 − d2 −
d
22k+1(2k + d + 1)
1
(α − 1)2 − (2k + d + 1)2
(cid:18)
(cid:19)(cid:21)
.
Proof. We give an abridged proof. Please see the appendix for full details. By linearity of expectation (where the
expectation is over all possible DRGG), E[Cin] = E[cu] for a randomly selected vertex u. Moreover,
(α − 1)2
d!!
(d − 1)!!
d−1
2∑
k=0
(−1)k
2k + 1
(cid:18) d−1
(cid:19)(cid:20)
2
k
(cid:20){v, w : v (cid:32) u, w (cid:32) u, v (cid:32) w}
(cid:21)
du(du − 1)
E[cu] = E
= ∑
k
P(du = k)
E[{v, w : v (cid:32) u, w (cid:32) u, v (cid:32) w}du = k]
k(k − 1)
from the law of iterated expectation. Furthermore,
E[{v, w : v (cid:32) u, w (cid:32) u, v (cid:32) w} du = k] = k(k − 1)P(v (cid:32) wv (cid:32) u, w (cid:32) u, du = k)
by linearity of expectation. Then, we can substitute this expression into the sum given for E[cu]:
P[du = k]P[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k].
After some computation, detailed in the Appendix, one obtains:
k
E[Cin] = ∑
(cid:90)
(cid:90)
E[Cin] =
dru p(ru)
drw p(rw)
(cid:90)
(cid:90)
ddxv
xv<ru
ddxw
xw<ru
1[xv − xw < rw]
V2
d r2d
u
.
For odd d, we can compute this explicitly (work detailed in the Appendix):
E[Cin] =
dd!!
(d − 1)!!
d−1
2∑
k=0
(−1)k
2k + 1
(cid:18) d−1
(cid:19)(cid:18) 1
2
k
(α − 1)2
(α − 1)2 − d2 −
1
22k+1(2k + d + 1)
(α − 1)2
(α − 1)2 − (2k + d + 1)2
d
9
(cid:19)
.
(8)
For even d, we cannot get nice closed forms since the density function of two randomly chosen points does not
have a nice form like the one that exists for odd d. However, we can perform asymptotic analysis and show that the
clustering coefficient also approaches a constant as n → ∞ for even d as well.
Remark 1. Note that from the expression in Eq. (8), it is clear that our value of E[Cin] is a constant independent of
n. This is different than other standard models such as the Erdos-Renyi random graphs which are known to have
low clustering coefficient [27] and the preferential attachment model which have the property that the clustering
coefficient approaches 0 as n → ∞ [16].
It is interesting to take the limit as α → ∞ in Eq.(8) which gives:
(cid:18) d−1
lim
α→∞
E[Cin] =
dd!!
(d − 1)!!
d−1
2∑
k=0
(−1)k
2k + 1
(cid:19)(cid:18) 1
d
(cid:19)
.
−
1
22k+1(2k + d + 1)
2
k
This limit matches the known clustering coefficient derived by Dall and Christensen of the standard RGG model
[17]. This is not surprising since taking α → ∞ in G(n, α, d) results in the standard RGG model, as explored in the
next section. The clustering coefficient for various odd dimensions along with their values as α → ∞ is shown in in
Table III in the appendix.
C. Undirected edges and graph Limits
In this section, we prove a lemma which shows that, given the existence of an edge, there is an asymptotically
constant probability of an edge in the opposite direction. This shows that we have a positive fraction of what we
have termed 'undirected edges.'
Lemma 2. For fixed α, d, and for any randomly selected vertices u, v, as n → ∞, we have that P[u (cid:32) vv (cid:32) u] → 2β−2
2β−1
where β = α−1
d .
Proof. The conditional probability can be written as P[u(cid:32)v,v(cid:32)u]
P[v(cid:32)u]
separately. As before, we can without loss of generality situate u at the origin. Then,
. We now compute the numerator and denominator
P[u (cid:32) v, v (cid:32) u] =
dru
ddxv
[0,1]d
drvP[u (cid:32) v, v (cid:32) uru, xv, rv] · p(ru, xv, rv).
(cid:90)
(cid:90) 1
2
r0
(cid:90) 1
2
r0
Since u, v share an undirected edge if and only if their separation is less than the radii of both of their circles, we have
P[u (cid:32) v, v (cid:32) uru, xv, rv] = 1[d(xv, 0) < ru]1[d(xv, 0) < rv]
Moreover, p(ru, xv, rv) = p(ru)p(xv)p(rv) as each of these 3 quantities is chosen independently. Then, the integral is
rewritten:
The integrand only depends on the norm of xv; we use spherical coordinates to write it as:
(cid:90)
ddxv
xv< 1
2
(cid:90) 1
xv dru p(ru)
2
(cid:90)
2
(cid:90) 1
xv drv p(rv) =
(cid:90) 1
2
rd−1P[ru > r]P[rv > r]dr
Sd−1
0
ddxvP[ru > xv]P[rv > xv].
xv< 1
2
where Sd−1 = 2πd/2
Γ( d
2 )
. We can split this integral into portions that go from 0 to r0, where P[ru > r] and P[ru > r] each
evaluate to 1, and a portion going from r0 to 1
2. By direct computation and for b ≥ r0, one obtains
10
and we have
b
We are interested in the behavior of this integral as n → ∞, or equivalently r0 → 0. Therefore, for sufficiently large n,
(cid:90) 1
2
drp(r) =
η
α − 1
(cid:34)
,
(cid:19)
(cid:18) 1
bα−1 − 2α−1
(cid:18) 1
(cid:90) 1
rα−1 − 2α−1
rd−1
2
r0
(cid:19)2
(cid:35)
dr
.
P[u (cid:32) v, v (cid:32) u] = Sd−1
rd
0
d
+
η2
(α − 1)2
(cid:90) 1/2
r0
rd−1
(cid:18) 1
rα−1 − 2α−1
(cid:19)
dr =
rd−2α+2
2α − d − 2
0
) + C
0
+ O(rd−α+1
(cid:33)
rd
0
d
+
rd
0
2α − d − 2
+ O(rd+α−1
).
0
P[u (cid:32) v, v (cid:32) u] = Sd−1
(cid:90) 1
P[v (cid:32) u] =
(cid:32)
2
r0
for some constant C. Using the Taylor expansion of η around 0 and noting that α > d + 1 (see III), we get
For the denominator of the conditional probability, assuming that u is located at the origin, we compute
Note that P[v (cid:32) uru] = P[xv < ru] = Vdrd
(cid:90) 1
u. Hence,
P[v (cid:32) u] = Vdη
r−α+d dr = Vdrd
2
r0
+ O(rα−1
).
0
Dividing P[u (cid:32) v, v (cid:32) u] by P[v (cid:32) u] and using the fact that r0 → 0, we get that
(cid:18) α − 1
dru p(ru)P[v (cid:32) uru].
(cid:19)
(cid:19) α − d − 1
α − d − 1
1
0
+
2α − d − 2
α − 1
(cid:18) 1
d
2β − 2
2β − 1
,
=
n→∞ P[u (cid:32) vv (cid:32) u] =
lim
Sd−1
Vd
since Sd−1
Vd
= d where β = α−1
d .
Remark 2. We can use Lemma 2 to understand the limiting behavior of G(n, α, d) for fixed n and d and as α → ∞. In
this case, the probability density function for the radii of the vertices converges to a delta distribution at the minimum
radius r0. However, we can actually say something stronger. In the α → ∞ case, G(n, α, d) actually converges to a
standard undirected random geometric graph with fixed radius r0. Note that r0 is the sharp connectivity threshold
for undirected random geometric graphs with fixed radius. To show this, note that the asymptotics we arrived at
P[u (cid:32) vv (cid:32) u] are also valid for fixed n and d and α → ∞ since the r0 term still dominates. Thus,
α→∞ P[u (cid:32) vv (cid:32) u] =
lim
Sd−1
dVd
= 1.
This proves the following corollary.
Corollary 2. For fixed n and d, limα→∞ G(n, α, d) converges to the standard random geometric graph model (RGG).
The diameter of a graph is defined as the longest path among the set of shortest paths over all pairs of vertices. In
our case, we are only concerned with directed paths. Similar to the clustering coefficient, the diameter of a graph is
D. Diameter
a measure of connectivity. It is common for real-world networks to have a small diameter, as can be seen from the
popular 'six-degrees of separation' phenomenon. Based on numerical results, we conjecture that the diameter of the
DRGG model is O(log n). It appears that the 'fat tail' property of the radii distribution contributes to the significant
reduction in the diameter of the DRGG model. However, even though we are not able to prove our conjecture for
the diameter, it is still possible to prove a related result which hints that the diameter is indeed O(log n).
Lemma 3. Let α and d be fixed in G(n, α, d). Pick two vertices u and v uniformly at random in G(n, α, d). Let ak denote the
number of directed paths of length k from u to v. If k ≥ log n
log log n , then E[ak] ≥ 1.
11
Proof. First consider three vertices w1, w2 and w3 chosen uniformly at random. If there is a directed edge from w1 to
w2, then this does not affect the probability of an edge from w2 to w3. This is because once the locations of w1 and w2
are fixed, the location of w3 is still uniform, and having an edge from w2 to w3 only depends on the location of w3.
Thus, given a length k directed path from u to v, the edges of this path are independent of one another. Hence, if ak
denotes the expected number of directed paths of length k form u to v, we have
E[ak] =
zk(k − 1)!
(9)
(cid:19)
(cid:18)n − 2
k − 1
where z is the probability of an edge in G(n, α, d) which is given by C log n
large, shifting k → k + 1, and using (n
n
k) ≥ nk
kk , we have
E[ak] ≥
√
2πk
(cid:18) C log n
(cid:19)k C log n
e
n
(Theorem 1) where C = α−1
α−1−d . Taking n
.
Hence, it suffices to find a k such that ( log n
Rearranging, we see that k ≥ log n
k = log n
log log n is at least
e )k ≥ n. This is equivalent to finding a k such that k log log n − k ≥ log n.
log log n works for large n, as desired. Therefore, the expected number of paths of length
√
E[ak] ≥ C
2πk log k ≥ 1.
Remark 3. In fact we can take the log of the expression in Eq. (9), it can be shown that k = Ω(cid:16) log n
(cid:17)
is the threshold
log log n
for the expected number of paths being asymptotically greater than 1.
The above lemma tells us that we can expect to find a short path between any two vertices. However, this result
is still far from establishing bounds on the diameter or even the length of the shortest path between two vertices
chosen uniformly at random. We end this section with the conjecture.
Conjecture 1. Let α and d be fixed in G(n, α, d). The length of the diameter of G(n, α, d) is O(log n).
V. AN APPLICATION TO REAL WORLD NETWORKS
We tested our model on a variety of real world networks. Our code is available at https://github.com/
martinjm97/DRGG. Interestingly, we empirically observed that networks created through word association resulted
in networks that had binomial outdegree distribution and power law indegree distribution. An example of this is
the University of South Florida Word Association Network. To create this network, researchers asked participants
to write the first word that came to mind that was meaningfully related or strongly associated to words that were
presented to them. Then a directed edge was drawn between the word said by the participant and the word that was
presented to them. This network has approximately 104 vertices and 7.2 × 104 edges. For more information about
this network, see [28]. In this section we investigate this network and see how its properties compare to that of the
DRGG model.
A. Degree Distribution
12
We begin by exploring how the indegree and outdegree distributions for the word association networks compare
to the predictions of DRGG. The outdegree and indegree distributions of the network along with the best fits accord-
ing to DRGG are shown in Figure 5. Note that for degree distributions, DRGG essentially has one free parameter,
namely β = α−1
d . Therefore, we fit both the outdegree and indegree distributions using β. As shown in Figure 5,
DRGG is a close fit, especially considering that there was only one free parameter to tune. We discovered that the
value of β = 7/3 ≈ 2.33 (α = 8, d = 3) resulted in the best fit.
(a) Outdegree Distribution
(b) Indegree Distribution
Figure 5: Fit for outdegree and indegree distributions for the word association network. β for both fits was β = 7/3 ≈ 2.33. The outdegree
distribution on the left also has error bars of approximately two standards of deviation (we estimate one standard deviation of a bin by the square
root of the number of items that fall in the bin).
B. Other Graph Statistics
It is interesting to investigate how other statistics quantities compare to the values predicted by DRGG. In this
section we use the model parameters of α = 8, d = 3 to fit the degree distributions.
We compared the average clustering coefficient (the clustering coefficient averaged over all nodes), the diameter,
and the average path length. The average clustering coefficient gives information about how tightly-knit small
communities are in the graph [14]. Likewise, diameter and average path length provides insight into how closely the
simulation models the real-world data. The comparison between our model predictions and actual real data values
are shown in Table I. Note that the average clustering coefficient is noticeably lower in our model predictions than
in the actual data. This suggests that the word association data set has a stronger clique behavior than our model.
Overall, the empirical degree distributions and the empirical graph statistics do not quite match the predictions
given by DRGG. This may be explained by the fact our results are asymptotic in n and the network we studied only
has 104 vertices.
Simulation
Real Data
Avg. Clustering Coefficient Diameter Avg. Path Length
0.512 ± 10−2
9.67 ± 0.94
5.149 ± 0.65
0.119
7
4
Table I: The results we averaged over 100 simulations of DRGG and were computed on the undirected version of the graph i.e., the directed edges
were made by bidirectional (undirected). This was done for computational simplicity. Since the DRGG model is strongly connected, this should
not have a large impact on the results. The same procedure was applied to the real data set. Finally, we only used the giant component in the real
data set to calculate these statistics. The mean values for the three graph statistics along with two standard deviations of error are displayed.
C. Analysis of Hubs
13
We analyze the words in the 'hubs' of the word association network [28]. By hubs, we specifically mean words
that have a high indegree and represent the tail-end of the power law indegree distribution. The 20 words with the
largest indegrees are shown in Table II. A lot of these hub words are emotional words such as Love, Good, Bad, Pain,
and Happy. In addition, the hubs also include words that are ubiquitous in everyday life, such as money, water, car,
work, and people.
Further analysis was performed on the largest 50 hubs to understand their significance in relation to the remainder
of the graph. One way of understanding the relationships between nodes in the graph is to look at their semantic
similarity, or closeness in meaning. Several metrics have been proposed to quantify semantic similarity in words. We
used two, based on the WordNet database and Word2Vec model. The WordNet database contains a hand-catalogued
tree-like hierarchy of words. Given a word at node n, hypernyms (words with broader meanings) are located higher
in the tree relative to n, while hyponyms (words with more specific meanings) are located lower in the tree. Two
words can be judged to be similar in meaning if they are close together in the graph induced by these word relation-
ships [29]. One particular such measure of similarity is Wu-Palmer similarity:
Similarity score(w1, w2) =
2 · depth(least common ancestor(w1, w2)
depth(w1) + depth(w2)
.
The Wu-Palmer similarity always lies between 0 and 1, and is higher if the words are closer in semantic similarity
[30]. We found that the average similarity between a hub and its neighbors is 0.359, the average similarity between
an arbitrary node in the graph and its neighbors is 0.354, and that the average similarity between two arbitrarily
selected nodes in the graph is 0.241. The average similarity between hubs is 0.263. Thus, according to this similarity
metric, hubs are on average slightly closer to their neighbors than other nodes. As expected, randomly chosen nodes
have lower similarity as they may not be related, while nodes that are connected would be expected to have higher
similarity. Hubs are also not very closely related: they are thus all common yet distinct words that serve as distinct
"sinks" in the word graph.
To confirm this trend, we compared these results to those obtained from a different similarity metric. The
Word2Vec model maps different words to continuous vector representations of a desired dimension. For more in-
formation, see the appendix. Similarity between vectors is then supposed to capture semantic similarity: indeed,
relationships such as King − Man + Woman = Queen seem to approximately hold between the vectors representing
these respective words. We found that the average dot product similarity between a hub and its neighbors is 0.452,
the average similarity between an arbitrary node and its neighbors is 0.422, and the average similarity between ran-
domly selected nodes is 0.338. The average similarity between different hubs is 0.415. Thus, as before, hubs are on
average slightly more similar to neighbors than arbitrarily chosen nodes, and much more similar than random words
are to each other. Interestingly, this metric describes hubs as fairly similar to each other- this might be an artifact of
this metric, as all hubs describe fairly common words that might appear together often in many text corpora.
We also used a library named TextBlob to perform sentiment analysis to determine whether hubs expressed sig-
nificantly different emotions than arbitrary nodes in the graph. For more information about TextBlob, please see the
appendix.
Phrases can be constructed by concatenating words in the association network with their neighbors. TextBlob was
used to analyze these phrases. Phrases that contain hub words have an average polarity of 0.0970 and subjectivity
of 0.553, with variances of 0.0731 and 0.0752 respectively. Phrases made from arbitrary graph nodes have an average
polarity of 0.00511 and subjectivity of 0.532, with variances of 0.0982 and 0.0611 respectively. Thus, hubs tend to be
slightly more "positive" than "negative", and slightly more "subjective" than "objective" compared to the average
node in the graph, but these differences are on the order of the variances in these numbers. It thus seems that hubs
are generally fairly neutral.
In summary, it seems that hubs are distinguished by the fact that they are short words that are easily memo-
rable. This explains why they have high indegree: people have an easy time remembering them, regardless of their
semantic content.
VI. CONCLUSIONS AND FUTURE WORK
We have introduced a new model of random graphs, the Directed Random Geometric Graph (DRGG) model that
has the property of being scale free in its indegree distribution, has few edges, and has a high clustering coefficient.
Food: 324 Money: 302 Water: 276
Good: 255
Bad: 229 Work: 195 House: 185 School: 183 Love: 181
Man: 171 Paper: 163
Pain: 158 Animal: 156 People: 154
Fun: 151 Book: 149 Clothes: 147 Happy: 145 Hard: 144
Car: 259
14
Table II: Words with the largest indegrees in the word association network. The respective indegrees are shown next to the words.
Furthermore, we have displayed that this model can be applied to real world networks such as word association
networks. Future work includes further theoretical investigation of the DRGG model, such as proving Conjecture 1
which states that the diameter of G(n, α, d) is O(log n).
A potential future application of DRGGs is to model power grid networks. Power grids are comprised of different
types of nodes such as generators and transformers. Edges are directed because some nodes produce energy, others
transfer energy, and yet others use up energy. Therefore, relationship among the nodes is asymmetrical. This matches
the asymmetric indegrees and outdegrees of our model. Furthermore, similar to our model, connections are highly
correlated with distance, since nodes that are far apart will be impractical to connect. However, a challenge for this
analysis is the lack of directed data that is available, although there has been some recent progress to construct such
a network by pulling data from multiple sources [31]. We envision the analysis of directed power grid networks as
a direction for future research with potential for broad applicability. In addition, we hope to see further applications
of the DRGG model to other real world networks.
VII. ACKNOWLEDGEMENTS
Jesse Michel, Sushruth Reddy, Rikhav Shah, and Sandeep Silwal would like to thank IBM Research for the oppor-
tunity to do an internship at the MIT-IBM AI lab in Cambridge MA in the winter of 2018, which was awarded to
them for winning the 2017 HackMIT competition. They would also like to thank Ramis Movassagh for mentoring
them during this period.
VIII. APPENDIX
A. Proof of Theorem 2
Proof. Throughout the proof, P[·] denotes a probability while p(·) denotes a probability density. By linearity of
expectation, we can write E[S] = n(n − 1)(n − 2) P(v (cid:32) u, w (cid:32) u, v (cid:32) w) for randomly selected vertices u, v, w.
Without loss of generality, as we are working on a torus, we may take u to be located at (0, 0,· · · , 0). We can then
condition on the locations of v and w, which we denote xv and xw, as well as the radii of circles centered at u and w,
which we denote ru and rw, respectively, to obtain:
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] =
dru
drw
ddxv
[0,1]d
ddxw P[v (cid:32) u, w (cid:32) u, v (cid:32) wru, rw, xv, xw] p(ru, rw, xv, xw).
[0,1]d
We now note that the radii of circles corresponding to u and w, along with the locations of v and w are independent.
Additionally, edges are conditionally independent given these radii and locations. Then, we may rewrite the above
probability as:
dru
drw
ddxv
[0,1]d
ddxwP[v (cid:32) uxv, ru] P[w (cid:32) uxw, ru] P[v (cid:32) wxw, xv, rw] p(ru) p(rw) p(xv) p(xw).
[0,1]d
Note firstly that the probability density of the points xv and xw is 1 since v, w are chosen uniformly from the unit torus
which means p(xv) = p(xw) = 1. Furthermore, P[v (cid:32) uxv, ru] = 1[d(xv, 0) < ru], as we draw an edge from v to u if
and only if xv is inside the circle of radius ru centered at u (the origin). Similarly, P[w (cid:32) uxw, ru] = 1[d(xw, 0) < ru].
Finally, we have that P[v (cid:32) wxw, xv, rw] = 1[d(xv, xw) < rw], as we draw an edge from v to w if and only if the
(cid:90)
(cid:90) 1
2
r0
(cid:90)
(cid:90) 1
2
r0
(cid:90)
(cid:90) 1
2
r0
(cid:90) 1
2
r0
(cid:90)
distance between their coordinates is less than the radius of w's circle. Substituting, we obtain:
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] =
dru p(ru)
drw p(rw)
ddxv
d(xv,0)<ru
ddxw1[d(xv, xw) < rw].
d(xw,0)<ru
(cid:90) 1
2
r0
(cid:90) 1
2
r0
(cid:90)
(cid:90)
We now upper and lower bound this expression in order to show that it is of order Θ(n log2(n)). We first prove an
upper bound.
1. Upper Bound Calculation
15
Note that 1[d(xv, xw) < rw] ≤ 1 is always true, and so our probability satisfies:
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≤
dru p(ru)
drw p(rw)
ddxv
d(xv,0)<ru
(cid:90)
(cid:90)
ddxw 1.
d(xw,0)<ru
(cid:90) 1
2
r0
Now, the last two integrals individually evaluate to the volume of the d-dimensional ball with radius ru. Further-
more, the integral over rw evaluates to 1, as p(rw) is a normalized probability density function. The remaining
integral can be evaluated as follows:
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≤ V2
d η
r2d−α
u
= V2
d η
(cid:34)
r2d−α+1
u
2d − α + 1
(cid:35) 1
2
.
r0
(cid:90) 1
2
r0
(cid:90) 1
2
r0
As n becomes large, for any fixed d we have that r0 goes to 0. This then implies (for α > 2d) that the dominant term
in the above (and a valid upper bound) is:
where C1 is some constant independent of n.
r2d−α+1
α − 2d − 1
0
V2
d η
= C1
log2(n)
n2
2. Lower Bound Calculation
We now show a lower bound on the integral expression. We claim that:
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥
dru p(ru)
drw p(rw)
ddxv
d(xv,0)<ru
(cid:90) 1
2
r0
(cid:90) 1
2
r0
(cid:90)
(cid:90)
ddxw1[rw > 2ru]
d(xw,0)<ru
This is because for choices of rw, ru such that rw > 2ru, we have d(xv, xw) ≤ d(xv, 0) + d(xw, 0) ≤ 2ru ≤ rw by the
triangle inequality. Then, this integrand is always nonnegative and is identical to the original integrand when it is
nonzero. This integral is then a lower bound on the original, as desired. Now, the integrals over xv, xw can be done
as before to give:
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ V2
d
drur2d
u p(ru)
drw p(rw)1[rw > 2ru]
We can eliminate the indicator function by rewriting the bounds as:
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ V2
d
drur2d
u p(ru)
(cid:90) 1
2
r0
(cid:90) 1
2
r0
(cid:90) 1
4
r0
(cid:90) 1
2
2ru
drw p(rw)
Doing the integral over rw, this becomes:
(cid:34)
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ V2
=
V2
d η2
α − 1
2−α r2d−2α−2
α − d − 1
0
(cid:90) 1
4
(cid:18) (2ru)1−α − (1/2)1−α
(cid:19)
1 − (4r0)α−1−2d(cid:17)(cid:35)
(cid:16)
(cid:16)
drur2d−α
u
d η2
1 − (4r0)2(α+1)−2d(cid:17) − 2α−1 r2d−α+1
α − 1
r0
0
α − 2d − 1
16
.
Note that for fixed d, as n goes to infinity, r0 goes to 0, so that the leading order term here is the one containing the
factor r2d−2α−2
(as α > 2d > d − 1). Thus, we have the lower bound
0
P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ (C2 − )
log2(n)
n2
for any > 0, for large enough n. This then proves that, for fixed α, d, that:
C1
log2(n)
n2 ≥ P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ (C2 − )
log2(n)
n2
Multiplying by n(n − 1)(n − 2), we get:
for any , given that n is sufficiently large. This then proves that E[S] ∈ Θ(n log2(n)), as desired.
C1n log2(n) ≥ E[S] ≥ (C2 − )n log2(n)
B. Proof of Theorem 3
1. Computing the expectation
Proof. Now, note that
P[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k, ru, rw, xv, xw] = P[v (cid:32) wxv, xw, rw] = 1[xv − xw < rw]
(i.e. v's lying in w's circle is independent of all variables but for the positions of v, w and w's radius). Furthermore,
p(ru, rw, xv, xwv (cid:32) u, w (cid:32) u, du = k) = p(rw)p(ru, xv, xwv (cid:32) u, w (cid:32) u, du = k),
from the conditional independence of rw, as none of the other variables being considered involve edges pointing
to w. Furthermore, this equals p(rw)p(ruv (cid:32) u, w (cid:32) u, du = k)p(xv, xwru, v (cid:32) u, w (cid:32) u), by the chain rule of
probability. Note that p(ruv (cid:32) u, w (cid:32) u, du = k) = p(rudu = k) as ru is independent of the fact that two things lie
within u's circle given the indegree of u. Furthermore, note that
p(xv, xwru, v (cid:32) u, w (cid:32) u) =
P[v (cid:32) u, w (cid:32) u, xv, xwru]p(xv, xwru)
P[v (cid:32) u, w (cid:32) uru]
by Bayes' Rule. Note that p(xv, xwru) = p(xv)p(xw) = 1, that P[v (cid:32) u, w (cid:32) uru] = (Vdrd
u)2, and that
P[v (cid:32) u, w (cid:32) uru, xv, xw] = 1[xw < ru]1[xv < ru].
Now, we decompose the conditional probability above as:
(cid:90)
P[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k]
=
(cid:90)
(cid:90)
(cid:90)
ddxv
dru
drv
ddxwP[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k, ru, rw, xv, xw]p(ru, rw, xv, xwv (cid:32) u, w (cid:32) u, du = k).
Then, our integral becomes:
P[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k] =
(cid:90)
dru p(rudu = k)
(cid:90)
(cid:90)
drw p(rw)
(cid:90)
ddxv
xv<ru
ddxw
xw<ru
1[xv − xw < rw]
V2
d r2d
u
17
.
Substituting these results back into the original expression, we get the desired result in the main body of the
paper.
2. Computing the integral expression for Cin for odd d
Proof. Note that the inner 2 integrals give the probability that 2 points randomly chosen in a sphere of radius ru are
less than rw apart. The answer to this question can be derived from a result that can be found in [32]. Namely, for
odd d, the probability distribution function for the distance between two points being exactly r apart in a ball of
radius R is:
P(r) =
drd−1
Rd
d!!
(d − 1)!!
d−1
2∑
k=0
(−1)k
2k + 1
(cid:18) d−1
(cid:19)(cid:18)
2
k
1 −(cid:16) r
2R
(cid:17)2k+1(cid:19)
.
(The even case is much harder to work with and does not result in a nice closed form. Thus, we will only work with
the odd d case). The cumulative distribution function is then (for odd d):
D(r) =
dd!!
(d − 1)!!
d−1
2∑
k=0
(−1)k
2k + 1
(cid:18) d−1
(cid:19)(cid:18) 1
2
k
d
(cid:90)
dru p(ru)
drw p(rw)
(cid:19)m
(cid:18) rw
ru
η2r2−2α
0
=
(1 − α)2 − m2
(cid:16) r
(cid:17)d −
(cid:34)(cid:32)
R
1 −
(cid:18) 1
2r0
22k+1(2k + d + 1)
1
(cid:16) r
(cid:19)m−α+1(cid:33)(cid:32)
R
1 −
(cid:17)2k+d+1(cid:19)
.
(cid:19)−m−α+1(cid:33)(cid:35)
(cid:18) 1
2r0
Then, when we substitute back into the integral, we wish to compute integrals of the form:
(cid:90)
(cid:90)
where m is an arbitrary integer. Note that since m ≤ (d − 1)/2, and α > 2d + 1, we have that ±m − α + 1 < 0. Then,
as n → ∞ (and, thus, as r0 → 0), the terms in parentheses both go to 1, so that the dominant term is proportional to
r2−2α
. We then get:
0
(cid:90)
(cid:18) rw
(cid:19)m ≈
(α − 1)2 − m2 .
Putting this all back together again, we get the final expression in the main body of the paper.
drw p(rw)
dru p(ru)
ru
η2
(1 − α)2 − m2 r2−2α
0 → (α − 1)2
d
1
3
5
E[Cin]
(cid:16) 4
(α−1)2
4
α2−2α
+
1−α2−2α+1
(cid:17)
3(α−1)2(5α4−20α3+9α2+22α−72)
32(α2−2α−8)(α2−2α−5)(α2−2α−3)
(α−1)2(159α6−954α5+5364α4−15096α3−73679α2+175006α+392040)
512(α2−2α−24)(α2−2α−9)(α2−2α−7)(α2−2α−5)
limα→∞ E[Cin]
3
4
15
32
159
512
Table III: Values of E[Cin] for various odd dimensions. The limiting value as α → ∞ is also shown. We only have values for odd d since we could
not calculate a closed form expression for the probability of the distance between two randomly chosen points being exactly r apart in a ball of
radius R.
18
C. Analysis of Hubs
The mapping utilized by Word2Vec is obtained by training a neural net. Specifically, the vectors are the solutions
of an optimization problem which roughly attempts to maximize the dot products of vectors corresponding to words
that are located close to each other in some text corpus. Ideally, words that are located close to each other often have
similar meaning, and thus higher dot products, giving some indication of semantic similarity [33]. For the purposes
of these experiments, we used a set of word vectors that were pre-trained on Google News articles. TextBlob uses
a probabilistic model, tending to classify words as positive if they occur in many positive movie reviews, and neg-
ative if they occur in low-rated reviews. The library returns polarity and subjectivity values, which measure how
negative/positive (on a [−1, 1] scale) and objective/subjective (on a [0, 1] scale) a given phrase is, respectively.
∗ Electronic address: R. Movassagh: [email protected], Rest: [email protected]
[1] Bin Zhang and Steve Horvath. A general framework for weighted gene coexpression network analysis. In STATISTICAL
APPLICATIONS IN GENETICS AND MOLECULAR BIOLOGY 4: ARTICLE 17, 2005.
[2] A. Capocci, V. D. P. Servedio, F. Colaiori, L. S. Buriol, D. Donato, S. Leonardi, and G. Caldarelli. Preferential attachment in the
growth of social networks: The internet encyclopedia wikipedia. Phys. Rev. E, 74:036116, Sep 2006. doi: 10.1103/PhysRevE.
74.036116. URL https://link.aps.org/doi/10.1103/PhysRevE.74.036116.
[3] D. Ediger, K. Jiang, J. Riedy, D. A. Bader, and C. Corley. Massive social network analysis: Mining twitter for social good. In
2010 39th International Conference on Parallel Processing, pages 583 -- 593, Sept 2010. doi: 10.1109/ICPP.2010.66.
[4] M. Kaiser and C. C. Hilgetag. Spatial growth of real-world networks. Phys. Rev. E , 69(3):036103, March 2004. doi: 10.1103/
PhysRevE.69.036103.
[5] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang. Complex networks: Structure and dynamics. Physics
ISSN 0370-1573. doi: https://doi.org/10.1016/j.physrep.2005.10.009. URL http://www.
Reports, 424(4):175 -- 308, 2006.
sciencedirect.com/science/article/pii/S037015730500462X.
[6] S. Tanimoto. Power laws of the in-degree and out-degree distributions of complex networks. ArXiv e-prints, December 2009.
[7] Albert-Laszlo Barabasi and Reka Albert. Emergence of scaling in random networks. Science, 286(5439):509 -- 512, 1999. ISSN
0036-8075. doi: 10.1126/science.286.5439.509. URL http://science.sciencemag.org/content/286/5439/509.
[8] Robert Elsasser, Leszek Gasieniec, and Thomas Sauerwald. On radio broadcasting in random geometric graphs. International
Symposium on Distributed Computing, 5218:212 -- 226, 01 1970.
[9] Xingde Jia. Wireless networks and random geometric graphs. In 7th International Symposium on Parallel Architectures, Algo-
rithms and Networks, 2004. Proceedings., pages 575 -- 579, May 2004. doi: 10.1109/ISPAN.2004.1300540.
[10] Albert-Laszlo Barabasi, Reka Albert, and Hawoong Jeong. Scale-free characteristics of random networks: The topology of
the world-wide web, 2000.
[11] Stefan Kambiz Behfar, Ekaterina Turkina, Patrick Cohendet, and Thierry Burger-Helmchen. Directed networks different link
formation mechanisms causing degree distribution distinction. Physica A: Statistical Mechanics and its Applications, 462(C):
479 -- 491, 2016. URL https://EconPapers.repec.org/RePEc:eee:phsmap:v:462:y:2016:i:c:p:479-491.
[12] B. A. Huberman, D. M. Romero, and F. Wu. Social networks that matter: Twitter under the microscope. ArXiv e-prints,
December 2008.
9780199206650.
e-prints, July 2012.
[13] Mark Newman. Networks: An Introduction. Oxford University Press, Inc., New York, NY, USA, 2010.
ISBN 0199206651,
[14] Duncan Watts and Steven H. Strogatz. Collective dynamics of small world networks. Nature, 393:440 -- 2, 07 1998.
[15] N. Durak, A. Pinar, T. G. Kolda, and C. Seshadhri. Degree Relations of Triangles in Real-world Networks and Models. ArXiv
[16] B. Bollobas. Mathematical results on scale-free random graphs. In Handbook of Graphs and Networks, pages 1 -- 37. Wiley, 2003.
[17] Jesper Dall and Michael Christensen. Random geometric graphs. Phys. Rev. E, 66:016121, Jul 2002. doi: 10.1103/PhysRevE.
66.016121. URL https://link.aps.org/doi/10.1103/PhysRevE.66.016121.
[18] M. Bradonjic and W. Perkins. On Sharp Thresholds in Random Geometric Graphs. ArXiv e-prints, August 2013.
[19] Paul Balister, Amites Sarkar, and Bela Bollobas. Percolation, Connectivity, Coverage and Colouring of Random Geometric
ISBN 978-3-540-69395-6. doi: 10.1007/
Graphs, pages 117 -- 142. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.
978-3-540-69395-6_2. URL https://doi.org/10.1007/978-3-540-69395-6_2.
[20] Carl P. Dettmann and Orestis Georgiou. Random geometric graphs with general connection functions. Phys. Rev. E, 93:
032313, Mar 2016. doi: 10.1103/PhysRevE.93.032313. URL https://link.aps.org/doi/10.1103/PhysRevE.93.032313.
[21] Eric W. Weisstein.
"pareto distribution." from mathworld -- a wolfram web resource. http://mathworld.wolfram.com/
ParetoDistribution.html, 2018.
[22] Richard Chapling. Asymptotic methods, April 2016.
[23] A. Erdelyi. Asymptotic Expansions. Dover Books on Mathematics. Dover Publications, 1956.
https://books.google.com/books?id=aedk-OHdmNYC.
[24] G. Fagiolo. Clustering in complex directed networks. Phys. Rev. E , 76(2):026107, August 2007. doi: 10.1103/PhysRevE.76.
19
ISBN 9780486603186. URL
026107.
[25] Benjamin Tabak, Marcelo Takami, J. Rocha, and Daniel Cajueiro. Directed clustering coefficient as a measure of systemic
risk in complex banking networks. Working Papers Series 249, Central Bank of Brazil, Research Department, 2011. URL
https://EconPapers.repec.org/RePEc:bcb:wpaper:249.
[26] Mohammad Al Hasan and Vachik S. Dave. Triangle counting in large networks: a review. Wiley Interdisciplinary Reviews:
Data Mining and Knowledge Discovery, pages e1226 -- n/a, 2017. ISSN 1942-4795. doi: 10.1002/widm.1226. URL http://dx.
doi.org/10.1002/widm.1226. e1226.
[27] N. Meghanathan. A random network model with high clustering coefficient and variation in node degree.
International Conference on Control and Automation (CA), pages 54 -- 57, Nov 2015. doi: 10.1109/CA.2015.20.
[28] Schreiber Nelson, McEvoy. The university of south florida word association, rhyme, and word fragment norms. http:
In 2015 8th
//www.usf.edu/FreeAssociation/, 1998.
[29] Christiane Fellbaum. WordNet. Springer, 2010.
[30] Zhibiao Wu and Martha Palmer. Verb semantics and lexical selection. CoRR, abs/cmp-lg/9406033, 1994. URL http://
arxiv.org/abs/cmp-lg/9406033.
[31] Saleh Soltan, Alexander Loh, and Gil Zussman. A learning-based method for generating synthetic power grids. 2017.
[32] S.-J. Tu and E. Fischbach. Random distance distribution for spherical objects: general theory and applications to physics.
Journal of Physics A Mathematical General, 35:6557 -- 6570, August 2002. doi: 10.1088/0305-4470/35/31/303.
[33] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, and Jeffrey Dean. Distributed representations of words and phrases
and their compositionality. CoRR, abs/1310.4546, 2013. URL http://arxiv.org/abs/1310.4546.
|
1712.10232 | 1 | 1712 | 2017-12-29T13:56:16 | Dependence Structure Analysis Of Meta-level Metrics in YouTube Videos: A Vine Copula Approach | [
"cs.SI"
] | This paper uses vine copula to analyze the multivariate statistical dependence in a massive YouTube dataset consisting of 6 million videos over 25 thousand channels. Specifically we study the statistical dependency of 7 YouTube meta-level metrics: view count, number of likes, number of comments, length of video title, number of subscribers, click rates, and average percentage watching. Dependency parameters such as the Kendall's tau and tail dependence coefficients are computed to evaluate the pair-wise dependence of these meta-level metrics. The vine copula model yields several interesting dependency structures. We show that view count and number of likes' are in the central position of the dependence structure. Conditioned on these two metrics, the other five meta-level metrics are virtually independent of each other. Also, Sports, Gaming, Fashion, Comedy videos have similar dependence structure to each other, while the News category exhibits a strong tail dependence. We also study Granger causality effects and upload dynamics and their impact on view count. Our findings provide a useful understanding of user engagement in YouTube. | cs.SI | cs | Dependence Structure Analysis Of Meta-level
Metrics in YouTube Videos: A Vine Copula
Approach
Vikram Krishnamurthy, Fellow, IEEE
Yan Duan
1
7
1
0
2
c
e
D
9
2
]
I
S
.
s
c
[
1
v
2
3
2
0
1
.
2
1
7
1
:
v
i
X
r
a
Abstract-This paper uses vine copula to analyze the multivari-
ate statistical dependence in a massive YouTube dataset consisting
of 6 million videos over 25 thousand channels. Specifically we
study the statistical dependency of 7 YouTube meta-level metrics:
view count, number of likes, number of comments, length of video
title, number of subscribers, click rates, and average percentage
watching. Dependency parameters such as the Kendall's tau and
tail dependence coefficients are computed to evaluate the pair-
wise dependence of these meta-level metrics. The vine copula
model yields several interesting dependency structures. We show
that view count and number of likes' are in the central position
of the dependence structure. Conditioned on these two metrics,
the other five meta-level metrics are virtually independent of
each other. Also, Sports, Gaming, Fashion, Comedy videos have
similar dependence structure to each other, while the News
category exhibits a strong tail dependence. We also study Granger
causality effects and upload dynamics and their impact on view
count. Our findings provide a useful understanding of user
engagement in YouTube.
I. INTRODUCTION
Since its establishment in 2005, YouTube has over 1 billion
registered users, who spend millions of hours and generate
billions of views everyday; more than 300 hours of video
content are uploaded every minute [1]. While YouTube is a
social media site, is is also a social networking site. Classical
online social networks (OSNs) are dominated by user-user
interactions. However YouTube is unique in that the interaction
between users is more sophisticated since it includes video
content–that is, the interaction follows: users → content →
other users.
The interaction between users in the YouTube social net-
work is incentivized using the posted videos. These interac-
tions include:
1) Commenting on users' videos and commenting on other
users comments which is very similar to users interaction
on blog posting sites such as Twitter.
2) Subscribing to YouTube channels provides a method of
forming relationships between users.
3) Users can directly comment on a YouTube channel.
4) Users can also interact by embedding videos from another
users channel directly into their own channel to promote
exposure or form communities of users.
Vikram Krishnamurthy (corresponding author) is with the School of Elec-
trical and Computer Engineering, and Cornell Tech, Cornell University, New
York (email: [email protected]). This research was partially supported by
an Army Research office grant and the Schmidt Sciences. Yan Duan is with
the University of British Columbia, Canada. (email: [email protected]).
In this paper we view YouTube as a big-data time series.
We statistically analyze a massive YouTube dataset of more
than 6 million videos over 25 thousand channels to understand
how various YouTube meta-level metrics (such as view count,
subscriber count, number of likes, etc) affect each other.
YouTube is a useful source of data: with efficient web crawlers,
meta-level metrics data such as "number of views" can be
collected for millions of videos. Careful analysis of YouTube
data can reflect users' preference and lead to useful outcomes
in optimal caching [3], recommendation systems [4], [5] and
targeted advertising [6]. For example [3] studies how popu-
larity prediction of YouTube can be used to design efficient
caching algorithms in 5G telecommunication systems.
A. Context. Copulas
With the rapid growth of YouTube data sets, there is strong
motivation for adequately understanding and modeling the
dependencies present
in the resulting multivariate random
processes. The modeling of a multivariate distribution function
can be decomposed into considering the marginal distributions
and then determining the underlying dependence structure,
the so-called copula. One of the most popular copula classes,
especially for high- dimensional data, are vine copulas.
In this paper we focus on the correlations amongst YouTube
video metrics and their dependence relationships, which are
determined using vine copula models. Vine copula models
[8] have several attractive features: since they do not impose
constraints on marginal distributions, they can capture unusual
correlations such as extreme co-movements [9]. Furthermore,
with vine copula, one can separate the task of estimating
marginal distributions from that of estimating dependence
between random variables. A short review of bivariate copulas
and vine copula model is provided in the Appendix.
B. Main Results
This paper uses vine copula to determine the multivariate
dependency structures in a YouTube dataset consisting of more
than 6 million videos over 25 thousand channels. The dataset
consists of the daily samples of meta-level video metrics from
April, 2007 to May, 2015. Specifically we consider 7 YouTube
meta-level metrics: view count, number of likes, number of
comments, length of video title, number of subscribers, click
rates, and average percentage watching.
The vine copula model is useful for visualizing the interde-
pendencies of the YouTube metrics across different channels.
Also, the Kendall's Tau yields the relative importance of these
metrics. Based on the vine copula analysis of the YouTube
dataset, we conclude several important facts regarding depen-
dence structures (Sec.III-E describes these dependencies in
more detail) of YouTube metrics.
1) We found that "number of views"1 and "number of
likes" are in the central position of the dependence
structure. Conditioned on these two metrics, the other
five YouTube metrics are virtually independent of each
other (see Figure 2). So for example, conditioned on the
number of likes, the number of comments (negative or
positive) is statistically independent of the number of
subscribers (which at first sight is somewhat counter-
intuitive). Surprisingly, this dependency structure is true
for all categories of videos that we considered, namely,
gaming, sports, fashion and comedy.
are
large
(i.e. positive
2) Regarding the various categories of videos; "News"
videos have stronger statistical inter-dependence when
their values
co-
movements), For "Gaming" videos, "annotation clicks
rate" is less dependent on number of views compared
to other categories, Users watching "Comedy" videos are
more likely to give comments. For a video with certain
popularity, users are more likely to finish a video in
"Fashion" category than in other categories.
extreme
3) Finally, given the dependency structure from the vine
copula, we dig further into the dynamics of YouTube.
We use Granger causality to determine the causal rela-
tion between viewcounts and subscribers for channels in
YouTube. We also study the upload dynamics of YouTube
and find he interesting property that for popular gaming
YouTube channels with a dominant upload schedule,
deviating from the schedule increases the views and the
comment counts of the channel.
The vine copula models in this paper are of interest in
interactive advertising [2], [7]: based on the meta-level metrics,
which channels to advertise on? Also, knowledge of the
dependency structure allows YouTube content providers to
maximize the number of views. The interaction between users
in the YouTube is incentivized using the posted videos. In
addition to the social incentives, YouTube also gives monetary
incentives to promote users increasing their popularity. As
more users view and interact with a users video or channel,
YouTube will pay the user proportional to the advertisement
exposure on the users channel. Therefore, users not only
maximize exposure to increase their social popularity, but
also for monetary gain. Finally, in 5G wireless networks [3],
adaptive caching of content is crucial: the vine copula gives a
tractable model to determine what videos to cache.
2
Pioneering works include: meta-data statistics/social network
analysis [11], [12], and proposed methods to improve quality
of service (QoS) [13], [14]. For the dependence analysis on
video meta-level metrics, earlier works found that YouTube
videos have clear small-world characteristics and thus strong
correlations with each other, and such knowledge can lead
to more efficient video caching and redistribution [12], [15].
However, to our best knowledge, no statistical analysis has
been conducted on the dependence among the key YouTube
video metrics.
This paper is organized as follows. In Sec.III, we discuss
the main results of this paper: summary of the YouTube data
statistics, details for the four steps of dependence analysis
using vine copula, estimated parameters, and interpretations
of the results. In Sec.IV, we validate the vine copula model
using the White goodness-of-fit test. Finally, Sec.VI offers the
concluding remarks. In the Appendix, we review the Sklar's
theorem and bivariate Archimedean copulas, which lead to the
construction of the vine copula model.
II. A SHORT OUTLINE OF VINE COPULAS
Since its introduction by Sklar in 1959 [24], copulas are a
useful multivariate model in various fields [25], [26], [27].
Definition. A (Borel-measurable) function C : [0, 1]n → [0, 1]
is a copula, if the following properties hold:
• for each i ∈ {1, 2, ..., n}, C(u) = ui when all compo-
nents of u are equal to 1, except the ith item that is equal
to ui ∈ [0, 1].
• for all u, v ∈ [0, 1]n such that ∀i ∈ {1, 2, ..., n}, ui ≤ vi,
C(u) ≤ C(v)
• C is n-decreasing.
A fundamental result involving copula is Sklar's Theorem.
Sklar's Theorem. Let F ∈ F(F1, ..., Fn) be an n-
dimensional cumulative distribution function with continuous
marginal distribution functions F1, ...Fn. Then there exists a
unique copula C with uniform marginals: C ∈ F(U, ...,U),
such that for all x1, ..., xn in (−∞,∞)
F (x1, ..., xn) = C(F1(x1), ..., Fn(xn)).
(1)
Note that copula function C is a [0, 1]n → [0, 1] mapping.
Therefore, in copula applications, the raw data is required to
be transformed into uniformly distributed data, or the so-called
"copula data" by using probability integral
transformation
(PIT). Sklar's theorem states that as long as one can estimate
marginal distributions for metrics of interests, it is possible
to find a function (or "copula") to properly model
their
multivariate distribution.
C. Literature Review
Copulas are now used in wide range of areas including
finance, econometrics, biology and medicine [10]. Research
on YouTube video data analysis started as early as 2007.
1The view count is a key metric of the measure of popularity or "user
engagement" of a video and the metric by which YouTube pays the content
providers
Bedford and Cooke [30] proposed the so-called "Regular
Vine" (or simply "R-Vine") graphical structure,2 hence the
name "vine-copula". "Vine" refers to a nested set of tree
structures, where the edges of the ith tree are the nodes of
the i + 1th tree. In copula applications, the trees are used to
represent the dependence structure of multiple variables: each
2A vine is a graphical tool for labeling constraints in high-dimensional
probability distributions.
edge represents the bivariate copula connecting one pair of
marginals; see appendix for an illustrative example.
Formally a regular vine structure is defined as follows (see
Appendix for background):
Definition. A graphical structure V is a regular vine of m
elements if:
1) V = (T1, ..., Tm−1) and all trees are connected
2) The first tree T1 has node set N1 = 1, ..., m and edge set
E1; then for the next trees Ti, i ∈ 2, ...m − 1, Ti has the
node set Ni = Ei−1
3) Proximity condition: If two nodes are connected by an
edge in the i + 1th tree, then the two edges in ith tree
corresponding to these two nodes share a node.
The following steps (see appendix for details) construct a
regular vine copula (R-vine) specification to a dataset:
1) Construct the R-Vine structure by choosing an appropri-
ate unconditional and conditional pair of metrics to use
for vine copula model.
2) Choose a bivariate copula family for each pair selected
3) Estimate the corresponding parameters for each bivariate
in step (1).
copula.
III. DEPENDENCE STRUCTURE OF YOUTUBE USING VINE
COPULA
In this section, we use the vine copula model to unravel the
dependence structure of a massive YouTube data set.
A. YouTube Dataset
The dataset contains daily samples of metadata of YouTube
videos from April, 2007 to May, 2015, and has a size of around
200 gigabytes. Table I summarizes the dataset.
TABLE I: Dataset summary
Videos
Channels
Average number of videos (per channel)
250
Average age of videos
Average number of views (per video)
6 million
26 thousand
275 days
10 thousand
The data-set comprises seven meta-level metrics and five
categories of YouTube videos. The 7 meta-level metrics of
YouTube:
• Number of views
• Number of likes
• Number of comments
• Video title length
• Number of subscribers
• Annotation click rates
• Average percentage of watching
The YouTube videos we consider belong to five categories:
• Sports
• Fashion
• Gaming
• Comedy
N(cid:88)
3
• News
For each category, 6000 samples including data of seven
metrics are chosen from the YouTube dataset, which has
different number of videos for different categories. For the
reader's convenience, the abbreviations of long metrics names
are also provided. All of above information is summarized in
Table II.
Table III conducts a preliminary statistical analysis on the
dataset in terms of mean, median, kurtosis and skewness. It
can be concluded that apart from "title length" and "average
percentage of watching", the other five metrics of YouTube
videos have very high kurtosis and skewness, which imply
heavy tails and high asymmetry of those distributions. There-
fore, these five metrics of YouTube videos are not normally
distributed. It is this property that motivates the use of vine
copula: the vine copula does not require the marginals to be
normally distributed, it serves as a useful multivariate model
for the dependence analysis of YouTube dataset.
B. Modelling Marginal Distributions
The marginal empirical distribution of each YouTube metric
can be estimated from the data:
F N (x) =
1
N + 1
i=1
I(Xi ≤ x).
(2)
where N is the number of data samples, Xi is the ith data
point, while I(·) is the indicator function. The probability
integral
transform (PIT) is then applied to the estimated
marginal distribution to obtain uniformly distributed samples
in [0,1], which is referred as "copula data" and required by
the vine copula model. In order to test whether the copula data
is uniformly distributed in [0, 1], the Kolmogorov-Smirnov
statistic [16] is used to do the goodness-of-fit test (i.e. how
close the transformed copula data is to the reference uniform
distribution) [17].
The high p-values in Table IV indicate that the copula data
generated from PIT is uniformly distributed.
C. Measure of Dependence
For each pair-copula, instead of the classical correlation
coefficient, the Kendall rank correlation coefficient (all called
Kendall's tau) [18] is a useful measure of dependence. The
classical correlation coefficient for two random variables X, Y :
ρX,Y = E[(X−µX )(Y −µY )]
only detects linear dependencies,
and it is not preserved by copulas. Therefore is not considered.
Unlike the classical correlation coefficient, the Kendall's tau3
is preserved by copulas [19].
(cid:1) = 21 pairs of metrics in total; an estimate
metrics, there are(cid:0)7
Given a dataset with N observations and seven meta-level
σX σY
of dependency for kth pair of metrics (X, Y ) is obtained by
the empirical Kendall's tau coefficient:
2
N − Bk
Ak
N (N − 1)/2
3Kendall's tau is a measure of rank correlation:
τem(X, Y ) =
N
the similarity of the
orderings of the data when ranked by each of the quantities. The rank is
high when the variables have a similar rank, and is low when the ranks are
dissimilar.
.
(3)
4
Number of Videos Categories
Metrics
Abbreviation
85657
90586
60438
431803
58820
Null
News
Fashion
Sports
Gaming
Comedy
Null
Number of Views
Number of Likes
Number of Comments
Video Title Length
Number of Subscribers
Annotation Clicks
Views
Likes
Comm
TitLen
Subs
Anno
TABLE II: YouTube Video Data Categories, Metrics and Abbreviations
TABLE III: Summary of YouTube data
4355984
134103
22932
Stats
Min
Max
Median
Mean
Kurtosis
Skewness
Views
1
Likes
0
5775400
12111
715
25540
9.59
1.61
2
124.50
11.44
1.04
Stats
Min
Min
Max
Median
Mean
Kurtosis
Skewness
Stats
Min
Max
Median
Mean
Kurtosis
Skewness
Stats
Min
Max
Median
Mean
Kurtosis
Skewness
Views
1
1
Likes
0
0
1385
50264
14.32
5.05
Views
0
19
487.7
13.46
3.18
Likes
0
5516714
12361
1772
17298
12.15
3.10
11
110.3
12.30
1.52
Views
1
Likes
0
6900910
22846
1287
30666
4.44
1.83
14
128
5.63
1.87
Stats
Min
Max
Median
Mean
Kurtosis
Skewness
Views
0
Likes
0
3233762
28314
341
7380
12.16
3.21
6
121
4.94
1.96
(A): News
Comm TitLen
0
9035
1
71.43
7.83
1.27
0
0
9
4
120
50
50.66
0.23
0.21
4
1
120
36
(B): Comedy
Comm TitLen
95.64
11.82
2.91
(C): Sports
38.69
0.041
0.096
Comm TitLen
0
5963
6
4
120
54
55.25
0.21
0.10
42.29
6.14
2.14
(D): Fashion
Comm TitLen
0
5094
8
3
120
45
45.05
0.037
0.062
36.18
4.85
1.79
(E): Gaming
Comm TitLen
0
9731
4
39.22
5.99
2.29
2
120
54
54.37
0.027
0.021
Subs
0
1589
1.0
13.6
2.30
1.30
Subs
0
7553
2.00
36.76
4.70
1.30
Subs
0
7405
0.00
12.02
13.17
3.82
Subs Anno AvgPer
0
0
0
9793
35.78
0
26.62
9.81
2.15
0
0.27
10.41
1.25
99.03
56.40
50.77
0.74
-0.43
Subs
0
0
23338
1.00
54.36
13.30
3.68
Anno
0
0
408.764
0.0
2.096
5.82
2.00
AvgPer
0
0
99.04
40.17
40.43
0.042
0.57
AvgPer
0
92.07
39.71
40.34
0.05
0.066
AvgPer
0
98.53
28.73
29.70
0.03
0.049
Anno
0
109.1267
0.0
1.198
1.26
0.90
Anno
0
176.8490
0.0
1.0688
3.65
1.62
Anno
AvgPer
0
91.4822
0.0
0.6450
2.52
1.40
0
98.36
26.72
30.21
0.063
0.11
5
Fig. 1: The scatter plots (lower matrix) and empirical Kendall's tau (upper matrix) for the copula data of "News" YouTube
videos. The empirical Kendall's tau is estimated from data using Table II, while the scatter plots provide qualitative information
regarding the pair-wise dependence. For instance, plots of "titlen" and "AvgPer" with other metrics are scattered everywhere,
this implies weak dependence of these two metrics on the other metrics. On the other hand, scatter plots of "Views", "Likes"
and "Subs" show distinct patterns of co-movements with each other, this implies their strong dependence on each other, and
might be in central position in the dependence structure.
N and Bk
N are the concordance and disconcordance
where Ak
number [20] of kth pair that has N data points. The concor-
dance number and the disconcordance number count the data
points that move in the same direction and opposite direction,
respectively.
In contrast to the empirical Kendall's tau, the theoretical
Kendall's tau, which is computed using bivariate copulas[21]:
(cid:90) u=1
(cid:90) v=1
τth(X, Y ) = 4
u=0
v=0
C(u, v)dC(u, v) − 1.
(4)
Here, C is the bivariate copula to be selected in the vine
the copula data of X and Y ,
model, u and v represent
respectively.
The empirical Kendall's tau and scatter plot for the copula
data of "News" videos are shown in Fig.1. In order to compute
empirical Kendall's tau, 6000 "News" videos are randomly
selected from 85657 videos over 3217 YouTube "News"
channels, its theoretical Kendall's tau values shown in Table
V(A) are computed from the vine copula model. The empirical
Kendall's tau, which is computed from data, is required in the
R-vine structure selection step for the pair copula construction
of vine copula (reviewed in the Appendix); while theoretical
Kendall's tau is computed as the measure of dependence given
by the vine copula model.
D. Summary of Main Conclusions
Based on the vine copula analysis of the YouTube dataset,
important facts regarding dependence
we conclude several
structures of YouTube videos. (Sec.III-E describes these de-
pendencies in more detail.)
1) Conditional dependence of the seven meta-level metrics
of YouTube videos is insignificant, compared with a much
stronger unconditional dependence.
2) Amongst the seven meta-level metrics of YouTube, "num-
ber of views" and "number of likes" are in the central
position of the dependence structure. The other five
metrics are much more dependent on these two metrics
than on each other.
3) The "News" category has a different dependence structure
from the other four categories. Furthermore, the met-
rics of "News" videos have stronger inter-dependence
when their values are large (i.e. positive extreme co-
movements), the other categories don't possess this prop-
erty.
4) For "Gaming" video category, "annotation clicks rate" is
least dependent on number of views among all the five
categories.
5) For "Comedy" video category, users are more likely to
subscribe to the channel for a popular video than other
categories.
6) Users watching "Comedy" videos are more likely to give
7) For a video with certain popularity, users are more likely
to finish a video in "Fashion" category than in other
categories.
8) "Length of video title" is independent of the other met-
comments.
rics.
E. Results and Discussion
We are now ready to discuss the main conclusions on our
dependency analysis of YouTube video meta-level metrics.
Once the empirical marginal distributions of YouTube video
metrics are obtained using vine copula described in Sec.III-B,
the three steps outlined in the Appendix were applied to model
the multivariate distributions for YouTube video metrics. Table
V summarizes the estimated parameters: Kendall's tau τ,
copula parameters and lower/upper tail dependence λL/λU
(defined in (19) in the Appendix), for the vine copula model of
all five video categories. General dependence analysis for the
five categories and category-specific conclusions are shown as
follows.
1) General Dependence Analysis for All Five Categories:
Fig.2 and Fig.3 are the main graphical dependency results of
our analysis. They illustrate the dependence structure for all
five video categories, with pair-wise theoretical Kendall's tau
values and bivariate copula names.
First, as described in the Appendix, a vine structure uses
multiple dependence trees to describe the dependence struc-
ture, which consists of two types of trees:
• Unconditional dependence tree: the first tree of the vine
• Conditional dependence trees: all
the trees of a vine
excluding the unconditional dependence tree
in Fig.2 and Fig.3, we only use the first
trees
However,
(i.e. unconditional dependence trees) to represent
the de-
pendence structure for YouTube video metrics. Uncondi-
tional/conditional dependence trees describe the dependence of
two or more random variables when another random variable
is present, and are induced through the decomposition of vine
structure. For instance, in (15), given three random variables
X1, X2 and X3, copula density c12 is the joint density of (X1,
X2), and c132 is the conditional density of X1, X3 given X2.
So c12 describes the unconditional dependence of X1, X2,
while c132 describes the conditional dependence of X1, X3
given X2. Table V shows that the unconditional dependencies
for the seven metrics (Kendall's tau values of 0.3-0.6) are
much stronger than the conditional dependencies (Kendall's
tau values of 0.01-0.2). Therefore, the conditional dependence
is insignificant for YouTube video metrics, and can be ignored.
Second, in Fig.2, it can be observed that for "Comedy",
"Sports", "Fashion", "Gaming" video categories, "number of
views" and "number of likes" are in the central position of
the dependence structure of the seven YouTube video metrics.
More specifically, "number of comments", "number of sub-
scribers" and "annotation clicks" have a strong unconditional
dependence on these two video metrics, with high Kendall'
tau values between 0.3 and 0.65. The exceptions are "title
length" and "average percentage of watching": "title length"
shows little dependence on other metrics with Kendall's tau
values that are no more than 0.1, while "Average Percentage
of Watching" shows a moderate dependence on other metrics
with Kendall's tau values between 0.14 and 0.25.
Third, given the central roles of "number of views" and
"number of likes" in the dependence structure, we should
assign dominant weights to them if we want
to assess a
video using these seven video metrics. Note that "number
of views" and "number of likes" are important indicators for
the popularity of a video. Since "title length" is statistically
independent of "number of views" and "number of likes"
(considering its Kendall's tau values that are less than 0.1),
one can conclude that changing video title length will not
increase the popularity of video. As for "average percentage
of watching", which is an important indicator for video quality,
surprisingly it is not highly dependent on the YouTube video
viewcount.
6
2) Category-specific Dependence Analysis: By comparing
the dependence structures of different categories in Fig.2, we
can see that "Gaming", "Sports", "Fashion" and "Comedy"
videos possess similar dependence structure. That is, "number
of views" and "number of likes" are in the central position
of the dependence structure, while other metrics are in the
border of the dependence structure. The exception is the
"News" category. As shown in Fig.3, "number of subscribers"
for the "News" category also plays the same central role
as "number of likes" and "number of views", although the
overall dependence of "News" category turns to be weaker
(i.e. smaller Kendall's tau values) than the other categories.
This can be explained by the fact that, all the other four
categories possess a strong characteristic of entertainment,
which "News" doesn't have much, thus a big difference of
dependence structure should be expected.
Furthermore, by comparing the theoretical Kendall's tau val-
ues among different video categories, more category-specific
conclusions can be made. The "Gaming" video category has
the smallest Kendall's tau value (0.22) for the (Anno, Views)
pair, while "Comedy" category has the largest τ for both the
(Comm, Likes) pair and the (Subs,Views) pair. The largest τ
value for the (AvgPer, Likes) pair belongs to the "Fashion" cat-
egory. Therefore, YouTube viewers watching "Gaming" videos
are more likely to accept the suggestions from the channel and
watch more related videos; while "Comedy" channels should
be a better place for video makers raising more subscribers
and create active online community; if business looks for
channels to put advertisements on, "Fashion" channels should
have a better chance to make viewers look at their break-in
advertisements.
Finally, from Table V, it can be observed that for uncon-
ditional dependence structures of video categories including
"Comedy", "Sports", "Fashion", "Gaming",
there are few
values for lower and upper tail dependence. This implies that
for these categories, YouTube video metrics don't have many
co-movements (i.e. small dependence) when their values are
very large or very small. The exception is again the "News"
category: with large values of upper tail dependence for four
pairs of metrics shown in Table V(A), the "News" video
metrics are expected to have stronger inter-dependence when
the values of these metrics are large.
IV. VALIDATION OF VINE COPULA MODEL USING THE
WHITE TEST
How good is the vine copula model of Sec.III in terms of de-
termining the dependency structures in YouTube? Goodness-
of-fit tests including the misspecification test, the information
matrix ratio test, and the Rosenbatt's transform test, have been
introduced for the vine copulas over the last decade [22].
Considering that we used regular vine (R-vine) to model the
dependence structure, below we use one type of misspecifica-
tion test (we call it "White test") for the goodness-of-fit test
of R-vine. Proposed by White and enhanced by Schepsmeier,
this test is shown to have excellent performance and power
behavior [23].
The theorem of White states that, under the correct model,
the negative Hessian matrix and outer product of gradient for
7
Fig. 2: The first dependence (unconditional dependence) trees of the vine copula for the "Comedy", "Sports", "Fashion",
"Gaming" YouTube video data, along with their theoretical Kendall's tau values and pair-wise copula families. Second and
further dependence trees are not provided, since we have shown in Table V that conditional dependence is not significant in
vine structure of YouTube videos. It can be observed that "number of views" and "number of likes" are in the central position
of the dependence structure.
TABLE IV: p-values of uniform K-S test for YouTube data
8
Category Views Likes Comm TitLen
0.91
0.71
0.99
0.88
0.89
News
Sports
Fashion
Gaming
Comedy
0.72
0.92
0.76
0.87
0.98
0.97
0.82
0.99
0.96
0.98
0.79
0.93
0.83
0.76
0.93
Subs Anno AvgPer
0.98
0.96
0.87
0.99
0.92
0.91
0.87
0.85
0.90
0.78
0.86
0.86
0.88
0.70
0.98
TABLE V: Estimated Parameters for the Vine Copula Model: bivariate copula types discussed in the Appendix, theoretical
Kendall's tau τ, bivariate copula parameters, lower/upper tail dependence λL/λU (defined in (19) in the Appendix)
Tree
1
1
1
1
1
1
2
2
2
2
2
Dependence Pair
(Views, Comm)
(Likes, Comm)
(Views, Likes)
(Subs, Anno)
(Views, Subs)
(Views, Avgper)
(Titlen, LikesViews)
(Comm, ViewsLikes)
(Likes, Subsviews)
(Anno, Viewssubs)
(Subs, Avgperviews)
Tree
Copula
S-Joe
Joe
Joe
Joe
Joe
S-BB8
BB8-270
S-BB7
Joe
Tawn-180
BB8-90
τ
0.098
0.35
0.35
0.18
0.33
0.16
-0.081
0.11
0.17
0.017
-0.121
Dependence Pair
(AvgPer, Views)
(Titlen, Likes)
(Comm, Likes)
(Views, Views)
(Subs, Views)
(Likes, Anno)
(AvgPer, CommViews)
(Titlen, ViewsLikes)
(Comm, LikesViews)
(Views, SubsViews)
(Subs, AnnoViews)
1
1
1
1
1
1
2
2
2
2
2
Tree
1
1
1
1
1
1
2
2
2
2
2
(A): News
Parameters
[1.20, null]
[1.98, null]
[1.95, null]
[1.42, null]
[1.85, null]
[1.77, 0.80]
[-1.27, -0.91]
[1.10, 0.16]
[1.35, null]
[1.28, 0.020]
[-1.72, -0.72]
(B): Comedy
Copula
Tawn
Clayton
BB8
BB8
BB8
BB8
Frank
Frank
Tawn
Clayton
BB8
(C): Sports
λL
0.22
0
0
0
0
0
0
0.12
0
0.015
0
λU
0
0.58
0.57
0.37
0.55
0
0.55
0.013
0.33
0
0
τ
0.14
0.12
0.63
0.63
0.62
0.30
-0.17
-0.041
0.12
0.13
0.0075
Parameters
[1.78, 0.20]
[0.26, null]
[4.40, 0.98]
[5.16, 0.91]
[4.53, 0.96]
[1.95, 0.96]
[-1.58, null]
[-0.37, null]
[1.30, 0.33]
[0.3, null]
[1.3, 0.84]
λL
0.17
0.07
0
0
0
0
0
0
0
0
0
λL
0
0
0
0
0
0.06
0
0
0
0
λU
0
0
0
0
0
0
0
0
0.15
0.10
0
λU
0
0
0
0
0
0
0
0.53
0.25
0
0.0073
0.0073
Dependence Pair
(AvgPer, Likes)
(Comm, Likes)
(Likes, Views)
(Subs, Views)
(Views, Anno)
(Titlen, Anno)
Copula
Frank
BB8
BB8
BB8
BB8
Tawn-180
(AvgPer, CommLikes) Gaussian
(Comm, ViewsLikes)
Tawn
(Likes, SubsViews)
Tawn
(Subs, AnnoViews)
BB8
(Views, TitlenAnno)
Student t
τ
0.19
0.58
0.55
0.53
0.31
0.045
-0.052
0.035
0.17
0.12
0.0036
Parameters
[1.80, null]
[3.94, 0.96]
[4.19, 0.90]
[3.47, 0.95]
[2.65, 0.79]
[1.29, 0.099]
[-0.082, null]
[1.11, 0.22]
[1.38, 0.54]
[1.46, 0.88]
[0.0051, 9.92]
9
Fig. 3: The first dependence (unconditional dependence) trees of the vine copula for the "news" category, with its theoretical
Kendall's tau values and pair-wise copula families. It can be observed that different from the other four categories, in the
dependence structure of the "News" category, "number of subscribers" is as important as "number of views" and "number of
likes". Although the overall inter-dependence of video metrics in "News" are weaker than in the other four categories.
(D): Fashion
Tree
1
1
1
1
1
1
2
2
2
2
2
Tree
1
1
1
1
1
1
2
2
2
2
2
Dependence Pair
(Likes, Comm)
(Views, Titlen)
(Likes, AvgPer)
(Views, Likes)
(Views, Subs)
(Views, Anno)
(Comm, ViewsLikes)
(Titlen, LikesViews)
(AvgPer, ViewsLikes)
(Likes, SubsViews)
(Subs, AnnoViews)
Dependence Pair
(AvgPer, Likes)
(Comm, Likes)
(Likes, Views)
(Subs, Views)
(Views, Anno)
(Titlen, Anno)
(AvgPer, ViewsLikes)
(Comm, ViewsLikes)
(Likes, SubsViews)
(Subs, AnnoViews)
(Views, TitlenAnno)
Copula
BB8
Survival BB7
Survival BB8
BB8
BB8
BB8
Tawn
BB8
Tawn-90
BB8
Tawn
(E): Gaming
τ
0.50
0.11
0.25
0.53
0.55
0.32
0.10
-0.053
-0.029
0.27
0.068
Parameters
[3.25, 0.95]
[1.13, 0.12]
[2.06, 0.85]
[3.25, 0.97]
[3.46, 0.95]
[2.68, 0.81]
[1.25, 0.30]
[-1.22, -0.81]
[-1.17, 0.093]
[3.12, 0.67]
[1.17, 0.33]
Copula
BB8
Joe
BB8
Joe
BB8
Gaussian
Student t
Student t
Gumbel
Frank
Tawn-180
τ
0.16
0.50
0.51
0.44
0.22
0.037
-0.034
0.13
0.17
0.046
0.014
Parameters
[2.22, 0.65]
[2.82, null]
[2.96, 0.99]
[2.42, null]
[1.59, 0.97]
[0.06, null]
[-0.054, 7.19]
[0.21, 16.5]
[1.21, null]
[0.41, null]
[1.11, 0.045]
λL
0
0
0
0
0
0
0.016
0.003
0
0
0.016
λL
0
0.15
λU
0
0.003
0
0
0
0
0
0
0
0
0
0
0
0
0
0.13
0
0
0
0.1
λU
0
0.72
0
0.67
0
0
0.016
0.003
0.23
0
0
10
Fig. 4: The scatter plots for original and simulated "Sports" YouTube copula data. It can be observed that, the original YouTube
copula data and the copula data simulated from vine copula model share a dependence pattern. This qualitatively shows that
the vine copula model captures the dependence patterns accurately, such conclusion is validated by the high p-values of White
test in Table VII.
TABLE VII: p-values of White test for YouTube copula data
Fashion Gaming Comedy
Categories News
p-values
0.674
0.591
0.666
Sports
0.685
0.714
the likelihood function are equal [23]. Therefore, the White
test is the following hypothesis test:
H0 : H(θ0) + C(θ0) = 0
H1 : H(θ0) + C(θ0) (cid:54)= 0.
where H(θ) is the Hessian matrix:
H(θ) =
∂2
∂2θ
L(θU ).
and C(θ) is the outer product of the gradient:
C(θ) =
∂
∂θ
L(θU )(
∂
∂θ
L(θU ))T .
(5)
(6)
L(θU ) is the likelihood function defined in (18), and U is
the simulated copula data following our vine copula model.
The p-values of the White test can be computed based on (4)
and (5), the reader can refer to [23] for more details.
Table VII lists the p-values of the White test for the vine
copula model, given the YouTube dataset. Based on the high
p-values of White test for all five YouTube video categories
considered, the null hypothesis can not be rejected. Thus the
vine copula model obtained from Sec.III-E is a reasonable
model for the multivariate probability distribution of YouTube
video metrics. Fig.4 compares the pairwise scatter plots of
YouTube copula data, along with the simulated data sampled
from our vine copula model. A common dependence structure
pattern can be observed in both plots, which show that the vine
copula model captures the dependence structures of YouTube
data accurately.
channel on day t is denoted by I(t). Define,
vj(t) =
vj
i (t),
11
(7)
I(t)(cid:88)
i=1
nv(cid:88)
i=k
as the total view count of channel j at time t. The Granger
causality test involves testing if the coefficients bi are non-
zero in the following equation which models the relationship
between subscribers and view counts:
sj(t) =
aj
ksj(t − k) +
bj
k vj(t − k) + εj(t),
(8)
ns(cid:88)
k=1
i}{i=1,...,ns} and {bj
where εj(t) represents normal white noise for channel j at
time t. The parameters {aj
i}{i=1,...,nv}
in (8) for channel
are the coefficients of the AR model
j, with ns and nv denoting the lags for the subscriber
and view counts time series respectively. If the time-series
Dj = {sj(t), vj(t)}t∈{1,...,T} of a channel j fits the model (8),
then we can test for a causal relationship between subscribers
and view count. In equation (8), it is assumed that ai < 1,
bi < 1 for stationarity. The causal relationship can be
formulated as a hypothesis testing problem as follows:
H0 : b1 = ··· = bnv = 0 vs. H1 : Atleast one bi (cid:54)= 0.
(9)
The rejection of the null hypothesis, H0, implies that there is
a causal relationship between subscriber and view counts.
Two hypothesis testing procedures are applied to test for
Granger causality. First, we use Box-Ljung test is to evaluate
the quality of the model (8) for the given dataset Dj. If
satisfied, then the Granger causality hypothesis (9) is evaluated
using the Wald test. If both hypothesis tests pass then we can
conclude that the time series Dj satisfies Granger causality–
that is, the previous day subscriber and view count have a
causal relationship with the current subscriber count.
An important issue prior to performing the Granger causal-
ity test is to determine the percentage of videos in the YouTube
dataset satisfy the AR model in (8). To perform this analysis
we apply the Box-Ljung test with a confidence of 0.95 (p-
value = 0.05). First, we need to choose ns and nv, namely, the
number of lags for the subscribers and view count time series.
For ns = nv = 1, we found that only 20% of the channels
satisfy the model (8). When ns and nv are increased to 2, the
number of channels satisfying the model increases to 63%.
For ns = nv = 3, we found that 91% of the channels satisfy
the model (8), with a confidence of 0.95 (p-value = 0.05).
Hence, we chose ns = nv = 3. It is interesting to note that the
mean value of coefficients bi decrease as i increases indicating
that older view counts have less influence on the subscriber
count. Similar results also hold for the coefficients ai. Hence,
as expected, the previous day subscriber count and the previous
day view count most influence the current subscriber count.
Given the above causal relation between subscriber count
and view count, a natural question is: Is there a causal
relationship between the subscriber dynamics and the view
count dynamics? This is modeled using the hypothesis in (9).
We use the Wald test with a confidence of 0.95 (p-value
= 0.05) and found that approximately 55% of the channels
satisfy the hypothesis. For approximately 55% of the channels
Fig. 5: Viewcount and subscribers for the popular movie trailer
channel: VISOTrailers. The Granger causality test for view
counts "Granger causes" subscriber count is true with a p-
value of 5 × 10−8.
V. YOUTUBE DYNAMICS: CAUSALITY AND SCHEDULING.
Thus far we have unravelled dependency structures in
YouTube metrics using vine copulas. Recall that Fig.2 shows
the dependence between view count and number of sub-
scribers. In this section we dig further into the dynamics of
YouTube in two ways: First we use Granger causality (see also
[36] for a more detailed study) to detect the causal relationship
between subscriber and viewer counts and how it can be
used to estimate the next day subscriber count of a channel.
The results are important for determining the popularity of a
YouTube channel. Second, we study the scheduling dynamics
of of YouTube channels. We find the interesting property that
for popular gaming YouTube channels with a dominant upload
schedule, deviating from the schedule increases the views and
the comment counts of the channel.
A. Causality Between Subscribers and View Count in YouTube
Fig. 5 displays the subscriber and view count dynamics
of a popular movie trailer channel in YouTube. It is clear
from Fig. 5 that the subscribers "spike" with a corresponding
"spike" in the view count.
The main idea behind Granger causality is that
if the
value(s) of a lagged time-series can be used to predict an-
other time-series, then the lagged time-series "Granger cause"
the predicted time-series. To formalize the Granger causality
model, let sj(t) denote the number of subscribers to a channel
j on day t, and vj
i (t) the corresponding view count for a video
i on channel j on day t. The total number of videos in a
IEEETRANSACTIONSONKNOWLEDGEANDDATAENGINEERING81,bi<1forstationarity.Thecausalrelationshipcanbeformulatedasahypothesistestingproblemasfollows:H0:b1=···=bnv=0vs.H1:Atleastonebi6=0.(7)Therejectionofthenullhypothesis,H0,impliesthatthereisacausalrelationshipbetweensubscriberandviewcounts.First,weuseBox-Ljungtest[33]istoevaluatethequalityofthemodel(6)forthegivendatasetDj.Ifsatisfied,thentheGrangercausalityhypothesis(7)isevaluatedusingtheWaldtest[34].IfbothhypothesistestspassthenwecanconcludethatthetimeseriesDjsatisfiesGrangercausality–thatis,thepreviousdaysubscriberandviewcounthaveacausalrelationshipwiththecurrentsubscribercount.AkeyquestionpriortoperformingtheGrangercausalitytestiswhatpercentageofvideosintheYouTubedataset(Appendix)satisfytheARmodelin(6).ToperformthisanalysisweapplytheBox-Ljungtestwithaconfidenceof0.95(p-value=0.05).First,weneedtoselectnsandnv,thenumberoflagsforthesubscribersandviewcounttimeseries.Forns=nv=1,wefoundthatonly20%ofthechan-nelssatisfythemodel(6).Whennsandnvareincreasedto2,thenumberofchannelssatisfyingthemodelincreasesto63%.Forns=nv=3,wefoundthat91%ofthechannelssatisfythemodel(6),withaconfidenceof0.95(p-value=0.05).Hence,inthebelowanalysisweselectns=nv=3.Itisinterstingtonotethatthemeanvalueofcoefficientsbidecreaseasiincreasesindicatingthatolderviewcountshavelessinfluenceonthesubscribercount.Similarresultsalsoholdforthecoefficientsai.Hence,asexpected,thepreviousdaysubscribercountandthepreviousdayviewcountmostinfluencethecurrentsubscribercount.Thenextkeyquestionisdoestheirexistacausalre-lationshipbetweenthesubscriberdynamicsandtheviewcountdynamics.Thisismodeledusingthehypothesisin(7).Totest(7)weusetheWaldtestwithaconfidenceof0.95(p-value=0.05)andfoundthatapproximately55%ofthechannelssatisfythehypothesis.Forapproximately55%ofthechannelsthatsatisfytheARmodel(6),theviewcount"Grangercauses"thecurrentsubscribercount.Interestingly,ifdifferentchannelcategoriesareaccountedforthenthepercentageofchannelsthatsatisfyGrangercausalityvarywidelyasillustratedinTable4.Forexample,80%oftheEntertainmentchannelssatisfyGrangercausalitywhileonly40%oftheFoodchannelssatisfyGrangercausality.Theseresultsillustratetheimportanceofchannelownerstonotonlymaximizetheirsubscribercount,buttoalsouploadnewvideosorincreasetheviewsofoldvideostoincreasetheirchannelspopularity(i.e.viaincreasingtheirsubscribercount).Additionally,fromouranalysisinSec.2whichil-lustratesthattheviewcountofapostedvideoissensitivetothenumberofsubscribersofthechannel,increasingthenumberofsubscriberswillalsoincreasetheviewcountofvideosthatareuploadedbythechannelowners.3.2SchedulingdynamicsinYouTubeInthissection,weinvestigatetheschedulingdynamicsofYouTubechannels.WefindtheinterestingpropertythatforpopulargamingYouTubechannelswithadominantuploadschedule,deviatingfromthescheduleincreasestheviewsandthecommentcountsofthechannel.CategoryaFractionGaming0.60Entertainment0.80Food0.40Sports0.67aYouTubeassignsacategorytovideos,ratherthanchannels.Thecategoryofthechannelwasobtainedasthemajorityofthecategoryofallthevideosuploadedbythechannel.TABLE4:Fractionofchannelssatisfyingthehypothesis:Viewcount"Grangercauses"subscribercount,splitaccordingtocategory.01,0002,0003,00000.511.52·106Time[Days]Viewcount01,0002,0003,00002,0004,0006,0008,000Time[Days]SubscribersFig.4:Viewcountandsubscribersforthepopularmovietrailerchannel:VISOTrailers.TheGrangercausalitytestforviewcounts"Grangercauses"subscribercountistruewithap-valueof5⇥10 8.CreatorAcademy10intheirbestpracticesectionrec-ommendstouploadvideosonaregularscheduletogetrepeatviews.ThereasonforaregularuploadscheduleistoincreasetheuserengagementandtorankhigherintheYouTuberecommendationlist.However,weshowinthissectionthatgoing"offtheschedule"canbebeneficialforagamingYouTubechannel,witharegularuploadschedule,intermsofthenumberofviewsandthenumberofcom-ments.Fromthedataset,we'filteredout'videochannelswithadominantuploadschedule,asfollows:Thedominantuploadschedulewasidentifiedbytakingtheperiodogramoftheuploadtimesofthechannelandthencomparingthehighestvaluetothenexthighestvalue.Iftheratiodefinedaboveisgreaterthan2,wesaythatthechannelhasadominant10YouTubewebsiteforhelpingwithchannelsthat satisfy the AR model (8),
the view count "Granger
causes" the current subscriber count. An interesting property is
that the percentage of channels that satisfy Granger causality
vary widely depending on the channel category. For example,
67% of Sports channels and 60% of the Gaming channels
satisfy Granger causality, while 80% of Sports channels satisfy
Granger causality. These results illustrate the importance of
channel owners to not only maximize their subscriber count,
but to also upload new videos or increase the views of old
videos to increase their channels popularity (via increasing
their subscriber count).
B. Scheduling Dynamics
From the dataset, we selected video channels with a domi-
nant upload schedule, as follows: The dominant upload sched-
ule was identified by evaluating the periodogram of the upload
times of the channel and comparing the highest value to the
next highest value. If the ratio defined above is greater than
2, we say that the channel has a dominant upload schedule.
From the dataset containing 25 thousand channels, only 6500
channels contain a dominant upload schedule. Some channels,
particularly those that contain high amounts of copied videos
such as trailers, movie/TV snippets upload videos on a daily
basis. These have been removed from the analysis so as to
concentrate on those channels that contain only user generated
content.
We found that channels with gaming content account for
75% of the 6500 channels with a dominant upload schedule
and the main tags associated with the videos were: "game",
"gameplay" and "videogame". We computed the average
views when the channel goes off the schedule and found
that on an average when the channel goes off schedule the
channel gains views 97% of the time and the channel gains
comments 68% of the time. Thus channels with "gameplay"
content with periodic upload schedule benefit from going off
the schedule. This suggests that by deliberately going off
schedule, gameplay channels can increase their view count.
VI. CONCLUSIONS
YouTube video metrics across thousands of channels form
a big-data time series. In this paper, we conducted a data-
driven dependence analysis for seven meta-level metrics of
YouTube videos among five different categories, based on a
YouTube dataset of over 6 million videos across 25 thousand
channels. To unravel the dependency structures of these meta-
level metrics, we constructed a vine copula model on the
YouTube dataset:
the marginal distribution for each video
metric is estimated empirically; the Kendall's tau is introduced
as the measure of dependence in vine copula model; the vine
structure is selected based on absolute empirical Kendall's tau,
bivariate copulas are chosen by using AIC approach, then cop-
ula parameters are estimated using the method of maximum-
likelihood. Parameters including theoretical Kendall's tau and
tail dependence coefficients are computed for the dependence
analysis of YouTube video metrics.
The analysis in this paper reveals three main conclusions
regarding the YouTube users' watching behaviours in different
12
video categories: conditional dependence is insignificant in
YouTube video metrics, number of views and number of likes
are in the central position of dependence structure, and "News"
category possess a stronger tail dependence than the other
YouTube video categories.
Finally, we also studied the dynamics of YouTube in two
ways. First, using Granger causality, we unravelled the causal
dependence between subscribers and view count. Second, by
studying the upload dynamics, we found that periodic content
providers can increase their view count by going off schedule.
REFERENCES
[1] Z. D. Stephens, S. Y. Lee, F. Faghri, R. H. Campbell, C. Zhai, M. J.
Efron, R. Iyer, M. C. Schatz, S. Sinha, and G. E. Robinson, "Big data:
astronomical or genomical?" PLoS Biol, vol. 13, no. 7, pp. e1002195,
2015.
[2] D. G. Popescu, P. Crama, "Ad revenue optimization in live broadcasting"
Management Science, vol. 62, no. 4, pp. 1145–1164, 2015.
[3] W. Hoiles, O. N. Gharehshiran, V. Krishnamurthy, N.-D. Dao, and
H. Zhang, "Adaptive Caching in the YouTube content distribution
network: A revealed preference game-theoretic learning approach," IEEE
Transactions on Cognitive Communications and Networking, vol. 1,
no. 1, pp. 71–85, 2015.
[4] R. Zhou, S. Khemmarat, and L. Gao, "The impact of YouTube recom-
mendation system on video views," in Proceedings of the 10th ACM
SIGCOMM Conference on Internet Measurement. ACM, 2010, pp.
404–410.
[5] J. Davidson, B. Liebald, J. Liu, P. Nandy, T. Van Vleet, U. Gargi,
S. Gupta, Y. He, M. Lambert, B. Livingston et al., "The Youtube video
recommendation system," in Proceedings of the Fourth ACM Conference
on Recommender Systems. ACM, 2010, pp. 293–296.
[6] J. R. Zhang, Y. Song, and T. Leung, "Improving video classification
via YouTube video co-watch data," in Proceedings of the 2011 ACM
Workshop on Social and Behavioural Networked Media Access. ACM,
2011, pp. 21–26.
[7] V. Krishnamurthy, A. Aprem and S. Bhatt, "Opportunistic advertisement
scheduling in live social media: A multiple stopping time POMDP
approach", arXiv :1611.00291, 2016.
[8] F. Durante and C. Sempi, "Copula theory: an introduction," in Copula
theory and its applications. Springer, 2010, pp. 3–31.
[9] P. K. Trivedi and D. M. Zimmer, Copula modeling: an introduction for
practitioners. Now Publishers Inc, 2007.
[10] H. Joe, "Dependence modeling with copulas", CRC Press, 2014.
[11] M. Cha, H. Kwak, P. Rodriguez, Y.-Y. Ahn, and S. Moon, "I tube,
you tube, everybody tubes: analyzing the world's largest user generated
content video system," in Proceedings of the 7th ACM SIGCOMM
Conference on Internet Measurement. ACM, 2007, pp. 1–14.
[12] X. Cheng, C. Dale, and J. Liu, "Statistics and social network of YouTube
videos," in IWQoS 2008. 16th International Workshop on Quality of
Service.
IEEE, 2008, pp. 229–238.
[13] X. Cheng, J. Liu, and H. Wang, "Accelerating YouTube with video
correlation," in Proceedings of the First SIGMM Workshop on Social
Media. ACM, 2009, pp. 49–56.
[14] T. Hossfeld, R. Schatz, E. Biersack, and L. Plissonneau, "Internet
video delivery in YouTube: From traffic measurements to quality of
experience," in Data Traffic Monitoring and Analysis. Springer, 2013,
pp. 264–301.
[15] D. K. Krishnappa, M. Zink, C. Griwodz, and P. Halvorsen, "Cache-
centric video recommendation: an approach to improve the efficiency
of YouTube caches," ACM Transactions on Multimedia Computing,
Communications, and Applications (TOMM), vol. 11, no. 4, p. 48, 2015.
[16] F. J. Massey Jr, "The kolmogorov-smirnov test for goodness of fit,"
Journal of the American Statistical Association, vol. 46, no. 253, pp.
68–78, 1951.
[17] H. W. Lilliefors, "On the kolmogorov-smirnov test for normality with
the American Statistical
mean and variance unknown," Journal of
Association, vol. 62, no. 318, pp. 399–402, 1967.
[18] M. G. Kendall, "Rank correlation methods." 1948.
[19] G. G. Venter, "Tails of copulas," in Proceedings of
the Casualty
Actuarial Society, vol. 89, no. 171, 2002, pp. 68–113.
[20] C. Genest and A.-C. Favre, "Everything you always wanted to know
about copula modeling but were afraid to ask," Journal of Hydrologic
Engineering, vol. 12, no. 4, pp. 347–368, 2007.
[21] B. Schweizer and E. F. Wolff, "On nonparametric measures of depen-
dence for random variables," The Annals of Statistics, pp. 879–885,
1981.
[22] C. Genest, B. Remillard, and D. Beaudoin, "Goodness-of-fit tests for
copulas: A review and a power study," Insurance: Mathematics and
Economics, vol. 44, no. 2, pp. 199–213, 2009.
[23] U. Schepsmeier, "A goodness-of-fit test for regular vine copula models,"
arXiv preprint arXiv:1306.0818, 2013.
[24] R. B. Nelsen, An introduction to copulas. Springer Science & Business
Media, 2013, vol. 139.
[25] E. Bouy´e, V. Durrleman, A. Nikeghbali, G. Riboulet, and T. Roncalli,
"Copulas for finance-a reading guide and some applications," Available
at SSRN 1032533, 2000.
[26] A. Subramanian, A. Sundaresan, and P. K. Varshney, "Fusion for the
detection of dependent signals using multivariate copulas," in 2011
Proceedings of the 14th International Conference on Information Fusion
(FUSION).
IEEE, 2011, pp. 1–8.
[27] L. Zhang and V. Singh, "Bivariate flood frequency analysis using the
copula method," Journal of Hydrologic Engineering, vol. 11, no. 2, pp.
150–164, 2006.
[28] K. Aas, C. Czado, A. Frigessi, and H. Bakken, "Pair-copula construc-
tions of multiple dependence," Insurance: Mathematics and Economics,
vol. 44, no. 2, pp. 182–198, 2009.
[29] O. Morales Napoles, R. M. Cooke, and D. Kurowicka, "About the
number of vines and regular vines on n nodes," 2010.
[30] T. Bedford and R. M. Cooke, "Probability density decomposition for
conditionally dependent random variables modeled by vines," Annals of
Mathematics and Artificial Intelligence, vol. 32, no. 1-4, pp. 245–268,
2001.
[31] J. Dissmann, E. C. Brechmann, C. Czado, and D. Kurowicka, "Selecting
and estimating regular vine copulae and application to financial returns,"
Computational Statistics & Data Analysis, vol. 59, pp. 52–69, 2013.
[32] O. Morales-N´apoles, "Counting vines," Dependence Modeling: Vine
Copula Handbook, pp. 189–218, 2011.
[33] H. Bozdogan, "Model selection and akaike's information criterion (aic):
The general theory and its analytical extensions," Psychometrika, vol. 52,
no. 3, pp. 345–370, 1987.
[34] C. Alexander, "Market risk analysis: Practical financial econometrics
(vol. ii)," 2008.
[35] P. Embrechts, F. Lindskog, and A. McNeil, "Modelling dependence with
copulas," Rapport Technique, D´epartement de Math´ematiques, Institut
F´ed´eral de Technologie de Zurich, Zurich, 2001.
[36] W. Hoiles, A. Aprem and V. Krishnamurthy, "Engagement dynamics
and sensitivity analysis of YouTube videos," IEEE Transactions on
Knowledge and Data Engineering, 2017.
APPENDIX
Recalling the definitions of copula and Sklar theorem in
Section II, this appendix gives a short outline of vine copulas
and their construction (which was used to analyze the YouTube
dataset).
A. Bivariate Archimedean Copula
One widely used copula type is the "Archimedean" copula:
Definition. Bivariate Archimedean Copula is a [0, 1]2 → [0, 1]
function C with the form:
C(u, v) = φ
−1(φ(u) + φ(v)).
(10)
where φ(t) is called the generator function, which is a
continuous, strictly decreasing function such that φ(1) = 0; θ
is the single parameter to be estimated.
Bivariate archimedean copulas can be easily extended to
arbitrarily high dimensions, but only bivariate ones are used
for current copula applications, since it is just not a good idea
that only one parameter is used to capture high dimensional
dependence.
13
Archimedean copula includes several bivariate copulas such
as Joe, Frank and Clayton copulas used in this work. Although
there are over forty different types of bivariate copulas that
are widely used. it is a harder problem to develop higher
dimensional copulas. The pair-copula construction based on
vine structure is a popular method of constructing a high
dimensional copula [28].
B. Pair Copula Construction
For convenience, we illustrate the construction process for
three random variables scenario, based on which a general
n-variable case can be easily obtained. The density of a 3-
dimensional copula function C is defined as:
c123(u1, u2, u3) =
∂C123(u1, u2, u3)
∂u1∂u2∂u3
.
(11)
Then by (1), if we let u1 = F1(x1), u2 = F2(x2), u3 =
F3(x3), the density of joint distribution F (x1, x2, x3) can be
represented as:
f (x1, x2, x3) =f1(x1) · f2(x2) · f3(x3)
· c123(F1(x1), F2(x2), F3(x3)).
(12)
One possible decomposition from the chain rule of probability
density gives:
f (x1, x2, x3) = f1(x1)f21(x2x1)f312(x3x1, x2).
(13)
Note that similar to (12), the conditional probability densities
can be represented as:
f21(x2x1) = c12(F1(x1), F2(x2))f2(x2)
f32(x3x2) = c23(F2(x2), F3(x3))f3(x3)
f312(x3x1, x2) = c132(F12(x1x2), F32(x3x2))
(14)
· f32(x3x2).
By combining (13) and (14),
the multivariate probability
density can be represented as multiplications of bivariate
copula densities and marginal probability densities (recall the
deifnitons of c12 and c132 in Sec. III-E1):
f (x1, x2, x3) = f1(x1)f2(x2)f3(x3)
(15)
· c12(F1(x1), F2(x2)) · c23(F2(x2), F3(x3))
· c132(F12(x1x2), F32(x3x2)).
In order to obtain a systematic way to represent
these
decompositions, Bedford and Cooke [30] proposed the so-
called "Regular Vine" (or simply "R-Vine") graphical struc-
ture, hence the name "vine-copula". "Vine" refers to a nested
set of tree structures, where the edges of the ith tree are the
nodes of the i + 1th tree. The formal definition of a regular
vine structure is provided below.
Definition. A graphical structure V is a regular vine of m
elements if:
1) V = (T1, ..., Tm−1) and all trees are connected
2) The first tree T1 has node set N1 = 1, ..., m and edge set
E1; then for the next trees Ti, i ∈ 2, ...m − 1, Ti has the
node set Ni = Ei−1
14
to determine if it is suitable to model dependence of two
distributions.
According to Genest [22], under the null hypothesis of inde-
pendence, Kendall's tau is approximately normally distributed
with mean of zero. With empirical Kendall's tau value τ, we
can choose independence copula using N observations if:
(cid:115)
9N (N − 1)
2(2N + 5) τ < 2.
(16)
If the above independence test fails, then the Akaike Infor-
mation Criterion (AIC) [33] is applied to choose the desired
copula families. By computing the AIC for all possible fami-
lies, the copula with smallest AIC will be selected:
AIC = 2k − 2 ln(M ).
(17)
where k is the number of estimated parameters of a copula (ei-
ther 1 or 2 for bivariate copulas), and M is the maximum value
among the likelihood functions for all copula candidates [34].
In this work, the bivariate copula families are chosen from 48
possible candidates.
3) Parameter Estimation: Finally, the corresponding pa-
rameters for the bivariate copula families θ, which includes
(cid:1) parameters for n metrics, can be estimated by using
2
maximum likelihood estimation given data points U =
(x1, x2, ...xN ):
(cid:0)n
θ∗
= argmax L(θU )
= argmax
n−1(cid:88)
N(cid:88)
(cid:88)
i=1
j=1
e∈Ej
(18)
log Cθe(F (xe1), F (xe2)).
where F (xe1) and F (xe2) are the two marginal distributions
(nodes of a dependence tree and can be estimated from U)
connected by copula (edge of a dependence tree) e, while θe
is the copula parameter for edge e. The associated likelihood
function is the sum of log-likelihood of all bivariate copulas
(i.e all edges Ej of tree j), for all n − 1 trees of a vine over
all N observations.
In addition to the regular dependency measure Kendall's
tau, the tail dependence measure can also be computed. The
upper and lower tail dependence coefficients λU and λL are
both defined using copula [35]:
limu→1
1 − 2u + C(u, u)
= λU ,
(19)
1 − u
C(u, u)
u
limu→0
= λL.
λU and λL denote the probabilities that describe the si-
multaneous co-movements in the upper and lower tails of a
bivariate distribution.
Fig. 6: The vine structure for a three-variable case. The vine
corresponds to (15): the first tree represents the unconditional
pairs c12, c23, while the second tree represents the conditional
pair c132.
3) Proximity condition: If two nodes are connected by an
edge in the i + 1th tree, then the two edges in ith tree
corresponding to these two nodes share a node.
In copula applications, the trees are used to represent the
dependence structure of multiple variables: each edge repre-
sents the bivariate copula connecting one pair of marginals.
For instance, the regular vine structure for three variables is
shown in Fig.6.
Once the uniformly distributed marginals are obtained,
we can construct the vine copula model for a multivariate
distribution. Dissmann et al. [31] summarizes an inference
procedure for pair-copula construction of vine copula. The
following steps are required to construct a regular vine copula
(R-vine) specification to a given dataset:
1) Construct the R-Vine structure by choosing an appropri-
ate unconditional and conditional pair of metrics to use
for vine copula model.
2) Choose a bivariate copula family for each pair selected
3) Estimate the corresponding parameters for each bivariate
in step (1).
copula.
1) R-Vine Structure Selection : Dissman et al. [31] sug-
gested a sequential tree-by-tree selection method, where the
first tree of the regular vine is selected to be the one with
strongest dependencies, then the following trees are selected
based on the same criteria. Such a heuristic approach is not
guaranteed to capture the global optimum point. However,
since the first tree of R-vine (unconditional dependence tree)
has the greatest influence on the model fit, the sequential
method has a reasonable trade-off between efficiency and
accuracy. A maximum spanning tree (MST) algorithm is
proposed for R-vine structure selection, where the the spanning
tree with the maximum sum of absolute empirical Kendall's
tau is selected [31]. To illustrate the dependence structure, the
first trees of Vine copulas for the all the five categories of
YouTube videos are shown in Fig.2, along with their bivariate
copula families and pairwise empirical Kendall's tau values.
2) Copula Families Selection: After the R-vine structure is
selected, the next step is to choose a suitable bivariate copula
function for each dependence pair (edge of dependence tree)
to fit the data. Due to its quick computation, the independence
copula (simple product of two distributions) is first tested
|
1510.01997 | 1 | 1510 | 2015-10-07T15:53:59 | Endorsement Deduction and Ranking in Social Networks | [
"cs.SI"
] | Some social networks, such as LinkedIn and ResearchGate, allow user endorsements for specific skills. In this way, for each skill we get a directed graph where the nodes correspond to users' profiles and the arcs represent endorsement relations. From the number and quality of the endorsements received, an authority score can be assigned to each profile. In this paper we propose an authority score computation method that takes into account the relations existing among different skills. Our method is based on enriching the information contained in the digraph of endorsements corresponding to a specific skill, and then applying a ranking method admitting weighted digraphs, such as PageRank. We describe the method, and test it on a synthetic network of 1493 nodes, fitted with endorsements. | cs.SI | cs |
Endorsement Deduction and Ranking
in Social Networks∗
Hebert P´erez-Ros´es1,2 †, Francesc Seb´e1
Josep Maria Rib´o3 (cid:134)
1Dept. of Mathematics, Universitat de Lleida, Spain
2Conjoint Fellow, University of Newcastle, Australia
3Department of Computer Science and Industrial Engineering,
Universitat de Lleida, Spain
August 20, 2018
Abstract
Some social networks, such as LinkedIn and ResearchGate, al-
low user endorsements for specific skills. In this way, for each skill we
get a directed graph where the nodes correspond to users' profiles and
the arcs represent endorsement relations. From the number and qual-
ity of the endorsements received, an authority score can be assigned to
each profile. In this paper we propose an authority score computation
method that takes into account the relations existing among different
skills. Our method is based on enriching the information contained
in the digraph of endorsements corresponding to a specific skill, and
then applying a ranking method admitting weighted digraphs, such
as PageRank. We describe the method, and test it on a synthetic
network of 1493 nodes, fitted with endorsements.
Keywords: Expertise retrieval, social networks, LinkedIn, Research-
Gate, PageRank
1
Introduction
Directed graphs (digraphs) are an appropiate tool for modelling social net-
works with asymmetric binary relations. For instance, the blogosphere is
∗Mathematics Subject Classifications: 05C20, 05C22, 05C50, O5C85, O5C90, 62F07,
62F10, 62H20, 68M11, 91D30
†Corresponding author -- E-mail: [email protected] -- Office: +34 973
702 781
a social network composed of blogs/bloggers and the directed 'recommen-
dation' or 'follower' relations among them. Other examples include 'trust'
statements in recommendation systems (some user states that he/she trusts
the recommendations given by some other user) and 'endorsements' in pro-
fessional social networks. Additionally, weighted arcs appear in situations
where such relations can accomodate some degree of confidence ('trust' or
'endorsement' statements could be partial).
LinkedIn and ResearchGate are two prominent examples of profes-
sional social networks implementing the endorsement feature. LinkedIn1
is a wide-scope professional network launched in 2003. More than a decade
later it boasts a membership of over 364 million, and it has become an es-
sential tool in professional networking. The LinkedIn endorsement feature,
introduced about three years ago,2 allows a user to endorse other users for
specific skills.
On the other hand, ResearchGate3 is a smaller network catering to
scientists and academics. It was launched in 2008, and it reached five million
members in August, 2014. ResearchGate also introduced an endorsement
feature recently.4 From the endorsements shown in an applicant's profile,
a potential employer can assess the applicant's skills with a higher level of
confidence than say, by just looking at his/her CV.
The two endorsement systems described above are very similar: For each
particular skill, the endorsements make up the arcs of a directed graph,
whose vertices are the members' profiles. In principle, these endorsement
digraphs could be used to compute an authority ranking of the members
with respect to each particular skill. This authority ranking may provide
a better assessment of a person's profile, and it could become the basis for
several social network applications.
For instance, this authority ranking could be the core element of an
eventual tool for finding people who are proficient in a certain skill, very
much like a web search engine. It could also find important applications in
profile personalization. For example, if a certain user is an expert in some
field, say 'Operations Research', the system can display ads, job openings,
and conference announcements related to that field in the user's profile.
Finally, we can envisage a world where people could vote on certain decisions
via social networks. For example, a community of web developers could
decide on the adoption of some particular web standard. In that scenario,
we might think about a weighted voting scheme, where the weight of each
vote is proportional to the person's expertise in that area.
Now, people usually have more than one skill, with some of those skills
being related. For example, the skill 'Java' is a particular case of the skill
1http://www.linkedin.com
2More precisely, on September 24, 2012
3http://www.researchgate.net
4On February 7, 2013
2
'Programming', which in turn is strongly related with the skill 'Algorithms'.
It may well happen that a person is not endorsed for the skill 'Programming',
but he/she is endorsed for the skills 'Java' and 'Algorithms'. From those
endorsements it can be deduced with a fair degree of confidence that the
person also possesses the skill 'Programming'. In other words, a person's
ranking with respect to the skills 'Java' and 'Algorithms' affects his/her
ranking with respect to the skill 'Programming'.
If the members of a social network were consistent while endorsing their
peers, this 'endorsement with deduction' would not add anything to simple
(i.e. ordinary) endorsement. In this ideal world, if Anna endorses Ben for the
skill 'Java', she would be careful to endorse him for the skill 'Programming'
as well.5 In practice, however,
1. People are not systematic. That is, people do not usually go over all
their contacts methodically to endorse, for each contact and alleged
skill, all those contacts which, according to their opinion, deserve such
endorsement. This may be the source of important omissions in mem-
bers' profiles.
2. People are not consistent, for consistency, like method, would require
a great effort. In an analysis of a small LinkedIn community con-
sisting of 3250 members we have detected several inconsistencies. For
example, there are several users who have been endorsed for some spe-
cific programming language, or a combination of programming lan-
guages, but have not been endorsed for the skill 'Programming'. De-
ciding whether there is an inconsistency entails some degree of subjec-
tivism, for inconsistencies ultimately depend on the semantics of the
skill names. Nevertheless, we can safely assert that practically 100%
of the profiles sampled by us contained some evident inconsistency or
omission. The Appendix lists some of the more significant inconsisten-
cies and omissions encountered, together with a more comprehensive
discussion about LinkedIn's endorsement mechanism.
3. Skills lack standardization. In most of these social networks, a set of
standard, allowed skills has not been defined. As a result, many re-
lated skills (in many cases, almost synonyms) may come up in different
profiles of the social network. Consider, for example, skills such as 're-
cruiting', 'recrutiments', 'IT recruiting', 'internet recruiting', 'college
recruiting', 'student recruiting', 'graduate recruiting' .... which are, all
of them, common in LinkedIn profiles. It may well happen that an
expert in 'recruiting' has not even assigned to him/herself that spe-
5Some people may argue that knowledge of a programming language does not auto-
matically imply programming skills, but this semantic discussion is out of the scope of
this paper.
3
cific skill, but a related one such as 'recruitments', which would hide
him/her as an expert in the 'recruiting' skill.
Endorsement with deduction may help address those problems, and thus
provide a better assessment of a person's skills. More precisely, we propose
an algorithm that enriches the digraph of endorsements associated to a par-
ticular skill with new weighted arcs, taking into account the correlations
between that 'target' skill and the other ones. Once this has been done, it is
possible to apply different ranking algorithms to this enhanced digraph with
the purpose of obtaining a ranking of the social network members concerning
that specific skill.
1.1 Related work
This research can be inscribed into the discipline of expertise retrieval, a sub-
field of information retrieval [1]. There are two main problems in expertise
retrieval:
1. Expert finding: Attempts to answer the question "Who are the experts
on topic X? ". In our approach, this question is answered by taking
all the network members who are within a certain percentile of the
ranking for topic X.
2. Expert profiling: Addresses the question "Which skills does person Y
possess? ". We could answer this question by computing the rankings
with respect to all the skills claimed by person Y, and taking those skills
for which Y has fallen within the pre-defined percentile mentioned
above.
Traditionally, these problems above have been solved via document min-
ing, i.e. by looking for the papers on topic X written by person Y, combined
with centrality or bibliographic measures, such as the H-index and the G-
index, in order to assess the expert's relative influence (e.g.
[29]). This is
also the approach followed by ArnetMiner6, a popular web-based platform
for expertise retrieval [46].
Despite their unquestionable usefulness, systems based on document
mining, like ArnetMiner, face formidable challenges that limit their ef-
fectiveness. In addition to the specific challenges mentioned by Hashemi et
al. [20], we could add several problems common to all data mining applica-
tions (e.g. name disambiguation). As a small experiment, we have searched
for some known names in ArnetMiner, and we get several profiles corre-
sponding to the same person, one for each different spelling.
6http://www.arnetminer.org
4
That is one of the reasons why other expertise retrieval models resort
to the power of PageRank in certain social networks, such as in the pe-
rused scientific citation and scientific collaboration networks (e.g. [10, 20]).
Another interesting example related to PageRank and social networks is
TwitterRank [49], an extension of PageRank that measures the relative
influence of Twitter users in a certain topic. Like our own PageRank ex-
tension, TwitterRank is topic-specific: the random surfer jumps from one
user to an acquaintance following topic-dependent probabilities. However,
TwitterRank does not consider any relationships among the different top-
ics.
To the best of our knowledge, there are no precedents for the use of
endorsements in social networks, nor for the use of known relationships
among different skills, in the context of expertise retrieval. The closest
approach might be perhaps the one in [42], which uses the ACM classification
system as an ontology that guides the mining process and expert profiling.
Another (very recent) model that uses semantic relationships to increase the
effectiveness and efficiency of the search is given in [27].
Another related field which has attained a growing interest in the last
few years is that of reputation systems, that is, systems intended to rank
the agents of a domain based on others' agents reports. Strategies for rank-
ing agents in a reputation system range from a direct ranking by agents
(as used in eBay) to more sophisticated approaches (see [30] for a survey).
One particularly important family of reputation system strategies is that
of PageRank-based algorithms. There are many of such approaches. For
instance, [8] provides an algorithm based on the so-called Dirichlet PageR-
ank, which addresses problems such as: (1) Some links in the network may
indicate distrust rather than trust, and (2) How to infer a ranking for a node
based on the ranking stated for a well-known subnetwork.
Another example of reputation system (again, based on PageRank) is
In this case, a modification of the PageRank algorithm is used to
[41].
create a reputation ranking among the members of an academic community.
One remarkable issue of this approach is that the network does not exist
explicitly, but it is created ad-hoc from the information harvested from the
personal web pages of the members (e.g. a couple of members are connected
if they have authored a research article together).
A thorough study of reputation systems is clearly beyond the scope of
this article, but in any case, all these scenarios above differ significantly from
our application for expertise retrieval with deduction of new endorsements,
based on existing endorsements of related skills, and information about the
correlation between skills.
5
1.2 Contribution and plan of this paper
This paper focuses on professional social networks allowing user endorse-
ments for particular skills, such as LinkedIn and ResearchGate. Our
main contributions can be summarized as follows:
1. We introduce endorsement deduction: an algorithm to enrich/enhance
the information contained in the digraph of endorsements correspond-
ing to a specific skill ('target' skill or 'main' skill) in a social network.
This algorithm adds new weighted arcs (corresponding to other skills)
to the digraph of endorsements, according to the correlation of the
other skills with the 'main' skill. We assume the existence of an 'on-
tology' that specifies the relationships among different skills.
2. After this pre-processing we can apply a ranking algorithm to the
enriched endorsement digraph, so as to compute an authority score
for each network member with respect to the main skill. In particular,
we have used the (weighted) PageRank algorithm for that purpose,
but in principle, any ranking method could be used, provided that it
admits weighted digraphs (e.g. Hits [53]). The reasons why we have
chosen PageRank in the first place are explained in Section 2.5. The
authority score obtained by our method could be useful for searching
people having a certain skill, for profile personalization, etc.
3. We propose a methodology to validate our algorithm, which does not
rely as heavily on the human factor as previous validation methods,
or on the availability of private information of the members' profiles.
More precisely, we discuss the benefits of endorsement deduction in
terms of (1) consistency with the results of simple weighted PageR-
ank, (2) reduction in the number of ties and (3) robustness against
spamming. Following this methodology, we test our solution on a syn-
thetic network of 1493 nodes and 2489 edges, similar to LinkedIn,
and fitted with endorsements [39].
The rest of the paper is organized as follows: Section 2 provides the
essential concepts, terminology and notation that will be used throughout
the rest of the paper. It also describes the PageRank algorithm, including
the variant for weighted digraphs. After that, our proposal is explained in
Section 3 together with a simple example.
In Section 4 we compare the
results obtained by ranking with deduction with those obtained by simple
ranking, according to three criteria proposed by ourselves. Finally, in Sec-
tion 5 we summarize our results, discuss some potential applications, and
enumerate some open problems that arise as an immediate consequence of
the preceding discussion.
6
2 Preliminaries
2.1 Terminology and notation
A directed graph, or digraph D = (V, A) is a finite nonempty set V of objects
called vertices and a set A of ordered pairs of vertices called arcs. The order
of D is the cardinality of its set of vertices V . If (u, v) is an arc, it is said
that v is adjacent from u. The set of vertices that are adjacent from a given
vertex u is denoted by N +(u) and its cardinality is the out-degree of u,
d+(u).
Given a digraph D = (V, A) of order n, the adjacency matrix of D is
an n × n matrix M = (mij)n×n with mij = 1 if (vi, vj) ∈ A, and mij = 0
otherwise. The sum of all elements in the i-th row of M will be denoted
Σmi∗, and it corresponds to d+(vi).
A weighted digraph is a digraph with (numeric) labels or weights attached
to its arcs. Given (u, v) ∈ A, ω(u, v) denotes the weight attached to that arc.
In this paper we only consider directed graphs with non-negative weights.
The reader is referred to Chartrand and Lesniak [7] for additional concepts
on digraphs.
2.2 PageRank vector of a digraph
PageRank [3, 37] is a link analysis algorithm that assigns a numerical
weighting to the vertices of a directed graph. The weighting assigned to
each vertex can be interpreted as a relevance score of that vertex inside the
digraph.
The idea behind PageRank is that the relevance of a vertex increases
when it is linked from relevant vertices. Given a directed graph D = (V, A)
of order n, assuming each vertex has at least one outlink, we define the n×n
matrix P = (pij)n×n as,
(cid:26) 1
pij =
if (vi, vj) ∈ A,
otherwise.
(1)
d+(vi)
0
Those vertices without oulinks are considered as if they had an outlink
pointing to each vertex in D (including a loop link pointing to themselves).
That is, if d+(vi) = 0 then pij = 1/n for each j. Note that P is a stochastic
matrix whose coefficient pij can be viewed as the probability that a surfer
located at vertex vi jumps to vertex vj, under the assumption that the next
movement is taken uniformly at random among the arcs emanating from
vi. When the surfer falls into a vertex vi such that d+(vi) = 0, then he/she
is able to restart the navigation from any vertex of D uniformly chosen at
random. So as to permit this random restart behaviour when the surfer is
at any vertex (with a small probability 1 − α), a new matrix Pα is created
as,
7
Pα = αP + (1 − α)
1
n
J(n),
(2)
with(cid:80)
where J(n) denotes the order-n all-ones square matrix.
By construction, Pα is a positive matrix [35], hence, Pα has a unique
positive eigenvalue (whose value is 1) on the spectral circle. The PageRank
vector is defined to be the (positive) left-hand eigenvector P = (p1, . . . , pn)
i pi = 1 (the left-hand Perron vector of Pα) associated to this eigen-
value. The probability α, known as the damping factor, is usually chosen to
be α = 0.85.
The relevance score assigned by PageRank to vertex vi is pi. This value
represents the long-run fraction of time the surfer would spend at vertex vi.
2.3 PageRank vector of a weighted digraph
When the input digraph is weighted, the PageRank algorithm is easily
adapted so that the probability that the random surfer follows a certain
link is proportional to its (positive) weight [50]. This is achieved by slightly
modifying the definition, previously given in Eq. 1, of matrix P so that,
(cid:40)
(cid:80)
pij =
ω(vi,vj )
v∈N +(vi) ω(vi,v)
0
if (vi, vj) ∈ A,
otherwise.
(3)
Nodes with no outlinks are treated in the same way as before.
2.4 Personalized PageRank
Personalized PageRank [21] is a variant of PageRank in which, when
the surfer performs a random restart (with probability 1 − α), the vertex it
moves to is chosen at random according to a personalization vector v = (vi)
so that vi is the probability of restarting navigation from vertex vi. Now,
matrix Pα is computed as,
Pα = αP + (1 − α)evT ,
(4)
with e denoting the order-n all ones vector. As a result, the computation is
biased to increase the effect of those vertices vi receiving a larger vi.
2.5 PageRank in context
PageRank is actually a variant of spectral ranking, a family of ranking
techniques based on eigenvalues and eigenvectors. Vigna [47] traces the
origins of spectral ranking to the 1950's, with [23] and [48]. Afterwards,
the method was rediscovered several times until the 1970's. Other articles
which are frequently cited as the original sources of spectral ranking include
8
[16, 4, 40]. Eventually, the method became widely popular when it was
adopted by Google for its search engine.
The reasons for the popularity of spectral ranking in general, and Google's
PageRank in particular, are, in the first place, their nice mathematical
properties. Under some reasonable mathematical assumptions, PageRank
produces a unique ranking vector, which reflects very accurately the rela-
tive importance of the nodes. Other competing algorithms, such as Hits
and Salsa do not guarantee such properties [13]. As we have seen in the
previous subsections, PageRank can be adapted to weighted digraphs and
supports personalization. Additionally, it can be efficiently approximated
[2, 5], and can be computed in a parallel or distributed framework [31, 44].
Besides information retrieval, spectral ranking in general, and PageR-
ank in particular, have been applied in social network analysis [4, 49, 38],
scientometrics [40, 34, 15, 51], geographic networks [16], and many other
areas with great success.
Last but not least, Google's PageRank has withstood the test of
public scrutiny, as it has been validated by millions of users for more than
fifteen years now.
3 Endorsement deduction and ranking
Let us consider a professional network in which users can indicate a set of
topics they are skilled in. So as to attract attention, some dishonest network
members could be tempted to set an over-inflated skill list. The effect of
such malicious behaviour is reduced if network members are able to endorse
other users for specific skills and the relevance they get depends on the
received endorsements. Since cheating users will rarely be endorsed, their
relevance in the network will be kept low.
In such a social network we get an endorsement digraph for each skill.
Our objective is to compute an authority ranking for a particular skill, which
is not only based on the endorsement digraph of that particular skill, but
also takes into account the endorsement digraphs of other related skills.
From now on, the skill for which we want to compute the ranking will be
called the main skill.
Let S = {s0, s1, . . . s(cid:96)} be the set of all possible skills, with s0 being the
main skill. Let Dk = (V, Ak) denote the endorsement digraph corresponding
to skill sk, and let Mk be its adjacency matrix.
We now define the skill deduction matrix Π = (πkt) as follows: Given a
pair of skills sk and st, πkt represents the probability that a person skilled
in sk also possesses the skill st. In other words, from sk we can infer st with
a degree of confidence πkt. By definition, πkk = 1 for all k. In this way, if
some user endorses another user for skill sk but no endorsement is provided
for skill st, we can deduce that an endorsement (for st) should really be
9
there with probability πkt. In general, Π will be non-symmetric and sparse,
thus it is better represented as a directed graph with weighted arcs.
Note that Π can be seen as an ontology that also accounts for hierarchies
among the topics. For example, 'Applied Mathematics' is a sub-category of
'Mathematics', and this would be reflected in Π as a link with weight 1,
going from 'Applied Mathematics' to 'Mathematics'.
Our proposal takes as input the skill deduction matrix Π, together with
those endorsement digraphs Dk, with 0 < k ≤ (cid:96), such that πk0 > 0. Without
loss of generality, we will assume that the set of skills related to s0 is S0 =
{sk k (cid:54)= 0, πk0 > 0} = {s1, . . . , s(cid:96)}.
0 = (V, Awe
The proposed endorsement deduction method constructs a weighted en-
dorsement digraph Dwe
0 ) on skill s0, with weights ranging from 0
to 1, considering the endorsements deduced from related skills {s1, . . . , s(cid:96)}.
1. First of all, if user vi directly endorsed vj for skill s0, that is (vi, vj) ∈
0 with ω(vi, vj) = 1 (that endorse-
0 has arc (vi, vj) ∈ Awe
A0, then Dwe
ment receives a maximum confidence level).
2. If (vi, vj) /∈ A0 but (vi, vj) ∈ Ak, for just one k, 1 ≤ k ≤ (cid:96), then arc
(vi, vj) is added to Dwe
0 with weight ω(vi, vj) = πk0, that is, the arc
is assigned a weight that corresponds to the probability that vi also
considers vj proficient in skill s0, given an existing endorsement for
skill sk.
3. Finally, if (vi, vj) /∈ A0 but (vi, vj) ∈ Ak1, . . . , Ak(cid:96), then the arc (vi, vj)
is assigned a weight corresponding to the probability that vi would
endorse vj for s0 given his/her endorsements for sk1, . . . , skl. That is,
let "(ski → s0)" denote the event "endorse for skill s0 given an en-
dorsement for ski (its probability is p(ski → s0) = πki,0) then (vi, vj)
is assigned a weight that corresponds to the probability of the union
event "∪ki∈{k1,...,k(cid:96)}(ski → s0)", assuming those events are indepen-
dent.
Next we show how to construct the weighted adjacency matrix of Dwe
by iteratively adding deduced information from related skills. Computa-
tions are shown in Eqs. 5. After the k-th iteration, matrix Qk corresponds
to the weighted digraph of skill s0 after having added deduced information
from skills s1, . . . , sk. The matrix computed after the last iteration Q(cid:96) cor-
responds to the weighted adjacency matrix of digraph Dwe
0 . Computations
can be carried out as follows,
0
Q0 = M0
Qk =
Qk−1 + πk0((J(n) − Qk−1) ◦ Mk),
for k = 1, . . . , (cid:96),
(5a)
(5b)
10
where the symbol '◦' represents the Hadamard or elementwise product
of matrices.
Note that Eq. 5b acts on the entries of Qk−1 that are smaller than 1,
and the entries equal to 1 are left untouched. If some entry Qk−1(i, j) is
zero, and the corresponding entry Mk(i, j) is non-zero, then Qk−1(i, j) takes
the value of Mk(i, j), modified by the weight πk0. This corresponds to the
second case above.
If Qk−1(i, j) and Mk(i, j) are both non-zero, then we are in the third
case above. To see how it works, let us suppose that some entry M0(i, j)
is zero, but the corresponding entries M1(i, j), M2(i, j), M3(i, j), . . ., are all
equal to 1. In other words, person i does not endorse person j for the main
skill (skill 0), but does endorse person j for skills 1, 2, 3, . . ..
In order to
simplify the notation we will drop the subscripts i, j, and we will refer to qk
as the (i, j)-entry of Qk. Applying Equations 5, we get:
q0 = m0 = 0
q1 = q0 + π1,0(1 − q0) = π1,0
q2 = q1 + π2,0(1 − q1) = π1,0 + π2,0(1 − π1,0)
= π1,0 + π2,0 − π1,0π2,0
q3 = q2 + π3,0(1 − q2)
= π1,0 + π2,0 − π1,0π2,0 + π3,0(1 − (π1,0 + π2,0 − π1,0π2,0))
= π1,0 + π2,0 + π3,0 − π1,0π2,0 − π1,0π3,0 − π2,0π3,0 + π1,0π2,0π3,0
...
which corresponds to the probabilities of the events (s1 → s0), (s1 →
s0) ∪ (s2 → s0), (s1 → s0) ∪ (s2 → s0) ∪ (s3 → s0), and so on.
Once we have the matrix Q(cid:96) = (qij)n×n, we can apply any ranking
method that admits weighted digraphs, such as the weighted PageRank al-
gorithm [50]. For that purpose we have to construct the normalized weighted
link matrix P, as in Eq. 3:
qij
Σqi∗
1
n
pij =
if Σqi∗ > 0,
if Σqi∗ = 0.
(6)
Then we compute Pα from P, as in Eq. 4, and we finally apply the
weighted PageRank algorithm on Pα.
3.1 An example
As a simple illustration, let us consider a set of three skills: 'Programming',
'C++' and 'Java'. The probabilities relating them, depicted in Figure 1,
11
have been chosen arbitrarily, but in practice, they could have been obtained
as a result of some statistical analysis.
Figure 1: Directed graph representing a skill deduction matrix Π.
Let us further assume that we have a community of six individuals,
labeled from '1' to '6'. Figure 2 shows the endorsement digraphs among the
community members for the skills 'Programming' and 'C++'.
Figure 2: Endorsements for 'Programming'(left) and 'C++'(right).
Let us suppose that the skill 'Programming' is our main skill (skill 0).
Thus, Q0 = M0 is the adjacency matrix of the digraph shown in Figure 2
(left). If we compute the PageRank for the skill 'Programming', without
considering its relationships with other skills, we get the following scores
(P(v) denotes the PageRank score assigned to vertex v):
P(1) = P(3) = P(4) = 0.0988, P(2) = P(5) = 0.1828, and P(6) = 0.3380.
In other words, on the basis of the endorsements for 'Programming'
alone, the individuals '2' and '5' are tied up, and hence equally ranked.
Now we will include the endorsements for 'C++' in this analysis (skill
1). We apply Eq. 5 to compute Q1, as follows:
Q1 = Q0 + π1,0((J(6) − Q0) ◦ M1),
where π1,0 = 0.8, and M1 is the adjacency matrix of the digraph shown in
Figure 2 (right). This yields the endorsement digraph depicted in Figure 3.
12
ProgrammingC++Java0.20.80.20.80.40.4123456123456ProgrammingC++The PageRank scores assigned to nodes in that digraph are:
P(1) = P(3) = P(4) = 0.0958, P(2) = 0.1410, P(5) = 0.2133,
and P(6) = 0.3585.
The individuals '2' and '5' are now untied, and we have better grounds
to trust Programmer '5' over Programer '2'.
Figure 3: Endorsements for 'Programming', with information de-
duced from 'C++'.
Let us now suppose that the endorsement digraph for 'Java' is the one
given in Figure 4 (left). We can include the endorsements for 'Java'in the
same manner:
Q2 = Q1 + π2,0((J(6) − Q1) ◦ M2),
where again π2,0 = 0.8. The result is given in Figure 4 (right).
Figure 4: Endorsements for 'Java' (left), and endorsements for 'Pro-
gramming', with information deduced from 'C++' and
'Java' (right).
If we apply PageRank to this final digraph we get:
P(1) = 0.1178, P(2) = 0.1681, P(3) = P(4) = 0.0945,
13
12345611110.8123456Java123456Final11110.80.80.96P(5) = 0.2027, and P(6) = 0.3224.
With the aid of the new endorsements, Programmer '1' differentiates
itself from Programmers '3' and '4'.
3.2 Some properties
We now pay attention to some properties of endorsement deduction:
Proposition 1 Let the matrices Qk be defined as in Equations 5. Then,
for all 1 ≤ i, j ≤ n, the entry Qk(i, j) satisfies the following properties:
a) 0 ≤ Qk(i, j) ≤ 1, for all 0 ≤ k ≤ (cid:96).
b) Qk(i, j) ≥ Qk−1(i, j), for all 1 ≤ k ≤ (cid:96).
c) Q(cid:96)(i, j) = 0 if, and only if, Mk(i, j) = 0 for all 0 ≤ k ≤ (cid:96).
d) Q(cid:96)(i, j) = 1 if, and only if, there exists some skill k, with 0 ≤ k ≤ (cid:96),
such that Mk(i, j) = 1, and πk,0 = 1. In particular, if M0(i, j) = 1, then
Q(cid:96)(i, j) = 1, since π0,0 = 1.
We omit the proofs, as they follow from the straightforward application
of Equations 5, and previous definitions.
Put into plain words, Proposition 1 states that a particular entry Qk(i, j)
can only grow with k, up to a limit of 1. This maximum can only be reached
if i endorses j directly for skill 0, or for some other skill that implies skill 0
with probability 1. No other endorsement can have the same effect.
This implies that, if two members of the network, i and j, who were tied
up in plain PageRank, get untied after deduction, it is because one of them
has received additional endorsements for other skills that are related to the
main skill (or has received more relevant endorsements).
4 Simple ranking vs. ranking with deduction
4.1 Evaluation criteria
There is an extensive literature on the evaluation of information retrieval
and ranking systems (see [6], Sec. 1.2; [43], and others). Several evaluation
criteria and measures have been developed for that purpose, such as preci-
sion, recall, F -measure, average precision, P@n, etc. All these measures rely
on a set of assumptions, which include, among others, the existence of:
1. a benchmark collection E of personal profiles (potential experts),
2. a benchmark collection S of skills,
14
3. a (total binary) judgement function r : E×S → {0, 1}, stating whether
a person e ∈ E is an expert with respect to a skill s ∈ S.
The above conditions have been taken from [6], Sec. 1.2, and adapted to
our situation. Unfortunately, none of these assumptions applies in our case.
To the best of our knowledge, there does not exist any reliable open-
access ground-truth dataset of experts and skills, connected by endorsement
relations. To begin with, the endorsement feature is relatively new, and still
confined to a few social networks (e.g. LinkedIn and ResearchGate). In
ResearchGate in particular, it was only introduced in February, 2013, and
not enough data has accumulated so far. On the other hand, LinkedIn does
not disclose sensitive information of its members (including their contacts
or their endorsements), due to privacy concerns. Crawling the network,
such as in [11] is not allowed: LinkedIn's terms of use specifically prohibit
to "scrape or copy profiles and information of others through any means
(including crawlers, browser plugins and add-ons, and any other technology
or manual work)" (see [32]). Therefore, assumptions 1 and 2 do not hold in
our case.
The third assumption is also problematic: Even if we had a dataset with
endorsements, we would still need a 'higher authority', or an 'oracle', to
judge about the expertise of a person. Moreover, since our goal is to rank
experts, a binary oracle would not suffice.
Traditionally, ranking methods have been validated by carrying out sur-
veys among a group of users (e.g. [14]), which in our opinion, is very subjec-
tive and error-prone. We propose a more objective validation methodology,
which is based on the following criteria:
1. Sanity check: Our ranking with deduction is close to the ranking pro-
vided by PageRank. If we use endorsement deduction in connection
with PageRank, results should not differ too much from PageR-
ank; i.e. our method should only modulate the ranking provided by
PageRank by introducing local changes.
In order to evaluate the
closeness between two rankings we can use some measure of rank cor-
relation. Measures of rank correlation have been studied for more than
a century now, and the best known of them are Spearman's correlation
coefficient ρ [45], and Kendall's correlation coefficient τ [24].
2. Ranking with deduction results in less ties than PageRank. Ties are
an expression of ambiguity, hence a smaller number of ties is desirable.
In the example of Section 3, we have seen that ranking with deduc-
tion resolves a tie produced by PageRank. However, this has to be
confirmed by meaningful experiments.
3. Ranking with deduction is more robust than PageRank to collusion
spamming. Collusion spamming is a form of link spamming, i.e. an at-
15
tack to the reputation system, whereby a group of users collude to cre-
ate artificial links among themselves, and thus manipulate the results
of the ranking algorithm, with the purpose of getting higher reputation
scores than they deserve [17, 18]. If the users create false identities (or
duplicate identities) to carry out the spamming, the strategy is known
as Sybil attack [12].
4.2 Experimental setup and results
We now proceed to evaluate our ranking with deduction, according to each
of the above criteria. Our experimental benchmark consists of a randomly
generated social network that replicates some features of LinkedIn at a
small scale [39]. LinkedIn consists of an undirected base network (L),
or network of contacts, and for each skill, the corresponding endorsements
form a directed subgraph of (L). In [28], Leskovec formulates a model that
describes the evolution of several social networks quite accurately, including
LinkedIn, although this model is limited to the network of contacts (L), and
does not account for the endorsements, since that feature was introduced in
LinkedIn later.
Thus, we have implemented Leskovec's model and used it to generate an
undirected network of contacts with 1493 nodes and 2489 edges, represented
in Figure 5.
Additionally, we have considered five skills: 1. Programming, 2. C++,
3. Java, 4. Mathematical Modelling, 5. Statistics. We have chosen these
skills for two main reasons:
1. These five skills abound in a small LinkedIn community consisting of
278 members, taken from our LinkedIn contacts, which we have used
as a sample to collect some statistics.
2. These five skills can be clearly separated into two groups or clusters,
namely programming-related skills, and mathematical skills, with a
large intra-cluster correlation, and a smaller inter-cluster correlation.
This is a small-scale representation of the real network, where skills
can be grouped into clusters of related skills, which may give rise to
different patterns of interaction among skills.
We have computed the co-occurrences of the five skills in our small com-
munity, resulting in the co-occurrence matrix Π1 of Eq. 7. The entry
Π1(i, j) is the ratio between the number of nodes that have been endorsed
for both skills, i and j, and the number of nodes that have been endorsed
for skill i alone.
16
Figure 5: Base network of 1493 nodes, used for experiments
17
Π1 =
1
0.42 0.42
1
0.62
0.62 0.62
0.75 0.25 0.12
0.12 0.12
0.5
1
0.5
0.33
0.62 0.25 0.12
0.12 0.12
0.5
1
1
0.5
(7)
Now, for each skill we have constructed a random endorsement digraph
(a random sub-digraph of the base network), in such a way that the above
co-occurrences are respected. We have also taken care to respect the relative
endorsement frequency for each individual skill. The problem of constructing
random endorsement digraphs according to a given co-occurrence matrix is
not trivial, and may bear some interest in itself [39]. We have chosen to skip
the details here because it is not our main concern in the present paper.
The base network and the endorsement digraphs can be downloaded from
http://www.cig.udl.cat/sitemedia/files/MiniLinkedIn.zip.
Next, for each skill we have computed two rankings, one using the simple
PageRank algorithm, and another one using PageRank with deduction.
For PageRank with deduction we have used the skill deduction matrix Π2
given in Eq. 8. This matrix has been constructed by surveying a group of
seven experts in the different areas involved.
(8)
For each skill we have computed the correlation between both rankings,
and the number of ties in each case, according to the first two criteria de-
scribed above. Additionally, in order to test the robustness of the method
to collusion spamming, we have added to each endorsement digraph, a small
community of new members (the cheaters), who try to subvert the system
by promoting one of them (their leader ) as an expert in the corresponding
skill. We have chosen the most effective configuration for such a spamming
community, as described in [17], and depicted in Figure 6. Thereupon we
have compared the position of the leader of cheaters in simple PageRank
with its position in PageRank with deduction.
Table 1 summarizes the results of the aforementioned experiments. Re-
garding the first criterion, we can see that there is a very high correlation
between PageRank with deduction and PageRank without deduction for
all skills. According to Kendall's τ , there is a significant agreement between
both rankings, with a significance level of 0.001, or even better. Spearman's
ρ shows an even higher agreement.
With respect to the second criterion, the experiments also yield unques-
tionable results: For all skills, the number of ties is significantly reduced.
18
Π2 =
0.7 0.7 0.4 0.3
1
1
0.6 0.4 0.3
1
0.4 0.3
1
1
0.7
0.8
1
0.3 0.2 0.2
0.3 0.2 0.2
1
1
Figure 6: Link spam alliance: Three people collude to promote one
of them.
Number Correlat.
of endor-
sements
ρ
τ
Skill
Program.
C++
Java
Math Mod
Statistics
AVG
(arcs)
220
140
137
134
128
%
fall
3%
3%
3%
3%
3%
3%
Number of ties
Position of leader
without
deduct.
with
deduc.
%
without
reduc. deduct.
with
deduc.
0.89 0.76
0.85 0.63
0.85 0.63
0.85 0.63
0.85 0.63
1460
1478
1486
1483
1486
1316
1304
1292
1318
1304
10%
12%
13%
11%
12%
11.6%
1
4
1
1
1
48
48
48
45
45
Table 1: Results from the first experiment
This is also reflected in the distribution of PageRank scores, shown in Fig.
7. After deduction, the scores are more evenly distributed.
As for the third criterion, in all cases there is a detectable drop in the po-
sition of the leader of cheaters, which may lead us to conclude that PageR-
ank with deduction is more robust to collusion spam than simple PageR-
ank. However, this may not lead us to the conclusion that PageRank with
deduction is an effective mechanism against collusion spam. Actually, the
spam alliance that we have introduced in our experiments is rather weak.
If we strengthen the spam alliance, then PageRank with deduction may
also be eventually deceived. Table 2 illustrates the effect of strengthening
the spam alliance, by increasing the number of assistants from 2 to 8. For
each spam alliance there are three columns, labelled as '-' (position of the
leader in the ranking without deduction), '+' (position in the ranking with
deduction), and '%' (effectiveness of deduction, measured as the leader's fall
in position, in percentage points).
The simplest way to implement a collusion spam attack is the so-called
Sybil attack, in which a single attacker creates several fake identities, with-
out the need to collaborate with other people. Proactive measures against
the Sybil attack focus on limiting the capability of a malicious user to cre-
ate a large amount of accounts. It has been proven that a trusted central
authority issuing credentials unique to an actual human being is the only
19
LEADERAssistantnum.1Assistantnum.2Figure 7: Histograms of PageRank scores, before and after deduc-
tion
Number of assistants
2
3
4
5
6
7
8
Skill
- + % - + % - + % - + % - + % - + % - + %
Program.
C++
Java
1 48 3 1 31 2 1 10 1 1 6
4 48 3 3 29 2 3 11 1 1 6
1 48 3 1 30 2 1 10 1 1 6
Math Mod 1 45 3 1 27 2 1 12 1 1 4
Statistics
1 45 3 1 28 2 1 11 1 1 4
0 1 4
0 1 5
0 1 4
0 1 2
0 1 2
0 1 2
0 1 2
0 1 2
0 1 2
0 1 2
0 1 1
0 1 1
0 1 1
0 1 1
0 1 1
0
0
0
0
0
Table 2: Effect of endorsement deduction in the presence of different
spam alliances
20
method that may eliminate Sybil attacks completely [12]. Requiring fees per
identity could mitigate them when the cost of the accounts is larger than the
benefit for the attacker. Reactive measures try to mitigate the effect of such
an attack. The SybilGuard [52] proposal bounds the number of identities a
malicious user can create under the assumption that a malicious user could
create many identities but few trust relations, so that there exists a small
cut in the graph between Sybil nodes and honest ones.
Our proposal belongs to the second category. It is not designed to be a
safeguard against the Sybil attack, but the experiments have shown that it
provides some reactive measure behaviour. In any case, the social network
platform implementing our proposal could include all the proactive and re-
active measures against sybil attacks without interferring with our method.
A complete survey of attack and defense techniques for reputation systems
is given in [19].
On the other hand, our endorsement digraphs are rather sparse, since
our contacts are rather lazy when it comes to endorsing each other. It is
reasonable to predict that if we should consider more skills, and if the total
number of endorsements should increase, then the effects of PageRank
with deduction will be stronger.
In order to verify this prediction, we have carried out a second exper-
iment on the same base network. For practical reasons we have decided
to keep the set of skills invariant for the moment, and increase the num-
ber of endorsements. Thus we have generated a second set of endorsement
digraphs, with a larger number of arcs. This time we cannot enforce the co-
occurrences observed in our small LinkedIn community. The co-occurrence
matrix obtained is given in Eq. 9 for the sake of comprehensiveness.
(9)
Subsequently we have performed the same computations on this second
set of endorsement digraphs, obtaining the results recorded in Table 3. These
results fully confirm our prediction: There is an increase in the correlation
coefficients (except in one case), as well as a larger reduction in the number
of ties, and a more significant fall in the position of the leader of cheaters.
5 Conclusions and future research
In this paper we describe endorsement deduction, a pre-processing algorithm
to enrich the endorsement digraphs of a social network with endorsements,
such as LinkedIn or ResearchGate, which can then be used in connec-
21
Π3 =
1
1
0.88 0.87
0.9
1
0.32
0.31 0.89
0.42 0.85 0.75
0.24 0.67 0.66 0.66
1
0.61
0.73 0.61
0.63 0.59
0.7
1
1
Number of ties
Position of leader
Number Correlat.
of endor-
sements
ρ
τ
Skill
Program.
C++
Java
Math Mod
Statistics
AVG
(arcs)
427
1793
1856
1406
1447
without
deduct.
with
deduc.
%
without
reduc. deduct.
with
deduc.
0.76 0.63
0.97 0.93
0.97 0.93
0.95 0.89
0.96 0.90
1428
1005
1005
1130
1113
625
575
566
652
580
56%
43%
44%
42%
48%
47%
1
66
63
56
58
175
178
180
168
169
%
fall
12%
7%
8%
7%
7%
8%
Table 3: Results from the second experiment
tion with a ranking method, such as PageRank, to compute an authority
score of network members with respect to some desired skill. Endorsement
deduction makes use of the relationships among the different skills, given
by an ontology in the form of a skill deduction matrix. A preliminary set of
experiments shows that the rankings obtained by this method do not dif-
fer much from the rankings obtained by simple PageRank, and that this
method represents an improvement over simple PageRank with respect to
two additional criteria: number of ties, and robustness to collusion spam.
Our experiments also show that the benefits provided by PageRank
with deduction are likely to increase in the future, with the densification of
the endorsement networks, and the introduction of new skills. However, this
has to be confirmed by larger-scale experiments. It could also be interesting
to test our method with other ranking algorithms, such as Hits.
Although LinkedIn and ResearchGate are perhaps the best examples
at hand, this system can also be extended to other social networks and
platforms. Take, for instance, the open access publishing platform arXiv7.
In order to submit a paper on a particular topic, say 'Statistics', an author
has to be endorsed by another trusted author for 'Statistics'. However, it
might as well be possible to allow an author submit a paper on 'Statistics'
if he/she has been endorsed for 'Probability Theory'.
There are many Internet forums, such as the 'StackExchange' suite, that
assign an authority score to their members. As an illustration, let us pick one
of the most popular forums of this family: The MathStackExchange8,
where users can pose questions and obtain answers about mathematical
problems. As of today (July, 2015), the site has more than 152 000 mem-
bers, and more than 467 000 questions have been posed. Members get credit
points for the questions, answers, or comments that they post, via the votes
of other members. A high authority score entitles a member to certain priv-
ileges. By design, all the votes are worth the same number of points, but a
more realistic model would be to make the value of the votes dependent from
7http://arxiv.org
8http://math.stackexchange.com
22
the authority score of the voting person. Additionally, authority scores could
be disassembled into areas of knowledge, since questions are tagged with the
areas to which they belong (e.g. 'Linear Algebra', 'Calculus', 'Probability',
etc.).
MathOverflow9 is very similar to MathStackExchange, but it fo-
cuses on more technical questions in state-of-the-art mathematics. Due to
its more 'elitist' nature, MathOverflow is smaller than the MathStack-
Exchange. Nevertheless, it is also a success story, with its more than 37
000 users, and circa 62 000 questions posted, and it has become an undis-
putable actor in mathematical research, having attracted some of the world's
top mathematicians [25].
A competitor to ResearchGate is Academia, another academic social
network designed to disseminate research results, ask and answer questions,
and find like-minded collaborators.
In both platforms, users can upload
their papers, and tag them with the different research topics. Questions can
be tagged too. It has been argued that, for the moment, these platforms
have failed to attract some of the most experienced scientists. This may
be partly due to the fact that scientists are conservative when it comes to
adopting new technologies, but judging from Egomnia's experience, it may
also be partly due to the unreliability (or outright inexistence) of scoring
and ranking mechanisms [33]. It would not be difficult for ResearchGate
to make the RG score more reliable by adopting the techniques discussed
above. As a starting point, it would be interesting to extend the experimen-
tal analysis of Section 4 to a ResearchGate-like network, and compare
the results with the ones obtained here.
It is worth observing that all these ideas are also applicable outside the
academic realm. In principle, even Google's search engine could make use
of these techniques to find content by synonyms. 10 In order to do that,
they would need a very large semantic network, comprising all the potential
keywords and their correlation.
Similarly, every social network or video repository displays some featured
content on the start page, whose popularity has been computed on the basis
of the number of votes (i.e. clicks on the 'Like' button). Yet, this content
is usually tagged by topic, and hence, it might be possible to compute a
more specific popularity score, and thus display content specifically tuned
to the user's interests. The authors in [26] propose a method for ranking we-
blogs. Their proposal consists in aggregating links by considering similarity
in authors and topics between pairs of blogs.
In any case, for the practical implementation of these techniques, two
obvious problems arise:
1. The first problem has to do with the estimation of the skill deduction
9http://mathoverflow.net
10Google already has some functionality for synonyms via the '∼' operator.
23
matrix, which in this paper we estimate by polling a group of experts.
There may be several alternatives to estimate the matrix from the
social network itself, and it may be necessary to ponder the pros and
cons of each alternative.
2. The second problem has to do with the feasibility of the computation.
Assuming that the skill deduction matrix is available, computation
of the weighted PageRank is a costly process for a large social net-
work. Methods for accelerating PageRank computations have been
considered in [22, 9]; we might need to adapt them to our situation.
Additionally, we might need methods to accelerate the computation
of the accumulated endorsement matrix Q.
A subsidiary problem has to do with modelling the dynamics of endorse-
ments in both LinkedIn and ResearchGate.
Acknowledgements
Authors have been partially funded by the Spanish Ministry of Economy
and Competitiveness under projects TIN2010-18978, IPT-2012-0603-430000,
and MTM2013-46949-P. The first two authors wish to dedicate this paper to
the memory of our friend and colleague Josep Maria Rib´o Balust,who could
not live to see the conclusion of his work.
References
[1] Balog, K., Fang, Y., de Rijke, M., Serdyukov, P., Si, L.: Expertise
Retrieval. Foundations and Trends in Information Retrieval 6 (1 -- 2), 127 --
256 (2012).
[2] Bar-Yossef, Z., Mashiach, L.-T.: Local Approximation of PageRank and
Reverse PageRank. Procs. of CIKM08, 279 -- 288 (2008).
[3] Berkhin, P.: A Survey on PageRank Computing. Internet Mathematics
2 (1), 73 -- 120 (2005).
[4] Bonacich, P.: Factoring and weighting approaches to status scores and
clique identification. The Journal of Mathematical Sociology 2, 113 -- 120
(1972).
[5] Broder, A.Z., Lempel, R., Magul, F., Pedersen, J.: Efficient PageRank
approximation via graph aggregation. Information Retrieval 9, 123-138
(2006).
[6] Ceri, S., Bozzon, A., Brambilla, M., Della Valle, E., Fraternali, P., Quar-
teroni, S.: Web Information Retrieval. Springer (2013).
24
[7] Chartrand, G., Lesniak, L.: Graphs and Digraphs. CRC Press, Boca
Raton, fourth ed. (2004).
[8] Chung, F., Tsiatas, A., Xu, W.: Dirichlet PageRank and Trust-based
Ranking Algorithms. WAW'11. Procs. of the 8th International conference
on Algorithms and Models for the Web Graph. 103 -- 114 (2011).
[9] Del Corso, G., Gulli, A., Romani, F.: Fast PageRank Computation
Via a Sparse Linear System. Internet Mathematics 2, 251 -- 273 (2005).
[10] Deng, H., King, I., Lyu, M.R.: Enhanced Models for Expertise Re-
trieval Using Community-Aware Strategies. IEEE Transactions on Sys-
tems, Man, and Cybernetics -- Part B: Cybernetics, vol. 42, 93 -- 106
(2012).
[11] Ding, C., Chen, Y., Fu, X.: Crowd Crawling: Towards Collaborative
Data Collection for Large-Scale Online Social Networks. Procs. COSN
2013, 183 -- 188 (2013).
[12] Douceur, J.R.: The Sybil Attack. LNCS 2429, 251 -- 260 (2002).
[13] Farahat, A., Lofaro, T., Miller, J.C., Rae, G., Ward, L.A.: Authority
Rankings from Hits, PageRank, and Salsa: Existence, Uniqueness,
and Effect of Initialization. SIAM J. Sci. Comput. 27, 1181 -- 1201 (2006).
[14] Fujimura, K., Toda, H., Inoue, T., Hiroshima, N., Kataoka, R., Sug-
izaki, M.: BLOGRANGER - A multi-faceted blog search engine. Procs.
WWW 2006, 22 -- 26 (2006).
[15] Gonz´alez-Pereira, B., Guerrero-Bote, V.P., Moya-Aneg´on, F.: A new
approach to the metric of journals scientific prestige: The SJR indicator.
Journal of Informetrics 4, 379 -- 391 (2010).
[16] Gould, P.R.: On the Geographical Interpretation of Eigenvalues. Trans-
actions of the Institute of British Geographers 42, 53 -- 86 (1967).
[17] Gyongyi, Z., Garcia-Molina, H.: Link Spam Alliances. Procs. 31st
VLDB (2005).
[18] Gyongyi, Z., Garcia-Molina, H.: Web Spam Taxonomy. Procs. AIRWeb
(2005).
[19] Hoffman, K., Zage, D., Nita-Rotaru, C.: A Survey of Attack and De-
fense Techniques for Reputation Systems. ACM Computing Surveys 42,
1 -- 31 (2009).
[20] Hashemi, S.H., Neshati, M., Beigy, H.: Expertise Retrieval in Bibli-
ographic Network: A Topic Dominance Learning Approach. Procs. of
CIKM, 1117 -- 1126 (2013).
25
[21] Haveliwala, T.H.: Topic-Sensitive PageRank: A Context-Sensitive
Ranking Algorithm for Web Search. IEEE Transactions on Knowledge
and Data Engineering 15(4), 784 -- 796 (2003).
[22] Kamvar, S.D., Haveliwala, T.H., Manning, C.D., Golub, G.H.: Ex-
trapolation methods for accelerating PageRank computations. Procs.
WWW'03, 261 -- 270 (2003).
[23] Katz, L.: A new status index derived from sociometric analysis. Psy-
chometrika 18 (1), 39 -- 43 (1953).
[24] Kendall, M.G.: A New Measure of Rank Correlation. Biometrika 30
(1/2), 81 -- 93 (1938).
[25] Klarreich, E.:
The Global Math Commons.
https://www.
simonsfoundation.org/features/science-news/mathematics-
and-physical-science/the-global-math-commons, May, 2011.
[26] Kritikopoulos, A., Sideri, M., Varlamis, I.: BlogRank: Ranking we-
blogs based on connectivity and similarity features. Procs. of AAA-IDEA
(2006).
[27] Lee, J., Min, J.-K., Oh, A., Chung, Ch.-W.: Effective ranking and
search techniques for Web resources considering semantic relationships.
Information Processing and Management 50, 132 -- 155 (2014).
[28] Leskovec, J.: Dynamics of Large Networks. PhD Thesis, School of Com-
puter Science, Carnegie-Mellon Univ. (2008).
[29] Li, N., Gillet, D.: Identifying Influential Scholars in Academic Social
Media Platforms. Procs. of the IEEE/ACM Int. Conf. on Advances in
Social Network Analysis and Mining (ASONAM), 608 -- 614 (2013).
[30] Khosravifar, B.: Trust and Reputation in Multi-Agent Systems. PhD
thesis. Department of Electrical and Computer Engineering. Concordia
University. Montr´eal, Qu´ebec, Canada, 2012.
[31] Kohlschutter, C., Chirita, P.A., Nejdl, W.: Efficient Parallel Compu-
tation of PageRank. Advances in Information Retrieval, LNCS 3936,
241 -- 252 (2006).
[32] LinkedIn User Agreement. https://www.linkedin.com/legal/
user-agreement, Oct. 2014.
[33] Lugger, B.: Ein Vergleich fur Forscher unter sich: Der Research-
Gate Score. http://www.scilogs.de/blogs/blog/quantensprung/
2012-10-09/ein-vergleich-f-r-forscher-unter-sich-der-
researchgate-score, Oct. 2012.
26
[34] Ma, N., Guan, J., Zhao, Y.: Bringing PageRank to the citation analysis.
Information Processing and Management 44, 800 -- 810 (2008).
[35] Meyer, C.D.: Matrix Analysis and Applied Linear Algebra. SIAM
(2001).
[36] Nagmoti, R., Teredesai, A., De Cock, M.: Ranking approaches for mi-
croblog search. WI-IAT '10 Proceedings of the 2010 IEEE/WIC/ACM
Int. Conf. on Web Intelligence and Intelligent Agent Technology - Vol.
01, 153 -- 157 (2010).
[37] Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Cita-
tion Ranking: Bringing Order to the Web. Technical Report, Stanford
InfoLab (1998).
[38] Pedroche, F., Moreno, F., Gonz´alez, A., Valencia, A.: Leadership
groups on Social Network Sites based on Personalized PageRank. Math-
ematical and Computer Modelling 57, 1891-1896 (2013).
[39] P´erez-Ros´es, H., Seb´e, F.:
Synthetic Generation of Social Net-
work Data with Endorsements. Journal of Simulation, Nov. 14, 2014.
DOI:10.1057/jos.2014.29.
[40] Pinski, G., Narin, F.: Citation Influence for Journal Aggregates of
Scientific Publications: Theory, with Applications to the Literature of
Physics. Information Processing and Management 12, 297 -- 312 (1976).
[41] Pujol, J.M., Sanguesa, R. Reputation Measures based on Social Net-
works metrics for Multi Agent Systems. Proceedings of the 4th Catalan
Conference on Artificial Intelligence (CCIA-01), 205 -- 213 (2001).
[42] Punnarut, R., Sriharee, G.: A Researcher Expertise Search System
using Ontology-Based Data Mining. Procs. 7th Asia-Pacific Conf. on
Conceptual Modelling (APCCM), 71 -- 78 (2010).
[43] Robertson, S.: Evaluation in Information Retrieval. In M. Agosti, F.
Crestani, and M. Pasi (eds): Lectures on Information Retrieval, LNCS
1980, 81 -- 92 (2000).
[44] Sarma, A.D., Molla, A.R., Pandurangan, G., Upfal, E.: Fast distributed
PageRank computation. Theoretical Computer Science 561, 113 -- 121
(2015).
[45] Spearman, C.: The proof and measurement of association between two
things. Am. J. Psychol. 15, 72 -- 101 (1904).
[46] Tang, J., Zhang, J.., Yao, L., Li, J., Zhang, L., Su, Z.: ArnetMiner:
Extraction and Mining of Academic Social Networks. Procs. of the 14th
27
ACM Int. Conf. on Knowledge Discovery and Data Mining (KDD), 990-
998 (2008).
[47] Vigna, S.: Spectral Ranking. arXiv:0912.0238v13 (2013).
[48] Wei, T.-H.: The Algebraic Foundations of Ranking Theory. University
of Cambridge (1952).
[49] Weng, J., Lim, E.P.., Jiang, J., He, Q.: TwitterRank: Finding topic-
sensitive influential twitterers. Procs. of the ACM Int. Conf. on Web
Search and Data Mining (WSDM 10), 261-270 (2010).
[50] Xing, W., Ghorbani, A.: Weighted PageRank Algorithm. Procs. of the
2nd Annual IEEE Conference on Communication Networks and Services
Research, 305 -- 314 (2004).
[51] Yan, E., Ding, Y.: Discovering author impact: A PageRank perspec-
tive. Information Processing and Management 47, 125 -- 134 (2011).
[52] Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A. "SybilGuard:
defending against Sybil attacks via social networks", Proc. of SIG-
COMM'06 (2006).
[53] Zhang, X., Yu, H., Zhang, C., Liu, X.: An Improved Weighted Hits
Algorithm Based on Similarity and Popularity. Procs. of the 2nd IEEE
Int. Multisymposium on Computer and Computational Sciences, 477 --
480 (2007).
Appendix: The endorsement mechanism and its in-
consistencies
We make a brief discussion about LinkedIn's endorsement mechanism,
which may be useful for the reader who is unfamiliar with the social network.
The process starts when some user, say Anna, declares her skills (in this
respect, LinkedIn differs from other social networks, such as Research-
Gate, where users can suggest skills to their contacts). Then, Anna's con-
tacts can endorse her for those alleged skills in three different ways:
1. When one of Anna's contacts (say Ben) opens Anna's profile, the sys-
tem presents Ben with a list of Anna's presumed skills, and asks Ben
whether it is true that Anna possesses those skills. By pressing a single
button Ben can endorse Anna for all the skills in the list. We may call
that mechanism batch endorsement. Figure 8 shows the dialog box
that is presented to Ben. The main advantage of batch endorsement
is that it requires very little effort by Ben, since he only has to press
a single button. Nevertheless, batch endorsement may be a source of
28
inconsistencies, since the batch list presented to Ben is usually made
up of several unrelated skills, and not necessarily those skills where
Ben is an expert. It is true that Ben may remove some of the skills
from the list, but that requires some additional effort.
2. After Ben has batch-endorsed Anna, he is then asked to endorse other
users, one skill at a time. The people appear in groups of four, and
their order of appearance, as well as their skills, seem to be random.
Figure 9 shows a group of four users waiting to be endorsed. This en-
dorsement mechanism is more specific, but also more time-consuming
than batch endorsement, and people usually skip it after a few clicks.
3. Finally, if Ben wants to endorse Anna for some specific skill which
did not appear, either in the initial batch list or in the subsequent
endorsement suggestions, then he has to go to Anna's list of skills,
and click on the specific skill he wants to endorse Anna for. This is
by far the most reliable mechanism for endorsement, but it requires
Ben's determination to make the endorsement. In Figure 10 we can
see Anna's list of skills, which can be clicked on individually.
Figure 8: First endorsement mechanism: Batch endorsement
Now it becomes evident why there are inconsistencies in people's en-
dorsements. In fact, we can say that practically all profiles surveyed by us
contain some inconsistency, although some inconsistencies are more obvious
than others, and the actual percentage may vary according to the definition
of inconsistencies that is agreed upon. In any case, whatever the convention
adopted, the percentage of profiles containing some form of inconsistency
will be very close to 100%.
We have manually surveyed 100 profiles from a pool of 3250, mainly from
the areas of Mathematics and Computer Science. Our sampling method con-
sisted in a random DFS of depth two with backtracking. We started at the
root profile (belonging to one of the authors), then checked for inconsisten-
cies, and selected one of the contacts at random, by generating a random
number modulo the total number of contacts in the profile. Then we re-
peated the process from the new profile. Since the contacts are not visible
29
Figure 9: Second endorsement mechanism: A group of four candi-
dates to be endorsed
Figure 10: Third endorsement mechanism: Anna's complete list of
skills, which can be endorsed individually
30
for the profiles located at distance two (or greater) from the root profile,
when we arrive at some profile of the second level, we check for inconsisten-
cies and bactrack. Thus, our pool consists of all the profiles within distance
two from the root profile.
In the literature it is possible to find several sampling methods that
are probably more effective than ours, but at this point, effectiveness and
accuracy are not a concern, since we are not collecting any formal statistics.
Our main purpose at this point is to find examples of inconsistencies, and
classify the most significant inconsistencies encountered. Roughly speaking,
the inconsistencies can be classified in the following categories:
• Inconsistencies associated with the existence of hierarchies among skills.
These can be subdivided into two groups:
-- Bottom-up inconsistencies: A user is endorsed for some sub-
category of a larger category, but not for the larger category.
This is by far the most common inconsistency we have encoun-
tered. For example, some users have many endorsements for sev-
eral programming languages, but do not have any endorsement,
or have very few endorsements for the skill 'Programming' it-
self, even though they have declared the skill 'Programming' in
their profiles. Also in relation to programming, some users have
several endorsements for one or more object-oriented program-
ming languages, such as Java, but are not endorsed for the skill
'Object-Oriented Programming'. Still other users have been en-
dorsed for 'Object-Oriented Programming', but not for 'Program-
ming'. In a different domain, some users have been endorsed for
several mathematical skills, e.g. 'Graph Theory', 'Discrete Math-
ematics', 'Applied Mathematics', 'Mathematical Modeling', 'Op-
timization' etc., but not for 'Mathematics'. Finally, some users
have been widely endorsed for 'Digital Signal Processing', 'Digital
Image Processing', 'Image Segmentation', but not for the more
generic 'Image Processing'.
-- Top-down inconsistencies: A user is endorsed for some category,
but is not endorsed for any sub-category of the larger category.
For example, some users have been endorsed for the skill 'Pro-
gramming', but not for any specific programming language.
• Inconsistencies associated with the existence of synonyms for a skill, or
translations in different languages: A user is endorsed for some skill,
but lacks endorsements in other skills that are synonyms of the first
one. For example, several users have been endorsed either for the skill
'Simulation' or for 'Simulations', but not both. Some users have been
endorsed for some skill (say 'Programming') in a language other than
English, but not in English.
31
• Inconsistencies between the information contained in the endorsements,
and the information contained in the rest of the profile, or the pub-
lic information available about the user. E.g. some user, who is a
renowned expert in some area, is not endorsed for the corresponding
skill. This may happen if the user himself has not declared the skill.
For two concrete examples, Prof. Edy Tri Baskoro, who is a renowned
graph theorist, is not endorsed for 'Graph Theory', and Prof. Cheryl
Praeger, who is a renowned group theorist, is not endorsed for 'Group
Theory'.
This taxonomy does not attempt to cover all the situations encountered,
which might be considered inconsistencies.
It is very difficult to compile
comprehensive statistics here, due to the huge diversity of cases, and to the
subjectivism associated with defining inconsistent behaviour, but in any case
it becomes quite clear that the endorsement mechanism offers some scope
for improvement.
32
|
1803.02592 | 4 | 1803 | 2018-06-23T09:18:45 | Foundations of Temporal Text Networks | [
"cs.SI",
"physics.soc-ph"
] | Three fundamental elements to understand human information networks are the individuals (actors) in the network, the information they exchange, that is often observable online as text content (emails, social media posts, etc.), and the time when these exchanges happen. An extremely large amount of research has addressed some of these aspects either in isolation or as combinations of two of them. There are also more and more works studying systems where all three elements are present, but typically using ad hoc models and algorithms that cannot be easily transfered to other contexts. To address this heterogeneity, in this article we present a simple, expressive and extensible model for temporal text networks, that we claim can be used as a common ground across different types of networks and analysis tasks, and we show how simple procedures to produce views of the model allow the direct application of analysis methods already developed in other domains, from traditional data mining to multilayer network mining. | cs.SI | cs |
Foundations of Temporal Text Networks
Davide Vega and Matteo Magnani
InfoLab
Department of Information Technology
{davide.vega, matteo.magnani}@it.uu.se
Uppsala University, Sweden
June 26, 2018
Abstract
Three fundamental elements to understand human infor-
mation networks are the individuals (actors) in the net-
work, the information they exchange, that is often observ-
able online as text content (emails, social media posts,
etc.), and the time when these exchanges happen. An ex-
tremely large amount of research has addressed some of
these aspects either in isolation or as combinations of two
of them. There are also more and more works studying
systems where all three elements are present, but typi-
cally using ad hoc models and algorithms that cannot be
easily transfered to other contexts. To address this het-
erogeneity, in this article we present a simple, expressive
and extensible model for temporal text networks, that we
claim can be used as a common ground across different
types of networks and analysis tasks, and we show how
simple procedures to produce views of the model allow
the direct application of analysis methods already devel-
oped in other domains, from traditional data mining to
multilayer network mining.
1
Introduction
A large amount of human-generated information is
available online in the form of text exchanged be-
tween individuals at specific times. Examples include
social network sites, online forums and emails. The
public accessibility of several of these sources allows
us to observe our society at various scales, from fo-
cused conversations among small groups of individu-
als to broad political discussions involving heteroge-
neous audiences from large geographical areas [1, 2].
This information is undoubtedly very valuable, as
shown for example by the large revenues of big In-
ternet companies and by its usage during political
campaigns, but it is also very complex because of
its joint textual, structural and temporal nature.
To cope with this complexity, researchers have typi-
cally focused on either the topology of the network,
as commonly done in Network Science, or the text
exchanged among individuals, using methods from
Computational Linguistics. In some cases time has
also been taken into consideration as in, respectively,
the fields of Temporal Networks and Temporal Infor-
mation Retrieval.
However, despite this broad interest in human in-
formation networks, only a limited number of works
have been developed to address text, network topol-
ogy and time in an integrated way and using a com-
mon data model.
In our opinion, this is partly a
result of the over-specialization of today's academia,
and the fragmented and discipline-specific develop-
ment of network research. Unfortunately, omitting
any of the three basic elements of temporal text net-
works may lead to significant information loss and
prevent a deeper understanding of the information
system, as exemplified in the next section.
1
1.1 A motivating example
One typical usage of social media data in research
is to study how information propagates online.
In
one of the many studies on this topic, the authors
have analyzed different aspects of the propagation
process considering the online reactions generated by
the death of a well-known Italian TV anchorman [3].
In Figure 1 we have reproduced (a) the information
propagation network, showing which posts contained
information obtained by which others, (b) the text
of some of the posts generated about this event, and
(c) a temporal pattern indicating the number of com-
ments per day.
While each of these pieces of information alone re-
veals something, putting them together into a tempo-
ral text network (Figure 1d) we obtain a much more
comprehensive understanding of the process. On the
one hand, we can see that for the posts represent-
ing explicit attempts to propagate information (e.g.,
Mike passed away) publication time is fundamental
to determine their success, and only the first of this
type of posts generated a large and sudden burst of
reactions in a very short time; on the other hand,
conversational posts evolving from it (e.g., How has
television changed? ) can appear later and still create
long but less dense chains of reactions. Other posts
not present in the information propagation network
neither explicitly give the news nor ask for an answer,
generating no or few reactions, but still have the role
of re-activating the information cascade so that even
the latecomers can find a trace of it; some of these
posts (e.g., Bye granpa Mike!, or R.I.P.) form what
has been called an online mourning ritual.
In summary, time, text and topology together can
lead to a deeper understanding of how this informa-
tion network evolved into its current structure and
how information propagated through it.
1.2 Contribution and outline
In this work we introduce a simple but expressive and
easily extensible model for temporal text networks,
and define two main approaches to analyze this type
of data. We also show how existing primitive data
manipulation operations for multilayer networks can
be composed to easily construct new algorithms for
temporal text networks.
Our claim is that such a model can play a similar
role of other recent attempts to unify related areas of
network science, such as multilayer networks, which
have boosted research in already existing fields (e.g.,
multiplex network analysis) by showing that results
in one area could be directly applied to other types of
data now expressed using a uniform terminology and
mathematical form. Our objective is to define an
essential model, with a minimal number of fea-
tures, so that several existing models can be
unified into it without a significant increase in
model complexity. We also believe that a unified
model will promote the development of software li-
braries providing different data analysis functions for
temporal text networks inside a single system, from
centrality measures to community detection and gen-
erative models.
The article is organized as follows.
In the next
section we present an overview of related work, high-
lighting how a large amount of research has been pro-
duced to analyze human information networks. As
the main objective of this article is to introduce a
data model for temporal text networks, our overview
of the state of the art focuses on the data models al-
ready introduced in the literature, to allow a precise
comparison with our model. In Section 3 we define
our model as a simple attributed bipartite network.
We also show how this simple model can be used to
represent many existing types of text-based interac-
tions, such as direct messages, multicast and broad-
cast. In addition, we show how to express different
types of information networks using our model, and
how to extend it with additional features. Finally, we
provide a detailed comparison of our model with the
ones presented in the state of the art, showing how
some existing models can be expressed using ours,
while others can be obtained by applying some lossy
processing to ours, e.g., replacing the exchanged text
with a bag of words, a set of topics, a sentiment, etc.
Section 4 explains how the model can be used in data
analysis. We show how the direct manipulation of the
model can be complemented by two additional types
of analysis: continuous and discrete. In the contin-
uous case, time and text are treated as points in a
2
Mike passed away!
Bye grandpa Mike
R.I.P.
How has television changed?
R.I.P.
. . .
(b) Text
(c) Time
(a) Topology
(d) Topology, text and time
Figure 1: Three elements of an online human information network: a) The topology, where each
edge represents an observed information propagation path: user A writes a post about some news, user B
reads the post and writes herself about it, for example by commenting on it; b) the text exchanged between
users, that is, the text of posts and comments; c) the number of comments over time; d) Topology, time
and text combined into a temporal text network. Only details about two posts are shown.
3
lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllmetric space, and analysis operations are based on
the computation of similarities between these points.
In the discrete case, discretization operations (such
as time slicing and topic modeling) are applied, en-
coding text and time into multiple discrete layers and
enabling the direct application of the large number of
methods already available for multilayer networks. In
Section 5 we present a practical example of our model
and analysis strategies applied to Twitter data.
of works using some of the models is very large, we
have sometimes arbitrarily and unavoidably chosen a
key set of references based on our knowledge and per-
sonal selection. Therefore, please notice that in the
table we only indicate selected representative refer-
ences; additional references are included in the text.
Figure 2 complements Table 1 providing a visual in-
tuition of the reviewed models and of the new models
introduced in this article.
2 Related work
Our concept of temporal text network is a combi-
nation of text, network topology and time.
In the
literature there is a large number of models support-
ing one or more of these aspects, and the objective of
this section is to characterize existing models from a
common viewpoint. In this way, in the next section
we will be able to provide a precise comparison be-
tween our proposal and existing work, showing that
our model is more expressive but at the same time
consistent with existing approaches, reusing existing
modeling constructs when possible. In particular, we
will show that we can express existing models using
ours, but not vice-versa.
Notice that there are entire well-established disci-
plines developed to address text, network topology
and time in isolation, and we do not review these
here as they are widely covered by text books [4, 5],
described in numerous research papers (see for ex-
ample [6] and subsequent extensions), and included
in several software packages and systems.
Instead
we describe recent research efforts combining at least
two of these aspects.
Table 1 presents a summary of the models selected
for this review, also including our proposed model
(core and extended temporal text network), orga-
nized according to four main criteria: (1) the type of
graph used to represent the topological portion of the
data, (2) the type(s) of nodes allowed in the graph,
(3) the way in which text is represented in the model
and (4) the way in which time is represented in the
model. In Section 3.3 these criteria will be used for
a comparison with our model. As our aim is to com-
prehensively list models, not papers, and the number
2.1 Time & Topology
The most basic family of models including both time
and topology is the contact sequence [7, 8]. This is
the most popular model for representing time and
relations as a simple network structure. Mathemat-
ically, the model can be represented as a directed
multi-graph G = (V, E, T ) with attributed edges.
The set of vertices V represent actors (e.g., individ-
uals, companies) and the set of edges E represent
the interactions among the actors. When used in
practice [35, 8, 36] the duration of the interactions
is sometimes considered negligible and hence repre-
sented as a single scalar t ∈ T , while in other oc-
casions the temporal information is represented as
time intervals t = (ts, te) indicating when the con-
tact between two actors starts (ts) and ends (te)
[37].
Contact sequences have been typically used
to study information spreading [35, 38], and existing
concepts such as motifs and triadic closure have been
re-defined to study the evolving structure of these
networks [36, 37, 39].
Differently from contact sequences, where inter-
actions are time-annotated one by one, other types
of models use sequences of time-annotated graphs,
where each graph is sometimes also called layer. In
time-sliced models, also known as time-aggregated
models, time is expressed as an interval and an edge
indicates that an interaction has happened at some
point during the time interval associated to the graph
[9]. These models are typically obtained starting
from a contact sequence and aggregating edges by
time.
In longitudinal networks relationships about
the same or similar actors are detected at different
points in time [10, 11]. From a data modeling point of
view, time slicing and longitudinal networks are very
4
Table 1: Comparison of models representing two or more of the main aspects of temporal text networks.
The graph type is indicated as D: directed (undirected if D is not specified), O: ordered, G: Graph, MG:
Multi graph, BG: Bipartite graph, ML: Multilayer graph. Node types indicate the domain of the nodes,
and we distinguish between A (nodes used to represent actors) and X (nodes used to represent text-related
objects). Given the variety of existing models, X is broadly used to represent full text documents, parts
of it (phrases, words), other representations of documents such as bags of words (BoW), and also objects
obtained by analyzing the text, such as concepts/topics. In this table we only indicate selected references.
Name
Graph type Node types
Text repr.
Time repr.
Refs.
DMG
Contact sequence
OML
Time-slice
OML
Longitudinal
DG
Memory
DML
Memory (multilayer)
-
Temporal text
-
Longitudinal text
G/DG
Language networks
G/DG
Document networks
BG
Document-phrase graph
BG
HIN
Socio-semantic network
BG
Temp. Socio-semantic network BG
DG
Citation network
DG
Author-citation network
Spreading process
DG
DG
Polyadic conversations
DBG
Core temporal text network
Ext. temporal text network
ML
A
-
A
-
A
-
An
-
A1 ∪ · · · ∪ An -
X
X
X
X
X ∪ X
A ∪ X
A ∪ X
A ∪ X
X
2A × X
A × X
A × 2A × X
A ∪ X
A ∪ X
mostly edges
layers
layers
edges (implicit)
edges (implicit)
vertices
document
layers
document
-
word
-
document
document, phrase
-
BoW, concept, doc. -
-
concept
edges
concept
vertices
document
vertices
document
-
edge (delay)
vertices
document
edges
document
document
edges
[7, 8]
[9]
[10, 11]
[12, 13, 14, 15]
[16]
[17]
[18, 19]
[20]
[21, 22]
[23]
[24, 25, 26]
[27, 28]
[29]
[30, 31]
[32]
[33]
[34]
similar, and in practice the main difference lies in
the nature of the time annotation associated to each
slice, where in time slicing adjacent slices are typ-
ically associated with adjacent time intervals while
in longitudinal network studies adjacent layers rep-
resent network snapshots obtained at specific points
in time. Different types of time annotations are de-
scribed for example in [40].
Memory models provide a different view over a
temporal network, where ordered tuples of two or
more actors are represented as single nodes [12, 13,
14, 15]. For example, second order memory net-
works [12, 13] can model the impact of one prede-
cessor edge. For example, if an actor vi is receiving
one message from vj and one from vk, and is later
sending a message to vj and one to vk, a contact se-
quence loses information on whether vi is replying to
vj and vk (j → i → j, k → i → k) or forwarding
the messages (j → i → k, k → i → j). A first-order
5
−→
ji,
−→
ij ) and (
−→
ki,
−→
ki,
memory model will contain nodes for each pair of
users and have an edge between two nodes if the cor-
responding pairs appear on consecutive paths. In our
−→
example, if vi is replying we will have two edges in
−→
the memory model: (
ik), while if vi
−→
is forwarding the messages we will have the edges (
ji,
−→
ik) and (
ij ). Higher order memory networks also
exist [14], although they are not as common, to rep-
resent causality effects between pathways consisting
of 3 or more nodes. Deciding the order of the model
is not trivial as specific patterns can be revealed only
on a specific subset of memory models. To solve this
problem, Scholtes et al. [16] introduced a multilayer
memory network, composed of multiple memory net-
works of different order hierarchically connected be-
tween them (e.g., each node in the 2nd-order layer
vij is connected with all nodes in the 3rd-order layer
whose path vklm contains the leg
klm).
ij ⊆ −−→
−→
−→
ij , so
Figure 2: A visual gallery of models for time text and networks.
Time often plays an important role when networks
are concerned, because networks often represent dy-
namical systems. However, in Table 1 we have only
listed distinct data models explicitly providing time
annotations. As an example, growing network mod-
els [4] such as preferential attachment [41] aim at ex-
6
plaining the observed topology of empirical networks
based on how they evolve in time from an initial small
network. Even if nodes and edges join the network
one after the other, there is no explicit representa-
tion of time in the final model. Similarly, we have
not listed papers about methods not explicitly intro-
ducing new data models, such as [42].
2.2 Time & Text
Time is often present inside text, and commercial
systems handling large human information networks
from Google mail to common text messaging appli-
cations on smart phones can automatically identify
the messages and annotate the text with temporal
information.
In research, text and time are studied together
in the field known as temporal information retrieval
[43, 44]. This is an active area, also represented at
the TREC conference where state-of-the-art informa-
tion retrieval methods compete on various practical
tasks. Time can be present in the text, as in the ex-
amples above or as metadata, expressed as absolute
or relative time and it can also be specified in queries
used to express information requirements [17].
Another set of studies has focused on how text
evolves in time, and in particular sentiment, with case
studies ranging from tweets [18] to songs, blogs and
presidential speeches [19]. Text and time are also
studied across data sources, for example to correlate
texts from online news to trends emerging in time se-
ries such as financial data [45]. However, no specific
data model is used for this type of tasks, but only
time-annotated documents (understood in a broad
sense, including words, etc.) and time series.
2.3 Text & Topology
Text and networks have been studied together in var-
ious areas, either without considering time or using
networks to represent relationships between texts.
Models where nodes represent parts of a document
have been used in structured information retrieval,
which was a particularly active research area when
hypertexts and markup languages became popular
[46]. Text is often contained inside some structure
(e.g., a title, sections, sub-sections, etc.) and queries
can be tuned to return specific parts of a document
instead of a full one. As an example, if the searched
keyword is contained inside Subsections 3.1 and 3.3 of
a document, a query may return either the two sub-
sections, or the whole Section 3, depending on the
method.
More relevant for this article are document net-
works, that are graphs whose nodes represent text
documents [21, 22]. These network models can be
classified in different groups depending on whether
they include time or not; later in this section we refer
to citation networks as a type of directed document
network where time is also typically present. Text
mining, and in particular clustering, can be applied to
document networks to identify groups of documents
that are similar not only because of their text but
also because of their connections, as summarized in a
recent article about clustering attributed graphs [47].
Several works have focused on networks extracted
from text, and we can broadly classify them into mod-
els representing the text itself, aimed at character-
izing language, and models representing actors and
concepts mentioned in the text.
Networks where nodes represent words have been
used to model both text documents and languages
[20]. For example, a document can be modeled as a
network where words are connected by an edge when
they are contiguous, or appear in the same sentence,
paragraph, etc. Similarly whole languages can be
modeled focusing on the relationships between words,
as in WordNet or BabelNet.
With regard to the second class of models for net-
works extracted from text, Named Entity Recogni-
tion methods are typically used to identify the nodes
and co-occurrence (or other language analysis ap-
proaches) to create edges among them [48, 24].
In
this case, the output network connects different por-
tions of a text document, or concepts extracted from
the text.
A model that has been used to represent the re-
lationships extracted from texts is known as hetero-
geneous information network (HIN) [49, 50]. HINs
are defined as attributed directed graphs G =
(V, E, A, R) with an object type mapping function
V → A and a link type mapping function E → R, so
7
that each object in the network (vertices and edges)
belongs to a single type and if two edges belong to the
same relation type R, the two edges share the same
starting object type as well as the ending object type.
For example, HINs have been used in the past to
model co-occurrence relations between entities (e.g.,
famous characters, sports, companies) in Wikipedia
articles [26]. In [24] vertices represent either famous
characters from the text or bags of words, while the
edges connect words that best explain the contexts
where two or more famous characters appear together
in the text. Document-phrase graphs as defined in
[23] are also HIN-based models, and more in de-
tail probabilistic bipartite networks B = (V, U, E, W )
where the vertices in one partition V represent docu-
ments from a large document collection, the vertices
in U represent salient phrases which are semantically
relevant to one or more documents in V , and edges E
indicate the relevance of each sentence for each doc-
ument. HINs are not limited to represent relations
within documents, text and concepts; but they can
also model relations between actors and text. The
most common use of HIN is actually to represent co-
author or citation networks. In [25], for example, the
authors use an heterogeneous information network to
describe the relations between scientific articles, their
authors, and the venues where they were published.
One of the concerns recently raised against using
methods from social network analysis to analyze so-
cial media is their intrinsic actor-centered approach
(e.g., people, companies, stakeholders), focusing on
social
interactions without properly characterizing
other aspects of the communication [27]. A similar
argument can be used against the use of just Natural
Language Processing or semantic networks [51].
Following this reasoning, a recent stream of re-
search focused on combining structural and seman-
tic data simultaneously, which led to the formaliza-
tion of the socio-semantic network model [29, 27, 28].
Originally, socio-semantic networks were just bipar-
tite graphs interconnecting agents (also known as ac-
tors in Social Network Analysis) with semantic ob-
jects called concepts, corresponding for example to
terms, n-grams, or lexical tags.
During the last decade the socio-semantic network
model has been extended to extract more valuable
knowledge from social media. An illustrative exam-
ple of such extension can be found in [28] where the
authors propose to combine the aforementioned social
and socio-semantic networks into a single model. In
short, they use a single matrix representation where
the diagonal sub-matrices represent the relation be-
tween the same type of entities (agents and con-
cepts) and the off-diagonal matrices represent the
relation between different ones (agent/concept and
concept/agent). From the point of view of data mod-
eling, HINs are very related to socio-semantic net-
work models, even though HINs have been introduced
as more general modeling tools while socio-semantic
networks have emerged and are used in a specific ap-
plication context.
A final work worth mentioning in this class is [52],
where topic modeling is performed using an extended
model considering not only the association between
topics, words and documents, but also the associa-
tion between documents and their authors. However,
this has not been included in our summary table be-
cause it introduces a generative model to summarize
the data in the form of parameters indicating the
probability that a given actor produces a given set of
words, but not to represent the empirical data show-
ing which actors have written what text.
2.4 Time & text & topology
Many works in the literature have dealt with time,
text and topology using ad hoc models specifically
designed to capture relevant aspects of specific plat-
forms such as Twitter. For example, in [53] a com-
munication network is built in three steps: (1) con-
versation trees are extracted from the dataset by in-
versely following the chain of Twitter user interac-
tions (replies, mentions and retweets); (2) the trees
are pruned based on the time elapsed between the
root tweet and the overlap of tweets and participants
in the tree; (3) finally, all trees are merged to generate
a simple weighted graph of interactions between au-
thors. A related model is the so-called polyadic con-
versation [34], designed to describe user interactions
in microblogging sites as a series of related conversa-
tions - also called polyadic interactions. A polyadic
interaction is a tuple i = (v, U, m, t) where v ∈ V is
8
the sender of the message m ∈ M , U ⊆ V is the set of
receivers and t ∈ T is the timestamp of the commu-
nication act. A polyadic conversation is then defined
as a chronologically ordered tree G = (I, E) where I
is a set of polyadic interactions and E ⊂ I × I.
In [29] a temporal model was used to compare
the co-growth of two epistemic networks, a Twitter
dataset and a set of related blogs, with the underlying
social network of contacts. The temporal information
attached to the edges of the network is, afterwards,
used to compare the order of formation of epistemic
and social communities.
Citation networks have received a lot of attention,
and include text documents, directed edges between
them and also time annotations [30, 31]. In addition,
when author co-citation analysis is performed [32],
the underlying data model must also contain infor-
mation about who authored which documents.
Information diffusion processes are often modeled
including the diffused information item (meme, blog
post, etc.), the actors propagating it, and the times
of propagation. This is for example the case for the
model used in [33]. However, the majority of these
models do not use text to perform the data analy-
sis, but (sometimes) to define the links between doc-
uments. Time can also be used to infer network
structure based on the observation of propagation
events. For example, the observation of a group of
individuals repeatedly re-sharing common tweets in
the same temporal order may suggest that these peo-
ple are connected, and that information (tweets, in
this case) passes through these hidden connections
[54]. In [55] existing theoretical diffusion models for
interconnected networks are reviewed, extending con-
cepts in information diffusion to a multilayer model.
In order to preserve as much original information
as possible, S´cepanovi´c et al. [56] use a more generic
process to build the network, mixing techniques from
social network and semantic analysis. In their work,
the communication network is modeled as a simple,
temporal graph using the Twitter "replies" to relate
actors with each other. Then, they apply several
semantic analysis procedures to generate support-
ing networks that describe the text-related features.
A comparative analysis between the communication
network and a subset of the semantic networks is used
to study several aspects of the overall system such
as semantic homophily and its evolution. However,
from a modeling point of view text is not explicitly
represented in this model, but coded inside the se-
mantic layers. We will later use a related approach
to exemplify how to use our model for data analysis.
Some attention has also been devoted to models de-
scribing co-evolutionary networks [57, 58]. Some of
these models allow the representation of a status as-
sociated to each node. Statuses can be used for exam-
ple to represent the political affiliation of the person
represented by the node. In growing network models,
the status can influence the evolution of the network
for example by increasing the probability that people
will create connections with other individuals shar-
ing the same political affiliation [59, 60]. As for the
case of simple network growing models, time is not
typically kept at the end of the growing process, and
in addition status has not been used to model text
to the best of our knowledge. Therefore, we have not
included these works in our summary table, even if
we consider them potentially relevant for this field if
extended in the future.
3 Modeling temporal text net-
works
In our opinion, a good model for temporal text net-
works should be general enough to be able to rep-
resent a wide range of systems, but also contain a
minimal number of modeling constructs, to make the
model easier to use and study. In other terms, a good
compromise should be found between expressiveness
and simplicity. In addition, given the large number of
existing models that have been used for a long time to
describe specific aspects of temporal text networks,
we believe that both the modeling constructs and the
terminology used in our model should be as aligned
with previous work as possible. Following these de-
sign principles, we propose the following definition of
temporal text networks:
Definition 1 (Temporal text network) A tem-
poral text network is a triple (G, x, t) where:
9
1. G = (A, M, E) is a directed bipartite graph,
where, A is a set of actors, M is a set of mes-
sages, and E ⊆ (A × M ) ∪ (M × A).
2. x : M → X, where X is a set of sequences of
characters (texts).
in: (as, mj,{ar1 , . . . , arn}, "text"), where "text" =
x(mj). Finally, when all the timestamps on the
edges adjacent to a message are equal, we can
also add a time to the previous notation, as in:
(as, mj,{ar1, . . . , arn}, "text", tq).
3. t : E → T , where T is an ordered set of time
3.1 Applicability
annotations.
and where the following constraints are satisfied:
1. ∀m ∈ M, in-degree(m) = 1.
2. (ai, m), (m, aj) ∈ E ⇒ t(ai, m) ≤ t(m, aj).
In our model edge directionality indicates the flow
of text in the network: (ai, mj) ∈ E indicates that
actor ai has produced text mj, while (mj, ai) ∈ E
indicates that actor ai is the recipient of text mj.
Actors with out-degree larger than 0 are information
producers, actors with in-degree greater than 0 are
information consumers, and actors with both positive
in- and out-degree are information prosumers.
Text is represented as a combination of a text con-
tainer (m ∈ M ), and a textual content (x(m)). As a
consequence, actors in our model do not only gener-
ate text, but produce text messages. Two text mes-
sages (for example, two tweets, or two emails) may be
different messages even if they contain the same text
and have been exchanged between the same actors at
the same timestamp.
The third key component of temporal text net-
works is the time attribute t. In our model, time is
defined based on a generic set of ordered time anno-
tations T . This enables the adoption of several ways
of representing time: as an absolute date-time, as a
relative date-time, as a timestamp with an arbitrary
format or as a discrete time interval if time has been
sliced into time windows as it often happens when
temporal networks are analyzed (See Table 1).
When writing about the model's elements, we will
sometimes use a concise notation. For example,
we will sometimes write an edge and its time to-
gether, as in:
(ai, mj, tq), where tq = t(ai, mj),
and we will sometimes write a message by also in-
dicating its sender,
its recipients and its text, as
While very simple, the model introduced above can
be used to represent a range of different forms of com-
munication and data from different sources. In par-
ticular, by explicitly dividing the network nodes into
actors and messages, their relations implicitly carry
more information. For example, whether the type of
communication implemented by a message is unicast,
multicast or broadcast is indicated by the out-degree
of the message.
With unicast a message such as a handwritten let-
ter is sent from a single source to a specific target.
This form of written communication has been pre-
served to the present day through instant messaging
services such as those offered by Twitter, Facebook
Messenger or Whatsapp and, more traditionally, us-
ing the electronic email. Unicast communication al-
lows to keep some text private between two actors,
but it can have a large overhead if the same text
must be sent to multiple sources because it requires
an individual message for every recipient. In order to
reach a larger population it is sometimes preferable to
use broadcasting or multicasting. In the former,
the message is transmitted to all possible receivers1,
while when the information is addressed to a group
of people but not to all possible receivers, such as a
post on a Facebook wall, the communication is called
multicast.
Fig. 3 shows these different types of communication
represented using our model.
Figure 4 shows an example of how a multicast com-
munication through email can be modeled as part of
a temporal text network. The resulting network in-
cludes the sender of the message (User A) and two
1For simplicity we use the expression "all possible receivers"
to refer to the community in which the information is spread,
independent of whether the community is the whole Internet,
the whole world or a set of members registered to a private
site.
10
to study information flows. Figure 5 shows, for exam-
ple, the modeling process of a blog post M1 and the
associated comments from the readers {M2, M3, M4}.
In this particular case, we know the identity of each
one of the authors, because they are authenticated in
the web platform, but we do not know exactly who
are the recipients of their comments. While we can
assume by context that the blog post M1 was read
by follower B and that her message was then read
by the blog owner A, it is uncertain what the third
user (follower C) has read. We only know that the
text produced by user C is a reply to the previous
comment M3, but we cannot infer if he has or has
not read the previous messages M1 and M2. One
possible way to model such scenario is to represent
the relation between messages instead of the relation
between messages and receivers. Similarly, in the ex-
ample of Figure 6 the edges between messages are
used to represent retweets on a micro-blogging plat-
form.
As we discuss in the next sections, this type of ex-
tension would nicely fit our analysis framework where
one main class of operations transforms the data into
a multilayer representation. Similarly, we may add
edges between actors indicating other types of rela-
tions relevant for the analysis of the human infor-
mation network such as indirect recipients. Figure 6
shows the modeling process of Twitter as a tempo-
ral text network. Unlike the previous communication
channels we discussed, in Twitter the recipients of the
information are encoded in the text of the messages
rather than being explicit in the metadata (e.g., the
edge (M1, B, t1) exists because actor A mentions B in
the first message of the data set). In addition, Twit-
ter users can also see messages from other users they
are following, which in our model is represented by
the actor-to-actor relations. This difference between
intra- and inter-layer relations allows us to differen-
tiate between direct and indirect communication in
many social platforms.
In our basic model x represents a generic string of
characters over some alphabet, whose interpretation
will depend on the source of the data and the context
of the analysis. For example, while the symbol # usu-
ally denotes the start of a filtering tag in online social
networks such as Twitter or Instagram, in other me-
Figure 3: Models for different types of commu-
nication. a) unicast from A to C; b) unicast from
A to B, C and D; c) broadcast from A - which
can also be implemented as in the previous case if
x(M1) = x(M2) = x(M3) and c) multicast from A to
C and D.
other actors (User B and User C ) who where ex-
plicit recipients of the message. The fourth vertex
M1 ∈ M represents the email and x(M1) corresponds
to its text content (the subject line and the body con-
tent). In this case, the time attribute associated to
each one of the edges represents the time when the
message was delivered or received by the SMTP and
POP3 servers allowing us not only to represent the
communication flow, but also the effect of the chan-
nel and/or medium. Representing multiple emails as
in the example above would lead to a full temporal
text network.
In the next section we describe how to express
other human information networks by extending our
core model.
3.2 Model extensions
One of the design principles we used to define our
model was simplicity, to make it tractable and gen-
eral. On top of the basic model defined above, we
can also easily add extensions to fit context-specific
requirements.
With regard to the structure, we can straight-
forwardly add edges between messages to represent
either information available from the data such as
retweets on Twitter, or information deduced from the
analysis of the data such as links indicating that one
message is probably an answer to another, if we want
11
Figure 4: Model of a multicast email as a temporal text network. The entire text content of the
email (including the subject line and the body) are encoded as a single message M1. The sender of the
email (User A) and the two friends (User B, User C ) are modeled as individual actors. In this case, the
ingoing and outgoing edges of the message contain a different time, indicating the delivery and reception
timestamps registered in the email servers.
dia sites it is just an acronym for the word "number".
Therefore, for specific application contexts additional
attributes can be added for example to messages by
providing special information, such as the hashtags
included in the text in the case of Twitter (See Fig-
ure 6). In particular, we can think of having three
types of information associated to each message:
1. The text, as in our basic model,
2. Metadata that is available in the specific data
source used for the analysis, such as links to
other resources (webpages, other tweets or multi-
media content), like and retweet counts, or hash-
tags.
3. Additional
information not directly available
from the data source but obtained analyzing the
text, for example through topic analysis.
Different types of temporal information have been
used in existing works on temporal networks and
temporal text analysis (See Section 2). For exam-
ple, time can represent actions from the users such
as the time when a message is posted and/or the
time when it is read as we did in the Twitter ex-
12
Figure 5: Model of a blog post as a temporal text network. The original data set contains a blog
post M1 and three comments (M2, M3, M4); which are encoded as three individual messages. The three
participants on the discussion (User A, Follower B, Follower C ) are modeled as individual producers. In
this case, the edges of the messages indicate the relation between their content.
ample. Alternatively, times can be used to represent
a physical property of the channel, as it happens in
computer networks when there can be a transmission
delay from the source to the destination of a message
(See Figure 4). Finally, time can also be associated to
the message, indicating for example the time interval
when the message exists. Furthermore, this informa-
tion can be complete or incomplete, so that if only
the initial time of the interval exists we must assume
the message is still valid at the time of analysis as we
did when we describe the blog posts; it can be pri-
vate (accessible only to specific actors) or universally
accessible by everyone.
3.3 A comparison with the state of the
art
Our core and extended models of temporal text net-
works allow us to describe a variety of human in-
formation networks ranging from person-to-person
email communication to complex interactions in so-
cial media sites. In Section 2 we summarized other
models from the literature, that have been used in
the past to partially support similar scenarios. In this
section we provide a comparative review between our
models and the ones described in Table 1 and Fig-
ure 2, emphasizing how they can be used to describe
13
Figure 6: Model of a Twitter network as a temporal text network. The entire content of each
tweet (including hashtags, urls and retweeted content) are encoded as messages. Senders (@A, @D) and
mentioned users (@B, @C, @D) are modeled as individual actors.
In this case, both the ingoing and
outgoing edges of the message contain the same time, which indicates when the tweet has been sent. The
edge between M3 and M2 indicates the retweet relation between both tweets.
human information networks.
All models based only on time and topology (See
Figs. 2a-e) do not include information about mes-
sages, documents or text. A simple extension adding
a text attribute to the edges would still be less ex-
pressive than our model, because this simpler solu-
tion would not be able to differentiate between dif-
ferent types of communication such as unicast, mul-
ticast and broadcast. These are instead allowed in
our model exploiting the presence of nodes represent-
ing text messages, and thus justifying the adoption
of a bipartite model instead of the simple graphs
used in contact sequences.
Single time annota-
tions are also unable to distinguish between produc-
tion/consumption or sending/receiving time. In sum-
mary, contact sequence models (Fig 2a) can be ex-
pressed using our model by representing edges as
edge-message-edge triples, but contact sequences can-
not represent all the information that we can express
using our model. Time-slices (Fig 2b) and longitu-
dinal models (Fig 2c) can also be obtained start-
ing from our model, as we do not make any as-
sumption about how the time is represented on the
edges.
It is thus possible to represent both time-
14
slices and longitudinal models as temporal text net-
works by just creating a new message mj and a se-
quence of edges (vi, mj, l), (mj, vk, l) for each origi-
nal edge e = (vi, vk, l) in the layer l of the sliced
network. Finally, when only time and structure are
concerned, memory models (Figs. 2d-e) are usually
constructed from contact sequence models by aggre-
gating the edges conditional on preceding pathways.
While the original temporal information is partially
preserved during the creation of the memory model,
it is impossible to preserve more information from our
temporal text network such as messages or network
attributes. Therefore, we can think of our model as a
way to represent raw and complete information about
the temporal interactions and memory models as a
way to emphasize information provenance. However,
to represent provenance we need to allow edges be-
tween messages, and for this reason only our extended
temporal text network model is able to express all the
information present in memory models (in addition
to text, multicasting and production/consumption
times, as for all the other models not based on bi-
partite graphs).
The absence of relations makes it difficult to de-
scribe human information networks using just time
and text (Figs. 2f-g), and despite their versatility
to analyze text documents, strictly speaking none of
the models only focusing on text and topology with-
out actors (Figs. 2h-j ) allows us to represent human-
information networks as they do not contain any rep-
resentation of the consumers and producers of the
text. When also actors are represented, as in some
HIN-based models (Fig 2k ) and in socio-semantic
networks (Figs. 2l-m), our model adds directionality,
which is necessary to represent text sender/receiver
and producer/consumer relationships. Time is also
not typically used in these models, but a tempo-
ral extension of existing HIN-based and basic socio-
semantic models is straightforward and has in fact
already appeared in the literature (Fig 2m). The
application of socio-semantic networks are also lim-
ited if compared with our model, as they contain al-
ready processed information (concepts) rather than
text. With this we do not mean that our model is
superior, as it can be useful to process the text into
concepts, but this shows how we can go from our
model to a socio-semantic model but not the other
way round.
Citation networks and author-citation networks
(Figs. 2n-o) can represent relationships between mes-
sages, and thus require our extended model to ex-
press their information. However, they cannot ex-
press communication, because even the more expres-
sive author-citation network model (Fig 2o) only
focuses on the production of text.
In particular,
there are no edges between documents and authors,
but only (implicit) edges between authors end doc-
uments.
Spreading processes (Fig 2p) also share
the same limitations of either contact sequences or
author-citation networks, depending on whether mes-
sages and/or authors are represented in the specific
model,
in addition of not (typically) keeping the
text content, which is however a minor problem as
text can be easily added to the nodes representing
the shared items. Compared with our core model,
polyadic conversations (Fig 2q) can express almost
the same information: both can express unicast, mul-
ticast and broadcast relations between messages and
actors, both differentiate between information pro-
ducers and consumers and contain the raw textual
information. However, while in our model each indi-
vidual edge connecting messages and consumers can
have a different temporal attribute, in the polyadic
conversation model each polyadic interaction has one
single temporal value.
4 Analyzing temporal text net-
works
One reason to adopt a common model instead of
defining ad hoc models for each application is to
reuse existing analysis methods. While our model can
be analyzed directly, for example studying dynamical
processes such as text propagation in a similar way
as in our motivating example, we can consider other
strategies. Here we define two more approaches that
can be used to analyze temporal text networks: we
call them continuous and discrete.
The practical benefit of using these two approaches
is that instead of developing new algorithms the ana-
15
lyst can focus on defining mapping functions encod-
ing the model in a way that fits the data and analysis
at hand. Then, these functions automatically gener-
ate model views of which existing algorithms can be
computed.
4.1 Continuous analysis
The main idea behind this approach is to map the
elements of the network (e.g., actors, messages, con-
tent, etc.)
into an asymmetric metric space. This
means that it is possible to compute distances be-
tween them.
Once distances are available, one can directly reuse
existing data analysis methods for metric spaces, such
as traditional distance-based and density-based algo-
rithms (k-means, db-scan, etc.). Distances can also
be used to retrieve relevant information from large
temporal text networks, specifying an information
query as an element of the metric space and retriev-
ing those elements that are the closest. We present
an example of this last type of analysis in the next
section.
The first way of doing this is to use a network em-
bedding method [61]. While network embedding was
initially defined for simple graphs, more recent algo-
rithms can be directly applied to attributed graphs
[62]. Meanwhile, we foresee the definition of special
versions of these algorithms that are specific for tem-
poral text networks. Figure 7 shows an example of
this first type of translation, where messages are the
target of the analysis. The same approach can also
be used to study other structures and elements in the
temporal text network such as actors or combinations
of actors and messages.
The second way to use the continuous approach is
to directly define a distance function, without any
explicit embedding into a coordinate system, so that
the points form a metric space but have not an ex-
plicit position: only their relationships are defined.
This approach is represented in Figure 8.
The two approaches may look similar:
in both
cases algorithms use distances, which can be com-
puted after an embedding or are directly defined in
the distance matrix. In practice, however, there can
be relevant differences. For example, after embed-
Figure 7: Continuous approach: embedding.
(left) A temporal text network with 6 actors - cir-
cles - and 5 messages - squares; (right) the mes-
sages have been grouped into two clusters based on
their topological, temporal and textual distance. The
point marked with q represents a user's informa-
tion requirements;
in this example the left cluster
(m1, m2, m3) contains nodes that are more relevant
for the user.
Figure 8: Continuous approach:
distance-
based. (left) A temporal text network with 6 actors
- circles - and 5 messages - squares; (right) a mes-
sages' distance matrix is obtained from the network
topology and time attributes.
ding it is easier to index the data so that not all
distances must be computed when algorithms are ex-
ecuted, leading to lower computation time. On the
other hand, the direct usage of a distance function is
more natural if distances are asymmetric, e.g., when
d(M 1, M 2) (cid:54)= d(M 2, M 1). Asymmetric distances of-
ten appear in temporal and directed networks, that
are both features of our model.
16
4.2 Discrete analysis
The main idea behind this approach is to encode
temporal and textual information into network struc-
tures, in particular layers in a multilayer network, so
that methods from multilayer network analysis can be
directly applied [63, 64]. This can be done by defining
a mapping function from time and text into a discrete
set of classes that are relevant for the analysis. Then,
topic-and-time-based user centrality, topic-and-time-
based relevance, as well as community detection al-
gorithms can be used. An example of this last type
of analysis on real data follows in the next section.
Textual discretization is typically performed using
methods from Natural Language Processing such as
topic, sentiment or semantic analysis. The main ob-
jective of the procedure is to group together messages
whose contents have similar characteristics. Time
discretization is apparently simpler, because only the
cutting points between time slices must be indicated.
However, also time discretization presents many op-
tions. First, there are often many ways of defining
the cutting points, leading to different results. Sec-
ond, after the cutting points have been defined there
can still be different ways of distributing network
structures into the slices. For example, if we want
to discretize messages, we can place a message mi
in a specific interval (ta, tb) either if the incoming
edge e = (vj, mi, t) exists in the interval (ta, tb), if all
the edges from/to mi exist in the interval, if at least
one of the out-going edges e = (mi, vj, t) exist in the
interval, etc. Finally, we use the term multiple dis-
cretization when both textual and time discretization
are applied together to generate the different groups.
Under this procedure, our model would produce
a k-partite network with one partition for each new
cluster of messages and one partition for the actors.
The procedure to generate such network is straight-
forward once the discretization function is defined.
Figure 9 shows an example of textual discretization
where the resulting 3-partite network contains the
original layer of actors A, and two message layers
with 2 and 4 messages each grouping together mes-
sages about the same topic. In this particular exam-
ple, x(M4) was related to both topics, therefore the
message M4 appears in both layers. A similar net-
17
Figure 9: Textual discretization.
(left) A tem-
poral text network with 6 actors - circles - and
5 messages - squares; (right) the network has been
discretized into two clusters - the top one with 2
messages, the bottom one with 4 - based on the
topic of the messages.
work structure will emerge from time discretization.
An additional operation on multilayer networks
that can be applied to the discretized data is pro-
jection, creating edges in one layer based on the in-
formation present in another layer. In the resulting
multilayer network, a new edge e[l]
ij = (vi, vj) is cre-
ated if there is a message mk in the partition l ∈ L of
the original network with: a) an edge (vi, mk) from
actor vi to message mk and b) an edge (mk, vj) from
message mk to actor vj. Weights can also be added
to the new edges, using various methods. Figure 10
shows one possible projection from the network in
Figure 9.
In this example the content of the mes-
sages (and more in general also the time) are now
encoded into the relations between actors.
The main advantage of using a projected multi-
layer network to analyze temporal text networks is
the vast available literature that has targeted this
type of data. In Section 5.2 we use the approach de-
scribed above together with a clustering algorithm for
multilayer networks to find communities of actors dis-
cussing about the same topics during the same time
spans.
June, 2017. The dataset contains mentions (tweets
including @username), retweets (tweets starting with
RT @username), other tweets that are neither men-
tions nor retweets, and the 51,369 users involved in
the aforementioned communications. In order to im-
prove the homogeneity of the collected data we fur-
ther filtered our dataset by keeping only the tweets
using at least one of thirty-two hashtags selected by
domain experts as representative of main topics in
this domain. This operation removed for example
tweets containing the string #iot but not concerning
the Internet of Things. In the following experiments
we focus on the network obtained starting from the
tweets containing mentions (about 5% of the initial
tweets), built by coding each tweet as in Figure 6.
The resulting temporal text network contains
about one third of the users in the initial dataset
(15,717) and the 13,210 messages exchanged between
them (See Table 2). We call this the original net-
work, and use it as a the starting point for both the
following experiments.
5.2 Discrete analysis
Social
interactions within a group of participants
can form a community if they occur more frequently
within the group than with other members of the net-
work. In temporal text networks, those interactions
are the result of the exchange of messages between ac-
tors. In this example we show how our model can be
used to find communities of actors discussing about
the same topics during the same weeks. Following
the method described in Section 4.2 we first trans-
form our network to a multilayer network preserving
information about interactions between users, topics
and time, so that we can then apply an existing clus-
tering algorithm.
The discretized k-partite network is built following
the procedure explained in Section 4.2. In this par-
ticular example, we first split the original layer of
messages using their hashtags as an indication of the
topic, then we further discretize based on the week
when messages are posted. The second discretization
uses the posting time to create hashtag-week-specific
layers.
Finally, we build the multilayer network by pro-
Figure 10: Projection.
(left) A projection of the
message layers into the actor layer in the original bi-
partite network in Figure 9-left. The projected mul-
tilayer network has 6 actors, 12 nodes and 5 weighted
edges; (right) a similar projection using the 3-partite
network described in Figure 9-right which generates
a multilayer network with 6 actors, 18 nodes and 7
weighted edges.
5 A case study
In this section, we apply the model and approaches
introduced in Sections 3 and 4 to a real temporal
text network.
In particular, we focus on using the
discretization approach introduced in Section 4.2 to
analyze the formation and evolution of communities
of actors and messages.
The objective of this section is two-fold. First, we
want to give a concrete example of the abstract type
of analysis described in the previous section. Second,
we want to show in practice how a new type of anal-
ysis can be easily built as a composition of the trans-
formations introduced in the previous section and an
existing algorithm (Section 5.2).
5.1 Dataset
Our initial dataset consists of 247,399 public tweets
with the hashtag #iot (Internet of Things) or some
of its variants (e.g., #IoT, #IOT, etc.) automati-
cally collected using the Twitter streaming API in
18
Table 2: Temporal text networks used in the case study and its basic properties: number of actors (A),
number of messages (M), number of edges (E) and number of layers (L).
Networks
Type
Original
Discretized
Projected
bipartite
k-partite
multilayer
A
15,717
15,717
15,717
M
13,210
17,273
-
E
35,015
44,943
23,766
L
2
182
182
jecting each one of the layers containing messages
into the actors' layer. Two actors in this network
are connected in a given layer L = (h, w) if at least
one of them has sent a message to the other using
the hashtag h during the week w. If multiple mes-
sages have been exchanged between two actors in the
same layer, only a single edge is generated during the
projection. At this step all edges are undirected and
unweighted to fit the community detection algorithm
we used. Table 2 describes the main properties of
the original temporal text network, the projected k-
partite and the final multilayer network used during
the analysis.
Using the multilayer network and the clique per-
colation mechanism described in [9], we proceed to
detect communities of actors across the whole net-
work.
Figure 3 shows the communities with more than 3
actors formed in the multilayer network. Communi-
ties contain users and topics, and both users and top-
ics can overlap across communities. The number of
users is indicated by the size of the community, while
the layers representing the topics of interest of the
actors are annotated next to each community. The
smallest community in the diagram has 4 actors in
the same layer, while the largest community contains
27 different actors and 3 layers. The edges between
communities in different weeks indicate that at least
one third of the users in the second community were
also present in its predecessor. The thicker the line,
the more users are shared between them.
Figure 11: Evolution of communities in the IoT
space. The size of the communities is indicated by
the size of the nodes - representing the number of
actors - and the annotated hashtags. The thickness
of the edges between two communities indicates the
number of common actors between them.
We can observe that some of the hashtags, in par-
ticular artificial intelligence (#ai), augmented real-
ity (#ar) and virtual reality (#ai), are very popu-
lar in the IoT space, with several groups of inter-
est of different sizes forming around one or more of
them. However, while the three topics are present
across the whole month, the communities they form
are very volatile. Only one of the smallest community
with just 4 actors, for example, is preserved in time
without changing its members or the topics they dis-
19
cuss. The largest communities formed during the first
week, instead, disappear in week 2. Later on, some
of the same users form new communities but with
less members and a higher variance of topics. Less
frequent hashtags such as #machinelearning, #se-
curity, #sensors, #smartcity and #blockchain also
form groups of interest, usually smaller and with no
or a few connections with the groups of users dis-
cussing the most common topics.
Overall these results suggest that the IoT space
is very fragmented in this Twitter dataset. None of
the found communities was big enough to become
the main arena to develop a long-standing conver-
sation on a specific topic.
Instead, users organize
themselves in smaller groups that change over time.
Without combining topology, text and time we would
find bigger communities, that would however include
users talking about different things and at different
times.
In summary, this example shows how a new analy-
sis method can be easily constructed using our model
and the approaches described in the previous section.
In addition, also the results of this experiment high-
light the value of using all the elements of the tem-
poral text network in the analysis.
of the possibilities enabled by our model in detail, in
the experimental section we show two concrete exper-
iments using the aforementioned transformations to
analyze a set of communication messages exchanged
in the Twitter platform during June 2017.
During the past century, the research community
has demonstrated a huge interest in studying human
information networks. As a consequence, researchers
from different disciplines have devoted a considerable
time to develop new models and methods to describe
aspects of interest in this scenario. However, as we
have shown in our review, there has been none or few
successful attempts to unify the literature under a
common framework: several models and algorithms
have been proposed, but only for a subset of the
aspects we consider in this article or they have been
developed ad hoc to address a specific problem.
So, results in one area cannot be directly applied
to other types of data. We believe that our work
can play a key role in the process of consolidating
existing efforts
from different disciplines under
a common framework,
in the establishment of a
common terminology and in the development of new
analytical software able to cope with the complexity
of such data.
6 Discussion and conclusions
In this work we introduce a general model to rep-
resent temporal text networks based on the prin-
ciples of expressiveness, simplicity and tractability.
Our model is expressive and simple enough to encode
the key components of human information networks
(topology, time and text) into a single bipartite net-
work, so that we can represent a range of different
forms of communication and data sources spanning
from postal services to online social media.
We additionally show how the model can be ana-
lyzed either directly or indirectly, to perform a va-
riety of mining tasks. In particular, we define vari-
ous transformations for two approaches that we call
continuous and discrete. Using such transformations,
we can map the data into existing models, allowing to
reuse part of the machinery already developed to ana-
lyze complex data. While we do not describe each one
Acknowledgements. We would like to thank
Luca Rossi and Irina Shklovski for the selection of
the hashtags used in the experiments.
References
[1] X. Zhou, D. Hristova, A. Noulas, C. Mascolo,
Detecting socio-economic impact of cultural in-
vestment through geo-social network analysis,
in: Proc. of the Eleventh International Confer-
ence on Web and Social Media, 2017, pp. 720–
724.
[2] A. Nerghes, J. S. Lee, P. Groenewegen, I. Hell-
sten, The shifting discourse of the european
central bank: Exploring structural space in se-
mantic networks, in: 10th International Confer-
ence on Signal-Image Technology and Internet-
20
Based Systems, 2014, pp. 447–455.
1109/SITIS.2014.13.
doi:10.
[3] M. Magnani, D. Montesi, L. Rossi, Friendfeed
breaking news: death of a public figure,
in:
IEEE SocialCom, IEEE Computer Society, 2010.
[4] M. E. J. Newman, Networks: An Introduction,
Oxford University Press, 2010.
[5] R. A. Baeza-Yates, B. Ribeiro-Neto, Modern In-
formation Retrieval, Addison-Wesley Longman
Publishing Co., Inc., Boston, MA, USA, 1999.
[6] D. M. Blei, A. Y. Ng, M. I. Jordan, Latent
dirichlet allocation, Journal Machine Learning
Research 3 (2003) 993–1022.
[7] P. Holme, J. Saramki, Temporal networks,
Physics Reports 519 (3) (2012) 97 – 125, tempo-
ral Networks. doi:10.1016/j.physrep.2012.
03.001.
[8] L. Gauvin, A. Panisson, C. Cattuto, A. Barrat,
Activity clocks: spreading dynamics on tempo-
ral networks of human contact., Scientific re-
ports 3 (2013) 3099. doi:10.1038/srep03099.
[9] P. J. Mucha, T. Richardson, K. Macon, M. A.
Porter, J.-P. Onnela, Community structure in
time-dependent, multiscale, and multiplex net-
works, Science 328 (5980) (2010) 876–878. doi:
10.1126/science.1184819.
[10] T. A. B. Snijders, Models for Longitudinal Net-
work Data, Structural Analysis in the Social
Sciences, Cambridge University Press, 2005, p.
215247. doi:10.1017/CBO9780511811395.011.
[11] T. A. B. Snijders, Siena: Statistical Modeling of
Longitudinal Network Data, Springer New York,
New York, NY, 2014, pp. 1718–1725. doi:10.
1007/978-1-4614-6170-8_312.
[12] I. Scholtes, N. Wider, R. Pfitzner, A. Garas,
C. J. Tessone, F. Schweitzer, Causality-driven
slow-down and speed-up of diffusion in non-
markovian temporal networks, Nature commu-
nications 5 (1) (2014) 5024–5033. doi:10.1038/
ncomms6024.
[13] M. Rosvall, A. V. Esquivel, A. Lancichinetti,
J. D. West, R. Lambiotte, Memory in net-
work flows and its effects on spreading dynam-
ics and community detection, Nature communi-
cations 5 (1) (2014) 4630–4643. doi:10.1038/
ncomms5630.
[14] R. Lambiotte, V. Salnikov, M. Rosvall, Effect of
memory on the dynamics of random walks on
networks, Journal of Complex Networks 3 (2)
(2015) 177–188. doi:10.1093/comnet/cnu017.
[15] T. P. Peixoto, M. Rosvall, Modelling se-
quences and temporal networks with dy-
namic community structures, Nature commu-
nications 8 (1) (2017) 582–594. doi:10.1038/
s41467-017-00148-9.
[16] I. Scholtes, When is a network a network?:
Multi-order graphical model selection in path-
ways and temporal networks, in: Proceedings of
the 23rd ACM SIGKDD International Confer-
ence on Knowledge Discovery and Data Mining,
Vol. 1 of KDD 2017, ACM, 2011, pp. 1037–1046.
doi:10.1145/3097983.3098145.
[17] M. Brucato, D. Montesi, Metric spaces for tem-
poral information retrieval, in: European Con-
ference on Information Retrieval, Vol. 8416 of
LNCS, Springer Berlin Heidelberg, 2014, pp.
385–397.
doi:10.1007/978-3-319-06028-6_
32.
[18] B. O'Connor, R. Balasubramanyan, B. R. Rout-
ledge, N. A. Smith, From tweets to polls: Link-
ing text sentiment to public opinion time series.,
in: W. W. Cohen, S. Gosling (Eds.), Proc. of the
Eleventh International Conference on Web and
Social Media, The AAAI Press.
[19] P. S. Dodds, C. M. Danforth, Measuring
the happiness of large-scale written expression:
Songs, blogs, and presidents, Journal of Hap-
piness Studies 11 (2) (2010) 441–456.
doi:
10.1007/s10902-009-9150-9.
[20] R. V. Sole, B. C. Murtra, S. Valverde, L. Steels,
Language networks: Their structure, function,
and evolution, Complexity 15 (6) (2010) 20–26.
21
[21] J. Chang, D. M. Blei, Relational topic mod-
els for document networks., in: D. A. V. Dyk,
M. Welling (Eds.), AISTATS, Vol. 5 of JMLR
Proceedings, JMLR.org, 2009, pp. 81–88.
[22] F. Menczer, Evolution of document networks,
Proceedings of the National Academy of Sci-
ences 101 (suppl 1) (2004) 5261–5265.
doi:
10.1073/pnas.0307554100.
[23] X. Ren, Y. Lv, K. Wang, J. Han, Compara-
tive document analysis for large text corpora,
in: Proc. of the Tenth ACM International Con-
ference on Web Search and Data Mining, WSDM
'17, ACM, New York, NY, USA, 2017, pp. 325–
334. doi:10.1145/3018661.3018690.
[24] J. Chang, J. Boyd-Graber, D. M. Blei, Connec-
tions between the lines: Augmenting social net-
works with text,
in: Proc. of the 15th ACM
SIGKDD International Conference on Knowl-
edge Discovery and Data Mining, KDD '09,
ACM, New York, NY, USA, 2009, pp. 169–178.
doi:10.1145/1557019.1557044.
[25] C. Wang, Y. Song, H. Li, Y. Sun, M. Zhang,
J. Han, Distant meta-path similarities for text-
based heterogeneous information networks, in:
Proc. of the 2017 ACM on Conference on In-
formation and Knowledge Management, CIKM
'17, ACM, New York, NY, USA, 2017, pp. 1629–
1638. doi:10.1145/3132847.3133029.
[26] J. Kralj, A. Valmarska, M. Grcar, M. Robnik-
Sikonja, N. Lavrac, Analysis of Text-Enriched
Heterogeneous Information Networks, Springer
International Publishing, Cham, 2016, pp. 115–
139. doi:10.1007/978-3-319-26989-4_5.
[27] C. Roth, Knowledge Communities and Socio-
Cognitive Taxonomies, Springer International
Publishing, Cham, 2017, pp. 1–18.
doi:10.
1007/978-3-319-64167-6_1.
[28] I. Hellsten, L. Leydesdorff, Automated analy-
sis of topic-actor networks on twitter: New ap-
proach to the analysis of socio-semantic net-
works, CoRR abs/1711.08387.
arXiv:1711.
08387.
[29] C. Roth, J.-P. Cointet, Social and semantic co-
evolution in knowledge networks, Social Net-
works 32 (1) (2010) 16 – 29, dynamics of So-
cial Networks. doi:10.1016/j.socnet.2009.
04.005.
[30] I. for Scientific Information, E. Garfield, I. Sher,
R. Torpie, The Use of Citation Data in Writing
the History of Science, Institute for Scientific In-
formation, 1964.
[31] V. Batagelj, Efficient algorithms for citation net-
work analysis, CoRR cs.DL/0309023.
[32] H. D. White, B. C. Griffith, Author cocita-
tion: A literature measure of intellectual struc-
ture, Journal of the American Society for In-
formation Science 32 (3) (1981) 163–171. doi:
10.1002/asi.4630320302.
[33] J. Leskovec, A. Krause,
C. Guestrin,
C. Faloutsos,
J. VanBriesen, N. Glance,
Cost-effective
outbreak
net-
works, International conference on Knowledge
Discovery and Data Mining (KDD)
(2007)
420doi:10.1145/1281192.1281239.
detection
in
[34] M. Magnani, D. Montesi, L. Rossi, Conver-
sation retrieval
Inf.
Retr. 15 (3-4) (2012) 354–372. doi:10.1007/
s10791-012-9189-9.
for microblogging sites,
[35] R. Lambiotte, L. Tabourier, J.-C. Delvenne,
Burstiness and spreading on temporal networks,
The European Physical Journal B 86 (7) (2013)
320. doi:10.1140/epjb/e2013-40456-9.
[36] A. Paranjape, A. R. Benson, J. Leskovec, Mo-
tifs in temporal networks, in: Proc. of the 10th
ACM International Conference on Web Search
and Data Mining, WSDM '17, ACM, New York,
NY, USA, 2017, pp. 601–610. doi:10.1145/
3018661.3018731.
[37] T. Viard, M. Latapy, C. Magnien, Comput-
ing maximal cliques in link streams, Theoreti-
cal Computer Science 609 (1) (2016) 245–252.
doi:10.1016/j.tcs.2015.09.030.
22
[38] J. Cheng, L. A. Adamic, J. M. Kleinberg,
J. Leskovec, Do cascades recur?, in: Proc. of
the 25th international conference on world wide
web, International WWW Conferences Steering
Committee, 2016, pp. 671–681.
[39] J. Kim, J. Diesner, Over-time measurement of
triadic closure in coauthorship networks, Social
Network Analysis and Mining 7 (1) (2017) 9.
doi:10.1007/s13278-017-0428-3.
[40] V. Batagelj, S. Praprotnik, An algebraic ap-
proach to temporal network analysis based on
temporal quantities, Social Network Analysis
and Mining 6 (1) (2016) 1–28. doi:10.1007/
s13278-016-0330-4.
[41] A.-L. Barabasi, R. Albert, Emergence of scal-
ing in random networks, Science 286 (5439)
(1999) 509–512.
doi:10.1126/science.286.
5439.509.
[42] H. H. K. Lentz, T. Selhorst, I. M. Sokolov,
Unfolding accessibility provides a macroscopic
approach to temporal networks, Phys. Rev.
110 (11) (2013) 118701–118706. doi:10.1103/
PhysRevLett.110.118701.
[43] O. Alonso, M. Gertz, R. Baeza-Yates, On the
value of temporal
information in information
retrieval, SIGIR Forum 41 (2) (2007) 35–41.
doi:10.1145/1328964.1328968.
[44] N. Kanhabua, R. Blanco, K. Nørvag, Temporal
information retrieval, Found. Trends Inf. Retr.
9 (2) (2015) 91–208. doi:10.1561/1500000043.
[45] V. Lavrenko, M. Schmill, D. Lawrie, P. Ogilvie,
D. Jensen, J. Allan, Mining of concurrent text
and time series, in: SIGKDD workshop on text
mining, 2000, pp. 37–44.
[46] E. Kotsakis, Structured information retrieval in
xml documents,
in: Proc. of the 2002 ACM
Symposium on Applied Computing, SAC '02,
ACM, New York, NY, USA, 2002, pp. 663–667.
doi:10.1145/508791.508919.
[47] C. Bothorel, J. D. Cruz, M. Magnani, B. Mi-
cenkova, Clustering attributed graphs: models,
measures and methods, Network Science 3 (3)
(2015) 408–444.
[48] J. Diesner, K. M. Carley, Revealing social struc-
ture from texts: Meta-matrix text analysis as
a novel method for network text analysis, in:
Causal Mapping for Research in Information
Technology, 2004, pp. 81–108.
[49] C. Shi, Y. Li, J. Zhang, Y. Sun, S. Y. Philip,
A survey of heterogeneous information network
analysis, IEEE Transactions on Knowledge and
Data Engineering 29 (1) (2017) 17–37.
[50] X. Ren, A. El-Kishky, C. Wang, J. Han, Au-
tomatic entity recognition and typing in mas-
sive text corpora,
in: Proc. of the 25th In-
ternational Conference Companion on World
Wide Web, WWW '16 Companion, Interna-
tional WWW Conferences Steering Committee,
Geneva, Switzerland, 2016, pp. 1025–1028. doi:
10.1145/2872518.2891065.
[51] J. F. Sowa, Principles of semantic networks: Ex-
plorations in the representation of knowledge,
Morgan Kaufmann, 2014.
[52] M. Rosen-Zvi, T. Griffiths, M. Steyvers,
P. Smyth, The author-topic model for authors
and documents, in: Proc. of the 20th Conference
on Uncertainty in Artificial Intelligence, UAI
'04, AUAI Press, Arlington, Virginia, United
States, 2004, pp. 487–494.
[53] L. Tamine, L. Soulier, L. Ben Jabeur, F. Am-
blard, C. Hanachi, G. Hubert, C. Roth, So-
cial media-based collaborative information ac-
cess: Analysis of online crisis-related twitter con-
versations, in: Proc. of the 27th ACM Confer-
ence on Hypertext and Social Media, HT '16,
ACM, New York, NY, USA, 2016, pp. 159–168.
doi:10.1145/2914586.2914589.
[54] M. Gomez Rodriguez, J. Leskovec, A. Krause,
Inferring networks of diffusion and influence,
23
Search and Data Mining, WSDM '17, ACM,
New York, NY, USA, 2017, pp. 731–739. doi:
10.1145/3018661.3018667.
[63] M. Kivela, A. Arenas, M. Barthelemy, J. P.
Gleeson, Y. Moreno, M. A. Porter, Multilayer
Networks, Journal of Complex Networks 2 (3)
(2014) 203–271. doi:10.1093/comnet/cnu016.
[64] M. E. Dickison, M. Magnani, L. Rossi, Mul-
tilayer Social Networks, Cambridge University
Press, 2016.
in: Proceedings of the 16th ACM SIGKDD In-
ternational Conference on Knowledge Discov-
ery and Data Mining, KDD '10, ACM, New
York, NY, USA, 2010, pp. 1019–1028.
doi:
10.1145/1835804.1835933.
[55] M. Salehi, R. Sharma, M. Marzolla, M. Mag-
nani, P. Siyari, D. Montesi, Spreading processes
in multilayer networks, IEEE Transactions on
Network Science and Engineering 2 (2) (2015)
65–83. doi:10.1109/TNSE.2015.2425961.
[56] S. S´cepanovi´c,
I. Mishkovski, B. Gon¸calves,
T. H. Nguyen, P. Hui, Semantic homophily in
online communication: Evidence from twitter,
Online Social Networks and Media 2 (2017) 1–
18. doi:10.1016/j.osnem.2017.06.001.
[57] T. Gross, B. Blasius, Adaptive coevolutionary
networks: a review, Journal of The Royal Soci-
ety Interface 5 (2008) 259–271.
[58] M. Magnani, L. Rossi, Formation of multiple
networks, in:
International Conference on So-
cial Computing, Behavioral-Cultural Modeling,
and Prediction, Vol. 7812 of LNCS, Springer
Berlin Heidelberg, 2013, pp. 257–264.
doi:
10.1007/978-3-642-37210-0.
[59] D. Kimura, Y. Hayakawa, J.-C. Delvenne, Co-
evolutionary networks with homophily and het-
erophily, Phys. Rev. E 78 (1) (2008) 161–168.
doi:10.1103/PhysRevE.78.016103.
[60] J. Lee, M. Zaheer, S. Gnnemann, A. Smola, Pref-
erential Attachment in Graphs with Affinities,
in: G. Lebanon, S. V. N. Vishwanathan (Eds.),
Proc. of the Eighteenth International Conference
on Artificial Intelligence and Statistics, Vol. 38 of
Proc. of Machine Learning Research, San Diego,
California, USA, 2015, pp. 571–580.
[61] P. Goyal, E. Ferrara, Graph embedding tech-
niques, applications, and performance: A sur-
vey, CoRR abs/1705.02801. arXiv:1705.02801.
[62] X. Huang, J. Li, X. Hu, Label
informed at-
tributed network embedding, in: Proc. of the
10th ACM International Conference on Web
24
|
1809.00289 | 1 | 1809 | 2018-09-02T04:23:43 | Opinion Conflicts: An Effective Route to Detect Incivility in Twitter | [
"cs.SI"
] | In Twitter, there is a rising trend in abusive behavior which often leads to incivility. This trend is affecting users mentally and as a result they tend to leave Twitter and other such social networking sites thus depleting the active user base. In this paper, we study factors associated with incivility. We observe that the act of incivility is highly correlated with the opinion differences between the account holder (i.e., the user writing the incivil tweet) and the target (i.e., the user for whom the incivil tweet is meant for or targeted), toward a named entity. We introduce a character level CNN model and incorporate the entity-specific sentiment information for efficient incivility detection which significantly outperforms multiple baseline methods achieving an impressive accuracy of 93.3% (4.9% improvement over the best baseline). In a post-hoc analysis, we also study the behavioral aspects of the targets and account holders and try to understand the reasons behind the incivility incidents. Interestingly, we observe that there are strong signals of repetitions in incivil behavior. In particular, we find that there are a significant fraction of account holders who act as repeat offenders - attacking the targets even more than 10 times. Similarly, there are also targets who get targeted multiple times. In general, the targets are found to have higher reputation scores than the account holders. | cs.SI | cs |
Opinion Conflicts: An Effective Route to Detect Incivility in
Twitter
SUMAN KALYAN MAITY, Northwestern University, USA
AISHIK CHAKRABORTY, McGill University, Canada
PAWAN GOYAL, Indian Institute of Technology Kharagpur, India
ANIMESH MUKHERJEE, Indian Institute of Technology Kharagpur, India
In Twitter, there is a rising trend in abusive behavior which often leads to incivility1. This trend is affecting
users mentally and as a result they tend to leave Twitter and other such social networking sites thus depleting
the active user base. In this paper, we study factors associated with incivility. We observe that the act of
incivility is highly correlated with the opinion differences between the account holder (i.e., the user writing the
incivil tweet) and the target (i.e., the user for whom the incivil tweet is meant for or targeted), toward a named
entity. We introduce a character level CNN model and incorporate the entity-specific sentiment information
for efficient incivility detection which significantly outperforms multiple baseline methods achieving an
impressive accuracy of 93.3% (4.9% improvement over the best baseline). In a post-hoc analysis, we also
study the behavioral aspects of the targets and account holders and try to understand the reasons behind the
incivility incidents. Interestingly, we observe that there are strong signals of repetitions in incivil behavior.
In particular, we find that there are a significant fraction of account holders who act as repeat offenders -
attacking the targets even more than 10 times. Similarly, there are also targets who get targeted multiple times.
In general, the targets are found to have higher reputation scores than the account holders.
CCS Concepts: • Human-centered computing → Social media; Social content sharing; Empirical studies
in collaborative and social computing;
Additional Key Words and Phrases: Incivility, cyberbullying, opinion conflicts, Twitter
ACM Reference Format:
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee. 2018. Opinion Conflicts:
An Effective Route to Detect Incivility in Twitter. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 117
(January 2018), 27 pages. https://doi.org/10.1145/3274386
1 INTRODUCTION
Twitter is one of the most popular online micro-blogging and social networking platforms. However,
of late, this social networking site has turned into a destination where people massively abuse and
act in an incivil manner. This trend is affecting the users mentally and as a result they tend to leave
1https://phys.org/news/2016-11-twitter-tool-curb-online-abuse.html
This research has been performed when SKM and AC were at IIT Kharagpur, India.
Authors' addresses: Suman Kalyan Maity, Northwestern University, Kellogg School of Management and Northwestern
Institute on Complex Systems, Evanston, IL, 60208, USA, [email protected]; Aishik Chakraborty,
McGill University, School of Computer Science, Montreal, Canada, [email protected]; Pawan Goyal, Indian
Institute of Technology Kharagpur, Department of Computer Science and Engineering, Kharagpur, 721302, India, pawang@
cse.iitkgp.ernet.in; Animesh Mukherjee, Indian Institute of Technology Kharagpur, Department of Computer Science and
Engineering, Kharagpur, 721302, India, [email protected].
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and
the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored.
Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
prior specific permission and/or a fee. Request permissions from [email protected].
© 2018 Association for Computing Machinery.
2573-0142/2018/1-ART117 $15.00
https://doi.org/10.1145/3274386
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117
117:2
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
Twitter and other such social networking sites. In an article in Harvard Business Review 2016[44],
the author claims that abuse and bullying are the primary reasons why this micro-blogging site is
losing its active user base. For instance, in August 2014, the Gamergate controversy2 [19, 20, 43, 68]
broke out in Twitter and other social media platforms. The Gamergate controversy originated from
alleged improprieties in video game journalism and quickly grew into a larger campaign (conducted
primarily through the use of the hashtag #GamerGate) centered around sexism and social justice.
Gamergate supporters took to massive incivil behavior e.g., sexual harassment, doxing, threats of
rape and murder.
1.1 What is incivility?
In general, incivility involves sending harassing or threatening messages (via text message or
e-mail), posting derogatory comments about someone on a website or a social networking site
(such as Facebook, Twitter etc.), or physically threatening or intimidating someone in a variety
of online settings [15, 28, 42, 65, 66, 78]. In contrast, cyberbullying is defined in the literature as
intentional incivil behavior that is repeatedly carried out in an online context against a person who
cannot easily defend himself or herself [63, 80, 105]. The important differences between incivility
and cyberbullying are that for the latter there is i) a continuous repetition of the act and ii) the
existence of imbalance of power between the target and the perpetrator.
1.2 Impact of incivility/bullying
Since online content spread fast and have a wider audience, the persistence and durability can make
the target as well as bystanders read the account holder's words over and over again resulting in
strongly adverse effects [16]. It can, thereby, potentially cause devastating psychological setbacks
like depression, low self-esteem, suicide ideation, and may even ultimately lead to actual suicides
among the targets [71] [50, 73]. Teenagers are mostly affected by this; in fact, more than half of the
American teens have been the targets of incivility/bullying3. Not only kids, adults too are subjected
to incivility/bullying4, 5. Owing to the increasing prevalence of social media, celebrity bullying
also takes place frequently which is supported by various articles [9, 27, 30]. Facebook, Twitter,
YouTube, Ask.fm, and Instagram have been listed as the top five networks having the highest
percentage of users who report incidents of incivility6.
The rapid spread of this activity over the social media calls for immediate active research to
understand how incivility occurs on OSNs today [40]. This investigation can help in developing
effective techniques1 to accurately detect and contain cases of incivility.
1.3 Working definition of incivility used in this paper
In this paper, we are specifically interested to study in depth the incivil behavior of Twitter users.
Note that we do not consider cyberbullying in this study since it is very different in characteristics
from incivility and calls for a completely separate line of investigation.
In the following we present a working definition of incivility that is largely accepted in the
community and shall be used all through in the rest of the paper.
Working definition: We adopt the definition of incivility as an act of sending or posting mean
text messages intended to mentally hurt, embarrass or humiliate another person using computers,
2https://en.wikipedia.org/wiki/Gamergate_controversy
3https://cyberbullying.org/
4https://cyberbullying.org/bullying-is-not-just-a-kid-problem
5https://cyberbullying.org/Preventing-cyberbullying-top-ten-tips-for-adults.pdf
6https://www.ditchthelabel.org/research-papers/
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:3
cell phones, and other electronic devices [28, 31, 32, 42, 94]. In the dataset section we precisely
operationalize this definition for the experiments that follow.
1.4 Research objectives and contributions
In this paper, we analyze a large Twitter dataset for incivility detection followed by a detailed
post-hoc analysis of the detected tweets. Toward this objective, we make the following contributions.
• We study the behavioral aspects of the targets and account holders and try to understand the
reason for the incivility incidents. Our central observation is that incivility in Twitter is strongly
correlated to opinion conflicts between the account holder and the target. Further analysis of
target and account holder profiles across the linguistic and the cognitive dimensions reveals
that account holders generally tend to use more swear words, negations; express more emotions
and tweet more related to body and sexual categories.
• Once we have established the association of opinion differences between account holder and
target toward named entities in incivility incidents, we propose a deep learning framework
based on bi-directional LSTMs and character-CNNs and incorporate the entity-specific
sentiment and followership information. Our model achieves an accuracy of 93.3% with an
F1-score of 0.82 which significantly outperforms (4.9%, 6.5% improvements w.r.t accuracy,
F1-score respectively) the best performing baseline.
• We then conduct a post-hoc analysis of the incivility tweets on the entire dataset and study
repetitions in incivility. We find that there exists a significant fraction of account holders who
act as repeat offenders. In line of previous works [35, 36, 81], our results also confirm prior
findings of targets being attacked multiple times and targets having usually more followers.
The existence of this imbalance of power in terms of the social prestige and reputation
between the target and the account holder is quite interesting because of its role reversal
unlike cyberbullying incidents where the power lies mostly with the account holder.
1.5 Outline of the paper
We have various subsegments in this paper that we build up layer by layer to finally obtain the
detection model. The entire pipeline is illustrated in Figure 1. As a first step tweets are labeled as
incivil and then the timelines of the account holder and the target are crawled. This is followed by
the construction of the incivility context (to be defined later). From the context, target sentiments
are extracted using standard Target Dependent Sentiment Analysis (TDSA) technique. Opinions of
the account holders and the targets are compared to finally ascertain opinion conflicts. This feature
is then pipelined into to a deep neural framework to automatically classify a tweet as incivil.
2 RELATED WORK
There have been several works in the area of incivility - online harassment, cyberbullying, trolling
etc., by researchers from various communities encompassing sociologists, psychologists and com-
puter scientists. The overall literature in this area can be classified into two major categories based
on the approaches taken to address the issues in incivility -- i) survey/interview based approaches
(non-computational) ii) computational approaches.
2.1 Survey/interview based approaches
Some of the very early works in the area of cyberbullying came from developmental psychology and
sociology using survey/interview based approaches. Most of these studies deal with cyberbullying
among school students and youth.
Prevalence of bullying: The prevalence of cyberbullying incidents in these studies varies from
∼ 6% to 72%. Finkelhor et al. [39] report that ∼ 6% of youth have been harassed online whereas
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:4
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
Fig. 1. Schematic of the steps for incivility detection. The yellow colored blocks represent inputs, the red
colored blocks represent the classifiers and the blue colored blocks represent the intermediate steps.
Juvonen and Gross [59] report this number to be 72%. Most of the other studies estimate that
6 − 30% of teens have experienced cyberbullying [47]. Similarly, the number of youth who admit
to cyberbullying is relatively lesser (3-44%) [47]. These variability in the numbers is largely due
to the following facts -- cyberbullying has been defined in various different ways [73, 99, 105]
and also sometimes the perception of bullying differs across age (youth understand it differently
compared to adults [11, 67]); the authors in these studies adopted various different sampling and
methodological strategies [97]. Despite differences in rate of cyberbully incidents, the prominence
of the factor among adolescents is well-grounded.
Sociodemographics: Cyberbullying though similar to traditional (offline) bullying embarks char-
acteristic differences in sociodemographics [90]. In contrast to school bullying (offline) where boys
are found to be more likely targets [17, 76], in cyberbullying there is no consensus on the role
of gender in bullying [97]. Some studies have found that girls are more likely to be targets of
cyberbullying [62, 100] yet other studies have found no gender differences [49, 102, 106]. Age is
another characteristic in which cyberbullying patterns differ from traditional bullying. Although
there is a decreasing trend of traditional bullying from middle to high school [76], some studies
suggest that cyberbullying incidents increase during the middle school years [62, 102] and others
have found no consistent relationship between cyberbullying and age [59, 95].
Effect of cyberbullying: There have been studies on the effect of cyberbullying incidents on the
adolescents. Researchers have found that cyberbullying incidents are associated with experience of
sadness, anger, frustration, depression, embarrassment or fear [48, 74, 79, 107] and these emotions
have been correlated with delinquency and interpersonal violence among youth and young adults [2,
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:5
12, 69, 70]. Apart from these, cyberbullying has been associated with various other behavioral and
psychological outcomes like suicide, school drop-out, aggression and fighting, drug usage and
carrying weapons to schools [37, 48 -- 51, 91, 106, 107]. In a recent study by Singh et al. [94], the
authors have observed the influence of newer mobile app features like perceived ephemerality,
location-based communication and image-based messaging etc. on cyberbullying in high school
and its effect on school students.
Critical observations from the above: Interpretation of cyberbullying seems to be conditioned
on age (youths and adults interpret them differently). The role of gender in cyberbullying is
unclear. There could be a multitude of effects of cyberbullying ranging from depression, sadness,
embarrassment to more severe incidents like fighting, drug use and carrying weapons.
2.2 Computational approaches
There have been several works in computer science domain mainly focusing on automatic detection
of cyberbullying in social media largely based on text analytic approaches applied to online
comments [22, 31, 61, 85, 89, 104, 108].
Content based approaches:
Language usage: There are several works that focus on usage of language - specific high frequent
terms associated with bullying incidents. Reynolds et al. [85] use curse and insult words with
their level of offensive intensity as primary indicators for detection of cyberbully incidents. Chen
et al. [22] propose a user-level offensiveness detection method by introducing Lexical Syntactic
Feature (LSF) architecture to detect offensive content and potential offensive users. They observe
the contribution of pejoratives/profanities and obscenities in determining offensive content, and
propose hand-crafted syntactic rules to detect name-calling harassments. They incorporate user's
writing style, structure and specific cyberbullying content as features to predict the user's potential
to post offensive content. Kontostathis et al. [61] also focus on language used in cyberbullying
incidents. They perform analysis of the words used in connection to cyberbullying incidents on
Formspring.me and further use those words and their context words to build a cyberbullying
detection framework.
Gender role: Chisholm in a social study [25] show that there exist differences between males
and females in the way they bully each other. Females tend to use relational styles of aggression,
such as excluding someone from a group and ganging up against them, whereas males use more
threatening expressions and profane words. Following this study, Dadvar et al. [29] leverage gender-
specific language usage for cyberbully detection on MySpace profiles and show that such gender
information improves the accuracy of the classifier.
Sentiment usage: Hee et al. [98] use sentiment lexicon and content of the text as bag-of-words
(unigram/bigrams of words and character trigrams) for detection of cyberbully posts on a corpora
of ∼ 91, 000 Dutch posts from Ask.fm. Nahar et al. [75] use sentiment features generated from
Probabilistic Latent Semantic Analysis (PLSA) on cyberbully texts and bag-of-word features to
detect cyberbullying incidents. Further, they detect and rank the most influential persons (bullies
and targets).
Mitigation of cyberbullying incidents: Dinakar et al. [31] address the problem of detection of
cyberbullying incidents and propose an intervention technique by notifying participants and net-
work moderators and offering targeted educational material. In this work, they present an approach
for bullying detection based on natural language processing and a common sense knowledge base
that allows recognition over a broad spectrum of topics in everyday life. They construct BullySpace,
a common sense knowledge base that encodes particular knowledge about bullying from various
associated subject matters (e.g., appearance, intelligence, racial and ethnic slurs, social acceptance,
and rejection) and then perform a joint reasoning with common sense knowledge. To mitigate the
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:6
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
problem of cyberbullying, they propose a set of intervention techniques. They propose an "air traffic
control"-like dashboard, that alerts moderators to large-scale outbreaks of bullying incidents that
appear to be escalating or spreading and help them prioritize the current deluge of user complaints.
For potential victims, they provide educational material that informs them about coping with the
situation, and connects them with emotional support from others.
Leveraging contextual information:
Apart from the content of the text, the contextual information is also important and relevant
for cyberbully detection since the lexicon based filtering approach is prone to problems around
word variations and lack of context. Yin et al. [108] use a supervised learning methodology for
cyberbully detection using content and sentiment features, as well as contextual (documents in the
vicinity) features of the considered documents on Slashdot and MySpace dataset. Similarly, Zhong
et al. [110] study cyberbullying of images on Instagram using text as well as image contextual
features. Hosseinmardi et al. [55] examine the users who are common to both Instagram and
Ask.fm and analyze the negativity and positivity of word usage in posts by common users of
these two social networks. Hosseinmardi et al. in two related works [56, 57] study detection and
prediction of cyberbullying. In [57], the authors detect cyberbullying in Instagram by classifying
images to different categories and further including text features from comments. In [56], the
authors try to predict cyberbullying instances using the initial posting of the media object, any
image features derived from the object, and any properties extant at the time of posting, such as
graph features of the profile owner. In a recent paper [19], Chatzakou et al. employ a more robust
approach considering text, user and users' follower-followee network-based attributes for detecting
aggression and bullying behavior on Twitter. In this paper, the prime objective of the authors is to
distinguish cases of cyberbullying from aggression and spamming. In a related vein, Chatzakou et
al. [18, 20] study cyberbullying and aggression behavior in GamerGate controversy (a coordinated
campaign of harassment in the online world) on Twitter.
Kwak et al. [64] have analyzed a large-scale dataset of over 10 million player reports on 1.46
million toxic players from one of the most popular online game in the world, the League of Legends.
They observe reporting behavior and find that players are not engaged in actively reporting toxic
behavior and this engagement can be significantly improved via explicit pleas from other players
to report. There are significantly varying perceptions of what constitutes toxic behavior between
those that experienced it and neutral third parties. There are biases with respect to reporting allies
vs. enemies. There are also significant cultural differences in perceptions concerning toxic behavior.
Chen et al. [21] in a recent study, present a dataset of user comments, using crowdsourcing for
labeling. Due to ambiguity and subjectivity in abusive content from the perspective of individual
reader, they propose an aggregated mechanism for assessing different opinions from different
labelers. In addition, instead of the typical binary categories of abusive or not, they introduce an
additional third category of 'undecidedness' to capture the instances that are neither blatantly
abusive nor clearly harmless. They evaluate against the performance of various feature groups,
e.g., syntactic, semantic and context-based features which yield better classification accuracy.
Samghabadi et al. [88] perform similar study of nastiness (invective in online posts) detection in
social media. They present evolving approaches for creating a linguistic resource to investigate
nastiness in social media. The starting point is selecting profanity-laden posts as a likely hostile
source for invective potentially leading to cyberbullying events. They use various types of classic
and new features, and try to combine them for distinguishing extremely negative/nasty text from
the rest of them. In a recent study, Hosseini et al. [53] analyze the recent advancement of Google's
Perspective API for detecting toxic comments and show that the system can be fooled by slight
perturbation of abusive phrases to receive very low toxicity scores, while preserving the intended
meaning.
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:7
Pavlopoulos et al. [81] have recently introduced deep neural models to moderate abusive (hate
speech, cyberbullying etc.) user content.
Critical observations from the above: Both content and context have been extensively used
to design hand-crafted features for detection of cyberbullying. There have also been one or two
attempts to use deep learning techniques to abusive content moderation in general. However,
there are hardly any approach that marry deep neural models with features that could be critically
responsible for the invocation of incivil posts.
Hate Speech: Hate speech detection has been studied by various researchers. These works use
several lexical properties such as n-gram features [77], character n-gram features [72], word and
paragraph embeddings [33, 77] to detect hate speech. Apart from detection, there exist research
works that look into various aspects of hate targets and the instigators. Silva et al. [93] study the
targets of online hate speech by searching for sentence structures similar to "I <intensity> hate
<targeted group>". They find that the top targeted groups are primarily bullied for their ethnicity,
behavior, physical characteristics, sexual orientation, class, or gender. ElSherief et al. [36] present
the comparative study of hate speech instigators and target users on Twitter. They study the
characteristics of hate instigators and targets in terms of their profile self-presentation, activities,
and online visibility and observe that hate instigators target more popular (celebrities with a higher
number of followers) Twitter users. Their personality analysis of hate instigators and targets show
that both groups have eccentric personality facets that differ from the general Twitter population.
In another concurrent paper, ElSherief et al. [35] focus on the hate targets - either directed toward
an individual or toward a group of people. They perform the linguistic and psycholinguistic analysis
of these two forms of hate speech and show that directed hate speech, being more personal and
directed, is more informal, angrier, and often explicitly attacks the target (name calling) with fewer
analytic words and more words suggesting authority and influence. Generalized hate speech, on
the other hand, is dominated by religious hate, is characterized by the mentions of lethal words
such as murder, exterminate, and kill; and quantity words such as million and many. In our study,
as well, we observe similar findings regarding the accounts and targets.
Trolling: Trolling has been defined in the literature as behavior that falls outside acceptable bounds
defined by those communities [7, 45]. There have been divided opinions on trolling behavior. Prior
research works suggest that trolls are born and not made: those engaging in trolling behavior have
unique personality traits [14] and motivations [3, 46, 92]. However, there is other school of thought
suggesting that people can be influenced by their environment to act aggressively [26, 58]. Cheng
et al. [23] in a recent study, focus on the causes of trolling behavior in discussion communities. By
understanding the reason behind trolling and its spreads in communities, one can design more
robust social systems that can guard against such undesirable behavior.
2.3 The present work
Our work is different from the previous works in several ways. We focus on understanding the
incivility incidents on general population in Twitter (unlike most of the previous studies which are
based on children or teens and dated online platforms like FormSpring, MySpace etc.). While most
of the survey/interview based techniques concentrate on analyzing the effects and consequences
of these incidents after the incident has happened, we attempt to (i) early detect the incidents of
incivility in the first place and then (ii) analyze the behavioral aspects of the account holder and the
targets so detected. Though there have been several lexicon-based studies, they have rarely reused
any labeled data from previous researchers due to incompatibility issues of applying on different
platforms. Our study, though on Twitter, can be used in other social media platforms because of
presence of a single user in multiple platforms and essentially similar language usage trend.
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:8
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
In particular, we observe that opinion conflict (target and account holder showing opposite
sentiments towards same named entities) is associated with incivility and we believe that this
aspect has not been earlier reported in the literature, not even in any of the earlier computational
studies. We then propose a deep learning based model that can automatically detect incivility text
more efficiently by correctly exploiting the aforementioned connection between incivility incidents
and target dependent expression of sentiments. This fusion of a deep neural model with a critical
feature that stems from opinion conflict is a prime novelty of our work.
3 DATASET PREPARATION
Recall that our working definition of incivility refers to the act of sending or posting mean text
messages intended to mentally hurt or embarrass a target. In this section we describe how we
operationalize this definition through the assemblage of appropriate data.
3.1 Operationalizing the definition of incivility
Although incivility is rising in Twitter1, from automated crawls, it is difficult to obtain data contain-
ing direct incivility instances. However, our working definition presents us with one important clue
that incivility tweets should generally contain offensive/mean words. We use a list of such offensive
words compiled by Luis von Ahn of Carnegie Mellon University7. This list is very comprehensive
and larger than any list containing offensive words known to us or used previously by other authors.
This list has been used by various authors [1, 4, 13, 21, 41, 83] in the past and this rich literature
justifies our choice. The list contains 1374 offensive words. The offensive words included in the list
can be categorized as: (i) Swear/profane words: f**k, a$$hole, b*tch etc., (ii) Negative words: die,
hell, death etc. and (iii) Others: enemy, drug etc.
Note that the list contains certain words that some of the people would not find offensive.
However, incivil tweets have a very high chance of having these offensive words8. We do understand
that these may not cover all instances of incivility and might affect the recall of our models which
is a limitation of our treatment of the problem. However, the precision of the system should not be
affected by this limitation and the current target of the paper is to build a highly precise system.
We then use these words to filter the Twitter data stream. The crawling has been done from
August to December 2017. We filter the tweets in which any of those offensive words are present.
We obtain a total of ∼2,000,000 tweets containing one or more such offensive words. Out of the
1374 offensive words, 59.4% of words have been used at least once, 54.9% have been used at least
twice and 47.8% have been used at least thrice. Some offensive words have also been used in as
high as 1.3% of the tweets.
3.2 Mention based filtering of the dataset
We further filter the dataset based on the presence of mentions in the tweets. This is because
in general, any conversation in Twitter should contain mention(s) and an account holder would
generally mention the target in their (incivil) tweets. We consider only those tweets in which
one or more mentions appear. This reduces the tweet dataset to ∼300,000 tweets from the earlier
∼2,000,000 tweets. Note that this step operationalizes the second part of the working definition
of incivility, i.e., the offensive text is usually targeted to an individual, which in this case is the
mentioned target.
7https://www.cs.cmu.edu/ biglou/resources/bad-words.txt
8Note that the number of incivil tweets in a random sample of tweets is very low. In fact, we observe that in a random
sample of 100 tweets, there are only 2 tweets that fall into the category of incivility. Also the tweets that were incivil from
the random sample contained words from the "mean" words list. After obtaining manually annotating the tweets as incivil
or civil , we found that the fraction of mean words were higher in the incivil tweets.
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:9
3.3 Manual labeling of the tweets
While the previous step reduces some noise in the data, not all the tweets obtained are related to
incivility. We, therefore, randomly sample 25,000 tweets out of these ∼300,000 tweets and manually
label them as incivil/civil instances. We consider those cases where we have full agreement between
the two authors who did the labeling. Out of the 25,000 tweets, we discard 729 tweets where
there was a disagreement between the authors. In the 24,271 selected tweets where there was
full agreement, we find 8,800 tweets as instances of incivility and the remaining 15,441 tweets as
instances of civility.
3.4 Criteria for labeling the tweets
Following are some of the broad cases where we have labelled the tweets as being incivil:
(a) Blackmails or threats: These tweets have expressions of physical or psychological threats to
the targets. Example: 'I'll smash you in the face when I see you.'
(b) Insult: These tweets have insults that are abusive for the target. Example: 'You are such an
a$$hole.'
(c) Cursing: These tweets have expressions wishing that some grave misfortune befalls the target
(like their or their loved one's death). Example: 'You'll die and burn in hell.'
(d) Sexual harassment: These tweets contain unwanted sexual talk which might be derogatory.
Example: 'Post a naked pic u sl*t!'
While labelling the tweets, we took into account that some of these tweets although might contain
offensive words are not cases of incivility, eg., 'Hey bitches, feel like seeing a movie tonight?'
4 TARGET SENTIMENTS & INCIVILITY
In this section, we construct an incivility context to be able to perform an in-depth analysis of the
reason for incivility. We find that contradicting sentiments (opinion conflicts) by the account holder
and target toward a named entity, are highly correlated to the act of incivility.
4.1 The incivility context
As described in the previous section, we label the incivil tweets and from the mention relationship,
identify the target and the account holder. A typical example is as follows:
@user1 what a dumb ass ** person you are, user2
Here user2 is the account holder while user1 is a target.
In our work, we consider the mentions of an incivil tweet as the target. In case of multiple
mentions, we consider all of the mentions as targets. However, it might be possible that some of
the mentions are not actually targets (usually rare as observed through manual inspection) and
is currently a limitation of our work which we wish to address in the future. Once we have the
account holder-target pairs, we consider the targets' and the account holders' profiles and crawl
their timeline (we get a maximum of 3,200 tweets per user). Also note that the timeline is crawled at
around the same time we collected our dataset. We take the first 100 tweets from their timeline. We
find that taking the first 100 tweets itself contains ample clues for us to investigate. The intuition
behind constructing this context is that these tweets might contain the context that triggered the
incivil tweet and thus these tweets should provide the best clues as to why the account holder
targeted the target. In fact, for annotating the tweets in the previous section, the annotators in
many instances had to visit the target and the account holder profiles to ensure if the instance
was indeed a case of incivility. In almost all the cases where the annotators attested instances of
incivility they observed opinion conflicts between the target and the account holder. We therefore
attempt to automate this natural "back-and-forth" process adopted by the annotators for identifying
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:10
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
incivility instances and build the incivility context to automatically analyze such opinion conflicts
by making comparisons between the target's and the account holder's timelines.
From the example of incivility context cited below, we observe that the target tweets positively
about Donald Trump and US Economy. However, the account holder tweets negatively about Trump
and positively about President Obama. We can observe that there is a conflict of opinion between
the target and the account holder as the sentiments expressed toward the common named entity
Donald Trump is opposite. Going through the entire context, we find that this opinion conflict
leads to an incident of incivil post.
account holder's tweet:
@user1 Enjoy prison a$$hole!
account holder's context tweets:
@user5 @user6 You sir, are just another clueless Trump lemming.
@user7 @user8 Seriously, get your head out of Trump's ass already. Go watch your Fox News & Friends and eat your jello.
@user8 The video of what your boyfriend said: Trump labels US justice system 'laughingstock' @CNNPolitics
https://t.co/QNa2jqAYsE
@user9 if the Devil was running as a Republican, would you still vote for him? Your morals and priorities are so screwed
up.
@user5 Seriously, let it f**king go. You are worse that a scorned girlfriend bringing up decades of shit that does not matter.
You are the BIGGEST LOSER of all time.
@user11 Trump idiot lemmings are condemning the outrage over slavery and agreeing w/the idiot Kelly about praising
Lee? Clueless losers
target's context tweets:
@user10 You are truly stupid. Trump is the first President to come into Office supporting marriage equality
Strange that the #fakenews media never gets stories wrong in favor of Trump. It's almost like they do it on purpose
According to HuffPo, President Trump is effective, but they don't like it. Donald Trump's relentless focus on tax cuts,
deregulation and draining the swamp is great for job growth... with minorities
and so on ...
Based on the 8800 incivility incidents in our manually labeled dataset, we obtain the incivility
contexts. Since our hypothesis is that opinion conflicts between the account holders and the targets
create the rift between them, we plan to use sentiment analysis as a tool to automatically identify the
conflicts. In particular, we try to find out the sentiments expressed by the targets toward different
named entities in their tweets. We also find out the sentiments expressed by the account holders
toward the different named entities. Next we find the common named entities toward which the
target and the account holder expresses positive or negative sentiments. Finally, we identify if the
targets and the account holder have expressed opposing sentiments toward the same entity. We
propose an algorithm to detect such opinion conflicts easily in the following subsections.
4.2 Step 1: Named entity recognition
We use a named entity recognition (NER) system to identify named entities that will enable us to
proceed further with the sentiment analysis. Recall that, according to our hypothesis, we first need
to identify the named entities and then find the sentiments expressed by the users toward these
named entities. For this purpose, we use the tool proposed in [86, 87]9 that is trained on Twitter
data and performs much better than other traditional NER tools like the ones proposed in [38]10.
9https://github.com/aritter/twitter_nlp
10http://nlp.stanford.edu/software/CRF-NER.shtml
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:11
Classifier
Accuracy Macro F1
TD-LSTM on benchmark dataset
TD-LSTM on our dataset
69.2%
73.4%
0.68
0.71
Table 1. Accuracy of the TD-LSTM.
4.3 Step 2: Target dependent sentiment analysis
After named entity recognition, we set out to obtain the sentiment polarity associated with each
named entity in a given text. Our sentiment analysis model is based on an LSTM framework. A
brief description of LSTMs and how we use it for target sentiment detection follows below.
Long Short Term Memory (LSTM) Recurrent Neural Networks (RNNs) are used for handling tasks
that use sequences. A recurrent network takes an input vector x and outputs a vector y. However,
y depends on not only the current input, but on all the inputs fed into it in the past. RNNs are
however not capable of handling long term dependences in practice [5]. It was observed that the
backpropagation dynamics caused gradients in an RNN to either vanish or explode. The exploding
gradient problem can be solved by the use of gradient clipping. [52] introduced LSTM to mitigate
the problem of vanishing gradient. The LSTMs by design have a hidden state vector (ht) and also a
memory vector ct at each timestep t. The gate equations at timestep t with input as xt and output
as ot are:
ft = σ(Wf .[ht−1, xt] + bf )
it = σ(Wi .[ht−1, xt] + bi)
Ct = tanh(WC .[ht−1, xt] + bC)
ct = ft ◦ ct−1 + it ◦ Ct
ht = ot ◦ tanh(ct)
ot = σ(Wo .[ht−1, xt] + bo)
Here, the three vectors f , i, o are thought of as binary gates to control whether each memory cell is
updated. The ◦ operation here denotes the element-wise matrix multiplication.
Target dependent sentiment classification using LSTM: Here we describe a LSTM based model for
target dependent (TD) sentiment classification. The model we use is adapted from [96]. The sentence
representation in this model can be naturally considered as the feature to predict the sentiment
polarity of the sentence. We use the glove vector word embeddings which are trained on 27 billion
tokens and 2 billion tweets as the vector representation of the words. We use the target dependent
LSTM approach (TD-LSTM) to find the sentiment polarity of the tweets toward a target.
The training of the TD-LSTM is done in a supervised learning framework using cross entropy
loss. We perform all parameter updates through backpropagation and stochastic gradient descent.
Evaluation results: We use the benchmark dataset from [34]. We train it on their Twitter dataset
having 6248 sentences and test it on 692 sentences. The percentages of positive, negative and
neutral instances in both the training and test sets are 25%, 25% and 50% respectively. The accuracies
reported in table 1 are obtained using 200 dimensional glove word embeddings. We manually label
the sentiments of 100 random entities from our dataset. We achieve an accuracy of 73.4% on our
dataset.
The above accuracy has been obtained using the early stopping criteria and the same weight
initializations as mentioned in [96].
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:12
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
4.4 Observations from TD sentiment analysis
In this section, we analyze the outcome of the TD sentiment analysis on the named entities. For
each incivility context, we perform the NER and target dependent sentiment analysis. Specifically,
we take all tweets in the incivility context of the account holders and targets and then run the NER
on the tweets to extract the named entities. Then we run the TD-LSTM with targets as these named
entities to get the target's polarities toward the named entities. We can conclude that the cases of
incivility where the algorithm returns empty sets for both the positive and the negative sentiments
for all the named entities are not related to contradicting sentiments between the account holder
and the target.
Sentiment expression toward different named entities: In Figure 2, we show the distribution of
Neutral
Positive
Negative
s
e
i
t
i
t
n
e
f
o
n
o
i
t
c
a
r
F
0.8
0.6
0.4
0.2
0
company
facility
other
movie
person
band
product
mentions
Fig. 2. Comparison of sentiment
toward different named entity
classes.
·105
1.5
1
0.5
s
t
e
g
r
a
t
f
o
o
N
0
Tru m p
M o ore
@ F o x N e w s
Y o utu be
T
m erica
A laba m a
R ealD
P O
R o y
@
@
A
T
@
U S
w itter
C hrist m as
T
3. Popular
which
express
Fig.
entities
different
toward
senti-
targets
ments.(@RealDonaldTrump has
been shortened as @RealDT.)
Neutral
Positive
Negative
0.4
0.2
s
r
e
s
u
f
o
n
o
i
t
c
a
r
F
0
0-100
100-1 k
100 k-1 M
10 k-100 k
1 k-10 k
10 M -100 M
1 M -10 M
Fig. 4. Sentiments versus follow-
ership counts of targets.
sentiments expressed toward different named entity classes by the targets in the incivility context.
It is evident from the figure that users express opinions differently about different entities. For
example, many users express negative sentiments toward a mention or a person. However, users
express no opinion toward the majority of mentions. Further, users express negative sentiments
more often than positive sentiments. This observation can act as an effective strategy to predict
incivility incidents beforehand.
Next we attempt to identify the popular entities toward which targets express sentiments (see
Figure 3). It is evident from the figure that there are more targets expressing opinion about Trump,
Youtube and Fox News. These entities might come on top due to the particular dataset used for this
work.
Table 2 shows examples where the target is attacked for expressing positive sentiment toward
Trump in an example and negative sentiment in another.
Sentiments and followership: We next study whether followership counts and the sentiments ex-
pressed by a target have any correlation. Figure 4 shows the relationship between the sentiment
expressed by the users and their number of followers. There is a distinct trend observed here. Users
with moderately low followership (100-10K) tend to express more negative sentiments toward the
named entities while the users with high followership (100K-10M) show more positive sentiments
toward such entities. Usually incivility is associated to negative sentiments. It seems that users
with high followership are less likely to be an account holder. In the later sections, we show that
this is indeed true.
Opinion conflicts. We have defined opinion conflicts as the case where the target and the account
holder express opposing sentiments toward the same entity. For example, suppose the target T
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
Positive Sentiment
Table 2. Sentiment toward a common named entity
117:13
Negative Sentiment
Incivil tweets
@user1 you really are a stupid dumb **. Do you know
anything. Like trump you are a ** brainless **. Dumbo
@user2 @user3 @user4 Since when do you have to be
a politician to talk to people with respect you stupid
moron. You are a fool.
Incivility context
RT @user5: The Washington Post calls out #Crooked-
Hillary for what she REALLY is. A PATHOLOGICAL
LIAR! Watch that nose grow!
RT @user6: The Obama/Clinton admin has failed Amer-
icans: "The Obama economy is trouble for Hillary Clin-
ton" https://t.co/JBoCmyHj6v
I don't think he's got a thing to apologize for... He is not
a professional politician
@user7: Trump is trying to go negative; drive up those
numbers so that he &; Clinton are on the same page
https://t.co/RlB00L32v9
expresses 10 sentiments toward entity E, out of which 8 are positive and 2 are negative. Similarly,
suppose the account holder expresses 20 sentiments toward entity E, out of which 4 are positive
and 16 are negative. Then, the overall sentiment toward the entity E by T is positive, whereas by A
is negative. This counts as a single opinion conflict between A and T. We use this mechanism to
compute the opinion conflict feature values.
We find that opinion sentiments are highly correlated to incivility. We observe that 75% of the
incivil tweets in our dataset have at least one opinion conflict between the targets and account
holders. In contrast, there are only 53% civil incidents where there is an opinion conflict. Further,
for each incivil incident, there are 2.52 ± 0.03 similar sentiments expressed, whereas, for each
civil incident, the mean similar sentiments expressed is 4.49 ± 0.19. Thus, it is clear that most
civility contexts come with an agreement of opinion (67% of total sentiments) whereas an incivility
context is filled with opinion conflicts (49% of total sentiments). Therefore, we use this concept as a
potential strategy for incivility detection and further use this as a feature in our subsequent models.
5 BEHAVIOR OF THE ACCOUNT HOLDERS AND THE TARGETS
In this section, we study the socio-linguistic behavior of the targets and the account holders.
Specifically, we analyze their user profiles to study followership behavior, tweeting behavior and
psycholinguistic dimensions.
5.1 Followerships
In Figure 5, we show the followership distribution of the user profiles in our dataset. It is evident
from the figure that our dataset is a good mix of both normal users as well as celebrity users.
Figure 6 shows a comparison between the follower counts of the account holder and the target
accounts. The figure indicates that the target accounts are more popular than the account holder
accounts (p-value of significance is < 10−5). Apparently, many well known users or celebrities tend
to be targets of incivility. A number of news articles also seem to mention this [9, 27, 30]. Moreover,
usually celebrities (i.e., those with typically high follower counts) tend to avoid insulting someone
on social media sites.
5.2 Tweeting behavior
The following analysis has been done on the timeline crawls of the account holders and the targets
to identify differences in their respective tweeting patterns. Figure 7 shows a comparison between
the account holder and the target accounts with respect to their tweeting behavior. We observe that
there are more account holders who tweet less or moderately compared to the targets (p-value of
significance is < 10−5). However, in the high tweeting zone, there are comparatively more targets
than the account holders. In fact, there are several accounts with more than 100K tweets. These are
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:14
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
Fig. 5. Followership distribution of all the users in our dataset.
Account Holder
Target
0.4
Account Holder
Target
y
t
i
l
i
b
a
b
o
r
P
0.2
0
1-100
100-1 k
1 k-10 k
10 k-100 k
100 k-1 M
Account Holder
Target
0.6
0.4
0.2
0
y
t
i
l
i
b
a
b
o
r
P
1 M -10 M
0
1
2
3
4
5
6
7
8
9
> = 10
No of mentions
0.4
0.2
y
t
i
l
i
b
a
b
o
r
P
0
1-100
100-1 k
1 k-10 k
10 k-100 k
100 k-1 M
1 M -10 M
10 M -100 M
No of followers
No of tweets
Fig. 6. Comparison of number of
followers of the account holders and
the target accounts.
Fig. 7. Comparison of the number
of tweets posted by the account
holder and the target accounts.
Fig. 8. Comparison between num-
ber of mentions in a tweet by the
account holder vs the target ac-
counts.
typically news media accounts like Fox News, Sky Sports, Telegraph, CBS Sweden, CNN News 18
etc. They are being cyberaggressed for the news/opinions the news anchors associated with them
typically express. We cite below such an example of a news media involved in incivility.
@user1 @newsmedia1 stupid English b*tch asking is there people on that plane?... No you thick c*nt it's like google cars....
Incivility context:
A Dubai firefighter has died of injuries sustained putting out fire after plane crash landing - Emirates chairman
https://t.co/i25sjAKfOC
We also observe the mention patterns of the targets and account holders. Figure 8 shows the
distribution of number of mentions in a tweet by the account holders versus the distribution of
number of mentions in a tweet by the targets. It is evident that there are many targets (∼ 30%)
who do not mention at all. The account holders generally mention multiple people in a tweet and
much more often than the targets (p-value of significance is < 10−5). This also indicates that they
might be insulting multiple targets. We further observe that there are some targets who use more
mentions in their tweets than account holders. These targets have high followers (198K on average)
and they probably use more mentions mostly for promotional purposes.
5.3 Linguistic and cognitive dimensions
In this section, we perform linguistic and psychological measurements of the tweets posted by the
target and the account holder profiles. We use the Linguistic Inquiry and Word Count (LIWC) [82],
a text analysis software to find which categories of words are used by the targets and the account
holders. LIWC evaluates different aspects of word usage in different meaningful categories, by
counting the number of words across the text for each category. Table 3 notes the frequent words
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
·10−2
s
e
u
l
a
V
C
W
I
L
2
1
0
n
o
s
r
e
p
d
n
2
l
a
r
u
l
p
n
o
s
r
e
p
t
s
1
r
a
l
u
g
n
i
s
n
o
s
r
e
p
t
s
1
Account Holder
Target
·10−2
1
0.8
0.6
0.4
0.2
s
e
u
l
a
V
C
W
I
L
Account Holder
Target
·10−2
s
e
u
l
a
V
C
W
I
L
6
4
2
0
117:15
Account Holder
Target
n
o
s
r
e
p
r
a
l
u
g
n
i
s
d
r
3
s
n
o
i
t
a
g
e
N
s
d
r
o
W
r
a
e
w
S
l
a
r
u
l
p
n
o
s
r
e
p
d
r
3
k
r
o
W
e
v
e
i
h
c
A
e
r
u
s
i
e
L
e
m
o
H
y
e
n
o
M
h
t
a
e
D
n
o
i
g
i
l
e
R
e
e
S
l
e
e
F
r
a
e
H
y
d
o
B
h
t
l
a
e
H
l
a
c
i
g
o
l
o
i
B
l
a
i
c
o
S
y
l
i
m
a
F
d
n
e
i
r
F
s
n
a
m
u
H
s
n
o
i
t
o
m
E
s
n
o
i
t
o
m
E
r
e
g
n
A
y
t
e
i
x
n
A
s
s
e
n
d
a
S
l
a
u
t
p
e
c
r
e
P
e
v
i
t
i
s
o
P
e
v
i
t
a
g
e
N
(a) Comparison of LIWC scores
in the linguistic categories be-
tween the account holder and
the target tweets.
(b) Comparison of LIWC scores
in personal concerns categories
between account holder and tar-
get tweets.
(c) Comparison of LIWC scores in the
cognitive categories between the ac-
count holder and the target tweets.
Fig. 9. LIWC analysis. We have used standard error as error bars in the graph.
from our dataset corresponding to the different LIWC categories. In Figure 9a, we show the linguistic
categories for the target and the account holder tweets. It is quite evident from the figure that the
account holders use first person quite frequently compared to the targets and refer to others (here,
targets) in third person. Moreover, the use of swear words and negations are more in the account
holder tweets than the target tweets.
Next, we look at some of the personal concerns such as work, achievements, leisure, etc. Figure 9b
shows the differences of the account holder and the target profiles in terms of expression of personal
concerns. We observe that the targets tweet more about work and achievements; account holders
tweet more about monetary aspects. We also observe that in "religion" (e.g., church, mosque) and
"death" (e.g., bury, kill) categories, account holders tweet more than the targets. This is indicative
of the fact that religion-based incivility is more prevalent in social media. This is in line with the
work by Hosseinmardi et al. [54] where they found that there is a high usage of profane words
around words like "muslim" in ask.fm social media.
We further analyze the cognitive aspects of the target and the account holder tweets (see Figure 9c).
We observe that account holders are more expressive of their emotions than the targets. Further,
the account holders tend to tweet more related to "body" (e.g. face, wear) and "sexual" (e.g. sl*t,
rapist etc.) categories. In "friend" category, both account holder and target tend to tweet in similar
proportions. However, the account holders talk more frequently related to the "social" category.
Also targets express more "positive emotion" whereas, account holders express "negative emotion".
6 DETECTING INCIVILITY
In the earlier section, we have discussed the possible connections of incivility with target dependent
sentiments and observed the various behavioral aspects of the targets and the account holders.
Note that to do this, we had to manually label the incivil tweets as a first step in order to build the
incivility context. In this section, we shall propose an automatic approach to classify incivil tweets.
Training and test sets: Recall that we have 24,271 manually labeled tweets. We choose randomly
21,000 of these tweets and consider them as our training set. The remaining 3271 points are in the
test set.
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:16
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
Table 3. Frequent words from the LIWC category in our dataset. The asterisk here denotes the acceptance
of all letters, hyphens, or numbers following its appearance.11
Category
Swear words
Work
Achieve
Leisure
Home
Money
Religion
Death
Social
Family
Friends
Humans
Positive Emotions
Negative Emotions
Anxiety
Anger
Sadness
Perceptual
See
Hear
Feel
Biological
Body
Health
Frequent words from the dataset
shit*, dumb*, bloody, crap, fuck
Read, police, political, policy, student*
Better, win, won, first, best
party*, read, running, show, shows
clean*, address, home, family, house*
Free, money*, worth, trade*, tax
Sacred, moral, worship*, hell, devil*
War, death*, murder*, kill*, die
You, we, your, our, they
Family, families*, pa, mother, ma
Mate, mates, fellow*, lover*, friend*
people*, human*, women*, children*, woman
Like, party*, lol, better, support
War, wrong*, violent*, liar*, rape*
doubt*, fear, risk*,avoid*, afraid
War, violent*, liar*, rape*, fight*
low*, lost, lose, loser*, fail*
green*, say*, said, watch*, see
green*, watch*, see, white*, look
say*, said, hear, heard, listen
round*, hard, loose*, hand, feel
health*, drug*, rape*, life, shit*
shit*, head, brain*, hand, face
health*, drug*, life, weak*, living
6.1 Baseline models
There have been several studies like [10] that consider identifying incivility instances in various
social media platforms based on various content features. We adopt this work (baseline 1) for
comparison with our model. A few studies use basic n-gram features. Hosseinmardi et al. [57] uses
unigrams and tri-grams to detect incivility. Xu et al. [104] uses unigrams, unigrams+bigrams as
features to detect incivil traces in social media. These n-gram features constitute our second baseline
model. We also consider n-gram (uni-, bi-,tri-) based model with automatic feature selection to
reduce the feature space to smaller number of features. We also use the work by Chen et al. [21] as
a baseline. In particular, we use n-grams together with textual features. The textual features include
number of words in the tweet, number of characters in the tweet, number of sentences in the
comment ,average word length (#characters divided by #words) , average sentence length (#words
divided by #sentences) , profane words usage level (#profane words divided by #words) , uppercase
letter usage (#uppercase letters divided by #sentences) , punctuations usage (#punctuations divided
by #sentences) , URL usage level (#URL divided by #words) , mentions usage level (#mentions
divided by #words) For all the above models, we use different classifiers like SVM with linear and
rbf kernels, k-NN, logistic regression, Adaboost with L2 regularization wherever possible and report
the best overall accuracy.
Feature engineering: We use the following content features adopted from Bommerson [10].
Length of the tweet. This feature simply corresponds to the length of the tweet measured in
terms of the number of words in the tweet.
Number of negative/offensive words in the tweet. This feature calculates the number of of-
fensive words using the offensive words list we introduced earlier.
Severity value of the tweet. We label every word in the offensive words list manually as '1' or
'2' and this is unanimously agreed upon by two of the authors. This is done because all offensive
words are not equally bad; some have more severe effect when used in the tweet. We label the more
severe offensive words as '2' while the less severe ones are labeled as '1'. If w is a bad word in a
sev(w), where sev(w)
tweet and W is a set of all offensive words, then severity of a tweet =
denotes the severity of the word w and sev(w) ∈ {1, 2}.
w ∈W
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:17
Time of the tweet. The time of post of a tweet is taken as a feature. It can be a distinguishing
feature between the two classes as incivility among teenagers happens usually after school whereas
normal tweets flow in all throughout the day.
Negation used or not. Sometimes the offensive words can be used with negations. This however
reverses the effect of the word and thus the tweets in these cases are usually civil (e.g., '@xyz Please
don't die.'). To handle this case, we take into account if negations are used along with offensive
words.
Drawbacks of the baseline models: The baseline model suffers from the following drawbacks:
Sentence dependencies. The above features cannot detect dependencies between different sen-
tences in a tweet. For example, '@xyz you are a footballer. All footballers are brainless.'
Multiple connotations. The above features do not take into account the multiple connotations
of a word or phrase. For example, the word 'well' has a neutral connotation whereas the words
'sooo welllll' indicates a much happier/excited state of the mind of the author.
Obfuscated words. The account holder can use words like 'a$$hole' or 'f**k' which will not get
detected by the above features.
In this work, we use character-level models that build representations of sentences using the
constituent characters. The advantage of using these kinds of models is that we can easily deal with
non-traditional spellings used in social media website and hence, can easily capture obfuscated
words, multiple connotations of words and sentence dependencies without the need of normalizing
the words to their correct forms. In particular, we use several deep learning models that take such
character embeddings as input and output a sentence representation using which we are able to
classify if the tweet is related to incivility or not. As an additional deep learning based basline we
use the model proposed by Pavlopoulos et al. [81] that was introduced to moderate abusive user
content.
6.2 The deep learning frameworks
We propose deep learning frameworks primarily based on character-level LSTM and character-
level CNNs. We use character-level models in this experiment as the characters can provide more
information than the words as a whole for the tweet dataset under consideration. In particular,
since the tweets are limited to only 140 (now 280) characters, it is very difficult to obtain rich
embeddings from such a short text where only a few words are present. Therefore, character-level
LSTM/CNN can obtain more information than a word-level LSTM/CNN in such a scenario. We
would also like the model to have knowledge about the past sequence of characters as well as to
look into the future. Thus, we choose the bidirectional LSTM framework12 for our purpose.
The second model we use is a character-level CNN model. The authors in [109] have successfully
used character level CNNs for text classification. This motivated us to try CNNs for the purpose of
our task. We use a model with 2 convolution layers, each layer followed by a max-pooling layer.
Bi-directional LSTM: We use a character-level bi-directional LSTM with tanh as the function that
provides non-linearity. The 100 dimensional characters embeddings are initialized randomly and
updated during training. The encoded vectors are passed to the LSTM units and then the output
of each unit which is a 100 dimensional vector is passed to the next unit in the forward as well
as backward direction. We concatenate the output of the LSTM unit in the last timestep in both
forward and backward direction. Finally, we use a softmax layer to calculate the probability of the
tweet belonging to a particular class.
Character CNN: The second model we use is a character-level CNN model with ReLU non-linearity.
The first convolution layer contains 100 filters with kernel size 5 × 5. The second convolution layer,
12We have also compared the model with unidirectional LSTM, GRUs although we do not report the results for all these.
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:18
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
Fig. 10. char-CNN + opinion conflict feature based model for incivility detection.
once again, contains 100 filters with kernel size 5 × 5. Both the convolution layers are followed by a
max pooling layer. Finally, we flatten the output vector and use a dense layer followed by a softmax
to get the output probabilities for the two classes. We also use dropout and batch normalization in
both the above models to prevent overfitting.
Character CNN + opinion conflict feature: The char-LSTM and char-CNN models might be
able to extract some features and temporal relations between characters but still they might not be
able to take into account the crucial observations about incivility that we made in the two previous
sections. To improve the performance of the model and to take advantage of both the scenarios, in
the char-CNN model, we fuse the flattened vector we get after the two convolution and maxpool
layers with a special entity sentiment based feature, which we have seen in the previous sections to
be very discriminative. The full architecture is shown in Figure 10. In particular, we take the vector
obtained by flattening and concatenate it with the opinion conflict feature described below. Then
we take this vector as an input to a feed forward neural network which classifies the tweet as an
instance of incivility or otherwise. Thus, we train the fused model end-to-end according to the final
loss function. The weights learned from the feed forward network at the end of the concatenated
flattened vector and custom feature vector tell the model the amount by which each feature should
be weighed.
Opinion conflict feature: The opinion conflict feature is the total count of opinion conflicts that
appear in the incivility context between the account holder and all the targets in a particular tweet.
Training: We perform all parameter updates through backpropagation and stochastic gradient
descent. We apply dropout with probability 0.25. We also use early stopping with patience value as
3.
Results: We train the model in a supervised learning framework using the same training and
test data on which we had trained the baseline model. The results are noted in Table 4. The first
observation is that content based features do not perform very well in this setting (see pink row).
As we can see from the table, the character CNN model along with the opinion conflict feature
(see green row) outperforms the baseline models achieving 93.3% accuracy with F1-score of 0.82 and
ROC area of 0.89. Note that while the increase in F1-score from char-CNN to char-CNN + opinion
conflict model is from 0.81 to 0.82, it is statistically significant with p-value < 0.05. Furthermore
the char-CNN + opinion conflict model corrects 10.14% of the errors made by the char-CNN model.
Among the baseline models, the best performance is obtained when we use unigram, bigram and
trigrams as features (see yellow row). Our model significantly outperforms this best performing
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:19
Table 4. Classification results
Bommerson et al. [10])
Content based features
n-gram based features
Method
unigrams
bigrams
trigrams
unigrams (automatic feature selection)
bigrams (automatic feature selection)
trigrams (automatic feature selection)
unigrams + bigrams
unigrams + bigrams (automatic feature selection) (Xu et al. [104])
unigrams + trigrams (automatic feature selection) (Hosseinmardi et al. [57])
unigrams + trigrams
bigrams + trigrams
bigrams + trigrams (automatic feature selection)
unigrams + bigrams + trigrams
unigrams + bigrams + trigrams (automatic feature selection)
baseline 1 + opinion conflict
unigrams + bigrams + trigrams + opinion conflict
unigrams + bigrams + trigrams + textual features (Chen et al. [21])
char-LSTM and char-CNN Models 1
char-LSTM
char-LSTM+attention (Pavlopoulos et al. [81])
char-LSTM+attention (Pavlopoulos et al. [81])+opinion conflict
char-CNN
char-CNN + opinion conflict
Accuracy
F1-Score ROC-AUC
71.1%
86.4%
85.6%
86.7%
88.4%
82.3%
83.6%
86.7%
87.5%
86.7%
86.7%
86.8%
88.8%
86.8%
88.9%
76.1%
80.9%
86.7%
88.9%
78.5%
78.6%
93.0%
93.3%
0.27
0.73
0.72
0.66
0.69
0.18
0.29
0.74
0.67
0.63
0.64
0.66
0.76
0.73
0.77
0.37
0.77
0.77
0.80
0.53
0.54
0.81
0.82
0.61
0.91
0.91
0.79
0.81
0.54
0.59
0.91
0.79
0.62
0.62
0.79
0.93
0.91
0.92
0.61
0.90
0.92
0.84
0.74
0.75
0.88
0.89
1 Results have been obtained by taking mean of 10 random runs.
baseline (5.1%, 6.5% improvements w.r.t accuracy and F1-score). The CNN model seems to learn
better representations than hand picked bag of word n-gram features.
Below we list a couple of examples where char-CNN fails and char-CNN+opinion conflict predicts
correctly. Both cases have very few linguistic cues to help in the classification task. In the first
case, the account holder tweets negatively about Old Alabama whereas the target @user1 tweets
positively about Old Alabama. In the second case, we found that the account holder tweets positively
about Daily News and @user1, the target negatively about Daily News.
1. @user1 @user2 YOU and your incessant attempts at lying to and bullying the press while at the White House as PS
are reason for apology you sack of dog stools. The AMERICAN public does not distrust the media other than by your
disingenuous propaganda. Ur time is coming you asshole.
2. @user1 No just you. Everyone would know he was asking for you. Asshole!
7 POST-HOC ANALYSIS
We run the trained char-CNN model on the entire dataset of ∼ 300, 000 tweets and perform a
post-hoc analysis of the incivility tweets to extract some more interesting properties. The key
observation is that there are multiple instances of incivil posts from the same account holder as
well as a target being attacked multiple times.
7.1 Repetition of incivility and targeting
In this section, we analyze the incivil posts in more detail focusing on their repetitions. Following
are some examples of multiple incivility and targeting. The first two examples show @user1 being
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:20
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
attacked by multiple account holders (user3 and user4) and the last two examples show @user5
being attacked multiple times by user6.
s
r
e
d
l
o
H
t
n
u
o
c
c
A
f
o
n
o
i
t
c
a
r
F
0.6
0.4
0.2
0
2
3
4
5
6
7
8
9 10 11
No of times an account holder harasses
s
t
e
g
r
a
T
f
o
n
o
i
t
c
a
r
F
0.4
0.2
0
4
3
2
No of times a target gets harassed
9 10 11
5
6
7
8
Fig. 11. Account holders involved in multiple in-
stances of incivility.
@user1 Hillary was a skankb*tch,and they make a cream for your butt-hurt condition (account holder: user3)
@user1 Get ur a$$ off here, u stupid b*tch (account holder: user4)
Fig. 12. Targets attacked multiple times.
@user5 you are the biggest f**king piece of scum there is. Karma is a b*tch (account holder: user6)
@user5 you are the biggest scumbag (account holder: user6)
In Figure 11 we show the distribution of account holders involved in multiple instances of
attacking another person. We observe that there are a significant number of account holders
(∼ 13%) who attack more than once and if we observe the distribution among them, while a
majority of them attack 2-5 times, there are also account holders who attack more than 10 times.
This scenario of multiple incivil posts seems alarming as it might be one of the prime reason for
users to quit social media sites. Thus, it is important to detect these account holders' accounts and
take necessary preventive measures.
We also observe that the same target is attacked multiple times. In Figure 12, we see that there
are a significant number of targets (∼ 19%) who get attacked multiple times and a majority of them
experience 2-3 times of attack. However, there are also a small fraction of targets who are attacked
more than 10 times.
#f ollowers
7.2 Reputation scores
Reputation score is a measure that determines the reputation of a profile in social media and is
defined as
#f ollowers +#f riends . A celebrity who tends to have a very large followership but follows
less people, i.e., having f ollowers >> f riends will have a reputation score close to 1. Figure 13a
shows the average reputation scores for the account holders, the targets, the multiple-time insulting
account holders and the multiple-time targets. The plot suggests that targets who are attacked
multiple times have the highest reputation scores and are therefore celebrities with high probability.
Moreover, the targets in general tend to have higher reputation scores than the account holders. We
next consider the account holder-target pairs. Figure 13b shows the distribution of the reputation
score ratio (
r epscor e(accountholder)) for the account holder-target pairs. It is quite evident from the
result that there are more number of account holder-target pairs with reputation score ratio more
than 1. Therefore, in general, the targets are more reputed than account holders. Figure 13c shows
the distribution of reputation score ratios for the account holder-target pairs appearing multiple
times and pairs appearing once. The pairs occurring multiple times tend to have greater reputation
score ratio with higher probability. Thus, targets who are attacked by the same account holder
again and again seem to have higher number of followers, and are highly likely to be celebrities.
r epscor e(tarдet)
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:21
Mult AccHolder/Target Pair
Normal Pair
0.8
y
t
i
l
i
b
a
b
o
r
P
0.6
0.4
0.2
(a) Reputation score comparison
between account holders, targets,
account holders offending multiple-
time times and multiple-time tar-
gets.
(b) Reputation score comparison
for account holder-target pairs.
0
0-0.5
0.5-1.0
>1.0
(c) Reputation score comparison
for account holder-target pairs ap-
pearing multiple times and pairs
appearing once.
Fig. 13. Reputation score comparison
7.3 Follower/followee properties
We further study the follower/followee behavior of multiple-time insulting account holders and
targets. Figure 14a shows a comparison between the followers of account holders who attack
multiple times and targets who are targeted multiple times. The graph shows that the targets have
higher number of followers in general as compared to the account holders (p-value of significance
is < 10−5). Many of the targets' follower count falls in the 1M -- 10M range, whereas more than 40%
of the account holders' follower count lies in the 1K-10K bucket. Figure 14b compares the friends of
multiple-time jnsulting account holders and targets. It is evident from the distribution that account
holders have larger number of friends in general with high probability (p-value of significance is
< 10−5).
0.4
0.2
y
t
i
l
i
b
a
b
o
r
P
0
1-100
Account Holder
Target
100-1 k
1 k-10 k
100 k-1 M
10 k-100 k
1 M -10 M
(a) Follower distribution.
0.6
0.4
0.2
y
t
i
l
i
b
a
b
o
r
P
0
1-100
Account Holder
Target
100-1 k
1 k-10 k
10 k-100 k
100 k-1 M
(b) Friend distribution.
Fig. 14. Distribution of various properties for multiple-time account holders and multiple-time targets.
8 DISCUSSIONS AND CONCLUSIONS
8.1 Implications of our work
There are several implications of this study. We report these in the following.
Mitigating the spread of negativity: Incivility has high impact on the spread of negativity among
communities in social media platforms. In prior research works [23, 24, 101], it has been shown
that negative behavior can persist and spread across a community (if not controlled) due to its
reinforcing nature. Opinion disagreements can act as early indicators for stopping the spread of
such negativities. Our proposed framework can be efficiently used to detect opinion disagreements
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:22
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
that might lead to incivilities early in time with minimal features. Since lot of conversations around
controversial topics or policy issues, e.g., global warming, vaccination, abortion, immigration etc.
on social media generally lead to opinion disagreements, our framework can be tuned to detect the
level of toxicity or incivility in the posts so that only the ones which are below a threshold (can be
a system parameter) are detected. This will increase the system efficiency of detecting potential
incivil incidents. Early detection of these opinion disagreements can act as alerts that can be sent to
content moderators (bots or humans) so that they monitor the conflicts and take necessary actions
to mitigate the further spread of negativity in the community.
Social and policy implications: Our work also has important implications to law, public policy
and the society. Wolfson in context of American concept of free speech and political scenario,
has argued in his book [103] that it is almost impossible to separate the good speech or the bad
speech/incivility/abusiveness. According to the First Amendment to the United States Constitution,
one has to provide adequate opportunities to express differing opinions and engage in public
political debate. However, Wolfson also notes that in case of private individuals, these differing
opinions impact emotional health of the targeted individual and hence must be prohibited. In
contrast, incivility directed toward a group or community has the potential to mobilize a larger
number of individuals and can have devastating consequences. These open up the debate for the
need to censorship, regulations or Government laws.
Design of online platforms to reduce conflicts: It might not be always appropriate to attribute
the strong sentiment expressed by a target to be representative of his/her internal characteristics;
in contrast, it might be because of a very specific and one-time external factor, for instance a "very
bad day" of the target for which he/she might hold the named entity responsible eventually causing
him/her to post a (one-off) tweet expressing a strong sentiment toward that named entity. Our work
sheds light on how we might design discussion platforms that minimize the number of opinion
conflicts due to such incidents.
Early detection of opinion conflict might be used by the platform moderators to alter the context
of the discussion by possibly selectively hiding strong sentiments toward entities and prioritizing
constructive comments. This may directly enhance civility in the platform making account holders
less likely to be invective (similar observations in the context of trolling and online harassment has
been made in earlier works [8, 23]).
In addition, community norms might be introduced to reduce conflicts. For instance, the moment
someone is found to express strong sentiments toward a certain entity, the platform may raise
alerts/reminders of ethical standards or cite past moral actions.
We believe that many of these efforts can come directly from the researchers and designers in
the CSCW community so as to make the online experience of user more safe and accommodating.
8.2 Conclusions
In this paper, we study the behavioral aspects of the targets and account holders and try to
understand various factors associated with incivility incidents. We then automate the incivility
detection process by developing a deep learning model with character level LSTM and CNNs
and incorporating information related to entity-specific opinion conflicts. Our model achieves an
accuracy of 93.3% with an F1-score of 0.82 which significantly outperforms the best performing
baseline models achieving 4.9%, 6.5% improvements w.r.t accuracy, F1-score respectively.
Insights: We gained several insights from our analysis and automation. Some of these are -
(i) Opinion conflicts among the target and the account holder at early stages can lead to eventual
instances of incivility;
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:23
(ii) Targets are usually more popular with higher reputation compared to account holders; this is
opposite to instances of cyberbullying where the perpetrator is usually more reputed and powerful;
(iii) Account holders tend to post tweets that are inflicted with negative sentiments/emotions,
"swear", "sex", "religion" and "death" words;
(iv) Targets usually post tweets rich in positive emotions;
(v) There are extensive evidences of repeated incivility as well as repeated targeting, sometimes
each of these up to 10 times. This could be very alarming for the social media sites and suitable
automatic procedures should be built in to contain such cases early in time. Our deep learning
model could be a first step toward this enterprise.
8.3 Future works
There are quite a few interesting directions that can be explored in future. One such direction could
be to look into the problem of incivility from perspectives of various events and topics and study
the effect of such topics/events on the incivility dynamics. Another interesting direction could be
to study the temporal characteristics of incivility incidents on social media and identify the factors
leading to rise in incivility incidents [6, 60, 84]. Apart from understanding the cause of incivility
and thereby detecting it, one can also develop alert-systems that can subsequently take action to
mitigate the impact of opinion disagreements leading to incivilities.
REFERENCES
[1] Aseel Addawood, Rezvaneh Rezapour, Omid Abdar, and Jana Diesner. 2017. Telling Apart Tweets Associated with
Controversial versus Non-Controversial Topics. In Proceedings of the Second Workshop on NLP and Computational
Social Science. 32 -- 41.
[2] Robert H Aseltine Jr, Susan Gore, and Jennifer Gordon. 2000. Life stress, anger and anxiety, and delinquency: An
empirical test of general strain theory. Journal of Health and Social Behavior (2000), 256 -- 275.
[3] Paul Baker. 2001. Moral panic and alternative identity construction in Usenet. Journal of Computer-Mediated
Communication 7, 1 (2001), JCMC711.
(SIGIR '17). 1069 -- 1072.
[4] Kaspar Beelen, Evangelos Kanoulas, and Bob van de Velde. 2017. Detecting Controversies in Online News Media
[5] Yoshua Bengio, Patrice Simard, and Paolo Frasconi. 1994. Learning long-term dependencies with gradient descent is
difficult. IEEE transactions on neural networks 5, 2 (1994), 157 -- 166.
[6] Annabella Biancheri. 2017. Cyberbullying on the rise; social media to blame. http://lobbyobserver.org/lobbyo/2016/
11/cyberbullying-on-the-rise-due-to-recent-technological-advances/. (2017). [Online].
[7] Amy Binns. 2012. DON'T FEED THE TROLLS! Managing troublemakers in magazines' online communities. Journalism
Practice 6, 4 (2012), 547 -- 562.
[8] Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for
Online Harassment: Design Insights from HeartMob. Proc. ACM Hum.-Comput. Interact. 1, CSCW, Article 24 (2017),
24:1 -- 24:19 pages.
[9] BlogXilla. 2013. 8 Of The Most Cyberbullied Celebrities On The Web (LIST). https://globalgrind.cassiuslife.com/
1969918/8-most-cyberbullied-celebrities-web-social-media-list/. (2013). [Online].
[10] Bouke Bommerson. 2015. Machine learning to classify bullying messages on twitter. . https://www.authorea.com/
users/40545/articles/46776/_show_article. (2015).
[11] Danah Boyd. 2014. It's complicated: The social lives of networked teens. Yale University Press.
[12] Lisa Broidy and Robert Agnew. 1997. Gender and crime: A general strain theory perspective. Journal of research in
crime and delinquency 34, 3 (1997), 275 -- 306.
[13] Elia Bruni, N Tram, Marco Baroni, et al. 2014. Multimodal distributional semantics. The Journal of Artificial Intelligence
[14] Erin E Buckels, Paul D Trapnell, and Delroy L Paulhus. 2014. Trolls just want to have fun. Personality and individual
Research 49 (2014), 1 -- 47.
Differences 67 (2014), 97 -- 102.
[15] Amanda Burgess-Proctor, Justin W Patchin, and Sameer Hinduja. 2009. Cyberbullying and online harassment:
Reconceptualizing the victimization of adolescent girls. Female crime victims: Reality reconsidered (2009), 153 -- 175.
[16] Marilyn A Campbell. 2005. Cyber Bullying: An Old Problem in a New Guise?. Australian journal of Guidance and
Counselling 15, 01 (2005), 68 -- 76.
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:24
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
[17] Kellie E Carlyle and Kenneth J Steinman. 2007. Demographic Differences in the Prevalence, Co-Occurrence, and
Correlates of Adolescent Bullying at School. Journal of School Health 77, 9 (2007), 623 -- 629.
[18] Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena
Vakali. 2017. Hate is not Binary: Studying Abusive Behavior of# GamerGate on Twitter. arXiv preprint arXiv:1705.03345
(2017).
[19] Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena
Vakali. 2017. Mean Birds: Detecting Aggression and Bullying on Twitter. In WebSci. 13 -- 22.
[20] Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena
Vakali. 2017. Measuring# GamerGate: A Tale of Hate, Sexism, and Bullying. In Proceedings of the 26th International
Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 1285 --
1290.
[21] Hao Chen, Susan Mckeever, and Sarah Jane Delany. 2017. Presenting a labelled dataset for real-time detection of
abusive user posts. In Proceedings of the International Conference on Web Intelligence. ACM, 884 -- 890.
[22] Ying Chen, Yilu Zhou, Sencun Zhu, and Heng Xu. 2012. Detecting offensive language in social media to protect
adolescent online safety. In Proc. of PASSAT. 71 -- 80.
[23] Justin Cheng, Michael Bernstein, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2017. Anyone can become a
troll: Causes of trolling behavior in online discussions. In CSCW, Vol. 2017. 1217.
[24] Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2014. How community feedback shapes user
[25] June F Chisholm. 2006. Cyberspace violence against girls and adolescent females. Annals of the New York Academy of
[26] Robert B Cialdini and Noah J Goldstein. 2004. Social influence: Compliance and conformity. Annu. Rev. Psychol. 55
behavior. In ICWSM.
Sciences 1087, 1 (2006), 74 -- 89.
(2004), 591 -- 621.
[27] Dan Claredon. 2017. 11 Celebrities Cyberbullied Off Social Media: Ed Sheeran, Normani Kordei, & More. http:
//www.wetpaint.com/cyberbullied-celebrities-twitter-1507798/. (2017). [Online].
[28] Lucie Corcoran, Conor Mc Guckin, and Garry Prentice. 2015. Cyberbullying or Cyber Aggression?: A Review of
Existing Definitions of Cyber-Based Peer-to-Peer Aggression. Societies 5, 2 (2015), 245 -- 255.
[29] Maral Dadvar, Franciska MG de Jong, RJF Ordelman, and RB Trieschnigg. 2012. Improved cyberbullying detection
using gender information. (2012).
[30] Noelle Devoe. 2016. 8 Celebrities Who Have Quit Social Media. https://www.seventeen.com/celebrity/news/a42328/
celebrities-who-have-quit-social-media/. (2016). [Online].
[31] Karthik Dinakar, Birago Jones, Catherine Havasi, Henry Lieberman, and Rosalind Picard. 2012. Common sense
reasoning for detection, prevention, and mitigation of cyberbullying. TIIS 2, 3 (2012), 18.
[32] Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The
Social Mobile Web 11, 02 (2011).
[33] Nemanja Djuric, Jing Zhou, Robin Morris, Mihajlo Grbovic, Vladan Radosavljevic, and Narayan Bhamidipati. 2015.
Hate speech detection with comment embeddings. In Proceedings of the 24th international conference on world wide
web. ACM, 29 -- 30.
[34] Li Dong, Furu Wei, Chuanqi Tan, Duyu Tang, Ming Zhou, and Ke Xu. 2014. Adaptive Recursive Neural Network for
Target-dependent Twitter Sentiment Classification.. In Proc. of ACL. 49 -- 54.
[35] Mai ElSherief, Vivek Kulkarni, Dana Nguyen, William Yang Wang, and Elizabeth Belding. 2018. Hate Lingo: A
Target-based Linguistic Analysis of Hate Speech in Social Media. In ICWSM.
[36] Mai ElSherief, Shirin Nilizadeh, Dana Nguyen, Giovanni Vigna, and Elizabeth Belding. 2018. Peer to Peer Hate: Hate
Speech Instigators and Their Targets. In ICWSM.
[37] Nels Ericson. 2001. Addressing the problem of juvenile bullying. US Department of Justice, Office of Justice Programs,
Office of Juvenile Justice and Delinquency Prevention Washington, DC.
[38] Jenny Rose Finkel, Trond Grenager, and Christopher Manning. 2005. Incorporating Non-local Information into
Information Extraction Systems by Gibbs Sampling. In Proc. of ACL (ACL '05). 363 -- 370.
[39] David Finkelhor, Kimberly J Mitchell, and Janis Wolak. 2000. Online Victimization: A Report on the Nation's Youth.
[40] Sharon Florentine. 2016.
Twitter needs to stop the harassment.
https://www.cio.com/article/3098441/
leadership-management/twitter-needs-to-stop-the-harassment-leslie-jones.html. (2016). [Online].
[41] Rolf Fredheim, Alfred Moore, and John Naughton. 2015. Anonymity and Online Commenting: The Broken Windows
Effect and the End of Drive-by Commenting. In Proceedings of the ACM Web Science Conference (WebSci '15).
[42] Dorothy Wunmi Grigg. 2010. Cyber-aggression: Definition and concept of cyberbullying. J. of psychologists and
counsellors in schools 20, 2 (2010), 143 -- 156.
(2000).
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:25
[43] Joshua Guberman, Carol Schmitz, and Libby Hemphill. 2016. Quantifying toxicity and verbal violence on Twitter. In
Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion.
ACM, 277 -- 280.
[44] Umair Haque. 2016.
The Reason TwitterâĂŹs Losing Active Users.
https://hbr.org/2016/02/
the-reason-twitters-losing-active-users. (2016). [Online].
[45] Claire Hardaker. 2010. Trolling in asynchronous computer-mediated communication: From user discussions to
academic definitions. (2010).
[46] Susan Herring, Kirk Job-Sluder, Rebecca Scheckler, and Sasha Barab. 2002. Searching for safety online: Managing"
trolling" in a feminist forum. The information society 18, 5 (2002), 371 -- 384.
[47] S Hinduja and JW Patchin. 2012. School climate 2.0: Reducing teen technology misuse by reshaping the environment.
(2012).
(2010), 206 -- 221.
[48] Sameer Hinduja and Justin W Patchin. 2007. Offline consequences of online victimization: School violence and
[49] Sameer Hinduja and Justin W Patchin. 2008. Cyberbullying: An exploratory analysis of factors related to offending
delinquency. Journal of school violence 6, 3 (2007), 89 -- 112.
and victimization. Deviant behavior 29, 2 (2008), 129 -- 156.
[50] Sameer Hinduja and Justin W Patchin. 2010. Bullying, cyberbullying, and suicide. Archives of suicide research 14, 3
[51] Sameer Hinduja and Justin W Patchin. 2015. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbul-
lying (2nd edition). Thousand Oaks, CA: Sage Publications.
[52] Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735 -- 1780.
[53] Hossein Hosseini, Sreeram Kannan, Baosen Zhang, and Radha Poovendran. 2017. Deceiving Google's Perspective
API Built for Detecting Toxic Comments. arXiv preprint arXiv:1702.08138 (2017).
[54] Homa Hosseinmardi, Amir Ghasemianlangroodi, Richard Han, Qin Lv, and Shivakant Mishra. 2014. Towards
understanding cyberbullying behavior in a semi-anonymous social network. In ASONAM '14. 244 -- 252.
[55] Homa Hosseinmardi, Shaosong Li, Zhili Yang, Qin Lv, Rahat Ibn Rafiq, Richard Han, and Shivakant Mishra. 2014. A
comparison of common users across instagram and ask. fm to better understand cyberbullying. In Big Data and Cloud
Computing (BdCloud), 2014 IEEE Fourth International Conference on. 355 -- 362.
[56] Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishr. 2015.
Prediction of Cyberbullying Incidents on the Instagram Social Network. arXiv preprint arXiv:1508.06257 (2015).
[57] Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015.
Detection of cyberbullying incidents on the instagram social network. arXiv preprint arXiv:1503.03909 (2015).
[58] John W Jones and G Anne Bogat. 1978. Air pollution and human aggression. Psychological Reports 43, 3 (1978),
[59] Jaana Juvonen and Elisheva F Gross. 2008. Extending the school grounds? -- Bullying experiences in cyberspace.
Journal of School health 78, 9 (2008), 496 -- 505.
[60] Maria Konnikova. 2015. How the Internet Has Changed Bullying.
https://www.newyorker.com/science/
maria-konnikova/how-the-internet-has-changed-bullying. (2015). [Online; The New Yorker].
[61] April Kontostathis, Kelly Reynolds, Andy Garron, and Lynne Edwards. 2013. Detecting cyberbullying: query terms
and techniques. In Proc. of ACM web science conference. ACM, 195 -- 204.
[62] Robin M Kowalski and Susan P Limber. 2007. Electronic bullying among middle school students. Journal of adolescent
721 -- 722.
health 41, 6 (2007), S22 -- S30.
age. John Wiley & Sons.
[63] Robin M Kowalski, Susan P Limber, Sue Limber, and Patricia W Agatston. 2012. Cyberbullying: Bullying in the digital
[64] Haewoon Kwak, Jeremy Blackburn, and Seungyeop Han. 2015. Exploring Cyberbullying and Other Toxic Behavior in
Team Competition Online Games. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing
Systems (CHI '15). 3739 -- 3748.
[65] Amanda Lenhart. 2007. Cyberbullying and online teens. (2007).
[66] Qing Li. 2007. New bottle but old wine: A research of cyberbullying in schools. Computers in human behavior 23, 4
(2007), 1777 -- 1791.
[67] Alice E Marwick et al. 2011. The drama! Teen conflict, gossip, and bullying in networked publics. (2011).
[68] Adrienne Massanari. 2017. #Gamergate and The Fappening: How Reddit's algorithm, governance, and culture support
toxic technocultures. New Media & Society 19, 3 (2017), 329 -- 346.
[69] Paul Mazerolle, Velmer S Burton, Francis T Cullen, T David Evans, and Gary L Payne. 2000. Strain, anger, and
delinquent adaptations specifying general strain theory. Journal of Criminal Justice 28, 2 (2000), 89 -- 101.
[70] Paul Mazerolle and Alex Piquero. 1998. Linking exposure to strain with anger: An investigation of deviant adaptations.
Journal of Criminal Justice 26, 3 (1998), 195 -- 211.
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
117:26
Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee
[71] David McNamee. 2016. Cyberbullying 'causes suicidal thoughts in kids more than traditional bullying'. https:
//www.medicalnewstoday.com/articles/273788.php. (2016). [Online].
[72] Yashar Mehdad and Joel Tetreault. 2016. Do Characters Abuse More Than Words?. In Proceedings of the 17th Annual
Meeting of the Special Interest Group on Discourse and Dialogue. 299 -- 303.
[73] Ersilia Menesini and Annalaura Nocentini. 2009. Cyberbullying definition and measurement: Some critical considera-
tions. Journal of Psychology 217, 4 (2009), 230 -- 232.
[74] Faye Mishna, Charlene Cook, Tahany Gadalla, Joanne Daciuk, and Steven Solomon. 2010. Cyber bullying behaviors
among middle and high school students. American Journal of Orthopsychiatry 80, 3 (2010), 362 -- 374.
[75] Vinita Nahar, Sayan Unankard, Xue Li, and Chaoyi Pang. 2012. Sentiment analysis for effective detection of cyber
bullying. In Asia-Pacific Web Conference. 767 -- 774.
[76] Tonja R Nansel, Mary Overpeck, Ramani S Pilla, W June Ruan, Bruce Simons-Morton, and Peter Scheidt. 2001.
Bullying behaviors among US youth: Prevalence and association with psychosocial adjustment. Jama 285, 16 (2001),
2094 -- 2100.
[77] Chikashi Nobata, Joel Tetreault, Achint Thomas, Yashar Mehdad, and Yi Chang. 2016. Abusive language detection in
online user content. In Proceedings of the 25th international conference on world wide web. 145 -- 153.
[78] Justin W Patchin and Sameer Hinduja. 2006. Bullies move beyond the schoolyard: A preliminary look at cyberbullying.
[79] Justin W Patchin and Sameer Hinduja. 2011. Traditional and nontraditional bullying among youth: A test of general
[80] Justin W Patchin and Sameer Hinduja. 2012. An update and synthesis of the research. Cyberbullying prevention and
Youth violence and juvenile justice 4, 2 (2006), 148 -- 169.
strain theory. Youth & Society 43, 2 (2011), 727 -- 751.
response: Expert perspectives (2012), 13.
[81] John Pavlopoulos, Prodromos Malakasiotis, and Ion Androutsopoulos. 2017. Deeper attention to abusive user content
moderation. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. 1125 -- 1135.
[82] James W Pennebaker, Martha E Francis, and Roger J Booth. 2001. Linguistic inquiry and word count: LIWC 2001.
Mahway: Lawrence Erlbaum Associates 71 (2001), 2001.
[83] Quang Anh Phan and Vanessa Tan. 2017. Play with Bad Words: A Content Analysis of Profanity in Video Games.
Acta Ludica-International Journal of Game Studies 1, 1 (2017), 7 -- 30.
[84] Team Rawhide. 2017. Teen Cyberbullying and Social Media Use on the Rise [INFOGRAPHIC]. http://www.rawhide.
org/blog/wellness/teen-cyberbullying-and-social-media-use-on-the-rise/. (2017). [Online].
[85] Kelly Reynolds, April Kontostathis, and Lynne Edwards. 2011. Using machine learning to detect cyberbullying. In
ICMLA, Vol. 2. 241 -- 244.
Study. In EMNLP.
[86] Alan Ritter, Sam Clark, Mausam, and Oren Etzioni. 2011. Named Entity Recognition in Tweets: An Experimental
357 -- 370.
[87] Alan Ritter, Mausam, Oren Etzioni, and Sam Clark. 2012. Open Domain Event Extraction from Twitter. In KDD.
[88] Niloofar Safi Samghabadi, Suraj Maharjan, Alan Sprague, Raquel Diaz-Sprague, and Thamar Solorio. 2017. Detecting
Nastiness in Social Media. In Proceedings of the First Workshop on Abusive Language Online. 63 -- 72.
[89] Huascar Sanchez and Shreyas Kumar. 2011. Twitter bullying detection. ser. NSDI 12 (2011), 15 -- 15.
[90] Shari Kessel Schneider, Lydia O'Donnell, Ann Stueve, and Robert WS Coulter. 2012. Cyberbullying, school bullying,
and psychological distress: A regional census of high school students. American Journal of Public Health 102, 1 (2012),
171 -- 177.
[91] Dorothy Seals and Jerry Young. 2003. Bullying and victimization: Prevalence and relationship to gender, grade level,
ethnicity, self-esteem, and depression. Adolescence 38, 152 (2003), 735.
[92] Pnina Shachaf and Noriko Hara. 2010. Beyond vandalism: Wikipedia trolls. Journal of Information Science 36, 3 (2010),
[93] Leandro Araújo Silva, Mainack Mondal, Denzil Correa, Fabrício Benevenuto, and Ingmar Weber. 2016. Analyzing the
Targets of Hate in Online Social Media.. In ICWSM. 687 -- 690.
[94] Vivek K Singh, Marie L Radford, Qianjia Huang, and Susan Furrer. 2017. " They basically like destroyed the school
one day": On Newer App Features and Cyberbullying in Schools.. In CSCW. 1210 -- 1216.
[95] Peter K Smith, Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil Tippett. 2008. Cyberbullying:
Its nature and impact in secondary school pupils. Journal of child psychology and psychiatry 49, 4 (2008), 376 -- 385.
[96] Duyu Tang, Bing Qin, Xiaocheng Feng, and Ting Liu. 2015. Effective LSTMs for Target-Dependent Sentiment
Classification. arXiv preprint arXiv:1512.01100 (2015).
[97] Robert S Tokunaga. 2010. Following you home from school: A critical review and synthesis of research on cyberbullying
victimization. Computers in human behavior 26, 3 (2010), 277 -- 287.
[98] Cynthia Van Hee, Els Lefever, Ben Verhoeven, Julie Mennes, Bart Desmet, Guy De Pauw, Walter Daelemans, and
Véronique Hoste. 2015. Automatic detection and prevention of cyberbullying. In International Conference on Human
and Social Analytics (HUSO 2015). IARIA, 13 -- 18.
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
Incivility
117:27
[99] Heidi Vandebosch and Katrien Van Cleemput. 2008. Defining cyberbullying: A qualitative research into the perceptions
of youngsters. CyberPsychology & Behavior 11, 4 (2008), 499 -- 503.
[100] Jing Wang, Ronald J Iannotti, and Tonja R Nansel. 2009. School bullying among adolescents in the United States:
Physical, verbal, relational, and cyber. Journal of Adolescent health 45, 4 (2009), 368 -- 375.
[101] Robb Willer, Ko Kuwabara, and Michael W Macy. 2009. The false enforcement of unpopular norms. Amer. J. Sociology
[102] Kirk R Williams and Nancy G Guerra. 2007. Prevalence and predictors of internet bullying. Journal of adolescent
[103] Nicholas Wolfson. 1997. Hate Speech, Sex Speech, Free Speech. (1997).
[104] Jun-Ming Xu, Kwang-Sung Jun, Xiaojin Zhu, and Amy Bellmore. 2012. Learning from bullying traces in social media.
115, 2 (2009), 451 -- 490.
health 41, 6 (2007), S14 -- S21.
In Proc. of NAACL. 656 -- 666.
[105] Michele L Ybarra, Danah Boyd, Josephine D Korchmaros, and Jay Koby Oppenheim. 2012. Defining and measuring
cyberbullying within the larger context of bullying victimization. Journal of Adolescent Health 51, 1 (2012), 53 -- 58.
[106] Michele L Ybarra and Kimberly J Mitchell. 2004. Youth engaging in online harassment: Associations with caregiver --
child relationships, Internet use, and personal characteristics. Journal of adolescence 27, 3 (2004), 319 -- 336.
[107] Michele L Ybarra and Kimberly J Mitchell. 2007. Prevalence and frequency of Internet harassment instigation:
Implications for adolescent health. Journal of Adolescent Health 41, 2 (2007), 189 -- 195.
[108] Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D Davison, April Kontostathis, and Lynne Edwards. 2009. Detection
of harassment on web 2.0. Proc. of the Content Analysis in the WEB 2 (2009), 1 -- 7.
[109] Xiang Zhang, Junbo Zhao, and Yann LeCun. 2015. Character-level convolutional networks for text classification. In
NIPS. 649 -- 657.
[110] Haoti Zhong, Hao Li, Anna Squicciarini, Sarah Rajtmajer, Christopher Griffin, David Miller, and Cornelia Caragea.
2016. Content-Driven Detection of Cyberbullying on the Instagram Social Network. (2016).
Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
|
1503.02373 | 3 | 1503 | 2015-09-16T06:03:23 | Measuring Technological Distance for Patent Mapping | [
"cs.SI",
"cs.CY",
"cs.DL",
"physics.soc-ph"
] | Recent works in the information science literature have presented cases of using patent databases and patent classification information to construct network maps of technology fields, which aim to aid in competitive intelligence analysis and innovation decision making. Constructing such a patent network requires a proper measure of the distance between different classes of patents in the patent classification systems. Despite the existence of various distance measures in the literature, it is unclear how to consistently assess and compare them, and which ones to select for constructing patent technology network maps. This ambiguity has limited the development and applications of such technology maps. Herein, we propose to compare alternative distance measures and identify the superior ones by analyzing the differences and similarities in the structural properties of resulting patent network maps. Using United States patent data from 1976 to 2006 and International Patent Classification system, we compare 12 representative distance measures, which quantify inter-field knowledge base proximity, field-crossing diversification likelihood or frequency of innovation agents, and co-occurrences of patent classes in the same patents. Our comparative analyses suggest the patent technology network maps based on normalized co-reference and inventor diversification likelihood measures are the best representatives. | cs.SI | cs | Measuring Technological Distance for Patent Mapping
Bowen Yan
SUTD-MIT International Design Centre
& Engineering Product Development Pillar
Singapore University of Technology and Design
8 Somapah Road, Singapore 487372
Email: [email protected]
Jianxi Luo*
SUTD-MIT International Design Centre
& Engineering Product Development Pillar
Singapore University of Technology and Design
8 Somapah Road, Singapore 487372
Email: [email protected]
* Corresponding author
Abstract
Recent works in the information science literature have presented cases of using patent
databases and patent classification information to construct network maps of technology
fields, which aim to aid in competitive intelligence analysis and innovation decision making.
Constructing such a patent network requires a proper measure of the distance between
different classes of patents in the patent classification systems. Despite the existence of
various distance measures in the literature, it is unclear how to consistently assess and
compare them, and which ones to select for constructing patent technology network maps.
This ambiguity has limited the development and applications of such technology maps.
Herein, we propose to compare alternative distance measures and identify the superior ones
by analyzing the differences and similarities in the structural properties of resulting patent
network maps. Using United States patent data from 1976 to 2006 and International Patent
Classification system, we compare 12 representative distance measures, which quantify inter-
field knowledge base proximity, field-crossing diversification likelihood or frequency of
innovation agents, and co-occurrences of patent classes in the same patents. Our comparative
analyses suggest the patent technology network maps based on normalized co-reference and
inventor diversification likelihood measures are the best representatives.
Keywords: information mapping, patents, innovation, technology networks, technological
distance
2
1. Introduction
To pursue innovation, inventors, companies or R&D organizations, cities or countries
continually diversify to explore technology fields different from their past ones, or combine
their existing knowledge with those of new fields to build new technological capabilities
(Schumpeter, 1934; Dosi, 1982). Therefore, innovation can be viewed as a process of
searching and combining knowledge across different technology fields. The variety of
technology fields together constitutes the “technology space”, in which the fields may have
different distances between each other (Teece et al., 1994; Breschi et al., 2003; Kay et al.,
2014). In turn, the heterogeneous structure of the technology space may condition the
diversification paths or knowledge recombination prospects of innovation agents (e.g.,
Thomas Edison, Google, China) with different knowledge positions in the space, and
condition the development potentials of specific technologies (e.g., fuel cells, robots, aircrafts)
given the positions of their knowledge base in the whole technology space.
Recent studies have proposed to represent the technology space as a network map of
technology fields based on mining patent data (Leydesdorff et al., 2014; Kay et al., 2014;
Nakamura et al., 2014). In such a network, a vertex represents a technology field and is
operationalized as a patent technology class. The weighted edge between a pair of vertices
denotes the distance between the vertex-represented technology fields. One can also overlay
such a network map by highlighting a subset of fields that are associated with a technological
design domain of interest (e.g., robotics, fuel cells), or the innovative activities of an
innovation agent (Kay et al., 2014). Fig. 1 illustrates an example of the network overlaid with
a subset of highlighted fields where Google Inc. had been granted US patents over time. Such
an overlay map locates the fields where a specific agent has developed innovation capabilities
and also reveals the evolution of such capabilities.
Assessment of the relative network positions of the subset of fields on the overlaid map
may illuminate new fields that are proximate to them in the technology space and present
great knowledge recombination potential with them (Fleming, 2001; Nakamura et al., 2014).
Such analyses may also lead to insights on the directions and paths of technology
diversification of an innovation agent, e.g., firm, city or country (Breschi et al., 2003; Rigby,
2013; Boschma et al., 2014), or help forecast development directions and potentials of an
emerging technology, e.g., fuel cells or solar cells (Kajikawa et al., 2008; Ogawa and
Kajikawa, 2015; Benson and Magee, 2013; 2015), given the locations of its established
knowledge base in the technology space. In general, such a map of technology fields will be
3
useful to aid in technology road mapping of innovation agents or technology-based industries
and forecasting development directions of emerging technologies.
Fig. 1. Example of the technology network map overlaid with Google’s knowledge positions.1 Each vertex
represents a 3-digit technology class defined in the International Patent Classification (IPC) system, and its size
corresponds to the total number of patents in the class from 1976 to 2006. An edge between pairs of vertices is
measured as inventor cross-field diversification likelihood (see details of the measure in Section 2 and Section
3.2). The original network is extremely dense. The network visualized here contains the maximum spanning tree
(i.e., a minimal set of edges that connect all vertices and maximize total edge weights) as the backbone plus the
strongest edges, which together make the total number of edges be twice of the vertices, as suggested by
Hidalgo et al. (2007) for best visualization. A vertex is highlighted in red color if Google had patents in the
corresponding technology class in a given time period. Details about this network are in Section 4.1.
For such a network to adequately represent the technology space requires an appropriate
measure of the distance between different technology fields (Jaffe, 1986; Joo and Kim, 2010;
Altuntas et al., 2015). Although various distance measures have been proposed from different
perspectives in the literature (see a review of the measures in Section 2), they have not been
assessed and compared using consistent criteria or methodology. It is unclear which measures
are superior for the purpose of constructing technology network maps, and which measures
are more representative of the others. This ambiguity has limited the use of technology
network maps in technology forecasting and roadmap analyses.
In this paper, we recognize that the choice of inter-field distance measures determines the
structure of the technology network to be constructed, which in turn influences the
innovation-related insights to be drawn from the network analysis. Following this logic, we
1 Fig. 1 highlights that Google’s first patents were in IPC class G06 computing in 2003. Later, Google diversified into
additional fields. In 2006, it had patents in H03 electronic circuitry, H04 electronic communication and H05 electric
techniques, and G10 music instruments and acoustics, in addition to G06. These new fields appear to be proximate to the
original field G06, within the core of the technology network map.
4
propose a strategy to use the structures of the overall technology networks resulting from the
choices of distance measures as the lens or protocol to assess and compare corresponding
measures. We also demonstrate this strategy through a comparative analysis of twelve
alternative distance measures, by using a few network metrics and patent data from United
States Patent and Trademark Office (USPTO). These twelve measures are chosen as
representatives of the main types of distance measures in the literature. Our analyses yield
new understandings on the differences and similarities of these measures, and also shed light
on some of these measures that yield more representative network maps than others for
constructing technology network maps.
The paper is organized as follows. We first survey the literature on various quantitative
measures of the distance of technology fields in Section 2. Section 3 introduces our data,
methodology and twelve distance measures. Section 4 reports and discusses results. Section 5
concludes the paper with suggestions for future work.
2. Literature review: Measures of distance between technology fields
In the literature, various technological distance measures have been developed, using the
information of references, classifications and inventor identities in patent documents. Some
of these measures were noted as “technological proximity”, which is direct reverse concept of
technological distance (Jaffe, 1986; Leydesdorff et al., 2014).
2.1 Patent reference-based measures
One strand of the measures uses patent citation information to calculate indicators of
knowledge distance of different technology fields. For instance, to construct the network map
of IPC classes, Leydesdorff et al. (2014) used the cosine similarity index to normalize the
citing-to-cited relationships between technology classes in an aggregated citation matrix. The
angular cosine value of the two vectors of citations from two classes to other classes captures
the similarity of their knowledge bases. Kay et al. (2014) also used the cosine similarity as
the measure of technological distance among different patent categories, some of which
combine original IPC patent classes to optimize the size distribution of classes for the sake of
visualization. Indeed, Jaffe (1986) was the first to propose this index for technology mapping,
whereas he used it to measure the correlation between the vectors representing the
distributions of firms’ patents in a set of technology fields.
In addition, to measure the knowledge distance between patents, co-citations, i.e., the
number of shared forward citations of two patents, and bibliographic coupling, i.e., the
number of shared backward citations (i.e. references) of two patents, were popularly used
5
(Iwan von Wartburg et al., 2005; Leydesdorff and Vaughan, 2006). A co-citation index can
be further normalized over the total number of citations for each article, i.e., the Jaccard
index (Small, 1973), or over a probabilistic measure of expected co-citation counts (Zitt et al.,
2000). The formulas of co-citations or bibliographic coupling of patents or academic articles
can be adopted to measure and indicate the distance of different technology classes.
2.2 Patent classification-based measures
Scholars have also used the “co-classification” information of patents to develop indicators
of the distance between technology classes. A patent belongs to at least one, but usually
multiple classes assigned by the patent examiners of the issuing offices. Using this
information, the distance between technology fields can be indicated by the co-occurrence of
classification codes assigned to individual patent documents (Engelsman and van Raan,
1994). The assumption is that the frequency in which two classes are jointly assigned to the
same patents will be high if these two classes are proximate. This assumption is similar to the
survivor principle in economics (Stigler, 1968), which suggests that surviving firms’
behaviors are more observable in empirical data, because they are more efficient and thus
make firms survive and observable.
Jaffe (1986) was also the first to apply the cosine index to measuring the distance of firms’
technological portfolios based on the symmetrical matrix of the frequency of two technology
classes being jointly assigned to the same patent that belongs to the observed firms. Later, the
cosine index was adopted for the general symmetrical co-occurrence matrix in which each
cell represents the total number of patents that are assigned with both technology fields
represented by the respective row and column (Breschi et al., 2003; Ejermo, 2005; Kogler et
al., 2013). Leydesdorff and Vaughan (2006) argued that the symmetrical co-occurrence
matrix contains similarity data and can be analyzed directly, whereas further normalization of
the co-occurrence matrix using the Pearson correlation or cosine may distort the data and
generate spurious correlations.
Leydesdorff (2008) further proposed to analyze the asymmetrical classification assignment
matrix, with patents as the units of analysis and the technology classes as the column
variables, and use the cosine index to associate the column variables. He also found that
networks built using classification data match poorly with those generated by citation data,
and the classification data might be less useful than co-citation data for technology network
mapping, primarily because the classifications were assigned poorly by the ISI staff. In
addition, Joo and Kim (2010) also argued that co-classification measures may not directly
assess the distance of technology fields and proposed to create a multi-dimensional
6
contingency table to represent patent classification data and apply the Mantel-Haenszel
common odds ratio on the table for measurement.
Furthermore, Nesta and Dibiaggio (2005), using the typical co-occurrence matrix,
measured the deviation of the number of observed patents shared between classes from the
expected number of randomly shared patents, in order to reveal the distance among fields,
following Teece et al. (1994) who initially developed this normalization method to measure
the distance between industrial fields. This measure takes a t-statistic form and adjusts for the
effects of class sizes. Similarly, recognizing the uneven importance of different patents and
their classes, Altuntas et al. (2015) used the data of forward citations of each patent and of the
size of each technology class in terms of total patent count to weight each patent occurring
between a pair of technology classes, when counting the occurrences of the same patents in a
pair of classes.
2.3 Likelihood of diversification as measures of distance
Another group of measures utilizes the data on field-crossing diversification behaviors of
innovation agents (e.g., countries, regions, cities, organizations or inventors) to indicate the
proximity (the reverse of distance) between technology fields. In studying the product space,
Hidalgo et al. (2007) measured the proximity between two product categories in terms of the
likelihood for an average country to develop strong relative comparative advantage (RCA) in
one product category, given that it has developed strong RCA in the other. The assumption is
that this likelihood is high if the capabilities required to produce products in one category are
similar to those required to produce another product. In other words, the likelihood of the
diversification of countries across two product categories may indicate the proximity of the
knowledge base of these two product categories. Boschma et al. (2013) applied the same
proximity measure to studying the diversification of productive capabilities of different
regions in Spain based on export product categories.
Although the studies of product space were based on export and import data and the
custom classifications of products, their proximity measure can be adapted to patent data and
patent technology classifications. For instance, a mathematically similar index called the
revealed technological advantage (RTA) has been used to measure the pattern of
technological specialization of innovation agents (Cantwell and Vertova, 2004; Hall et al.,
2001). Boschma et al. (2014) applied this measure to calculating the likelihood of technology
diversification at the region and city levels, and used such a likelihood as edge weight in the
network of patent technology classes.
7
In parallel, Teece et al. (1994) estimated how much the frequencies that firms diversify in
combinations of 4-digit SIC industries deviate from what one would expect if diversification
patterns were random. They called it a “survivor-based measure”, because their inspiration
was from the survivor principle in economics (Stigler, 1968), which suggests that efficient
firms survive and contribute to empirical observations and regularity. Following the survivor
principle, Teece et al. argued that one can observe that firms diversify more often across
industries that are more proximate, so that the number of diversifying firms in a pair of
industries may indicate the distance of the industries. Particularly, this measure is superior in
that it extracts the information about the true distance in the number of empirical observations
by comparing it to the expected value under the hypothesis that diversification is random and
not affected by the true distance. In doing so, it adjusts for industry size such that it can be
compared consistently across industry pairs. Despite being initially developed to measure
industry distance, this measure can be easily leveraged to measure the distance of technology
fields, based on patent data.
2.4 Other measures
In addition to the information on references, classifications, and inventor identities in
patent documents, patent texts have also been analyzed to measure the distance of different
technologies and fields. For instance, Nakamura et al. (2014) measured the technological
distance of patents in the sub-domains of automobile and aircraft industries by using cosine
similarity of the vectors representing occurrence frequencies of words in the patent titles and
abstracts of pairs of sub-domains. Fu et al. (2013) proposed a technological distance measure
as the text similarity between patents in terms of the functional meanings of the verbs that
appear in the description texts of patents. Information of “functional similarity” is useful,
because those different solutions or mechanisms used in different inventions to address
similar functions present great potential to be recombined into new technologies.
Despite the variety of distance measures in the literature, they have not been assessed and
compared using a consistent methodology or criterion. To address this gap, this paper
presents a strategy and methodology to assess and compare alternative measures by
investigating the similarities and differences in the structures of their resulting technology
networks. To implement this strategy, we analyze twelve distance measures that belong to the
categories of measures reviewed in Section 2.1, 2.2 and 2.3, respectively.
8
3. Data and methodology
3.1 Data
The vertices in our technology network maps are patent classes defined in the International
Patent Classification (IPC) system, following many other authors who have considered IPC
classes the most suitable and stable representations of technology fields (Leydesdorff et al.,
2014).2 The IPC system includes 8 broad technical domains, which can be subdivided into,
for example, 3-digit and 4-digit level subclasses. For the best visualization without losing
necessary details and resolution of the technology landscape, we chose 3-digit classes to
represent vertices in networks. Some undefined classes, for example, “A99 - subject matter
not otherwise provided for in this section,” are excluded from the analysis. As a result, the
networks contain 121 vertices, i.e. 3-digit level IPC classes. We use the patent data from
1976 to 2006 from United States Patent & Trademark Office (USPTO) and NBER Patent
Data Project3. The data set contains 3,186,310 utility patents. Each patent is classified in one
or multiple IPC classes.
3.2 Distance measures
The literature review has shed light on at least four categories of distance measures:
1) the proximity (either similarity or relatedness) of knowledge bases of the innovation
activities in a pair of technology fields, using patent citation data;
2) the likelihood for the same innovation agents (i.e., inventors, R&D organizations, or
countries) to invent technologies in a pair of technology fields, using data on the
successful patenting records of the agents (i.e., in which classes one has patents);
3) the frequency to observe the same innovation agents inventing technologies in a pair
of technology fields, using data on the successful patenting records of the agents;
4) the frequency to observe a pair of technology fields being assigned to the same
patents, using data on the co-classifications of patents.
In this paper, we choose to analyze 3 specific measures that are most representative for
each above category, totaling 12 measures. Table 1 summarizes these 12 measures that follow
respective rationales.
2 This paper focuses on comparing vertex distance measures, so vertex definitions are fixed. Future research may conduct
similar analyses based on different definitions of vertices, such as United States Patent Classes and recently proposed hybrid
patent categories (Kay et al. 2014; Bensen and Magee, 2013; 2015).
3 NBER Patent Data Project website: https://sites.google.com/site/patentdataproject/Home
9
Table 1 Twelve distance measures in four different categories
Rationale
A: Similarity or
relatedness of
knowledge bases
Data required
Patent references
B: Likelihood for
innovation agents
to diversify across
fields
Bibliographical
information of
inventors,
assignees and
regions
C: Frequency to
observe innovation
agents diversifying
across fields
Bibliographical
information of
inventors,
assignees and
regions
D: Frequency for
technology fields to
share same patents
Information of
multiple classes
assigned to the
same patent
Measures
A1: Normalized co-
reference
A2: Class-to-class
cosine similarity
A3: Class-to-patent
cosine similarity
B1: Inventor
diversification
likelihood
B2: Organization
diversification
likelihood
B3: Country
diversification
likelihood
C1: Inventor co-
occurrence frequency
C2: Organization co-
occurrence frequency
C3: Country co-
occurrence frequency
D1: Normalized co-
classification
D2: Co-classification
cosine similarity
D3: Patent co-
occurrence frequency
Definitions
The count of shared citations, normalized by the
count of all unique citations of patents in a pair
of classes
The cosine of the angle of the two vectors
representing two technology classes’
distributions of citations into all patent classes
The cosine of the angle of the two vectors
representing two technology classes’
distributions of citations into unique patents
Minimum of the pairwise conditional
probabilities of an inventor having stronger than
average patenting records in one class, given that
he also has stronger than average records in the
other
Minimum of the pairwise conditional
probabilities of an organization having stronger
than average patenting records in one class,
given that it also has stronger than average
records in the other.
Minimum of the pairwise conditional
probabilities of a country having stronger than
average patenting records in one class, given that
it also has stronger than average records in the
other
The deviation of the number of shared inventors
of a pair of technology classes from the expected
value under the hypothesis that diversification
patterns are random.
The deviation of the number of shared inventing
organizations of a pair of technology classes
from the expected value under the hypothesis
that diversification patterns are random.
The deviation of the number of shared inventing
countries of a pair of technology classes from
the expected value under the hypothesis that
diversification patterns are random.
The number of shared patents of a pair of
technology classes, normalized by the number of
all unique patents in both classes.
The cosine of the angle of the two vectors
representing two technology classes’
distributions of shared patents with all other
technology classes.
The deviation of the number of shared patents of
a pair of technology classes from the expected
value under the hypothesis that classes are
randomly assigned to patents.
The first group of measures (A1, A2 and A3) uses the information of backward citations
(i.e. references) of patents, which represent the knowledge inputs to innovation activities, to
measure either relatedness or similarity of knowledge bases or inputs of different classes.
A1. “Normalized co-reference”: the count of shared references, normalized by the total
count of all unique references of patents in a pair of classes, formulated as
10
Co-Reference
=
C C
∩
i
C C
∪
i
j
j
(1)
where Ci and Cj are the numbers of backward citations (i.e., references) of patents in
technology classes i and j;
C C∩
i
j
is the number of patents referenced in both technology
classes i and j, and
C C∪
i
j
is the total number of unique patents referenced in both
technology classes i and j, respectively. It is also known as the Jaccard index (Jaccard, 1901).
A2. “Class-to-class cosine similarity”: the cosine of the angle of the two vectors
representing two technology classes’ distributions of citations into all patent classes
(Leydesdorff, 2007), formulated as
Cosine( , )
j
i
= ∑
k
2
C
ik
∑
k
C C
ik
jk
∑
k
C
2
jk
(2)
where Cij denotes the number of citations referred from patents in technology class i to the
patents in technology class j; k belongs to all the technology classes. The cosine value is
between [0,1] and indicates the similarity of the knowledge bases of two fields.
A3. “Class-to-patent cosine similarity”: the cosine of the angle of the two vectors
representing two technology classes’ distributions of citations into specific unique patents
instead of aggregated classes. The same formula as (2) applies, but Cij now denotes the
number of citations of all patents in class i to the specific patent j. Measure A3 has a better
resolution than measure A2, whereas computation is slightly more complex.
The next two groups of measures, B1-B3 and C1-C3, similarly utilize the patent
information related to successful inventive behaviors of different types of agents (inventors,
organizations and countries) in terms of which classes their patents are assigned in. These
measures generally indicate the likelihood or frequency that innovation agents diversify
across a pair of technology fields. We separate them into two groups, B and C, due to the
difference in their mathematical formulas.
B1. “Inventor diversification
likelihood”: minimum of
the pairwise conditional
probabilities (Rij) of an inventor having strong inventing records in one class, given that this
person also has strong inventing records in the other
=
R
ij
min{
Prob
(RTA RTA ),
Prob
(RTA RTA )}
,
c j
,
c i
,
c i
,
c j
(3)
where RTAc,i and RTAc,j denotes inventor c’s revealed technological advantage in technology
class i and j.
11
RTA
,
c i
=
(
)
,
x c i
(
,
x c i
∑
i
)
)
(
,
x c i
)
(
,
x c i
,
c i
c
∑
∑
where (cid:1)(cid:2)c,i(cid:3) is the number of patents held by an inventor c in technology class i; ∑ x(c,i)
i
(4)
is
the number of patents held by an inventor c in all technology classes; ∑ x(c,i)
c
is the total
number of patents held by all inventors c in class i; ∑ x(c,i)
c,i
is the total number of patents in
the observed data. RTAc,i is an indicator of the relative inventive capacity of inventor c in
class i. RTAc,i > 1 means inventor c has more patents in class i as a share of the inventor’s
total patents than an “average” inventor; otherwise, if RTAc,i ≤ 1 . The mathematical
formulation is adopted from Hidalgo et al. (2007). A high Rij value indicates a higher
likelihood for an inventor to leverage knowledge across technology fields i and j for
innovation, or to diversify personal inventive activities across fields i and j. To calculate this
measure, we use the unique inventor identifiers from the Institute for Quantitative Social
Science at Harvard University (Li et al., 2014).
B2. “Organization diversification likelihood”: the formula is the same as the “inventor
diversification likelihood” above (Eq. 3 and Eq. 4), except that the agent is now an
“organization”, which is often a company, university, or public R&D institute. The
organizations are identified using the “unique assignee” identifiers created by the National
Bureau of Economics Research (NBER) (Hall et al., 2001).
B3. “Country diversification likelihood”: the formula is the same as the “inventor
diversification likelihood” above (Eq. 3 and Eq. 4), except that the agent is now a country.
Measures C1, C2 and C3 employ the form of a measure, which Teece et al. (1994) first
proposed to indicate the relatedness between industries, following the “survivor principle” in
economics. Applied to the context of technology classes, the measure compares the
empirically observed frequency of co-occurrences of a pair of technology classes in the
patenting records of the same inventors, organizations or countries, to the expected frequency
in a random co-occurrence situation controlled for the sizes of technology classes.
C1: “Inventor co-occurrence frequency”: the deviation of the empirically observed number
of inventors occurring in a pair of technology classes from the value that would be expected
when technology classes are randomly assigned to inventors. The formula is,
m
ij
=
r
ij
O
ij
s
ij
(5)
where Oij is the observed number of inventors active in both technology classes i and j, i.e.
the count of inventor-level occurrences of patent technology classes i and j; µ ij and σij are the
12
-
mean and variance of the expected number of inventors active in both classes i and j, given
by a hypergeometric distribution. The hypoergeometric distribution defines µ ij and σij as
m =
ij
N N
i
T
j
s
2
=
m
(
ij
T N
T
i
)(
T N
1
T
j
)
(6)
(7)
where T is the total number of inventors having two or more technology classes; Ni and Nj are
the number of inventors empirically observed in technology i and j, respectively. Thus rij is
analogous to a t-statistic. It indicates that, when the actual number Oij observed between
classes i and j greatly exceeds the expected number µ ij, these two technology fields are
considered highly proximate.
This measure controls for the effect of the sizes of technology classes on inventor
appearances in them. If technology classes have many inventors, i.e. Ni (or Nj) is large, the
chance for inventors in Ni (or Nj) to be active in class j would be high, even if classes i and j
are distant. When Ni or Nj is small, one would not expect to see many co-occurrences even if
classes i and j are highly proximate. µ ij estimates the co-occurrence frequency resulting only
from the size effect but not from the effect of knowledge distance. Therefore, rij extracts the
information in Oij about actual distance.
C2. “Organization co-occurrence frequency”: the formula is the same as “inventor co-
occurrence frequency” above (Eq. 5-7), except that the agent is now an “organization”, which
is often a company, university, or public R&D agency.
C3. “Country co-occurrence frequency”:
the formula
is
the same as “inventor
diversification likelihood” above (Eq. 5-7), except that the agent is now a country.
The last group of measures (D1, D2 and D3) uses the information of the co-classifications
of patents to quantify the co-occurrences of a pair of technology classes in the same patents.
Co-classification means that a patent is assigned to more than one class. Patent examiners
based on their assessments of the inventions carry out the assignment activity.
D1. “Normalized co-classification”: the count of shared patents, normalized by the total
count of unique patents in a pair of classes, formulated as
Co-Classification
=
N
N
i
i
∩
∪
N
N
j
j
(8)
where Ni and Nj are the number of patents in technology classes i and j, respectively;
N
i
N∩
j
is the number of shared patents in both technology classes i and j, and
N
i
N∪
j
is the total
number of unique patents in both technology classes i and j.
13
-
-
-
D2. “Co-classification cosine similarity”: the cosine of the angle of the two vectors
representing two technology classes’ distributions of patents shared with all other technology
classes, formulated as
Cosine( , )
j
i
= ∑
k
2
O
ik
∑
k
O O
ik
jk
∑
k
O
2
jk
(9)
where Oij is the number of shared patents in both technology classes i and j.
D3: “Patent co-occurrence frequency”: the deviation of the empirically observed number of
patents occurring in a pair of technology classes from the value that would be expected when
technology classes are randomly assigned to patents. Its formulas are the same as those for
inventor, organization and country co-occurrence frequencies, i.e. Eq. (5)-(7). But here the
variables are given new meanings: Oij is the number of shared patents in both classes i and j;
T is the total number of patents having two or more technology classes; Ni and Nj are the
number of patents in classes i and j, respectively. D3 concerns the frequency of patents being
assigned to a pair of classes, differing from C1, C2 and C3 that concern the frequency of
innovation agents being active in a pair of classes.
By far we have introduced 12 measures to be analyzed in Section 4. While some measures
(such as A2, B3, D2 and D3) have appeared in prior studies of technology networks, the
others (such as A1, A3, B1, B2, C1, C2, C3 and D1) are new. A1 and D1 use the formula of
well-established Jaccard index, but are new to the literature on patent network mapping.
While A3 employs the cosine formula of A2 that has been used to construct patent
technology networks (Leydesdorff et al., 2014; Kay et al., 2014), it is new in that it considers
the distribution of citations to unique patents, rather than classes, in order to improve
measurement resolution. The formula for B1, B2 and B3 first appeared in the studies on the
diversification of countries or regions in the product space based on export product data
(Hidalgo et al., 2007; Boschma et al., 2014). To our best knowledge, the present paper is the
first to apply this formula to the analysis levels of inventors and inventive organizations in the
context of technology and patent classes. Thus we consider B1 (inventor diversification
likelihood) and B2 (organization diversification likelihood) are new to the literature.
Likewise, the formula of C1, C2 and C3 was first developed to measure industry relatedness
(Teece et al., 1994). Here, it is the first time that the formula is used to measure the frequency
of innovation agents having patents in pairs of patent technology classes.
14
3.3 Strategy of comparison
Because these distance measures deal with the same underline structure of the technology
space, the overall network map structures resulting from them are expected to be similar. The
maps that exhibit the highest structural similarities with all other maps are the best
representatives out of this set of alternative maps to represent the underlining technology
space. Therefore, after the networks of the 121 IPC classes are constructed by using the
twelve distance measures, we investigate their pairwise correlations/similarities in terms of
network structural properties, for example, weights of corresponding edges and centralities of
corresponding vertices in different networks.
To calculate the centrality of each vertex, we employ the two most commonly used
network centrality metrics in graph theory, because of their applicability to weighted
undirected networks. One is degree centrality, which is the sum of the weights of the edges
connected to the focal vertex. The other is eigenvector centrality, which is the value of the
focal vertex’s respective element in the dominant eigenvector of the adjacency matrix of the
network (Newman, 2005). We also assess the correlation between vertex centralities and the
indicators of “importance” of technology classes (e.g., total numbers of patents and forward
citation counts of patents in a class), in the 12 technology networks.
4. Results
Before comparing different types of networks, we first examine the over-time changes of
each of them. Table 2 reports the Pearson coefficients of correlations of the weights of
corresponding edges in different time periods for each network. It is shown that the
correlations between networks of the same type but in different time periods are generally
high (in most cases, higher than 0.9), indicating that network changes over time are fairly
slow regardless of the choices of distance measures. Such observations are consistent with the
prior study of Hinze et al. (1997) that also suggested the stability of the network of
technology fields.
In the meantime, these two networks based on measures of the likelihood and frequency of
country-level cross-field diversification (B3 and C3) are the least stable over time, as
indicated by their lowest correlation coefficients in the range of 0.5~0.6. For all measures, the
network based on data for the longest time period (1976 to 2006) is the most correlated with
all other networks constructed using data for single decades (e.g. 1977 to 1986, 1987 to 1996,
1997 to 2006). Therefore, in later analyses we focus on the networks constructed using our
15
total patent data from 1976 to 2006, to have the most representative empirical approximation
of the distance between technology fields.
Table 2 Correlation coefficients of edge weights in the same technology network for different time periods
A1. Normalized co-reference
1977-1986
1987-1996
1997-2006
1976-2006
A2. Class-class cosine
1977-1986
1987-1996
1997-2006
1976-2006
A3. Class-patent cosine
1977-1986
1987-1996
1997-2006
1976-2006
B1. Inventor diversification likelihood
1977-1986
1987-1996
1997-2006
1976-2006
B2. Organization diversification likelihood
1977-1986
1987-1996
1997-2006
1976-2006
B3. Country diversification likelihood
1977-1986
1987-1996
1997-2006
1976-2006
C1. Inventor co-occurrence frequency
1977-1986
1987-1996
1997-2006
1976-2006
C2. Organization co-occurrence frequency
1977-1986
1987-1996
1997-2006
1976-2006
C3. Country co-occurrence frequency
1977-1986
1987-1996
1997-2006
1976-2006
D1. Normalized co-classification
1977-1986
1987-1996
1997-2006
1976-2006
D2. Co-classification cosine
1977-1986
1987-1996
1997-2006
1976-2006
D3. Patent co-occurrence frequency
1977-1986
1987-1996
1997-2006
1976-2006
1997-2006
1.000
0.987
1997-2006
1.000
0.987
1997-2006
1.000
0.973
1997-2006
1.000
0.972
1997-2006
1.000
0.969
1997-2006
1.000
0.819
1997-2006
1.000
0.979
1997-2006
1.000
0.968
1997-2006
1.000
0.889
1997-2006
1.000
0.904
1997-2006
1.000
0.948
1997-2006
1.000
0.957
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1976-2006
1.000
1987-1996
1.000
0.951
0.977
1987-1996
1.000
0.882
0.921
1987-1996
1.000
0.812
0.913
1987-1996
1.000
0.916
0.973
1987-1996
1.000
0.938
0.969
1987-1996
1.000
0.633
0.752
1987-1996
1.000
0.942
0.978
1987-1996
1.000
0.932
0.965
1987-1996
1.000
0.687
0.746
1987-1996
1.000
0.741
0.947
1987-1996
1.000
0.874
0.954
1987-1996
1.000
0.890
0.973
1977-1986
1.000
0.952
0.894
0.937
1977-1986
1.000
0.896
0.817
0.874
1977-1986
1.000
0.877
0.712
0.817
1977-1986
1.000
0.943
0.846
0.928
1977-1986
1.000
0.929
0.864
0.935
1977-1986
1.000
0.592
0.547
0.654
1977-1986
1.000
0.950
0.879
0.939
1977-1986
1.000
0.938
0.886
0.938
1977-1986
1.000
0.541
0.483
0.606
1977-1986
1.000
0.922
0.654
0.896
1977-1986
1.000
0.873
0.784
0.912
1977-1986
1.000
0.923
0.810
0.931
16
To develop a general intuition about technology network structures, we visualize these
twelve networks, using VOSviewer that was initially created to visualize bibliometric
networks. Leydesdorff et al. (2014) showed that it also provides good visualizations of patent
technology networks. As an example, Fig. 2 visualizes the technology network constructed
by using the measure of inventor diversification likelihood (B1). This network is also the
background map used in Fig. 1 to locate the specific knowledge positions of Google and to
reveal its innovation directions or diversification paths by overlaying.
These networks are almost fully connected, but most of the edges have extremely small
values, indicating long distance between most fields. Therefore, to visually reveal its main
structure, we filter the network to contain only the maximum spanning tree4 as the skeleton
plus the strongest edges, which together make the total number of edges be twice that of the
vertices. Hildago et al. (2007) suggested this threshold of edge filtering as a rule of thumb for
good network visualization. Fig. 2 is such a filtered network. It exhibits a heterogeneous
structure, with six communities of technology fields identified by the Louvain community
detection method (Blondel et al., 2008). The heterogeneity, instead of homogeneity, of the
structure of technology networks justifies it as a good lens or protocol for the comparison of
alterative networks.
Fig. 2 The technology network using the inventor diversification likelihood as distance measure. Vertex sizes
correspond to the total patent counts in respective IPC patent classes; vertex colors denote different communities.
4 A maximum spanning tree (MST) only keeps those strongest edges that minimally connect the network into a
tree. The MST for the network in Fig. 2 contains the strongest 120 edges that connect all 121 vertices into a tree.
17
4.1 Correlation of edge weights between different networks
To compare the structures of the 12 networks, we first investigate the Pearson correlation
coefficient between the edge weights of corresponding pairs of technology classes in different
networks (see Table 3). In Table 3, we underline the highest correlation coefficient between
each measure and any other measures, and also report the average of the correlation
coefficients of one measure with all other 11 measures. In respective categories (A, B, C and
D),
the networks using
the measures of normalized co-reference (A1),
inventor
diversification likelihood (B1), inventor co-occurrence frequency (C1) and co-classification
(D1) are the most correlated with all other types of networks. This result suggests, A1, B1,
C1 and D1 lead to the most representative networks in their respective groups.
Table 3 Correlation coefficients of edge weights between technology networks (1976-2006)
A1
A2
A3
B1
B2
B3
C1
C2
C3
D1
D2
D3
Average
A1
0.541
0.857
0.915
0.785
0.178
0.792
0.723
0.145
0.736
0.453
0.587
0.610
A2
0.541
0.661
0.482
0.414
0.021
0.592
0.460
-0.119
0.454
0.446
0.490
0.404
B1
A3
0.857 0.915
0.661 0.482
0.814
0.814
0.664 0.840
0.142 0.205
0.775 0.827
0.622 0.737
0.083 0.191
0.734 0.836
0.350 0.398
0.635 0.666
0.576 0.628
B2
0.785
0.414
0.664
0.840
0.389
0.703
0.866
0.371
0.609
0.431
0.522
0.599
B3
0.178
0.021
0.142
0.205
0.389
0.259
0.288
0.428
0.139
0.171
0.228
0.223
C1
0.792
0.592
0.775
0.827
0.703
0.259
0.714
0.134
0.736
0.451
0.898
0.626
C2
0.723
0.460
0.622
0.737
0.866
0.288
0.714
0.413
0.529
0.489
0.522
0.578
C3
0.145
-0.119
0.083
0.191
0.371
0.428
0.134
0.413
0.085
0.133
0.112
0.180
D1
0.736
0.454
0.734
0.836
0.609
0.139
0.736
0.529
0.085
0.238
0.735
0.530
D2
0.453
0.446
0.350
0.398
0.431
0.171
0.451
0.489
0.133
0.238
0.279
0.349
D3
0.587
0.490
0.635
0.666
0.522
0.228
0.898
0.522
0.112
0.735
0.279
0.516
* Distance measures: (A1) normalized co-reference; (A2) class-to-class cosine similarity; (A3) class-to-patent cosine
similarity; (B1) inventor diversification likelihood; (B2) organization diversification likelihood; (B3) country diversification
likelihood; (C1) inventor co-occurrence frequency; (C2) organization co-occurrence frequency; (C3) country co-occurrence
frequency; (D1) normalized co-classification; (D2) co-classification cosine similarity; (D3) patent co-occurrence frequency.
In particular, among all the pairwise correlations, the correlation coefficient (=0.915) for
the pair of A1 and B1 is the highest. This may suggest a strong effect of the technological
distance of a pair of fields on the likelihood for inventors to diversify across fields or to
combine knowledge of these fields to generate new inventions. In the meantime, this effect of
knowledge distance on diversification patterns is lesser for organizations and the least for
countries. The networks based on country diversification likelihood (B3) and country co-
occurrence frequency (C3) are the least correlated with networks in group A based on
knowledge distance measures as well as all other networks. That is, the survivor principle
may not explain technology diversification patterns of countries. A country may survive
many inefficient diversification choices and behaviors across distant fields, as long as their
resources are abundant enough to ensure survival. In contrast, individual inventors must learn
and master relevant knowledge of a technology field in order to invent there. Thus the
18
diversification patterns of inventors, as measured by B1 and C1, are strongly constrained by
the knowledge distance of different fields, as measured by A1.
We further plot and visually compare the distributions of edges by weights of the 12
network maps in Fig. 3. The networks using group A measures and the networks using B1
and B2 as well as D1 measures exhibit negative exponential distributions. In particular, the
high skewness of the A1, A2 and A3 networks indicates that very most technology fields are
indeed highly distant from one another. Thus, the likelihood for inventors to diversify across
most pairs of technology fields must be also limited. This is reflected in the similarly skewed
distribution of edges in the network using inventor diversification likelihood (B1).
Fig. 3 Distributions of edges by weights of the technology networks using 12 alternative measures.
19
In group B, as we expand the scope of the innovation agents from inventors (B1) to
organizations (B2) and then to countries (B3), the mean values of inter-field distance
decreases (i.e. proximity increases) and the skewness of the distribution decreases. This
increasing normality from B1 to B3 may also suggest that countries may make more normal
decisions of cross-field diversifications, without being strongly constrained by inter-field
knowledge distance whose distributions are highly skewed. In addition, the distributions of
C1, C2, C3 and D3 all exhibit the form of normal distributions, despite varied skewness. This
similarity may result from their shared mathematical formation that normalizes empirical
observations with corresponding random scenarios.
4.2 Correlation of vertex centralities between different networks
We also investigate the correlation between degree and eigenvector centralities of the same
set of 121 vertices in different networks. In Tables 4(a) and 4(b), we underline the highest
correlation coefficients between each measure and any other measures, and also report the
average of the correlation coefficients of each measure with all other 11 measures. For both
types of centrality metrics, within group A, the networks using normalized co-reference (A1)
and class-to-patent cosine similarity (A3) are far more correlated with all other networks than
class-to-class cosine similarity (A2), although A2 is popularly used in the literature
(Leydesdorff et al., 2014; Kay et al., 2014).
Table 4(a) Correlations of vertex degree centrality between technology networks (1976-2006)
A1
0.236
0.914
0.910
0.539
-0.179
0.101
0.496
0.047
0.837
0.338
-0.521
0.338
D1
0.837
0.277
0.844
0.819
0.493
-0.126
-0.049
0.390
-0.029
0.043
-0.632
0.261
C3
0.047
-0.334
-0.003
0.241
0.514
0.435
0.387
0.560
-0.029
0.194
0.286
0.209
B1
0.910
0.168
0.833
0.760
-0.062
0.295
0.709
0.241
0.819
0.273
-0.361
0.417
B3
-0.179
-0.369
-0.192
-0.062
0.380
0.242
0.149
0.435
-0.126
-0.064
0.309
0.048
C1
0.101
0.132
0.201
0.295
0.493
0.242
0.496
0.387
-0.049
0.285
0.734
0.302
C2
0.496
0.119
0.453
0.709
0.876
0.149
0.496
0.560
0.390
0.230
0.033
0.410
D2
0.338
0.131
0.265
0.273
0.156
-0.064
0.285
0.230
0.194
0.043
0.044
0.172
D3
-0.521
-0.107
-0.419
-0.361
0.018
0.309
0.734
0.033
0.286
-0.632
0.044
-0.056
A1
A2
A3
B1
B2
B3
C1
C2
C3
D1
D2
D3
Average
A2
0.236
0.474
0.168
0.051
-0.369
0.132
0.119
-0.334
0.277
0.131
-0.107
0.071
A3
0.914
0.474
0.833
0.502
-0.192
0.201
0.453
-0.003
0.844
0.265
-0.419
0.352
B2
0.539
0.051
0.502
0.760
0.380
0.493
0.876
0.514
0.493
0.156
0.018
0.435
Table 4(b) Correlations of vertex eigenvector centrality between technology networks (1976-2006)
A1
0.285
0.826
0.891
0.418
-0.278
-0.041
0.472
-0.001
0.391
0.293
A2
0.285
0.502
0.284
0.053
-0.41
-0.167
0.159
-0.338
0.165
0.101
A3
0.826
0.502
0.801
0.437
-0.17
-0.342
0.44
0.038
0.368
0.199
B1
0.891
0.284
0.801
0.671
-0.171
-0.138
0.701
0.164
0.267
0.234
B2
0.418
0.053
0.437
0.671
0.39
-0.212
0.872
0.478
0.014
0.09
A1
A2
A3
B1
B2
B3
C1
C2
C3
D1
D2
B3
-0.278
-0.41
-0.17
-0.171
0.39
-0.307
0.128
0.411
-0.088
-0.088
20
C1
-0.041
-0.167
-0.342
-0.138
-0.212
-0.307
0.004
0.101
-0.619
0.281
C2
0.472
0.159
0.44
0.701
0.872
0.128
0.004
0.534
-0.088
0.198
C3
-0.001
-0.338
0.038
0.164
0.478
0.411
0.101
0.534
-0.296
0.209
D1
0.391
0.165
0.368
0.267
0.014
-0.088
-0.619
-0.088
-0.296
-0.246
D2
0.293
0.101
0.199
0.234
0.09
-0.088
0.281
0.198
0.209
-0.246
D3
0.046
-0.061
-0.066
0.106
0.112
-0.123
0.786
0.282
0.292
-0.868
0.378
D3
Average
0.046
0.300
-0.061
0.052
-0.066
0.276
0.106
0.346
0.112
0.302
-0.123
-0.064
0.786
-0.059
0.282
0.337
0.292
0.145
-0.868
-0.091
0.378
0.150
0.080
Within group B, the networks using inventor diversification likelihood (B1) and
organization diversification likelihood (B2) are far more correlated with other networks, than
country diversification likelihood (B1). In group C, the network using organization co-
occurrence frequency (C2) is the most correlated with other types of networks, in contrast to
the analysis of edge weight correlations (see Table 3) that suggests the network using
inventor co-occurrence frequency (C1) is the most correlated one from group C. The results
of group D networks are mixed across the analyses of degree and eigenvector centralities, and
the correlations of group D networks with other networks are generally weak.
In the meantime, we find a few negative correlation coefficients in Table 4. The negative
correlations between group A networks (based on knowledge distance) and country
diversification likelihood (B3) and country co-occurrence frequency (C3) may suggest that, it
is more often for countries to diversify into or combine knowledge of less central fields in the
technology space, implying broad exploration.
In brief, based on the analysis of pairwise network vertex centrality correlations, A1 and
A3, B1, B2, and C2 lead to the most representative network maps.
4.3 Correlations of vertex centrality, popularity and impact in different networks
The relative network positions of technology fields in the total technology space may
affect their relative popularity (i.e. attracting innovation activities) and impact (i.e.
influencing future innovation activities). For instance, for the technology classes that are
strongly connected to many other classes (i.e. high centrality in the technology network),
innovation agents from many other fields may enjoy the ease to diversify into them, resulting
in a large number of patents. Innovation agents in highly central fields can also see many
innovation opportunities via leveraging and recombining knowledge from many other fields
strongly connected to their own. Thus, the relative network positions of technology classes in
terms of centralities may predict their relative importance. Herein, we compare such
predictabilities of the 12 networks.
We focus on two indicators of the importance of a technology field: popularity and impact.
Popularity of a technology field is measured by the total number of all patents in its patent
class from 1976 to 2006. Impact of a field is measured by the number of total forward
citations of all patents in the field, i.e. the number of later patents that cite a focal patent.
21
Forward citation count of a patent has been found to be an effective indicator of the economic
impact of the patent in a number of prior studies (Albert et al., 1991; Hall et al., 2005;
Harhoff et al., 1999; Lee et al., 2007; Trajtenberg, 1990). We calculate Spearman rank
correlations between vertex centralities and popularity/impact indicators of the 121
technology classes in each of the 12 networks, because it is more appropriate for the purpose
of investigating if more central vertices are also more important ones. Results are shown in
Table 5.
Table 5. Rank correlations of vertex centralities, forward citation counts and patent counts in different networks.
Networks
Degree Centrality
Eigenvector Centrality
# of future citations
# of patents
# of future citations
# of patents
A1
A2
A3
B1
B2
B3
C1
C2
C3
D1
D2
D3
0.859
-0.036
0.654
0.776
0.300
-0.279
-0.024
0.284
-0.126
0.738
0.312
-0.841
0.857
-0.036
0.657
0.773
0.296
-0.278
-0.032
0.280
-0.123
0.741
0.304
-0.845
0.875
-0.027
0.546
0.782
0.281
-0.277
0.290
0.292
-0.129
0.694
0.310
0.547
0.874
-0.025
0.550
0.782
0.278
-0.275
0.275
0.289
-0.125
0.701
0.300
0.531
Among all 12 networks, the one using normalized co-reference (A1) yields the highest
correlations of vertices between their network centralities and total patent counts as well as
forward citation counts. A1 is followed by the networks using inventor diversification
likelihood (B1), normalized co-classification (D1) and class-to-patent cosine similarity (A3),
in terms of the predictability of vertex centralities on actual importance. In these networks, it
is highly likely that more central technology classes are also more popular and impactful ones.
None of other networks than A1, B1, D1 and A3 provides a correlation coefficient greater
than 0.5.
4.4 Brief summary of findings
We have analyzed different kinds of correlations in terms of edge weights, vertex centrality
and importance, among the 12 technology networks, in order to explore how similar each
network is with other networks. We paid special attention to the networks that have the
highest overall correlations with all other networks. Specifically, the measures of normalized
co-reference (A1) and inventor diversification likelihood (B1) lead to network maps that are
consistently the most correlated with other networks, in terms of edge and vertex properties
of the networks, and also provide the best correlations between network centrality and
22
importance indicators of technology classes. These networks are the best representatives of
the technology space from this set of 12 candidate alternatives compared in this study.
A few findings on additional measures are noteworthy. First, in group A, class-to-class
cosine similarity (A2) performs the worst in various correlation analyses, although it is
popularly used for constructing network maps of patent technology classes in the literature.
Class-to-patent cosine similarity (A3) follows the same formula of A2 but uses a higher
resolution of data, and is highly correlated with A1. In some cases of our analysis, A3 is no
worse than A1. Second, the networks using country diversification likelihood (B3) and
country co-occurrence frequency (C3) are the least correlated with the networks using
measures in group A. Furthermore, inventor co-occurrence frequency (C1), organization co-
occurrence frequency (C2) and normalized co-classification (D1) perform well in some of
our correlation analyses, but not always.
5. Conclusion
This paper contributes to the research to develop and analyze patent technology network
maps to explore technology diversification and knowledge combination opportunities, and
thus support technology forecasting and road mapping practices. A main challenge to
developing reasonable technology network maps is the ambiguity in the choice of measures
of the distance between various technology fields in the total technology space. To address
this challenge, we have proposed a strategy to assess and compare alternative measures
through analyzing the overall structures of their resulting networks, because the structures of
technology networks condition the strategic insights that can be potentially drawn for road-
mapping and forecasting analyses but are affected by the choices of distance measures.
We implemented the strategy in a comparative analysis of twelve distance measures, by
correlating the edge and vertex properties of their resulting networks based on network
structural properties. These twelve measures were chosen to represent the most common
types of distance measures that have been proposed in the literature. These measures had not
been previously compared via a consistent quantitative methodology. Particularly, our
analyses in all cases consistently suggest the measures of normalized co-reference and
inventor diversification likelihood lead to network maps that are the most similar to all other
maps. That is, these two measures lead to relatively the most representative technology maps
in our comparative set of twelve.
The contribution of the present paper lies primarily in promising and demonstrating the
strategy to assess alternative distance measures by analyzing the correlations or similarity of
23
the overall network structures resulting from those measures. For a consistent comparison of
alternative distance measures, we utilized IPC 3-digit classes to represent technological fields
and operationalize the vertices in the networks. Moving forward, the same network-based
comparative strategy and analysis that we have demonstrated here can be also be carried out
on alternative definitions of vertices (representing technology fields) and categorizations of
patents, such as USPC (United States Patent Classification), CPC (Cooperative Patent
Classification), and the hybrid patent categories proposed by Kay et al. (2014) and Benson
and Magee (2013; 2015)5, to see which distance measures lead to the most representative
maps. We consider this a promising avenue for future research.
Also, we only compared twelve distance measures. Although they are representative,
additional measures exist in the literature. Researchers may also propose new types of
measures in future. Therefore, future work may compare a broader set of existing and new
measures. In addition, the present analyses only made use of a few simple graph theory
metrics to analyze the correlations of the networks in terms of their structures, for
demonstrating our proposed distance measure comparison strategy based on network analysis.
More sophisticated network analysis methods can be applied to this kind of analysis. For
instance, one can investigate and compare the community structure of alternative patent
technology networks, using community detection algorithms. Eventually, we aim to
investigate how to effectively use the technology network maps to explore knowledge
combination opportunities for innovation and technology diversification directions of
individual inventors, technology companies, cities and countries.
Acknowledgement
We thank Loet Leydesdorff and Duncan Kushnir for sharing a unique patent dataset, and
Kristin Wood, Aditya Mathur, Christopher Magee, Jeffrey Alstott and Giorgio Truilzi for
many insightful and stimulating discussions. This research was supported by SUTD-MIT
International Design Centre and Singapore Ministry of Education Tier 2 Research Grants.
5 Kay et al. (2014) regrouped patent classes in order to have more evenly distributed patents in hybrid classes for
better visualization. Benson and Magee (2013; 2015)’s hybrid categories of patents aim to improve their
completeness and relevancy in representing actual technologies from technologist perspective.
24
References
Ahlgren, P., Jarneving, B., Rousseau, R., 2003. Requirement for a cocitation similarity
measure, with special reference to pearson’s correlation coefficient. Journal of the
American Society for Information Science and Technology 54, 550-560.
Albert, M.B., Avery, D., Narin, F., McAllister, P., 1991. Direct validation of citation counts
as indicators of industrially important patents. Research Policy 20, 251-259.
Altuntas, S., Dereli, T., Kusiak, A., 2015. Analysis of patent documents with weighted
association rules. Technological Forecasting and Social Change 92, 249-262.
Benson, C. L., Magee, C. L. 2013. A hybrid keyword and patent class methodology for
selecting relevant sets of patents for a technological field. Scientometrics 96, 69–82.
Benson, C. L., Magee, C. L. 2015. Technology structural implications from the extension of a
patent search method. Scientometrics 102, 1965-1985.
Blondel, V.D., Guillaume, J.-L., Lambiotte, R., Lefebvre, E., 2008. Fast unfolding of
communities in large networks. Journal of Statistical Mechanics: Theory and Experiment
2008, P10008.
Boschma, R., Minondo, A., Navarro, M., 2013. The Emergence of New Industries at the
Regional Level in Spain: A Proximity Approach Based on Product Relatedness.
Economic Geography 89, 29-51.
Boschma, R., Balland, P.-A., Kogler, D.F., 2014. Relatedness and technological change in
cities: the rise and fall of technological knowledge in US metropolitan areas from 1981 to
2010. Industrial and Corporate Change, in press.
Breschi, S., Lissoni, F., Malerba, F., 2003. Knowledge-relatedness in firm technological
diversification. Research Policy 32, 69-87.
Cantwell, J., Vertova, G., 2004. Historical evolution of technological diversification.
Research Policy 33, 511-529.
Dosi, G., 1982. Technological paradigms and technological trajectories — a suggested
interpretation of the determinants and directions of technical change. Research Policy 11,
147–162.
Ejermo, O., 2005. Technological diversity and Jacobs' externality hypothesis revisited.
Growth and Change 36, 167-195.
Engelsman, E.C., van Raan, A.F.J., 1994. A patent-based cartography of technology.
Research Policy 23, 1-26.
Fleming, L., 2001. Recombinant Uncertainty in Technological Search. Management Science
47(1), 117-132.
Fu, K., Chan, J., Cagan, J., Kotovsky, K., Schunn, C., Wood, K. L. 2013. The meaning of
“near” and “far”: the impact of structuring design databases and the effect of distance of
analogy on design output. Journal of Mechanical Design 135 (2), 021007.
Hall, B.H., Jaffe, A., Trajtenberg, M., 2005. Market Value and Patent Citations. The RAND
Journal of Economics 36, 16-38.
Hall, B.H., Jaffe, A.B., Trajtenberg, M., 2001. The NBER patent citation data file: Lessons,
insights and methodological tools. National Bureau of Economic Research.
25
Harhoff, D., Narin, F., Scherer, F.M., Vopel, K., 1999. Citation Frequency and the Value of
Patented Inventions. The Review of Economics and Statistics 81, 511-515.
Hidalgo, C.A., Klinger, B., Barabasi, A.L., Hausmann, R., 2007. The product space
conditions the development of nations. Science 317, 482-487.
Hinze, S., Reiss, T., Schmoch, U., 1997. Statistical Analysis on the Distance Between Fields
of Technology. Fraunhofer-Inst. Systems and Innovation Research.
Iwan von Wartburg, I., Teichert, T., Rost, K., 2005. Inventive progress measured by multi-
stage patent citation analysis. Research Policy 34, 1591-1607.
Jaccard, P., 1901. Distribution de la flore alpine dans le bassin des Dranses et dans quelques
régions voisines. Bulletin de la Société Vaudoise des Sciences Naturelles 37, 241-272.
Jaffe, A.B., 1986. Technological Opportunity and Spillovers of R & D: Evidence from Firms'
Patents, Profits, and Market Value. American Economic Review 76, 984-1001.
Joo, S., Kim, Y., 2010. Measuring relatedness between technological fields. Scientometrics
83, 435-454.
Kajikawa, Y., Yoshikawa, J., Takeda, Y., Matsushima, K. 2008a. Tracking emerging
technologies in energy research: Toward a roadmap for sustainable energy. Technological
Forecasting & Social Change 75 (2008) 771–782.
Kay, L., Newman, N., Youtie, J., Porter, A.L., Rafols, I., 2014. Patent overlay mapping:
Visualizing technological distance. Journal of the Association for Information Science
and Technology 65, 2432-2443.
Kogler, D.F., Rigby, D.L., Tucker, I., 2013. Mapping Knowledge Space and Technological
Relatedness in US Cities. European Planning Studies 21, 1374-1391.
Lee, Y.-G., Lee, J.-D., Song, Y.-I., Lee, S.-J., 2007. An in-depth empirical analysis of patent
citation counts using zero-inflated count data model: The case of KIST. Scientometrics 70,
27-39.
Leydesdorff, L., 2007. Visualization of the citation impact environments of scientific journals:
An online mapping exercise. Journal of the American Society for Information Science and
Technology 58, 25-38.
Leydesdorff, L., 2008. Patent classifications as indicators of intellectual organization. Journal
of the American Society for Information Science and Technology 59, 1582-1597.
Leydesdorff, L., Kushnir, D., Rafols, I., 2014. Interactive overlay maps for US patent
(USPTO) data based on International Patent Classification (IPC). Scientometrics 98,
1583-1599.
Leydesdorff, L., Vaughan, L., 2006. Co-occurrence matrices and their applications in
information science: Extending ACA to the Web environment. Journal of the American
Society for Information Science and Technology 57, 1616-1628.
Li, G.-C., Lai, R., D’Amour, A., Doolin, D.M., Sun, Y., Torvik, V.I., Yu, A.Z., Fleming, L.,
2014. Disambiguation and co-authorship networks of the U.S. patent inventor database
(1975–2010). Research Policy 43, 941-955.
26
Nakamura, H., Suzuki, S., Sakata, I., Kajikawa, Y., 2014. Knowledge combination modeling:
The measurement of knowledge similarity between different technological domains.
Technological Forecasting and Social Change, In Press.
Nesta, L., Dibiaggio, L., 2005. Patents Statistics, Knowledge Specialisation and the
Organisation of Competencies. Revue d'économie industrielle, 103-126.
Newman, M.E.J., 2005. A measure of betweenness centrality based on random walks. Social
Networks 27, 39-54.
Newman, M.E.J., 2010. Networks: An Introduction. Oxford University Press.
Ogawa, T., Kajikawa, Y. 2015. Assessing the industrial opportunity of academic research
with patent relatedness: A case study on polymer electrolyte fuel cells. Technological
Forecasting & Social Change 90, 469–475.
Rigby, D.L., 2013. Technological Relatedness and Knowledge Space: Entry and Exit of US
Cities from Patent Classes. Regional Studies 0, 1-16.
Schumpeter, J., 1934. The Theory of Economic Development. Harvard University Press,
Cambridge.
Small, H., 1973. Co-citation in the scientific literature: A new measure of the relationship
between two documents. Journal of the American Society for Information Science 24,
265-269.
Stigler, G. J., 1968. The Organization of Industry. Homewood, Ill.,: R. D. Irwin.
Teece, D.J., Rumelt, R., Dosi, G., Winter, S., 1994. Understanding corporate coherence:
Theory and evidence. Journal of Economic Behavior & Organization 23, 1-30.
Trajtenberg, M., 1990. A Penny for Your Quotes: Patent Citations and the Value of
Innovations. The RAND Journal of Economics 21, 172-187.
Zitt, M., Bassecoulard, E., Okubo, Y., 2000. Shadows of the past in international cooperation:
Collaboration profiles of the top five producers of science. Scientometrics 47, 627-657.
27
|
1711.07677 | 3 | 1711 | 2018-09-22T11:50:17 | Corporate payments networks and credit risk rating | [
"cs.SI",
"q-fin.RM"
] | Aggregate and systemic risk in complex systems are emergent phenomena depending on two properties: the idiosyncratic risks of the elements and the topology of the network of interactions among them. While a significant attention has been given to aggregate risk assessment and risk propagation once the above two properties are given, less is known about how the risk is distributed in the network and its relations with the topology. We study this problem by investigating a large proprietary dataset of payments among 2.4M Italian firms, whose credit risk rating is known. We document significant correlations between local topological properties of a node (firm) and its risk. Moreover we show the existence of an homophily of risk, i.e. the tendency of firms with similar risk profile to be statistically more connected among themselves. This effect is observed when considering both pairs of firms and communities or hierarchies identified in the network. We leverage this knowledge to show the predictability of the missing rating of a firm using only the network properties of the associated node. | cs.SI | cs |
Corporate payments networks
and credit risk rating
Elisa Letizia1 and Fabrizio Lillo1,2,3
1Scuola Normale Superiore, piazza dei Cavalieri 7, 56126, Pisa, Italy - [email protected]
2Department of Mathematics, University of Bologna, Piazza di Porta San Donato 5, 40126,
3Center for Analysis, Decisions, and Society, Human Technopole, Milano, Italy
Bologna, Italy - [email protected]
Abstract
Aggregate and systemic risk in complex systems are emergent phenomena depend-
ing on two properties: the idiosyncratic risks of the elements and the topology of the
network of interactions among them. While a significant attention has been given to
aggregate risk assessment and risk propagation once the above two properties are given,
less is known about how the risk is distributed in the network and its relations with
the topology. We study this problem by investigating a large proprietary dataset of
payments among 2.4M Italian firms, whose credit risk rating is known. We document
significant correlations between local topological properties of a node (firm) and its
risk. Moreover we show the existence of an homophily of risk, i.e. the tendency of
firms with similar risk profile to be statistically more connected among themselves.
This effect is observed when considering both pairs of firms and communities or hierar-
chies identified in the network. We leverage this knowledge to show the predictability
of the missing rating of a firm using only the network properties of the associated node.
keyword financial networks - corporate networks - credit risk - credit rating - ma-
chine learning
JEL classification: C45 - C88 - G21 - G33 - L14
Assessing the aggregate risk emerging in complex systems is of paramount importance in
disparate fields, such as economics, finance, epidemiology, infrastructure engineering, etc..
A large body of recent literature has explored, both theoretically and empirically, how risk
propagates [Pozzi et al., 2013] and how to assess aggregate risk when the risk of each individ-
ual entity is known [Nier et al., 2007], as well as the topology of the network of interaction
among them. Both aspects have been shown to be important, however their mutual rela-
tion is relatively less explored. In theoretical studies, one typically assumes independence
between idiosyncratic risk and topology, while in empirical studies the correlation is the one
present in the investigated dataset.
But what is the relation (if any) between the idiosyncratic risk of a node and its local
topological properties (e.g. degree, centrality, community, etc)? In this paper we answer this
1
question by studying a specific system where the assessment of aggregate risk is particularly
important, namely the network of interaction between firms. Assessing the risk of firms is
one of the fundamental activities of the credit system. Banks spend a significant amount of
resources to scrutinise the balance sheet of firms in order to obtain accurate estimations of
their riskiness, the internal rating, and provide credit conditions reflecting both the capability
of the firm to repay the loans and its probability of default. The riskiness of a firm depends on
many idiosyncratic factors (e.g. balance sheet, structure of management, etc.) as well as the
industrial sector or its geographical location [Treacy and Carey, 2000, Crouhy et al., 2000,
Crouhy et al., 2001]. However, corporate firms do not live in isolation but interact with each
other on a daily basis. The interactions can be of different kinds, including those due to the
supply chain, payments, business partnerships, financial contracts, and mutual ownership.
The structure of interactions is complex and multifaceted but its knowledge is critical both
for macroeconomists and for the credit and banking industry to understand the dynamics of
the economy, the business cycle, the structure of corporate control, and, of course, the risk
of firms (in isolation or in aggregation).
Here we study the interplay between the risk of firms and the interlinkages connecting
them. The network is built from a large proprietary dataset provided by a major European
bank. The dataset contains the payments collected at daily granularity between more than
two million Italian firms together with the information on internal risk rating for a large
fraction of them. We want to understand whether and in which measure a firm's role in the
network can be informative of its riskiness. This is important for two reasons. First, even
if the risk of a firm is not known to all the counterparts, it may affect its ability to interact
with other firms. For example, a poor rating (i.e. high riskiness) may prevent the access to
credit and as a result it may cause a reduction or delay in payments toward suppliers. If
the supplier has high risk, the missing or delayed payment can prevent its own payments,
increasing the likelihood of a cascade of missing payments and a propagation of financial
distress. The second reason is that, in certain cases, the knowledge of the riskiness of a firm
or a group of firms is lacking or imprecise.
In these cases, the existence of a correlation
between network properties and risk can allow or improve the assessment of risk. Indeed,
in the last part of the paper we will show how network properties of a node can be used to
predict the risk of the corresponding firm.
Previous works on networks of firms focussed mainly on ownership [Kogut and Walker, 2001,
Souma et al., 2006, Vitali et al., 2011, Romei et al., 2015, Garcia-Bernardo et al., 2017], or
dealt with the modelling but not with the empirical part [Huremovic and Vega-Redondo, 2016].
Exception are the empirical studies on the the Japanese economic system [Ohnishi et al., 2009,
Watanabe et al., 2012], where links represent buyer-supplier relationship between, but with-
out the information on the amount of money exchanged. In the seminal work [Acemoglu et al., 2012],
even if the theoretical framework applies also to single firms, the empirical part focuses on
the aggregate, sector network, due to lack of more granular data. The use of payments
as a proxy of interactions between economic entities is not new and has been investi-
gated mainly for banks [Soramaki et al., 2007, Rørdam et al., 2009, Battiston et al., 2012,
Bargigli et al., 2015, Fukuyama and Matousek, 2016] in the context of systemic risk studies,
where, however, other choices to characterise interactions are possible [Elliott et al., 2014,
Cimini et al., 2015, Affinito and Pozzolo, 2017, DErrico et al., 2017]. Apparently much less
is known about the payment network between firms, mostly because of lack of data. As
2
for rating prediction, it can be embedded in the now broad literature of classification prob-
lems [Friedman et al., 2001]. The idea of employing machine learning techniques in credit
rating scoring has been explored before [Altman et al., 1994], but in that case the pre-
dictors for the rating are all derived from balance sheets, so the results are not compa-
rable with ours. Other works use more heterogeneous information to predict the rating
[Wilson and Sharda, 1994, Grunert et al., 2005, Lee, 2007, Parnes, 2012].
This paper contributes to these streams of literature in several aspects. First, we in-
vestigate the topological properties of payment networks by considering standard network
metrics, such as degree and strength distribution and components decomposition. We find
that the large payment networks investigated in this paper share the properties observed in
other complex networks, namely they are sparse but almost entirely made of a single com-
ponent, they are scale free and small world. Then, we look into the distribution of risk of
firms in the network of payments in order to quantify the dependence between the network
property of a node or a group of nodes and the risk of the firm represented by the node(s).
The main and most innovative contribution of this paper is to document the existence of
such correlations. We find an homophily of risk, i.e.
the tendency of a firm to interact
with firms with similar risk. This is a two nodes properties, but a similar behaviour is ob-
served, even more clearly, also at larger aggregation scales. Communities of firms, detected
by using different methods, often display a statistically significant abundance of firms of a
specific risk class, indicating the tendency of firms with similar rating to be linked together
through payments. Risk is therefore not spread uniformly on the network, but rather it is
concentrated in specific areas. This implies that an idiosyncratic shock on a single firm can
propagate more or less quickly depending on the local network structure and the community
the node belongs to. The last contribution, is to exploit this correlation between risk of a
firm and network characteristics of the corresponding node to predict the risk rating of the
firm using network properties alone. To this end, we employ machine learning techniques
to build classifiers for risk rating whose inputs are only network properties (e.g. degree,
community, etc.). We show that our classification method has a good performance both in
terms of accuracy and of recall and that outperforms significantly random assignments.
1 The network of payments
1.1 The dataset
The investigated dataset contains information on payments between more than two million
Italian firms and is built from transactional data of the payment platform of a major Euro-
pean bank. Transactions are registered with daily granularity for the year 2014, for a total of
47M records, each of which includes the two counterparts involved, date, type, amount and
number of transactions in the same day. Transactions are originally identified by account,
but in case of customers and former customers, multiple accounts associated to the same
firm are aggregated into a single entity1. This results in a total of 2.4M entities (which
will be referred to as firms, for brevity) operating through the platform during the whole
1In order to comply with privacy regulation any payment from or to physical persons is excluded, moreover
the filter is implemented to exclude any ambiguous record.
3
investigated period. The counterparts can be of different types. In principle, any firm or
public body can make use of the platform, but in practice in most cases at least one is a
customer of the bank. Similar considerations hold for the total amount exchanged: in each
month more than 50% of the volume is transferred between customers, and it rises to above
95% when considering transaction with at least one customer involved. More details on the
dataset and some descriptive statistics is presented in A. For customers, the dataset contains
information on the economic sector and on the internal rating of the firm on a three value
scale: Low (L), Medium (M), and High (H) risk.
1.2 Networks definition and basic metrics
A network, or graph, is identified by two sets: V , the sets of nodes with cardinality V = n,
and E, the sets of links or edges, with cardinality E = m. The latter is the collection
of ordered pairs of connected nodes. In our case, we also take into account the strength of
interactions so a weight wij is associated with each link. Starting from transaction data,
payment networks are constructed as follows: given a time window, each node represents a
firm active in that period, if there is payment between two firms a link from the source to the
recipient is added, with weight equal to the payment amount. If multiple transactions occur
between the same (ordered) pair of nodes, the weight of the link is the sum of the amounts of
the payments. Therefore for each time period we construct a directed and weighted network.
The time window of analysis may vary depending on the type of information one wants to
extract from the dataset. In the following the focus will be on monthly networks, for which
results are quite stable, at the cost of dealing with fewer and larger graphs. For the period
covered by the dataset, each monthly network consists on average of n = 1M nodes and
m = 3.2M links with the lowest activity in August and the highest in July (see A.1). The
density ρ = m
n(n−1) is thus small, resulting in a so called sparse network. Nevertheless this
low density does not imply a disaggregated system. Indeed for all the networks the diameter
is very small compared to the size: on average starting from a node, one has to pass at most
19 links to reach any other node in the weakly connected component (see Table 1). Thus
the networks have the so called small-world property.
1.3 Networks topology
When considering a small number of firms, one would expect simple topologies: one firms
is the supplier of intermediate products for another firm, resulting in a line (the simplest
supply chain), or one firm is a supplier or a buyer for many others firms, resulting in a
star network. Instead what is observed is a much more complex organisation, with a non
negligible presence of cycles.
At a very coarse level, it is possible to identify two large classes of firms. The first
constitute the core of the network, which includes approximately 20% of the nodes and more
than half of the links. This core has a density an order of magnitude larger than that of the
whole network and it is characterised by the fact that any pair of firms is connected, directly
or via intermediaries. Around 60% of the total volume circulates among the nodes of the
core. The other class is made of payers-only, i.e nodes that have no incoming links. These
represent each month about one half of the active firms and their activity is sporadic. To
4
month
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
nodes
n
1,000,555
997,006
1,018,164
1,047,706
1,048,803
1,039,876
1,091,393
891,587
1,041,124
1,066,044
1,023,692
1,052,975
links
m
out-degree
E[k(out)]
Table 1: Basic metrics of the network of payments
density
ρ = m
n(n−1)
3.27 · 10−6
3.09 · 10−6
3.04 · 10−6
3.05 · 10−6
3.05 · 10−6
3.00 · 10−6
2.95 · 10−6
2.92 · 10−6
3.20 · 10−6
2.89 · 10−6
2.96 · 10−6
2.71 · 10−6
in-degree
E[k(in)]
6.61
6.11
6.19
6.52
6.58
6.30
6.44
5.21
6.80
6.11
6.15
5.60
3,271,861
3,067,029
3,146,559
3,346,763
3,359,315
3,239,886
3,510,435
2,319,697
3,465,233
3,289,946
3,103,365
3,000,284
4.20
3.98
3.98
4.09
4.08
4.02
4.14
3.44
4.25
4.00
3.90
3.74
diameter
d
20
18
18
19
20
19
20
19
20
18
18
19
better understand the role of this significant subset of firms we check their customer status
and we find that the majority of them are unclassified, and that their number is larger than
one expects from the unconditional distribution among all the firms. This means that likely
they are not customers and, more importantly, almost no information, for example about
risk, is available on them. For further details on this refer to A.3.
We now turn our attention to the distribution of degree and strength. In our case the in-
(out-) degree is the number of payers (payees) of a given firm and the corresponding amount
of Euro. For the monthly aggregation case the average in- and out-degree of a firm is 6 and
4, respectively (see Table 1). These low values are a direct consequence of the low density of
the network. However the degrees and the strengths are extremely heterogeneous as testified
by the degree and strength distribution.
Figure 1 shows the empirical cumulative distribution for these two quantities in a double
logarithmic scale. The approximately straight line indicates the presence of a fat tail with
a power law behaviour. The fit of the exponent supports the observation that in- and out-
degree distribution data are consistent with a power-law tail and the estimated exponents
are around 2.6 and 2.8, respectively. Similarly, in-strength and out-strength are well fitted
by power-law distributions of exponents around 2.1 and 2, respectively. Despite the fact that
a large fraction of nodes is different in each month, the tail exponents are remarkably stable
(see Table 6 of the A.3).
This scale free behaviour is quite ubiquitous in complex networks has been found in many
other real economic and financial networks [Serrano and Bogun´a, 2003, Garlaschelli and Loffredo, 2005,
Boginski et al., 2005, Boss et al., 2004, Kim et al., 2002, Huang et al., 2009, Ohnishi et al., 2009].
The fat-tailed distribution for the degree has two interesting consequences: first, there is no
characteristic scale for the average degree or strength; second, there are a few nodes that
act as hubs for the system, in the sense that, having a large amount of connections, many
pairs of nodes are connected through them. This partially explains the low values for the
diameter.
5
Figure 1: Empirical complementary cumulative degree (left) and strength (right) distribu-
tions and their power law fit. The scale is logarithmic for both axes. Data refers to January,
but results are similar for the other months.
(cid:80)
1 −(cid:80)
i eii − aibi
i aibi
(1)
i aibi
i aibi
Finally, we measure the tendency of firms to be connected to firms which are similar
with respect to some attribute, namely the number and the total volume of connections (i.e.
degree and strength). Following [Newman, 2002], we compute the assortativity coefficient
for a categorical variable,
r =
where eij is the fraction of edges connecting vertices of type i and j, ai =(cid:80)
(cid:80)
(each node connects to a node of a different type) it is rmin = − (cid:80)
1−(cid:80)
j eij and bj =
i eij. It is rmax = 1 for perfect mixing, while when the network is perfectly disassortative
. Using the number
of connections as categorical variable, an high value for the assortativity coefficient indicates
that highly connected firms tend to interact significantly more than average with other highly
connected firms. Similar reasoning holds using the volume exchanged as categorical variable.
Beside the entire graph, we also consider the subgraph of firms with rating and the
subgraph of customers. The assortativity coefficient is consistently slightly negative for both
attributes, for all months and graphs, namely around −0.03 for the entire graph and the
subgraph of firms with rating, and −0.04 for the subgraph of customers, with no strong
differences among months and attributes. Table 7 of A reports the summary of values of
the assortativity coefficient for each month. A possible explanation can be that large, very
interconnected firms are connected to many subsidiaries which in turn do not engage with
many other firms, being their business almost exclusively focussed on the relationship with
the large and central firms.
To summarise, each month the payment network of firms is very sparse but almost entirely
connected. Half of the firms appear in the network as payers only (no incoming links) and
they are mainly unclassified with respect to customer status, so no much information is
available on them. Of the remaining nodes, almost half constitutes the denser core of the
network where more than a half of the transactions occur and above 60% of the volume
circulates. Finally the network is small world, scale free, and slightly disassortative both for
degree and for strength.
6
2 Risk distribution and network topology
In this Section we investigate the distribution of risk of firms in the network of payments.
We are interested in measuring the dependence between the network property of a node
or a group of nodes and the risk of the firm represented by the node(s). We proceed in a
bottom-up fashion, zooming out from single nodes to subsets. At first we consider a firm's
local property (the number of connections) and we check if it correlates with the risk. Then
we consider pairs of linked firms and measure the homophily in risk, i.e. whether firms with
similar risk profile tend to do business together and thus to be linked. Finally, we divide firms
into subsets induced by the network structure and we check whether the inferred subsets are
informative with respect to the riskiness of the composing firms. Specifically, we partition
the network in groups (or communities) of firms by using only network information, and we
test if the distribution of risk within each group is statistically different from the global one.
Thus the goal is to understand if the inferred communities are homogeneous with respect to
the risk profile of the composing firms: a community with many firms with high risk rating
is a clear indication of financial fragility and a possible source of instability, since the distress
of one or few firms of the community is likely to propagate to the other firms.
For the sake of brevity, in the following the analysis is carried on for one month, but
results are consistent for all the months.
2.1 Degree and risk
The first investigation is on the relation between the degree of a firm and its risk. The
probability for each risk level r ∈ L, M, H conditional to the out-degree is computed2 and
plotted against the degree. The results are shown in Figure 2. We notice an interesting
correlation between degree and risk: small degree nodes are more likely medium risk firms,
whereas large degree nodes are more likely low risk firms. The high risk firms are more evenly
spread across degrees, even if a larger fraction is observed for low degree nodes. To assess
if the three curves are statistically different we perform a multinomial logistic regression
on data [Greene, 2003] (the solid lines in the plot). This choice is justified by the fact the
quantities just described are the probabilities of outcomes in a multi-class problem given an
independent variable (the degree). The estimated probabilities follow quite closely the trend
of the empirical distribution and the coefficients are all significant. More detailed results of
the fit are given in table 8 of B.1 (first two columns).
The correlation just highlighted can be, at least in part, influenced by the effect of the size
of the firm (in term of assets value from the balance sheet): a large firm is usually considered
less risky than a small one, at the same time, a larger size generally implies a higher number
of connections, as seen for example in the interbank network [Bargigli et al., 2015]. As the
size of firms is not available to us, we use the sum of the incoming and outgoing amounts as
proxy. Defined in this way, the size has a Pearson correlation of around 0.19 , 0.15 with in-
and out- degree, but a Spearman rank correlation of 0.67 , 0.57 respectively. To control for
the effect of the size, we repeat the same procedure on subsets of firms, grouping according to
their size into tertiles. The results, not shown here but available upon request, hold true also
2The results for the in-degree are qualitatively very similar.
7
Figure 2: Probability of rating of a firm conditional to its out-degree. The solid lines show
the fitted multinomial logistic distribution, with its confidence intervals (dashed lines) in
matching colours.
on the sub-samples, but slightly less sharply. We repeat the multinomial logistic regression
adding the size tertiles among the predictors, and we still obtain statistically significant
coefficients (last four column in 8 of B.1).
Similarly, the three conditional degree distributions given the rating result statistically
different, as for every month all pairs reject the null hypothesis in the 2-sample Kolmogorov-
Smirnov test [Smirnov, 1939]. Therefore topological characteristics (the degree) of the node
can be used to obtain information on the riskiness of the corresponding firm. From a risk
management perspective this is an important results, since on average highly connected
nodes are also less risky.
2.2 Assortative mixing of risk
The next step is to check whether risk is correlated with direct connection preferences.
To clarify this point, we consider two features: the assortative mixing of the risk and the
conditional distribution of rating given the distance.
In the first case we compute a weighted variant of the assortativity coefficient in Eq.
(1) using as categorical variable the risk rating rather than the degree or the strength. In
practice, the quantities eij are substituted by eij, the fraction of volume from nodes of type i
to nodes of type j. The reason for this choice is to mitigate the impact of the aforementioned
large number of uncategorised payers.
In most cases their links are associated with low
volume and few transactions. Also, customer firms, even if they represent only around 1/3
of the firms, exhibit a generally more intense activity, both in terms of number of transactions
and of volume, hence accounting for the stronger ties between the firms.
The metric is positive for all the three graphs, 0.070, 0.157, 0.163 for the whole set,
the nodes with rating, and the customers, respectively, with significant variability across
the months but always positive sign3.
In Table 9 of B.2, the summary of values of the
3Results for the standard assortativity coefficient are quite different, and the choice of the subgraph
8
assortativity coefficients for each month is presented.
With the same quantities eij we define metrics to assess different preferences in connection
between incoming and outgoing payments. We test if firms are more concerned with the risk
of payers than of the payees by testing for different risk distribution between incoming and
outgoing connection. To discriminate between these two cases, for each node i we compute
the percentage excess of volume with respect to the average toward nodes in certain risk
class and we group according the rating of the node. The distributions are compared using
MannWhitney U test [Mann and Whitney, 1947]. This non-parametric test allow to assess
if one distribution is stochastically greater than the other. Details on the metrics and the
test performed are given in B.2. We find that it is likely that firms are, at least in part,
aware of the riskiness of their counterparts and results suggest they use this information in
choosing their business partners. However the hypothesis that incoming payments show a
more marked preference for low risk is not supported by data. Moreover the overall positive
assortativity is mainly due to low risk nodes. This suggests that low risk firms are more
careful in the choice of their business counterparts, possibly also because their relative larger
creditworthiness allow them to find available partners more easily.
The quantities considered so far in this section are pairwise comparisons between the
rating of nearest neighbours, and give an aggregate measure. A possible4 way to enrich this
information is to consider the conditional distribution of rating for nodes at a given distance5
and to compare it to the unconditional distribution. In the case of no influence of the rating
on the connection pattern, the conditional distribution of risk given the distance should be
statistically undistinguishable from the null unconditional distribution. To test if this is the
case, we first compute the distance between all the nodes for which the rating is available.
Then for any fixed k, the occurrences of ratings are computed by looking at the set of pairs
at distance k. Finally, the estimated distributions are tested against the null one with an
hyper-geometric test, as explained in details in B.3.
Results for April are summarised in Figure 3, which considers the case when the source
node is in class L. Results are similar when considering a medium or high risk source. For
each k a marker indicates the percentage of nodes with low (green circles), medium (yellow
squares) or high (red diamonds) risk at distance k. A marker is full when the percentage is
statistically different from the null distribution (the dashed lines, with matching colours).
We note that up to distance 5 the class of low risk firms is significantly over-represented
in the distributions. At greater distances, medium and high risk groups are over-represented.
This means that more steps in the networks are necessary to reach riskier firms. This fact is
particularly interesting when considering that each firm is in theory unaware of others firms'
ratings and in some cases even its own.
appears to be crucial. When considering the entire network, the assortativity coefficient is negative, around
−0.07, hence indicating a slightly disassortative behaviour with respect to risk. The subgraphs, instead,
show an assortative tendency, with coefficients around 0.025 and 0.038 for the nodes with rating and for
customers, respectively. This shift can be explained again by the impact of the large number of uncategorised
nodes.
4An alternative strategy to go beyond first order neighbours in the computation of assortativity has been
recently proposed by [Arcagni et al., 2017].
5The distance between nodes in a network is defined as the length of the shortest directed path connecting
two nodes, where a path is a sequence of links. Clearly, in a directed network in general d(u, v) (cid:54)= d(u, v)
and moreover d(u, v) can be not defined (or ∞) if there is no path from u to v.
9
When considering the same quantities for incoming paths, results (not shown) are very
similar, namely at short distances the low risk class is over-represented, while medium and
high risk nodes are over-represented for longer distances.
Figure 3: Distribution of ratings for nodes at distance k from a node with rating L. The
dashed lines are the unconditional (null) distribution of ratings among nodes in the entire
sample. A full marker indicates that the over or under representation with respect to the
null distribution is statistically significant in the hyper-geometric test at 1% significance level
with Bonferroni correction.
A possible explanation for these observations is that among the hubs of the systems (i.e
the most connected nodes) firms with rating L (i.e the most creditworthy) constitute the
vast majority. This holds true when considering both in-coming and out-going links, and
including also the nodes with no rating. Moreover, they are in the denser core previously
described, while many high risk firms have a few or no out-going links and they are peripheral
in network. This asymmetry in the position in the network is observed also when considering
the distribution of the closeness centrality [Newman, 2010] of the nodes, i.e the harmonic
mean of the distances to all other nodes, conditioning on the risk class (not shown6).
2.3 Network organization and risk
In this Section we study the relation between the organization of the network at a more
aggregate level and the distribution of risk. We are interested in two types of organization
of networks into groups. The first is the modular organization: each module is composed
by nodes, which are much more connected among themselves than with the rest of the
network. In economic terms modules could represent, for example, firms operating in the
same region or area, and the high density of the module reflects the fact that payments are
more frequent with geographically close firms. We saw before that the network shows an
assortative tendency with respect to risk, so we want to test if the homophily on risk can be
observed beyond pairwise relationship.
6Results available upon requests
10
The second is a hierarchical organization. Since the payment network is directed, we
look for a ranked partition (i.e. each group of nodes is labelled with an integer from 1 to
the number of groups M ) such that most links are from nodes of low rank classes to nodes
in high rank classes. This type of organization could represent, for example, a supply chain
and the flow of payments between the firms of a group and those in the group in the next
rank class reflects the (opposite) flow of goods or services. This classification is important
because a high risk concentration in low class nodes of a strongly hierarchical network can
trigger a cascade of distress in the higher rank classes.
Modularity and hierarchy are conceptually opposite as the first penalises connections
towards other groups, which instead are encouraged in the latter (provided that they go
from low rank to high rank nodes).
For each metric, we proceed in the following way:
i. find the optimal partition according to the criterion;
ii. compute the distribution of ratings within each subset of the partition;
iii. test whether such local distribution is statistically different from the overall distribution
of ratings by employing the hypergeometric test used in the previous Section and
described in B.3. In order to have a sample large enough to perform the test, we only
consider subsets with at least 500 known ratings.
We showed so far that the structure of the payments network is very complex. Since our
goal is to obtain information on the risk of the firms, it can be helpful to filter the network
before performing communities detection, in order to keep the most relevant connections.
Thus we focus on the subgraph of customers. The reasons for this choice are many. First,
the percentage of nodes with rating active every month is quite low, around 20%, but it
raises to 70% when considering only the customers (see Table 4 in A.1 for a summary). This
will help having a more informative local distribution of risk when considering subsets of
nodes. Secondly, more than a half of the volume is transferred between customers (see Table
3 in A.1), so even if a large fraction of transactions is dropped, we are mostly pruning weak
connections, while keeping the strongest ones. Finally, as it has been shown in the previous
Subsection about assortativity, considering the entire network can be misleading, especially
when looking at the connections without considering the weights, as it will be necessary for
some metrics.
2.3.1 Modular structure
One of the standard methods for inferring a modular structure in a network is via modularity
maximization. This method divides nodes into subsets, called modules, such that nodes are
well connected with other nodes in the same module and there is a smaller number of links
with nodes in other modules. Given a partition P in modules C the modularity is
(2)
(cid:18)
Aij − kin
i kout
j
2m
(cid:19)
Q =
1
2m
(cid:88)
(cid:88)
C∈P
i,j∈C
where Aij is the (i, j) element of the adjacency matrix and kin
) is the in- (out-) degree of
node i. The optimal partition is the one which maximizes modularity. Despite the associated
i (kout
i
11
L
M
H
L
M
H
Figure 4: Distribution of ratings in the three partitions, modularity (top), hierarchy (bot-
tom). The dashed lines are the unconditional (null) distribution of ratings among nodes in
the entire sample. A full marker indicates that the over (above the dashed line) or under
(below the dashed line) representation with respect to the null distribution is statistically
significant in the hypergeometric test at 1% significance level with Bonferroni correction.
12
optimisation problem is NP-Hard, fast and reliable heuristics for an approximate solution
exist, and here the well known Louvain method [Blondel et al., 2008] is employed.
In each month we find that the optimal partition has around 2, 000 modules. These
are really heterogeneous in size: for example, the 13 largest ones cover more than 95% of
the nodes of the network. We perform the hypergeometric test of the null hypothesis of an
homogeneous distribution of risk in each module with at least 500 known ratings. These are
less than 1%, around 19 every month. (see Table 10 in B.3 for more details). These are clearly
very large modules but a significant number of them shows an over or under-expression of
one or two risk classes.
For some specific module it is possible to draw statistical robust conclusions on its risk
profile. The top panel of Fig. 4 shows the over- or under-representation for the largest
modules for January. The seventh module, for example, has an over-representation of firms
with low risk and an under-representation of the other two risk profiles, thus it represents a
group of firms with small risk. On the contrary the eighth module has an over-representation
of highly risky firms and under-representation of low risk firms, representing a possible
warning for the bank.
2.3.2 Hierarchical organization
We now consider explicitly the directed nature of the payment graph and the hierarchical
organization of the network. An ordered partition is such that each subset is associated with
an integer number (rank) r ∈ {1, ..., M}. A graph has a hierarchical organization if nodes
are more likely linked to other nodes with a higher rank [Simon, 1991], such as in military
organizations or in administrative staff. Finding the optimal ordered partition and revealing
the hierarchy of a graph is in general complex and requires the minimization of a suitable
cost function, similarly to what is done with modularity.
In this paper we use a recently proposed cost function [Gupte et al., 2011]. Given a rank
function r : V → {1, ..., M}, the cost function penalizes links from a high rank node to a low
rank node. The penalization is a linear function of the difference between the ranks. Thus
the optimal hierarchical partition is obtained by solving the optimisation problem
A∗ = min
r∈R
f (r(u) − r(v)) ,
where R denotes the set of all ordered partitions and the cost function is
(cid:88)
(cid:40)
(u,v)∈E
x + 1 x ≥ 0
x < 0
0
.
f (x) =
The hierarchy of the graph is defined by
h∗(G) = 1 − A∗
.
m
By definition, h ∈ [0, 1], and 0 is the value for the trivial partition with only one set,
while h = 1 is obtained when the network is a Directed Acyclical Graph and it signals
a perfect hierarchy. The linear choice of the penalization function is convenient because
13
the associated optimisation is solvable in polynomial time and few exact algorithms exist
[Gupte et al., 2011, Tatti, 2017], while non-linear forms can lead to NP-hard problem.
We apply the hierarchy detection to the monthly networks of payments and the results
are summarized in Table 11 of B.3. First of all we notice that the number of inferred classes,
roughly 18, is much lower than in the modular case. Moreover the size of the classes is
much more homogeneous. The value of h is also quite stable, around 0.75, indicating a
strong hierarchical structure, a remarkable result considering that we are studying only the
customers network.
We now consider the distribution of risk in each class and we study the over or under-
expression of certain levels of risk as a function of the rank of the class in the inferred
hierarchy. The test rejects the null hypothesis of uniform risk distribution a considerable
number of times (also compared with the total number of subsets in the partitions). As
displayed in the bottom panel of Figure 4, low rank classes have an over-expression of high
and medium risk firms, while middle and low rank classes (i.e. r ∈ [8, 12]) have an over
expression of low risk firms and an under-expression of medium and high risk firms. More
details on the test results are given in This empirical evidence may signal the presence of
paths of risk propagation, since low rank firms, typically more risky, are payers of high rank
firms, which are instead less risky. We now consider the distribution of risk in each class
and we study the over or under-expression of certain levels of risk as a function of the rank
of the class in the inferred hierarchy. The test rejects the null hypothesis of uniform risk
distribution a considerable number of times (also compared with the total number of subsets
in the partitions). As displayed in the bottom panel of Figure 4, low rank classes have
an over-expression of high and medium risk firms, while middle and low rank classes (i.e.
r ∈ [8, 12]) have an over expression of low risk firms and an under-expression of medium and
high risk firms. More details on the test results are given in This empirical evidence may
signal the presence of paths of risk propagation, since low rank firms, typically more risky,
are payers of high rank firms, which are instead less risky. We now consider the distribution
of risk in each class and we study the over or under-expression of certain levels of risk as a
function of the rank of the class in the inferred hierarchy. The test rejects the null hypothesis
of uniform risk distribution a considerable number of times (also compared with the total
number of subsets in the partitions). As displayed in the bottom panel of Figure 4, low rank
classes have an over-expression of high and medium risk firms, while middle and low rank
classes (i.e. r ∈ [8, 12]) have an over expression of low risk firms and an under-expression of
medium and high risk firms. More details on the test results are given in 11 in B.3. This
empirical evidence may signal the presence of paths of risk propagation, since low rank firms,
typically more risky, are payers of high rank firms, which are instead less risky.
2.4 Discussion
Both investigated partitions give interesting insights on the relationship between risk and
network structure. On one side, the percentage of rejected tests in the case of modularity
partition is consistent with the observed assortativity of risk. It may be noticed that the
preference for low risk business partners is not always a realistic option, because in some
sectors business partners are not replaceable for geographical reasons. To better assess this
point, one possibility could be to include the comparison between modules and geographical
14
location of firms, which is not available to us. On the other side, the hierarchical partition
appears to follow the risk distribution slightly better and this is probably related to the
peculiar conditional distribution of risk with respect to the distance described in Subsection
2.2. Indeed, given the fact the high risk nodes are over represented for longer distances, they
should be located in extreme positions in the ranking, either at the top or at the bottom, and
this is what is observed. It must be stressed that in the case of the two methods chosen here,
one does not exclude the other, as they give different and complementary standpoints for
interpretation. In this sense a multi-dimensional perspective is needed, where the dimensions
are the mechanisms that either favour or discourage the creation of business relationships.
3 Missing rating prediction using payments network
data
In the previous Sections we showed that network metrics can be informative of the risk of a
firm. It is therefore natural to ask whether it is possible to predict the missing risk rating
of a firm by using only information on network characteristics of the corresponding node,
as well as risk rating of the neighbour firms. This problem is particularly relevant since
we noticed that around 30% of the customers in the dataset do not have a rating and this
percentage is even higher when the entire dataset is considered (see table 4 in A.1).
Here we use network characteristics as predictors for the missing ratings into well known
methods of machine learning for classification problem. The predictors we employ are the
following:
i. in- and out-degree;
ii. weighted fraction of (in- and out-) neighbours with a given rating (H,M,L or NA)
iii. rank of the class in the hierarchy inferred by agony minimisation;
iv. membership in community inferred by modularity maximisation;
v. sum of in- and out-strength.
The fractions in (ii.) are computed considering the amount (weight) of each payment and
are together a measure for rating assortativity, while (v.) is a proxy for the size. Data are
preprocessed following [Friedman et al., 2001] so that variables are comparable in order of
magnitude, as detailed in Appendix C.1. These transformations result into a total of 25
predictors. The dataset is the one which includes only the customers, and we consider the
monthly network for January. In order to assess the performance of the prediction, we train
each model using 75% of the data, and the remaining 25% is used for testing.
We consider three methods for classification:
i. multinomial logistic;
ii. classification trees;
iii. neural networks.
See [Friedman et al., 2001] for a review of these methods.
The class H is under-represented in the sample, as it includes only around 10% of the
firms with rating. This affects the ability of any classifiers to recover this class. This is
undesirable, since the class H the most critical for the riskiness.
15
To address this issue we proceed with a 2-step classification strategy for all the three
methods. The intuition behind this strategy is to train a classifier more specialised in the
recovery of one specific class at the first step, and then separate the remaining classes in the
second step. In the first step we fix a risk class, say L, and we merge the other two classes
into a fictitious class X. We fit a first instance of the chosen model on the modified database.
In the second step, we train another instance of the model only on the two previously merged
classes. This is repeated for all the three risk classes. In the case of class H being the one
selected for step one, we apply SMOTE [Chawla et al., 2002] before training, a well-known
algorithm for data rebalancing.7.
Once the models are trained, the prediction are obtained by iterating the following two
steps for each risk class (see the schematic representation in Figure 5)
i. apply the first step classifier;
ii. if the entry is classified as X, apply the second step classifier.
Figure 5: Schematic representation of the 2-steps classifier
The final prediction is the median of the predictions. In case of draw, more weight is
given when the class is obtained from the first instance (as the classifier is more specialised).
For the 2-steps method, the random classifier can be defined in the following way: the
null distribution for the first step is obtained for each classifier, by taking into account the
fictitious class, and at the second step by considering only the two classes previously merged.
Table 2 shows the results for each classifier, together with the value for the same metrics
computed for the random classification. In the case of classification trees and neural net-
works, different combinations for the hyper-parameters have been tested (such as depth for
the trees, and number and size of hidden layers for neural networks), here we present the
results for the best choice for each model, and in Supplementary Information we explain the
selecting procedure.
The three models behave quite similarly, with slightly better overall performance of neural
networks, and the training times are comparable. It must be noted that, among the predictors
7Using SMOTE in the 1-step classification would also be an option if the objective were to use the
classifier as a first filter to detect possibly critical nodes. However, we found that the overall performance
of the classifier is quite poor, especially when considering the cost of classifying as highly risky (H) a firm
which is creditworthy (L).
16
Table 2: Accuracy and recall for 2-steps classifiers. R: random, ML: multinomial logistic,
CT: classification tree, NN: neural network.
method
accuracy
random 1-step
random 2-steps
multinomial logistic
classification tree
neural network
0.413
0.366
0.477
0.496
0.505
recall
M
0.625
0.391
0.452
0.567
0.559
L
0.438
0.368
0.553
0.502
0.526
H
0.108
0.249
0.253
0.151
0.166
only network deduced metrics have been included, while any data from the balance sheet,
which is likely to represent the main source for the risk rating model, as well as the sector
or geographic location, are excluded. When adding the economic sector, which is the only
metadata available to us, as further predictor the prediction power only slightly improves to
from 49%− 50% to around 52% of accuracy for both classification trees and neural networks.
The natural benchmark models are the random classifiers, both 1-step and 2-steps, due to
the total lack of data employed in the proprietary rating model. We are able to outperform
the first by 30% to 38%, and the latter by 15% to 22% in term of accuracy, and especially
in the case of neural network, we are able to find a good compromise with recall for H.
4 Conclusions
In this paper we empirically study the interactions and the risk distribution of 2 million
Italian firms, via the investigation of payments networks built from transactional data.
Our contribution is threefold. On one side, the empirical study of the relationship between
the high number of firms to our knowledge has not been done before, especially with this
granularity. The study of the structure of the network highlights a complex interdependence
between firms; indeed particularly interesting is the presence of a relatively small core of
firms, which are involved in most transactions. This feature, paired with the power-law tail
distribution of the number of connections and the total volume exchanged by the firms, can
be a symptom of an architecture which favours the spread of distress, or positive feedbacks.
Also relevant is the observed tendency of large, well-connected firms to be connected to small
(in terms of exchanged volume), poorly connected firms. This can be the result of almost
exclusive relationships between a big producer and its subsidiaries.
The second and main contribution is the assessment of the correlation between the net-
work structure and the distribution of risk. From our analysis, we can conclude that the risk
level of a firm is related to its features and role in the network at different levels. For single
firms, we observed that low risk firms are more likely to have a high number of connections,
and some of them acts as hubs for the entire network, being connected to thousands of other
firms. When pairs of linked firms are considered, we observed the tendency to favour connec-
tions towards firms with the same risk level. This tendency can be observed also on a more
aggregate level. Indeed, we found that also groups of firms which are more connected among
them that with the rest of the network, have a local distribution of risk which is statistically
17
different from the global one, meaning that some risk classes are over- or under- represented.
Finally, we divided firms into a hierarchical organisation, in such a way to highlight the
main direction along which money circulates. This simplified structure showed once more
that many levels of the hierarchy have a local distribution of risk statistically different from
the global one. As high risk firms are over-represented at the beginning of the flow of money,
this can be a source of distress for the entire system.
Finally, we showed that network metrics and communities can be successfully used to
predict the missing ratings with machine learning models. We propose a simple 2-steps
strategy to compromise between overall accuracy and recall on the smallest but most risky
class. We test our strategy with three methods, namely multinomial logistic, classification
trees and neural networks. Since predictors are all network-derived quantities, and no infor-
mation from balance sheets or other meta-data are used, the random rating assignment is
the natural benchmark. We find that all the three methods are able to outperform sizeably
the benchmark, with slightly better results for neural networks.
Acknowledgements
We would like to thank Ilaria Bordino, Francesco Gullo, Francesco Montecuccoli degli Erri,
Marcello Paris and Stefano Pascolutti from R&D team in UniCredit for useful discussions and
technical support. We are also grateful for suggestions we have received from Giulia Livieri,
and the participants to the Data Science Summer School at cole Polytechnique in Paris,
XLI AMASES Annual Meeting in Cagliari and XVIII Workshop in Quantitative Finance in
Milan.
References
[Abadi et al., 2015] Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C.,
Corrado, G. S., Davis, A., Dean, J., Devin, M., Ghemawat, S., Goodfellow, I., Harp,
A., Irving, G., Isard, M., Jia, Y., Jozefowicz, R., Kaiser, L., Kudlur, M., Levenberg,
J., Man´e, D., Monga, R., Moore, S., Murray, D., Olah, C., Schuster, M., Shlens, J.,
Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., Vi´egas,
F., Vinyals, O., Warden, P., Wattenberg, M., Wicke, M., Yu, Y., and Zheng, X. (2015).
TensorFlow: Large-scale machine learning on heterogeneous systems. Software available
from tensorflow.org.
[Acemoglu et al., 2012] Acemoglu, D., Carvalho, V. M., Ozdaglar, A., and Tahbaz-Salehi,
A. (2012). The network origins of aggregate fluctuations. Econometrica, 80(5):1977 -- 2016.
[Affinito and Pozzolo, 2017] Affinito, M. and Pozzolo, A. F. (2017). The interbank network
across the global financial crisis: Evidence from italy. Journal of Banking & Finance,
80:90 -- 107.
[Altman et al., 1994] Altman, E. I., Marco, G., and Varetto, F. (1994). Corporate distress
diagnosis: Comparisons using linear discriminant analysis and neural networks (the italian
experience). Journal of Banking & Finance, 18(3):505 -- 529.
18
[Arcagni et al., 2017] Arcagni, A., Grassi, R., Stefani, S., and Torriero, A. (2017). Higher
order assortativity in complex networks. European Journal of Operational Research,
262(2):708 -- 719.
[Bargigli et al., 2015] Bargigli, L., di Iasio, G., Infante, L., Lillo, F., and Pierobon, F. (2015).
The multiplex structure of interbank networks. Quantitative Finance, 15(4):673 -- 691.
[Battiston et al., 2012] Battiston, S., Puliga, M., Kaushik, R., Tasca, P., and Caldarelli, G.
(2012). Debtrank: Too central to fail? financial networks, the fed and systemic risk.
Scientific reports, 2.
[Bergstra and Bengio, 2012] Bergstra, J. and Bengio, Y. (2012). Random search for hyper-
parameter optimization. Journal of Machine Learning Research, 13(Feb):281 -- 305.
[Blondel et al., 2008] Blondel, V. D., Guillaume, J.-L., Lambiotte, R., and Lefebvre, E.
(2008). Fast unfolding of communities in large networks. Journal of statistical mechanics:
theory and experiment, 2008(10):P10008.
[Boginski et al., 2005] Boginski, V., Butenko, S., and Pardalos, P. M. (2005). Statistical
analysis of financial networks. Computational statistics & data analysis, 48(2):431 -- 443.
[Boss et al., 2004] Boss, M., Elsinger, H., Summer, M., and Thurner 4, S. (2004). Network
topology of the interbank market. Quantitative Finance, 4(6):677 -- 684.
[Chawla et al., 2002] Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer, W. P.
(2002). Smote: synthetic minority over-sampling technique. Journal of artificial intelli-
gence research, 16:321 -- 357.
[Chollet et al., 2015] Chollet, F. et al. (2015). Keras.
[Cimini et al., 2015] Cimini, G., Squartini, T., Garlaschelli, D., and Gabrielli, A. (2015).
Systemic risk analysis on reconstructed economic and financial networks. Scientific reports,
5:15758.
[Clauset et al., 2009] Clauset, A., Shalizi, C. R., and Newman, M. E. (2009). Power-law
distributions in empirical data. SIAM review, 51(4):661 -- 703.
[Crouhy et al., 2000] Crouhy, M., Galai, D., and Mark, R. (2000). A comparative analysis
of current credit risk models. Journal of Banking & Finance, 24(1):59 -- 117.
[Crouhy et al., 2001] Crouhy, M., Galai, D., and Mark, R. (2001). Prototype risk rating
system. Journal of banking & finance, 25(1):47 -- 95.
[DErrico et al., 2017] DErrico, M., Battiston, S., Peltonen, T., and Scheicher, M. (2017).
How does risk flow in the credit default swap market? Journal of Financial Stability.
[Elliott et al., 2014] Elliott, M., Golub, B., and Jackson, M. O. (2014). Financial networks
and contagion. American Economic Review, 104(10):3115 -- 53.
19
[Friedman et al., 2001] Friedman, J., Hastie, T., and Tibshirani, R. (2001). The elements of
statistical learning, volume 1. Springer series in statistics New York.
[Fukuyama and Matousek, 2016] Fukuyama, H. and Matousek, R. (2016). Modelling bank
performance: A network dea approach. European Journal of Operational Research,
259(2):721 -- 732.
[Garcia-Bernardo et al., 2017] Garcia-Bernardo, J., Fichtner, J., Takes, F. W., and
Heemskerk, E. M. (2017). Uncovering offshore financial centers: Conduits and sinks in
the global corporate ownership network. Scientific Reports, 7(1):6246.
[Garlaschelli and Loffredo, 2005] Garlaschelli, D. and Loffredo, M. I. (2005). Structure and
evolution of the world trade network. Physica A: Statistical Mechanics and its Applica-
tions, 355(1):138 -- 144.
[Greene, 2003] Greene, W. H. (2003). Econometric analysis. Pearson Education India.
[Grunert et al., 2005] Grunert, J., Norden, L., and Weber, M. (2005). The role of non-
financial factors in internal credit ratings. Journal of Banking & Finance, 29(2):509 -- 531.
[Gupte et al., 2011] Gupte, M., Shankar, P., Li, J., Muthukrishnan, S., and Iftode, L. (2011).
Finding hierarchy in directed online social networks. In Proceedings of the 20th interna-
tional conference on World wide web, pages 557 -- 566. ACM.
[Huang et al., 2009] Huang, W.-Q., Zhuang, X.-T., and Yao, S. (2009). A network analy-
sis of the chinese stock market. Physica A: Statistical Mechanics and its Applications,
388(14):2956 -- 2964.
[Huremovic and Vega-Redondo, 2016] Huremovic, K. and Vega-Redondo, F. (2016). Pro-
duction networks.
[Kim et al., 2002] Kim, H.-J., Lee, Y., Kahng, B., and Kim, I.-m. (2002). Weighted scale-free
network in financial correlations. Journal of the Physical Society of Japan, 71(9):2133 --
2136.
[Kogut and Walker, 2001] Kogut, B. and Walker, G. (2001). The small world of germany
and the durability of national networks. American sociological review, 66(3):317 -- 335.
[Lee, 2007] Lee, Y.-C. (2007). Application of support vector machines to corporate credit
rating prediction. Expert Systems with Applications, 33(1):67 -- 74.
[Mann and Whitney, 1947] Mann, H. B. and Whitney, D. R. (1947). On a test of whether one
of two random variables is stochastically larger than the other. The annals of mathematical
statistics, pages 50 -- 60.
[Newman, 2010] Newman, M. (2010). Networks: an introduction. Oxford university press.
[Newman, 2002] Newman, M. E. (2002). Assortative mixing in networks. Physical review
letters, 89(20):208701.
20
[Nier et al., 2007] Nier, E., Yang, J., Yorulmazer, T., and Alentorn, A. (2007). Network
models and financial stability. Journal of Economic Dynamics and Control, 31(6):2033 --
2060.
[Ohnishi et al., 2009] Ohnishi, T., Takayasu, H., and Takayasu, M. (2009). Hubs and au-
thorities on japanese inter-firm network: Characterization of nodes in very large directed
networks. Progress of Theoretical Physics Supplement, 179:157 -- 166.
[Parnes, 2012] Parnes, D. (2012). Approximating default probabilities with soft information.
The Journal of Credit Risk, 8(1):3.
[Pedregosa et al., 2011] Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion,
B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J.,
Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and Duchesnay, E. (2011). Scikit-
learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825 -- 2830.
[Pozzi et al., 2013] Pozzi, F., Di Matteo, T., and Aste, T. (2013). Spread of risk across
financial markets: better to invest in the peripheries. Scientific reports, 3:1665.
[Romei et al., 2015] Romei, A., Ruggieri, S., and Turini, F. (2015). The layered structure of
company share networks. In IEEE Data Science and Advanced Analytics , DSAA-2015,
pages 1 -- 10. IEEE.
[Rørdam et al., 2009] Rørdam, K. B., Bech, M. L., et al. (2009). The topology of danish
interbank money flows. Banks and Bank Systems, 4:48 -- 65.
[Serrano and Bogun´a, 2003] Serrano, M. A. and Bogun´a, M. (2003). Topology of the world
trade web. Physical Review E, 68(1):015101.
[Simon, 1991] Simon, H. A. (1991). The architecture of complexity. Facets of systems sci-
ence, 106(6):457 -- 476.
[Smirnov, 1939] Smirnov, N. V. (1939). On the estimation of the discrepancy between em-
pirical curves of distribution for two independent samples. Bull. Math. Univ. Moscou,
2(2).
[Soramaki et al., 2007] Soramaki, K., Bech, M. L., Arnold, J., Glass, R. J., and Beyeler,
W. E. (2007). The topology of interbank payment flows. Physica A: Statistical Mechanics
and its Applications, 379(1):317 -- 333.
[Souma et al., 2006] Souma, W., Fujiwara, Y., and Aoyama, H. (2006). Change of ownership
networks in Japan. In Practical Fruits of Econophysics, pages 307 -- 311. Springer.
[Tatti, 2017] Tatti, N. (2017). Tiers for peers: a practical algorithm for discovering hierarchy
in weighted networks. Data Mining and Knowledge Discovery, 31(3):702 -- 738.
[Treacy and Carey, 2000] Treacy, W. F. and Carey, M. (2000). Credit risk rating systems at
large us banks. Journal of Banking & Finance, 24(1):167 -- 201.
21
[Tumminello et al., 2011] Tumminello, M., Miccich`e, S., Lillo, F., Varho, J., Piilo, J., and
Mantegna, R. N. (2011). Community characterization of heterogeneous complex systems.
Journal of Statistical Mechanics: Theory and Experiment, 2011(01):P01019.
[Vitali et al., 2011] Vitali, S., Glattfelder, J. B., and Battiston, S. (2011). The network of
global corporate control. PloS one, 6(10):e25995.
[Watanabe et al., 2012] Watanabe, H., Takayasu, H., and Takayasu, M. (2012). Biased dif-
fusion on the japanese inter-firm trading network: estimation of sales from the network
structure. New Journal of Physics, 14(4):043034.
[Wilson and Sharda, 1994] Wilson, R. L. and Sharda, R. (1994). Bankruptcy prediction
using neural networks. Decision support systems, 11(5):545 -- 557.
22
A Dataset and network metrics
A.1 The dataset
The dataset is built from transactional data of the payment platform of a major Italian bank
for a total of 47M records. In table 3 the details of the exchanged volume by customer status
is presented. Table 4 shows the distribution of rating across the firms, disaggregating them
in terms of their customer status.
Table 3: Percentage of volume by customer status, the row indicates the status of the payer,
the column the recipient
month
no
ex
Jan
Mar
May
Jul
Sep
Nov
0.000
0.009
0.000
0.000
0.000
0.023
0.000
0.000
0.000
0.023
0.000
0.000
0.000
0.019
0.000
0.000
0.000
0.019
0.000
0.000
0.000
0.013
0.000
0.000
yes
0.036
0.604
0.046
0.149
0.015
0.541
0.036
0.193
0.018
0.542
0.040
0.194
0.014
0.538
0.031
0.183
0.015
0.599
0.032
0.175
0.015
0.578
0.031
0.158
0.001
0.030
0.002
0.002
0.000
0.037
0.000
0.001
0.000
0.035
0.000
0.001
0.000
0.031
0.000
0.001
0.000
0.027
0.000
0.001
0.000
0.037
0.000
0.000
no
no
yes
ex
no
yes
ex
no
yes
ex
NA
0.001
0.000
0.110
0.027
0.003
0.000
0.006 NA 0.000
0.000
0.000
0.151
0.023
0.002
0.000
0.000 NA 0.000
0.000
0.000
0.018
0.144
0.001
0.000
0.000 NA 0.000
0.000
0.000
0.018
0.181
0.002
0.000
0.000 NA 0.000
0.000
0.000
0.022
0.131
0.001
0.000
0.000 NA 0.000
0.000
0.000
0.012
0.165
0.001
0.000
0.000 NA 0.000
no
yes
ex
no
yes
ex
no
yes
ex
yes
0.014
0.543
0.037
0.184
0.018
0.525
0.040
0.199
0.015
0.534
0.033
0.189
0.014
0.591
0.029
0.172
0.013
0.581
0.037
0.175
0.014
0.578
0.028
0.137
ex
0.000
0.037
0.000
0.001
0.000
0.033
0.000
0.003
0.000
0.037
0.000
0.001
0.000
0.029
0.000
0.005
0.000
0.029
0.000
0.000
0.000
0.036
0.001
0.000
Feb
Jun
Apr
NA month
0.000
0.154
0.002
0.000
0.000
0.155
0.002
0.000
0.000
0.172
0.001
0.000
0.000
0.140
0.001
0.000
0.000
0.141
0.001
0.000
0.000
0.194
0.001
0.000
Aug
Dec
Oct
A.2 Time aggregation
When defining a network from temporal data, choosing the time scale of analysis is crucial
because it can affect deeply the topology. Shorter time scales (daily or weekly) emphasise
peculiar behaviours as, for example, which supplier is paid first once liquidity is available.
Longer time scales help giving a more stable picture of the supply chain structure among
firms.
23
Table 4: Average monthly distribution of nodes by customer status and rating.
status
rating
L
M
H
ND
L
M
H
ND
L
M
H
ND
not customer
incl. NA
customer
former
total
count
2121
4592
305
676762
87801
95893
18811
85841
3901
7850
926
41775
1026577
%
%with rating
0.000
0.003
0.000
0.990
0.305
0.333
0.065
0.298
0.017
0.179
0.017
0.767
0.010
0.702
0.340
0.217
In order to give an intuition of different behaviours, two quantities can be considered.
The first is the persistence of links and nodes, which is measured by counting the number
of times a node or an edge appears in the networks for different time aggregations. From
Figure 6 one can see that most of nodes are active only for few days, while a small core of
firms is intensely active through the whole year. Secondly, the size of the networks, both
in terms of number of nodes and links, for different time aggregations is shown in Figure 7.
Interestingly, for daily aggregation, see Left panel, both quantities show a high periodicity,
with a very high peak (a factor ∼ 5 with respect to the other days) at the end of each
month. This effect is evident also with weekly aggregation, see (central panel), but not in
the monthly time scale. This last observation justifies the choice of monthly networks as
focus of this analysis.
y
c
n
e
u
q
e
r
f
105
100
107
105
103
0
100 200 300
10 20 30 40 50
days
weeks
nodes
links
107
106
105
104
1
6
12
months
Figure 6: Histogram for the number of days, weeks, months of activity for nodes (blue) and
existence for edges (green) for different time aggregations
24
·106
1.2
1
0.8
0.6
0.4
0.2
0
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
·106
days
1.5
1
0.5
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
·106
weeks
4
3
2
1
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
months
Figure 7: Number of nodes (blue) and links (green) for each day, week, and month. Only
with longer time aggregations one is able to eliminate periodicity.
25
A.3 Network metrics
A network's component is a subsets of nodes such that there is path between any pair of
nodes, either undirected (weakly connected components), or directed (strongly connected
components). From the definition of the networks it is clear that there are no isolated
nodes, since the smallest weak components include at least two nodes, namely a payer and
a payee. As it is common for many other real networks, it is possible to identify a weak
component, which is of the order of magnitude of the entire network. In our case this giant
component (GC) includes on average 98% of the nodes. Considering instead the largest
strongly connected component (SCC), it includes approximately 20% of the nodes but more
than half of the links. As a consequence the density of the strongly connected component
is an order of magnitude larger than the density of the whole network or of the weakly
connected component. See Table 5 in for more details of these quantities.
In the standard definition of the bow-tie structure of a network, the nodes in the GC
but outside the strongly connected component are divided between the in-component, the
nodes from which links arrive in the strongly connected component, and the out-component,
the nodes reachable from the SCC. Nodes in the in-component that have no incoming links,
represent each month about one half of the active firms and their activity is sporadic.
Table 5: Percentage size (%n) and density (ρ) of the largest weakly (GC) and strongly (SCC)
connected components. The last column (%w) contains the relative volume transferred
among nodes in the SCC with respect to the total volume.
month %n
Jan
0.989
0.989
Feb
0.980
Mar
Apr
0.980
0.981
May
0.980
Jun
0.982
Jul
Aug
0.970
0.981
Sep
0.981
Oct
Nov
0.979
0.979
Dec
ρ
GC
3.4 · 10−6
3.21 · 10−6
3.15 · 10−6
3.16 · 10−6
3.16 · 10−6
3.11 · 10−6
3.05 · 10−6
3.08 · 10−6
3.31 · 10−6
3.00 · 10−6
3.08 · 10−6
2.81 · 10−6
SCC
ρ = m
3.29 · 10−5
2.99 · 10−5
2.98 · 10−5
3.09 · 10−5
3.06 · 10−5
3.03 · 10−5
2.88 · 10−5
3.23 · 10−5
3.23 · 10−5
2.81 · 10−5
3.00 · 10−5
2.69 · 10−5
n(n−1) %w
0.75
0.69
0.70
0.67
0.69
0.69
0.70
0.69
0.73
0.68
0.65
0.67
%n
0.232
0.237
0.235
0.231
0.232
0.230
0.237
0.204
0.233
0.237
0.227
0.228
26
Table 6: Results of power law fit of the degree and strength distribution for all the months
obtained by using the algorithm described in [Clauset et al., 2009]. The α parameter is the
fitted exponent and the kmin and wmin parameter is the estimated minimum value after
which the behaviour of the distribution is consistent with a power law tail. Since the volume
of payments are scaled, the values of wmins are not much informative, so for the strength
F (wmin) = 1 − EDCF (wmin) is reported instead.
month
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
αin
2.55
2.56
2.53
2.67
2.66
2.58
2.52
2.62
2.64
2.53
2.59
2.55
degree
min αout
kin
159
2.85
2.80
148
2.70
125
257
2.82
2.83
227
2.83
135
2.80
124
236
2.74
2.83
187
2.75
129
134
2.83
2.62
180
kout
min
24
19
44
22
23
23
21
14
32
25
19
41
αin
1.89
2.10
2.11
2.14
2.12
2.07
2.07
2.07
2.09
2.05
2.06
2.06
strength
min) αout F (wout
min)
0.01
0.01
0.01
0.01
0.01
0.01
0.01
0.01
0.01
0.01
0.01
0.01
1.89
1.99
1.97
2.01
2.07
1.96
2.02
1.94
2.03
1.95
2.04
1.98
F (win
0.03
0.03
0.03
0.03
0.03
0.03
0.03
0.03
0.04
0.03
0.03
0.03
Table 7: Assortativity coefficient for degree and strength. The columns with rating refers to
the subgraph of nodes with known rating. The columns customers refers to the subgraph of
nodes with customer status yes.
attribute
degree
nodes
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
all
with rating
-0.035
-0.027
-0.025
-0.027
-0.026
-0.025
-0.025
-0.027
-0.024
-0.028
-0.023
-0.027
-0.035
-0.029
-0.030
-0.027
-0.033
-0.027
-0.028
-0.035
-0.027
-0.028
-0.028
-0.030
strength
all
with rating
-0.036
-0.030
-0.027
-0.030
-0.027
-0.028
-0.028
-0.032
-0.028
-0.032
-0.026
-0.031
-0.031
-0.031
-0.027
-0.029
-0.026
-0.030
-0.028
-0.034
-0.030
-0.033
-0.028
-0.035
clients
-0.046
-0.039
-0.037
-0.041
-0.035
-0.037
-0.038
-0.041
-0.036
-0.043
-0.035
-0.041
clients
-0.046
-0.036
-0.038
-0.037
-0.039
-0.032
-0.036
-0.040
-0.030
-0.037
-0.031
-0.034
27
B Risk distribution
B.1 Degree and risk
The multinomial logistic regression aims to model the probabilities for a classification prob-
lem with more than two outcomes. Here we treat the responses (L, M, H) as categorical
and ordered. In practice this means to find parameters that best fit the model
(cid:18) P (r ≤ L)
(cid:18)P (r ≤ M )
P (r > L)
(cid:19)
(cid:19)
P (r > M )
log
log
= aL + b1
LX1... + bp
LXp+
= aL + b1
M X1... + bp
M Xp+
. Xi are the predictors, a and bi· are the coefficients. We consider the cases p = 1, where the
predictor is the degree X1 = k, and the case p = 2 where also the size is used as predictor
X2 = s. In the following table 8, the b coefficients are shown, together with an indication
for the statistical significance.
Table 8: Coefficients for multinomial logistic regression. The first two columns refer to the
regression with the degree as only predictor. The last four columns refer to the regression
with also the size as predictor. The superscript indicates the predictors: k for the degree,
s for the size. The subscript indicates the risk rating. The stars indicate significance: one
star if the p-value < 0.05, two stars if the p-value < 0.01
bk
L
0.258 **
Jan
0.221 **
Feb
Mar
0.226 **
0.243 **
Apr
May 0.229 **
0.239 **
Jun
0.238 **
Jul
0.183 **
Aug
0.238 **
Sep
0.220 **
Oct
0.226 **
Nov
Dec
0.219 **
bk
M
0.352 **
0.305 **
0.314 **
0.328 **
0.324 **
0.325 **
0.344 **
0.272 **
0.355 **
0.329 **
0.338 **
0.331 **
bk
L
0.261 **
0.210 **
0.220 **
0.240 **
0.206 **
0.232 **
0.227 **
0.175 **
0.218 **
0.207 **
0.211 **
0.220 **
bs
L
-0.007
0.024 **
0.013
0.007
0.051 **
0.017 *
0.026 **
0.020 *
0.046
0.030 **
0.034 **
-0.002 *
bk
M
0.312 **
0.233 **
0.237 **
0.270 **
0.237 **
0.237 **
0.263 **
0.179 **
0.255 **
0.232 **
0.233 **
0.231 **
bs
M
0.091 **
0.159 **
0.173 **
0.131 **
0.195 **
0.199 **
0.187 **
0.211 **
0.228 **
0.220 **
0.234 **
0.227 **
28
B.2 Assortativity of risk
Table 9: Assortativity coefficient for risk rating. The columns with rating refers to the
subgraph of nodes with known rating. The columns customers refers to the subgraph of
nodes with customer status yes.
In the last two columns, the metric for assortativity is
modified in order to take into account weights, specifically eij is computed as the fraction of
volume, not the number of edges (see main text for more details).
metric
nodes
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
all
-0.063
-0.066
-0.067
-0.067
-0.067
-0.068
-0.072
-0.078
-0.067
-0.076
-0.072
-0.082
standard
with rating
0.025
0.026
0.025
0.026
0.025
0.026
0.025
0.025
0.025
0.024
0.024
0.024
clients
0.035
0.038
0.039
0.036
0.038
0.039
0.037
0.040
0.040
0.037
0.039
0.040
all
0.073
0.106
0.073
0.069
0.065
0.060
0.046
0.078
0.087
0.080
0.070
0.037
weighted
with rating
0.115
0.181
0.150
0.154
0.146
0.150
0.142
0.149
0.168
0.151
0.175
0.199
clients
0.109
0.188
0.150
0.156
0.139
0.128
0.137
0.224
0.216
0.213
0.149
0.151
To test if nodes show different preferences in connection between incoming and outgoing
payments we define the quantities
∆(in)
i
(X) =
∆(out)
i
(X) =
w(in)
i
w(out)
i
br(i)
(X) − aX
1 − aX
br(i)
(X) − ar(i)
1 − ar(i)
bX
, X ∈ {L, M, H}
bX
, X ∈ {L, M, H} .
The notation is consistent with the definition in (1): r(i) is the risk of node i; aX, bX
are the percentage volume from or to nodes with rating X for the whole network, w(out)
(X)
(w(in)
(X)) is the percentage of the volume from (to) node i to (from) nodes of rating X. Sam-
ples are obtained by grouping nodes by rating, for a total of 18(= (3 ratings)2 · 2 directions)
distributions. For example, the distribution of excess percentage volume from L towards M
is given by
i
i
{∆i(M )(out) i ∈ L} ∼ F (out)
L
(M ) .
Similarly, the excess percentage volume entering M from H is given by
{∆i(H)(in) i ∈ M} ∼ F (in)
M (H) .
Note that in general, F (in)
X (Y ) (cid:54)= F (in)
Y
(X).
29
We perform two set of test.
In the first case we fix one rating and we compare out-
and in- excess percentage volume with respect to a certain rating. In all the cases the null
hypothesis is rejected with very low p-values, however it is not straightforward to give an
economic interpretation of the overall results: for all the rating, the excess percentage toward
L is greater that the analogous for incoming volume, while the opposite holds for payments
to and from H. In the second set of test we fix a rating and a direction (in or out), and
we compare the excess percentage volume from (or to) all the ratings. Also in this case all
the tests reject the null with very low p-values, so we are able to order the distributions
and evaluate the preference in connection. For the outgoing volume, rating L is preferred to
the more risky ones in all the case. Payments to nodes rated M follows in preference from
nodes having risk M and H, but are last in order for nodes having rating L. For incoming
payments, the situation is slightly different. Rating M is preferred by nodes rated M and
H, and it is followed by L. While the preference is reversed for payments from nodes rated
L.
B.3 Test for risk distribution within a community
The statistical test employed in the main text has the purpose to assess whether a given rating
is under- or over- represented in a certain subset, obtained by one of the partitioning methods
described in the paper. In general, this means to test if the distribution of ratings in a single
subset is statistically different from the unconditional distribution obtained considering the
entire sample. To do so, one computes the p-value representing the probability to observe
a given number of ratings in each community under the null hypothesis of that ratings are
distributed in the community as in the whole sample. As shown in [Tumminello et al., 2011]
the probability under the null is the hyper-geometric distribution. Moreover, since for each
community multiple tests (one for each rating and community) are performed, a correction
for the p-value for multiple hypothesis testing is used. In particular, the Bonferroni correction
is chosen, i.e. fixed a threshold ps for the p-value, the corrected threshold is given by ps
,
Nr
where Nr is the number of tests. The threshold of is fixes at ps = 1% before correction.
Specifically, given a partition {Ci}i the following quantities are computed
kx,i = #{nodes in Ci with rating x}
ni = #{nodes in Ci}
Kx = #{nodes with rating x}
N(cid:48) = #{nodes}
kx,i
ni
kx,i
ni
> Kx
N(cid:48) )
< Kx
N(cid:48) )
,
y ∼ hypergeom
(cid:18) KL
N(cid:48) ,
KM
N(cid:48) ,
N(cid:48) ; N(cid:48)(cid:19)
KH
.
and the p-value is given by
p =
(cid:40)P(y > kx,i
P(y < kx,i
Note that {Kx} and N(cid:48) are computed in the specific monthly network under considera-
tion.
In the case of the distribution conditioned on the distance, the subsets are obtained by
considering pairs of nodes. For example, the fraction of nodes with rating L at distance k
30
from H is computed as
p(k)
HL =
{(i, j) : d(i, j) = k, i ∈ H, j ∈ L}
{(i, j) : d(i, j) = k, i ∈ H}
.
The partitions resulting from the other methods are very different in terms of number
and size of subsets, so to make tests comparable, only communities including at least 500
nodes with known rating. In the cases of modularity, subsets are ordered by descending size.
Note that, since each month the set of active nodes and the labelling of subsets changes, one
cannot easily compare the behaviour of a subsets across months.
Tables 10, 11, present a summary of the tests, recording for each month and risk class
the number of times the null hypothesis has been rejected, separated in over- (+) and under-
(−) representation. The last two columns contain the number classes respectively tested,
and in total (nC).
Table 10: Summary for test results: modularity
L
M
H
+ - + - + -
5
4
7
5
5
4
6
4
5
3
6
5
6
3
5
5
4
3
5
4
4
5
3
3
8
9
7
7
8
11
10
8
9
9
7
10
9
11
13
9
9
12
8
12
9
11
9
11
4
2
2
3
2
3
5
3
2
2
4
3
6
9
8
7
7
6
5
8
4
6
5
7
tested nC95%
17
20
20
19
18
21
17
21
16
18
17
19
13
15
14
14
13
15
12
16
12
13
11
15
nC
1971
1900
2070
1902
1856
2148
1862
2608
1879
1922
2083
2323
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
31
Table 11: Summary for test results: hierarchy
L
M
H
+ - + - + -
5
5
5
5
4
4
6
4
6
6
6
5
4
5
5
6
6
5
5
5
5
5
4
7
5
5
4
4
4
3
3
4
4
4
3
3
3
4
4
3
3
4
3
3
4
3
3
3
5
4
4
3
4
3
3
3
3
3
4
3
4
4
4
4
4
4
4
5
4
4
4
4
tested nC95% nC
18
17
18
15
18
17
16
20
17
17
18
19
12
12
12
12
12
12
12
14
12
12
12
12
11
11
11
10
13
11
11
11
10
11
10
12
h
0.75
0.74
0.74
0.75
0.74
0.75
0.74
0.78
0.74
0.73
0.75
0.75
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
32
C Classification
C.1 Data pre-processing
It is well established [Friedman et al., 2001] that rescaling/ transforming data in order them
to be ∈ [0, 1] or ∈ [−1, 1] or standardised, generally improves the performance of classifica-
tion, especially when different predictors have very different scale. So, before training the
models we perform data preprocessing, in particular:
i. for in- and out- degree we use quantile transformation of the logarithm of the degree.
This choice is explained by the aforementioned power-law tail distribution of these
quantities, and aim to avoid too scattered data;
ii. the predictors for assortativity are already ∈ [0, 1] so they do not need preprocessing;
iii. the distribution of nodes into hierarchy classes is standardised, i.e each rank is shifted
and rescaled to have mean 0 ad variance 1;
iv. the module is the only categorical variable. The usual binary transformation would
result into a new binary variable for each possible value. As we discussed before,
the number of modules is very high but a small fraction of them contains almost all
the nodes, so we only keep those that have more than 500 nodes and merge all the
remaining into a residual class;
v. quantile transformation is applied also to the log-distribution of the size.
C.2 Models training and hyper-parameter optimisation
Models training is performed using already implemented packages: for multinomial logistic
and classification trees Scikit-learn Python package [Pedregosa et al., 2011] has been em-
ployed, while for neural networks Keras Python package [Chollet et al., 2015] and Tensor-
flow [Abadi et al., 2015] have been used. However, during optimisation, the parameters that
define the architecture of the model, the so called hyper-parameters, remain fixed. For this
reason, a common practice is to train many models using different values for these hyper-
parameters and compare performance according to the chosen metric(s). A thorough discus-
sion on this topic is beyond the scope of this paper, we refer to [Bergstra and Bengio, 2012]
and related literature for detailed information.
Here we apply a simple grid search for the hyper-parameters of interest. This has been
done for both 1-step and 2-steps classifiers. The metrics we employ take into account the
domain specific interpretation of the risk classes. In particular we want to penalise more
misclassification towards lower risk classes, i.e M → ¯L, H → ¯M , H → ¯L8, and towards
distant classes, i.e L → ¯H, H → ¯L. For this reason, beside the standard accuracy and
recall, we also consider weighted scores for accuracy wsacc, recall wsrec, precision wspr, which
are function of the confusion matrix C. With the notation
Cx,y = {x → ¯y} , C·,y =
Cx,y,
∀x, y ∈ {L, M, H}
(cid:88)
8X indicates the real class, while ¯X indicates the predicted class.
x
33
(cid:88)
(cid:88)
(cid:88)
1
1
1
−0.25 −0.5
−0.25
1
−0.75
−1 −0.75
1
−0.25 −0.75
−0.25
1.75
−0.25 −0.75
−0.25
1.75
1
Cx,y
Cx,·
P rec
x,y ,
Cx,y
C·,y
P pr
x,y ,
P rec =
P pr =
−0.75
−1 −0.75
1
−0.75
−1 −0.75
wsacc =
1
C·,·
x, y∈{L, M, H}
Cx,yP acc
x,y ,
P acc =
wsrec =
wspr =
x, y∈{L, M, H}
x, y∈{L, M, H}
For classification trees, the hyper-parameter of interest is the depth, i.e the maximum
number of condition to be satisfied for classification (or the length of the longest path from
root to leaves). A higher value for depth results in lower training error but may lead to
over-fitting. We considered value of depth from 3 to 10. For the 1-step model, the tree with
depth 6 resulted the best choice, while for the 2-steps, the best results have been attained
with a depth of 9 for the first step tree and 5 for the second. For neural networks, the
hyper-parameters of interest are the number and size of hidden layers. As before, increasing
too much these values may lead to over-fitting. In order to avoid extremely high number of
parameters when adding layers, we consistently reduce their size as their number increases
ili, where li is the size of the ith layer).
For example, in the case of 1 (hidden) layer the number of nodes is between 10 and 100,
while for two layers, it goes from 5 each to 10 each. For the 1-step model the best results
are obtained with 1 layer of 50 nodes, while for the 2-steps the best choice is 2 layers of 5
nodes each for the first step and 1 layer of 10 nodes for the second.
(intuitively, the number of parameter grows as(cid:81)
34
|
1912.12846 | 1 | 1912 | 2019-12-30T08:24:59 | A Game-Theoretic Algorithm for Link Prediction | [
"cs.SI",
"physics.soc-ph"
] | Predicting edges in networks is a key problem in social network analysis and involves reasoning about the relationships between nodes based on the structural properties of a network. In particular, link prediction can be used to analyse how a network will develop or - given incomplete information about relationships - to discover "missing" links. Our approach to this problem is rooted in cooperative game theory, where we propose a new, quasi-local approach (i.e., one which considers nodes within some radius k) that combines generalised group closeness centrality and semivalue interaction indices. We develop fast algorithms for computing our measure and evaluate it on a number of real-world networks, where it outperforms a selection of other state-of-the-art methods from the literature. Importantly, choosing the optimal radius k for quasi-local methods is difficult, and there is no assurance that the choice is optimal. Additionally, when compared to other quasi-local methods, ours achieves very good results even when given a suboptimal radius k as a parameter. | cs.SI | cs |
A Game-Theoretic Algorithm for Link Prediction
Mateusz Tarkowski, University of Oxford
Tomasz P. Michalak, University of Warsaw
Michael Wooldridge, University of Oxford
January 1, 2020
Abstract
Predicting edges in networks is a key problem in social network analysis and
involves reasoning about the relationships between nodes based on the structural
properties of a network. In particular, link prediction can be used to analyse how
a network will develop or -- given incomplete information about relationships --
to discover "missing" links. Our approach to this problem is rooted in coopera-
tive game theory, where we propose a new, quasi-local approach (i.e., one which
considers nodes within some radius k) that combines generalised group closeness
centrality and semivalue interaction indices. We develop fast algorithms for com-
puting our measure and evaluate it on a number of real-world networks, where it
outperforms a selection of other state-of-the-art methods from the literature. Im-
portantly, choosing the optimal radius k for quasi-local methods is difficult, and
there is no assurance that the choice is optimal. Additionally, when compared
to other quasi-local methods, ours achieves very good results even when given a
suboptimal radius k as a parameter.
1 Introduction
In this paper we are concerned with link prediction -- an important research problem in
social network analysis [4, 20, 23]. The aim is to predict between which pairs of nodes
unknown links exist or should form based on the known structural characteristics of
the network. Applications include biological networks, where some of the network
is known, but checking whether other links actually exists is very costly (e.g., food
web, protein-protein and metabolic networks [23]); social networks, where certain in-
formation about links is impossible to attain or verify (e.g., covert networks [38]); and
identifying potentially fruitful collaboration in organisations [20].
Predicting whether links exist or will form is strongly associated with the concept
of node similarity [23]. If two nodes are similar, then there is a greater chance that they
are connected. The three most common approaches to computing node similarity take
into account either local, quasi-local or global topological information about nodes. In
general, global methods produce better results than local ones, but are more computa-
tionally involved. Furthermore, quasi-local methods, which only consider the network
within a certain radius k around the pair of nodes, tend to do better than global ones
1
[23] when given an optimal radius. This is because, it is unlikely that features of the
network that are far away from a pair of nodes (that are taken into account by global
methods) will actually impact the chance of those two nodes being connected.
Recently, Szczepanski et al. [31] proposed a new method to tackle the link predic-
tion problem based on group k-degree group centrality and the concept of the game-
theoretic interaction index. In particular, k-degree group centrality is a valuation of
groups of nodes according to the number of nodes that are at a distance k or closer to
the group [24]. In turn, the interaction index can be interpreted as a measure of the syn-
ergy [1] or similarity of players in a cooperative situation. When applied to k-degree
group centrality, the interaction index becomes an interesting measure of the similarity
of the topological placement of nodes. In particular, two nodes produce negative syn-
ergy according to k-degree group centrality whenever they have common neighbours.
The interaction index is used to measure such negative synergies between any pair of
nodes in the context of all the possible groups of nodes that these two nodes belong
to. Considering all these groups allows the measure to prioritise the impact of unique
common neighbours. The intuition behind considering all groups is as follows: if most
of the nodes in a network neighbour a certain node, then this does not necessarily mean
that they are similar; on the other hand, if only two nodes neighbour a certain node,
then this is a unique characteristic shared only by these two nodes and suggests that
they are similar. Szczepanski et al. show that their game-theoretic approach produces
a very competitive link prediction method when compared to a selection of quasi-local
measures. As for computational considerations, the authors develop a general algo-
rithm for computing interaction indices of k-degree centrality that runs in O(V 4) and
a more specific one that runs in O(V 3) time.
In what follows, we propose an alternative game-theoretic method to tackle the
link prediction problem. Our method builds upon the following intuition: while the
k-degree centrality used by Szczepanski et al. [31] postulates that all nodes within a
distance k of a pair of nodes impact their similarity equally, we postulate that those
that are farther away should be considered less important than those that are closer
from the pair. In order to develop a method based on this intuition, we use the con-
cept of generalised group closeness centrality, which has precisely this property: the
magnitude of the impact of a node on the value of a group reduces as the distance from
this group increases.1 As compared to k-degree centrality, this allows us to reduce the
impact of far-away nodes on synergy. As we are interested in developing a quasi-local
measure, similarly to k-degree centrality, we introduce a restriction on the generalised
group closeness centrality that only nodes inside of a radius k around a given group
impact the value of this group value.
Interestingly, despite the fact that our method is more general that the one developed
by Szczepanski et al. [31], our algorithm for computing it is less demanding compu-
tationally. In particular, we compute our generalised closeness semivalue interaction
index with a complexity of O(V 2
k V 2), where Vk is the average number of nodes
within a distance k of any node. We also develop an algorithm to compute the gen-
eralised closeness Shapley value interaction index that runs in O(V 2
k V +V 2) time.
1See the work by Skibski and Sosnowska [30] for an overview of different centrality measures that focus
on the distances between nodes.
2
This is an interesting result, since computing the interaction index given an arbitrary
cooperative game is difficult (#-P complete, like the Shapley value [6, 8]). We should
also highlight the generality of our algorithm stemming from the fact that we allow
for any function of distance, f , to be used with our measure. For f (d) = 1 whenever
d < k, our measure is equivalent to the k-degree interaction index.
We evaluate our approach by considering 11 real-life networks on which we run
a series of experiments. We find that -- in most cases -- our approach produces equal
or better results than the state-of-the-art quasi-local measures in the literature. Among
others, it outperforms the game-theoretic method proposed by Szczepanski et al. [31].
Furthermore, we consider an aspect of quasi-local measures that has thus-far been
overlooked in the literature. In particular, most authors present the result of their mea-
sure given an optimal parameter k [33, 31, 23]. However, the optimal value of this
parameter is unknown and it must be estimated. Therefore, we study how the measures
perform given a selection of values for the parameter k, and not only the optimal value
of this parameter, since there is always a chance that the estimated value of k is not
optimal.
Two cases can be distinguished. If a value for k is chosen that is smaller than the
optimal value of this parameter, then this results in a computational/accuracy trade-off.
The measure can usually be computed faster, but it could perform better by having
more information about the network (i.e., a larger value for k). For large networks, it
may simply take too long to compute a quasi-local measure with an optimal k, and such
a trade-off is necessary. In the worst case, k = 1 may be chosen, and the quasi-local
measure becomes local. On the other extreme, if k is equal to the longest shortest path
in the network, then it can be said that the quasi-local measure becomes global.
What happens, then, if the value of k is larger than the optimal value? In our
study, we show that such a k can result in a significant reduction of the quality of
the similarity ranking for quasi-local measures. We find, however, that our proposed
measure is largely resistant to this. For example, in one network that we study -- a
Football network [13, 5] -- the precision of the ranking produced by the measure due
to Szczepanski et al. [31] decreases by approximately 37% when the value of k is 3
instead of the optimal value 1, whereas the precision of our measure decreases by less
than 1%. Interestingly, we also note that there are cases where the quality of other
measures is reduced given a larger k, while the quality of our measure improves. This
means that whereas other measures pick up more noise given more information about
the network, our measure is still able to gather more insight in order to improve the
ranking of potential edges.
2 Preliminaries
In this section we introduce the key concepts required for the understanding of the
paper.
3
2.1 Graph-Theoretic Concepts
A network is a directed weighted graph G = (V, E, ω), where V is a set of nodes, E is
a set of edges, i.e., unordered pairs (v, u) of nodes in V with v 6= u, and ω : E → R+
is a weight function from edges to the positive real numbers. A graph is unweighted if
ω(e) = 1 for all e ∈ E. We denote the neighbours of a node v by E(v) = {u : (v, u) ∈
E} and the neighbours of a subset C of nodes by E(C) = Sv∈C E(v) \ C. We refer
to the degree of a node v by deg(v) = E(v). We define the distance from a node s to
a node t as the length of the shortest path from s to t and denote it by dist (s, t), and
we define the distance between a node v and a subset of nodes C ⊆ V as dist (C, v) =
minu∈C dist(u, v).
The Generalised Group Closeness Centrality [11, 10, 26] of a group of nodes S in
a graph G is defined as:
νCL
f
(G)(S) = Xv∈V \S
f (dist(S, v));
(1)
2.2 Game-Theoretic Concepts
A cooperative game is defined by a group of players, I, and a characteristic function
ν : 2I → R that assigns to each group of players a real value, with the restriction
that ν(∅) = 0. For our purposes, the players are nodes within a graph (i.e., I = V ). A
central concept to cooperative game theory is that of the marginal contribution, i.e., how
much value a player i brings to a coalition C of players. Formally, M Cν(C, i) = ν(C∪
{i}) − ν(C). Whereas in the game-theoretic literature marginal contributions are used
to measure the importance of players for a group in order to divide the value of said
group fairly among its members [6], we are concerned with using them in order to rank
the similarity of players. To achieve this, We follow Owen [27] in defining the synergy
between two players, i and j, within the context of a coalition C as the difference
between the marginal contribution of the group {i, j} and the marginal contributions
of each node separately. Formally,
Sν (C, i, j) =
MC ν (C, {i, j}) − MC ν(C, {i}) − MC ν(C, {j}).
The Shapley value interaction index of i and j is defined as:
I Shapley
i,j
(ν) = Xπ∈Π(I i∧j )
Sν(Cπ({i, j}), i, j)
(n − 1)!
,
(2)
(3)
where I i∧j = I \ {i, j} ∪ {{i, j}}, Π(X) is the set of permutations of the set X,
and Cπ({i, j}) is the set of elements preceding {i, j} in the permutation π. Grabisch
and Roubens [15] continued this work and introduced the Banzhaf interaction index.
Szczepanski et al. [31] generalised these concepts further by introducing semivalue
interaction indices, defined below:
I SEMI
i,j
(ν) =
n−2
Xk=0 XC∈C k(I\{i,j})
β(k)
Sν (C, i, j)
(cid:0)n−2
k (cid:1)
4
(4)
For our purposes, the lower the interaction index of two nodes, the more similar they
are.
2.3 Performance Metrics for Link Prediction
Next, we present the main metrics used to evaluate link prediction methods. The first
of these is the area under curve (AUC), and the second is precision [23]. The goal of
a link prediction algorithm is to identify pairs of nodes that are not connected by an
edge but which do (or will) exist in the real world (i.e., nodes that are "missing" from
the graph). For example, people in an online social network are typically connected by
their friendships. However, this is not to say that people who have not indicated their
friendship via the social platform are not actually friends. Ideally, a link prediction
algorithm would identify those pairs of individuals who are friends in real-life but not
(yet) on the social network.
In order to test link prediction methods, it is typical to remove a certain percentage
of links from a real life network [23, 31, 33]. This altered network is given as input
to a link-prediction algorithm, which ranks disconnected pairs of nodes in terms of the
likelihood that they belong to the "removed," or "missing" set.
◮ Area Under Curve The area under the ROC curve is a good overall indicator of the
quality of the ranking of edges that is produced by a link prediction algorithm and we
can compute it using the Mann-Whitney U test [17]. Formally, let m be the number
of edges in the network that are "missing." In other words, these edges do not exist in
the graph that the link-prediction algorithm received as input, but do exist in the real
world. These are the edges that we would like a link-prediction algorithm to discover
and therefore give them a high rank. Let l be the number of edges that do not exist in
the graph that are not missing. In other words, these are the edges that we would like
a link-prediction algorithm to recognise as non-existent and therefore give them a low
rank. There are a total of n = m × l comparisons between missing and non-existent
edges. Let n′ be the number of such comparisons where a missing edge is ranked over
a non-existent edge, and n′′ be the number of comparisons where a missing edge is
given the same rank as a non-existent edge. AUC, then, is defined as follows:
AUC =
n′ + n′′
2
n
If all missing edges are ranked higher than non-existent edges, the resulting AUC is
equal to 1. If the opposite is true (i.e., all non-existent edges are ranked higher than all
missing edges), then this results in an AUC of 0. A random link-prediction algorithm
results in an average AUC of 0.5. In short, AUC is the percentage of comparisons be-
tween ranked edges that are "correct." For this reason, we present AUC as a percentage
value.
◮ Precision For a given p ∈ N, let Top(p) be the set of top p edges according to the
ranking generated by a link-prediction algorithm. Let Correct (p) be the set of edges in
Top(p) that are "missing." The precision of the algorithm, then, is defined as follows:
Precision(p) =
Correct (p)
p
5
If all of the top p edges ranked by an algorithm are missing edges, then the precision
is equal to 1. If none of them are, then the precision is equal to 0. Note that this
metric is dependent on the variable p, which indicates the depth to which the ranking
is studied. In particular, this depth should never be higher than the actual number of
missing edges. Whereas most literature [23] has focused on a static depth p, such as
100, we take a different approach. Since the sizes of our networks vary greatly, a static
depth makes no sense, which is why we take p to be equal to the number of missing
edges in the network.
3 Semivalue Closeness Interaction Index & Its Compu-
tation
In this section, we introduce our family of quasi-local measures for link prediction.
Generally, quasi-local measures are characterised by requiring a parameter, k. When a
quasi-local algorithm evaluates the likelihood of an edge existing between the nodes u
and v, it only ever considers the nodes that are at distance of at most k away from u or
v. If all other nodes that are farther than k from u and v would be removed from the
graph, then this would not change the evaluation of the existence of an edge between u
and v according to a quasi-local algorithm. Conversely, local algorithms are equivalent
to quasi-local algorithms with k = 1 and global algorithms consider the whole graph
in evaluating the likelihood of an edge existing. Following Szczepanski et al. [31],
we apply semivalue interaction indices (see Equation 4) to a group centrality measure
as a means to measure the similarity of disconnected nodes. Whereas Szczepanski
et al. [31] used group k-degree centrality, we use a broader class of group centrality
measures -- general group closeness centrality, νCL
:
f
νCL
f
(G)(S) = Xv∈V
f (dist(S, v)).
If for any natural number k we define f as
f (d) =(1
0
if d ≤ k
otherwise,
then νCL
use the following distance function:
f
is equivalent to k-degree centrality. To develop our measure, however, we
f (d) =( 1
d2
0
if d ≤ k
otherwise.
This choice has two benefits:
(1) It retains the computational advantage of k-degree group centrality, whereby faraway
nodes do not impact it. This not only improves computational performance, but also
the accuracy of the resulting similarity measure, since Szczepanski et al. [31, 33]
6
and Szczepanski et al. [33] showed that faraway nodes are less likely to impact the
similarity of nodes and therefore reduce the accuracy of the measure. In fact, this
is well-known for various similarity measures, which is why some quasi-local mea-
sures outperform global ones in many networks [23]. Faraway nodes do not impact
the index, and therefore need not be considered, which leads to faster computation.
We show that this also improves the AUC and precision of the index, since faraway
nodes are less likely to impact the similarity of nodes. This is why some quasi-local
measures outperform global ones [23].
(2) It is likely that nodes that are closer impact similarity more than those that are further
away, so it makes sense to use a decreasing function such as 1
d2 for those nodes where
d < k in order to decrease the impact of far-away nodes. We also studied functions
such as 1
d2 produced the best results.
2d , but found that 1
d or 1
Let us now introduce our main computational results. We start off by proving that
the generalised closeness semivalue interaction index can be computed in polynomial
time of O(V 2
k V 2). Next, we consider a particular case of this general result, i.e.,
the generalised closeness Shapley value interaction index. We prove that it can be
computed even faster, in O(V 2
k V +V 2) time. Importantly, for both algorithms, we
leave the choice of f open, meaning that the analysis and algorithms can be used with
any decreasing function.
Theorem 1. I Semi
s,t
(νCL
f
(G)) can be computed in O(V 2
k V 2) time.
Proof. Our goal is to compute
I SEMI
s,t
(νCL
f
(G)) =
V −2
Xk=0 XC∈C k(V \{s,t})
β(k)
S(C, s, t)
(cid:0)V −2
k (cid:1)
,
(5)
f
i.e., Equation 4, in polynomial time. We will be counting the number of coalitions for
which certain common expressions appear in this sum. By multiplying these expres-
sions by their number of appearances, we will achieve polynomial computation. Let us
first look closer at the definition of νCL
(G) in Equation 1. In particular, the equation
itself consists of a sum over nodes u. We will only focus on one of these elements
(G)). Let
us define νu = f (dist (C, u)) for the remainder of our proof and focus on computing
I SEMI
s,t
at a time, keeping in mind thatPu∈V I SEMI
Moreover, we will focus on computing the inner sum of Equation 4 -- PC∈C k(V \{s,t}) β(k) S(C,s,t)
for an arbitrary k, and our resulting algorithm will then sum the value of this inner
part for all k such that 0 ≤ k ≤ V −2. We assume without loss of generality that
dist (s, u) ≤ dist (t, u), meaning that S(C, s, t) = MC (C, t). Moreover, only coali-
tions C such that dist (C, u) > dist (t, u) matter (since otherwise S(C, s, t) = 0). In
effect, we arrive at the following simplification:
(f (dist (C, u)) = I SEMI
(νu) for some s and t.
(νCL
f
s,t
s,t
--
(V −2
k )
XC∈C k(V \{s,t})
−β(k)(
−
νu({s})
(cid:0)V −2
k (cid:1)
)
νu(C)
(cid:0)V −2
k (cid:1)
7
.
We will use the following notation:
M C+(s, t, u, k) =
C∈{C:C∈C k(V \{s,t}) and
dist (C,u)>dist (s,u)}
M C−(s, t, u, k) =
C∈{C:C∈C k(V \{s,t}) and
dist (C,u)>dist (s,u)}
X
X
β(k)
β(k)
νu({s})
(cid:0)V −2
k (cid:1)
νu(C)
(cid:0)V −2
k (cid:1)
The rest of the proof will focus on computing these values. In order do this, let us
introduce the following notation:
Nod ∼d(u) = {v : v ∈ V and c ∼ u},
where ∼ is one of <, >, ≤, or ≥.
M C+(s, t, u, k) : Let d = dist (t, u). Computing M C+(s, t, u, k) is equivalent to
computing the following expression:
{C : C ∈ C k(V \ {s, t}) and dist (C, u) > d},
and multiplying it by β(k) f (d)
(V −2
k )
. We need to count the number of coalitions C of
size k such that dist (C, u) > d. Counting the number of such coalitions is as simple
as counting the number of ways to choose k elements from N od>d. In other words:
k
(cid:0)N od>d
(cid:1). This gives us the desired result:
M C+(s, t, u, k) = β(k)
M C−(s, t, u, k) : Let us define
M C−(s, t, u, k, d) =
f (d)
k (cid:19)
k (cid:1)(cid:18)N od>d
(cid:0)V −2
X
C∈{C:C∈C k(V \{s,t}) and
dist (C,u)=d
β(k)
}
.
νu(C)
(cid:0)V −2
k (cid:1)
We now have
M C−(s, t, u, k) =
Xd∈{d:
d∈dists(u) and
d<dist(s,u) }
M C−(s, t, u, k, d).
We therefore have to find the number of coalitions of size k such that dist (C, u) = d.
In other words, they need to have at least some node at distance d from u and no nodes
that are closer. The answer is as follows:(cid:0)N od≥d
result:
k
M C−(s, t, u, k, d) =
(cid:1). This gives us the desired
k
f (d)
(cid:1) −(cid:0)N od>d
k (cid:19) −(cid:18)N od>d
k (cid:1)(cid:18)(cid:18)N od≥d
(cid:0)V −2
k (cid:19)(cid:19).
8
Algorithm 2 implements the equations from this proof and computes the semivalue
closeness interaction index in the required time.
As for the generalised closeness Shapley value interaction index, the following
result holds.
Theorem 2. I Shapley
s,t
(νCL
f
(G)) can be computed in O(V 2
k V +V 2) time.
Proof. Our proof will be based on dissecting Equation 3. First, note that this equation
is a sum of multiple expressions over various permutations. To achieve polynomial
computation, we will group expressions that are equal to one another and count how
many permutations these expressions appear in. Finally, by multiplying the expressions
by their respective number of appearances we will achieve polynomial computation. As
previously, we will focus on computing I Shapley
(νu) for some s and t, and the resulting
algorithm will be a sum over u ∈ V . Again, assuming that dist (s, u) ≤ dist (t, u) we
have S(C, s, t) = −M C(C, {t}) = −(ν(C ∪ {t}) − ν(C)).
s,t
Continuing, our aim will be to dissect the formula for I Shapley
(νu) into smaller,
more manageable parts, and to compute those. Note that M C(C, {t}) 6= 0 if and
only if dist (t, u) < dist (C, u). In this case ν(C ∪ {t}) = ν({t}) is independent of
C. We refer to this as the left, or positive, part of the sum that constitutes the marginal
contribution. We refer to ν(C) as the negative part. As previously, we note that νCL
(G)
in Equation 1 consists of a sum over nodes u and define νu = f (dist (C, u)). We will
focus on computing our similarity metric for νu, and the final answer will be a sum of
νu for all u 6= s, t. Next, let us introduce the following notation:
s,t
f
X
π∈Π(V s∧t) and
dist (t,u)<dist (πt,u)}
νu({t}),
M C+(t, u) =
π∈{π:
M C−(t, u) =
X
νu(Cπ({s, t})),
π∈{π:
π∈Π(V s∧t) and
dist (t,u)<dist (πt,u)}
where Cπ(x) is the set of elements in the permutation π that precedes x, and arrive at
the following simplification:
I Shapley
s,t
(νu) = −
(M C+(t, u) − M C−(t, u))
(V −1)!
.
The remainder of the proof will focus on computing M C+(t, u) and M C−(t, u).
M C+(t, u) : Our goal here is to find the number of permutations π ∈ Π(V s∧t) such
that dist (t, u) < Cπ({s, t}) and multiply this number by ν({t}). Let d = dist(t, u).
We can construct all such permutations in the following manner:
• First, choose Nod ≤d(u)−1 positions (we have to subtract 1, since s and t are treated
as one node) for all of the nodes in V s∧t that are as close to u as t or closer. Out
9
of all of these positions, t has to be first, otherwise dist (t, u) < Cπ(t) will not be
satisfied. There are(cid:0)
the nodes except the first can be permuted in (Nod ≤d(u) − 2)! ways.
Nod ≤d(u)−1(cid:1) ways that we can choose the positions and all of
V −1
• Next, the rest of the nodes are placed in the rest of the positions, which can be
permuted in (V −1 − (Nod ≤d(u))! −1) ways.
When we combine both steps, there are(cid:0)
such permutations, which simplifies to:
Nod ≤d(u)−1(cid:1)(Nod ≤d(u)−2)! (V −Nod ≤d(u))!
V −1
M C+(t, u) =
(V −1)!
Nod ≤d(u) − 1
M C−(t, u) : Let us introduce the following notation
M C−(t, u, d) =
π∈{π:
X
π∈Π(V s∧t) and
dist (Cπ({s,t}),u)=d}
νu(Cπ({s, t}))
and let dists(u) be the set of distances from any node to u. In effect, we have
M C−(t, u) =
X
d∈{d:
d∈dists(u) and
dist (t,u)<dist (d,u)}
M C−(t, u, d).
For a given d, then, we will focus on computing M C−(t, u, d). We need to capture
all permutations π for which the coalition of nodes preceding {s, t} (i.e., Cπ({s, t})
is exactly at distance d from u. The requirement can be summarised as follows: there
needs to be at least one node x in π preceding {s, t} such that dist (x, u) = d and no
nodes that are closer than x to u preceding t. This can be counted using the inclu-
sion/exclusion principle. Counting all permutations such that dist(Cπ({s, t}), u) ≥ d
and subtracting those such that dist(Cπ({s, t}), u) > d provides the answer. We can
use the techniques for counting MC +(t, u) to arrive at the following:
M C−(t, u, d) =
(V −1)!
Nod <d(u) − 1
−
(V −1)!
Nod ≤d(u) − 1
Algorithm 3 implements the equations from this proof and computes the Shapley value
closeness interaction index in the required time. This concludes our proof.
Since our Algorithms require information about the distances between certain nodes
to be presented in a sorted fashion and this information is used multiple times, it is ad-
visable to compute these sorted vectors in a precomputation phase. Furthermore, since
these precomputations are common between both the Shapley value and semivalue in-
teraction indices, we present them in a common precomputation algorithm, the pseudo-
code of which can be found in Algorithm 1. Algorithms 2 and 3 continue where the
precomputations leave of to compute their respective indices.
10
Algorithm 1: Precomputations.
input : Graph G = (V, E, ω), Closeness function f : R → R, Probability
distribution function β : 0, 1, . . . V −1 → R, radius k
output: Configuration Semivalue
1 dist[V ][V ];
2 for v ∈ V do
3
for u ∈ V do
dist[v][u] = ∞
distance[v] ← empty set;
visited ← empty set;
φv ← 0;
4
5
6
7
8 Q ← Priority Queue;
9 Q.enqueue(hv, 0i);
10
11 while Q not Empty do
dist[v][v] = 0;
12
13
14
15
16
17
18
19
20
21
hu, di ← Q.pop();
II[v, u] = 0;
visited.insert(u);
for s ∈ E(u) do
if (s 6∈ visited or dist[v][s] > dist[v][u] + ω(u, s)) and
(dist[v][u] + ω(u, s) ≤ k) then
dist[v][s] = dist[v][u] + ω(u, s);
Q.enqueue(hs, dist[v][s]i);
for u ∈ visited do
distances[v] ← distances[v] ∪ hu, dist [u, v]i;
sort in descending order(distances[v]);
In particular, Algorithm 1 uses a modified Dijkstra's algorithm [9] in order to com-
pute the distance between the k nearest nodes to each node in O(V (Vk log(Vk)+Ek))
time, where Vk is the average number of nodes at distance k from any node and Ek is
the average number of edges within a distance of k around any node. The algorithm
also sets up the data structures required for the computation of the interaction index.
Algorithms2 and 3 use dynamic programming in order to compute the negative part of
the marginal contributions (M C− from our proof). Algorithm 2 runs in O(V 2V 2
k )
time, and Algorithm 3 runs in O(V V 2
k + V 2) time.
We already mentioned that generalised closeness centrality is equivalent to k-degree
centrality given the appropriate function f , and our algorithms can therefore also com-
pute the k-degree interaction index. Interestingly, despite being more sophisticated,
our algorithm is actually faster.
Szczepanski et al. [31] quote the complexity of their algorithm as O(V 3), however
the authors did not consider the complexity of finding the intersection of two sets. We
give the authors the benefit of the doubt, since it is possible to do this in linear time,
11
Algorithm 2: Semivalue Closeness Interaction Index.
1 for u ∈ V do
prev d ← largest distance in distances[u];
2
3 Nod>[prev d ] ← V −distances[u].size();
4 N od≥[prev d] ← V −distances[u].size();
5
for (v, d) ∈ distances[u] do
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
if d 6= prev d then
N od>[d] ← N od≥[prev d];
N od≥[d] ← N od≥[prev d];
prev d ← d;
N od≥[d] ← N od≥[d] + 1;
prev d ← largest distance in distances[u];
for k ∈ [0, V ] do
MC − ← 0;
for (s, d) ∈ distances[u] do
if d 6= prev d then
MC − ← MC − + f (prev d )((cid:0)N od≥[d]
prev d ← d;
k
k
(cid:1)(cid:0)N od>[d]
(cid:1));
for (t, dt) ∈ distances[u] do
d ← max(d, dt);
MC + ← f (d)(cid:0)N od≥[d]
(cid:1);
II[s, t] = M C− − M C+;
k
which gives their algorithm a complexity of O(V 2Vk). This, however, requires a
modification of their algorithm in order to sort the neighbour sets in the precomputation
phase.
As opposed to querying every pair of nodes and then every node s within the radius
k of the pair, our algorithm reverses this, and first considers any node s and then all
pairs of nodes within its vicinity. In doing this, we avoid altogether querying pairs
of nodes that are far away (except to first initialise the distance between each node to
infinity and interaction index to 0). Combined with our restricted Dijkstra algorithm,
this results in a total time complexity of O(V V 2
k + V 2).
We study the running time of both algorithms using randomly generated graphs
according to the preferential attachment (PA) model due to Barabasi and Albert [2]. In
particular, we study two cases: a relatively sparse network, where we start with a clique
of 3 nodes and in each iteration add a node with 2 edges, and a denser, more centralised
network that starts with a clique of 5 nodes and with each node adds 3 edges. The
running times of both algorithms are presented in Tables 1 and 2, where m0 is the size
of the initial clique and m is the number of edges added during each iteration of the
preferential attachment algorithm. We note that the comparison is heavily dependent
on our implementation of the algorithms, and that we implemented the algorithm due
12
Algorithm 3: Shapley Value Closeness Interaction Index.
1 for u ∈ V do
prev d ← largest distance in distances[u];
2
3 Nod>[prev d ] ← V −distances[u].size();
4 N od≥[prev d] ← V −distances[u].size();
5
for (v, d) ∈ distances[u] do
6
7
8
9
10
if d 6= prev d then
N od>[d] ← N od≥[prev d];
N od≥[d] ← N od≥[prev d];
prev d ← d;
N od≥[d] ← N od≥[d] + 1;
prev d ← largest distance in distances[u];
11
12 MC − ← 0;
13
for (s, d) ∈ distances[u] do
14
15
16
17
18
19
20
if d 6= prev d then
MC − ← MC − +
prev d ← d;
f (prev d )
N od<[prev d]−1 −
f (prev d)
N od≤[prev d]−1 ;
for (t, dt) ∈ distances[u] do
d ← max(d, dt);
MC + ← f (d)
II[s, t] = M C− − M C+;
N od≤[d]−1 ;
to Szczepanski et al. [31] with the benefit of our restricted Dijkstra algorithm. We
note that although our algorithm is significantly faster given a sparse network or low
radius k, due to the more complicated nature of our algorithm it actually becomes
somewhat slower given a high enough Vk. This is because our algorithm performs
more complicated operations, which cannot be expressed by its asymptotic complexity
alone.
4 Empirical Evaluation
In this section, we compare our generalised closeness Shapley interaction index to
four other state-of-the-art link prediction methods from the literature on 11 real-life
networks.
4.1 Setting & Datasets
We compare our algorithm (referred to as Shp. Cls.) to the Shapley k-degree interac-
tion index [31], to k-Common Neighbours [31], and to the SRW and LRW algorithms
[21]. We briefly introduce these algorithms below:
13
V
500
400
300
200
100
k
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
Vk
3.788
18.2011
65.1542
3.785
17.9544
57.734
3.78
17.1246
60.0592
3.77
15.5977
46.0083
3.74
12.0278
30.4716
Algorithm 3
3.153
17.417
106.436
2.331
12.295
70.226
1.669
9.199
50.777
1.053
5.517
26.046
0.476
2.324
8.147
Szczepanski et al. [31]
21.789
32.648
107.116
16.412
24.916
72.582
10.096
15.626
49.086
6.169
8.668
25.923
2.874
3.416
8.757
Table 1: Average running time (in milliseconds) of Algorithm 3 compared to Szczepan-
ski et al. [31] for 1000 random PA graphs using the parameters m0 = 3 and m = 2.
• Shapley k-Degree Interaction Index (Shp. Deg.): This similarity measure is
equivalent to our measure with the parameter f (d) = 1 for d ≤ k and f (d) = 0
otherwise.
• k-Common Neighbours (CN): According to this measure, which is used to rank
undirected, unweighted graphs, the rank of every non-existing edge between a pair of
nodes is the number of common k-neighbours between the two nodes. Let Ek(v) =
{u : v 6= u and dist (v, u) < k}. k-Common Neighbours, then, is defined as fol-
lows:
CN k(u, v) = Ek(u) ∩ Ek(v)
.
• Local Random Walk (LRW): This measure ranks the similarity of nodes based on
the concept of a random walk. Assume that at time step t = 0 a walker starts at
node u. In other words, there is 100% probability that the current node is u at time
step t = 0. At any other time step, the walker can visit any of the neighbours of the
current node with equal probability. Denote by Puv(t) the probability that a walker
that started at u is at node v at time step t. LRW, then, is defined as follows:
LRW k(u, v) =
E(u)
2E
Puv(k) +
E(v)
2E
Pvu(k)
• Superimposed Random Walk (SRW): This measure is considered by the authors
to be a more advanced version of LRW. It is defined as the sum of all LRW measures
14
V
500
400
300
200
100
k
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
Vk
5.184
38.5843
158.143
5.18
34.162
139.181
5.1733
33.2759
133.982
5.16
26.6135
88.1525
5.12
22.4189
65.1413
Algorithm 3
4.14
39.503
360.747
3.437
27.707
251.65
2.329
21.42
160.85
1.397
11.172
77.701
0.691
4.253
16.191
Szczepanski et al. [31]
39.241
66.001
318.472
25.969
45.686
206.952
18.799
31.384
140.103
10.756
17.757
75.709
5.189
6.685
16.797
Table 2: Average running time (in milliseconds) of Algorithm 3 compared to Szczepan-
ski et al. [31] for 1000 random PA graphs using the parameters m0 = 5 and m = 3.
from time step 0 to time step k. Formally, we have:
SRW k(u, v) =
LRW t(u, v)
k
Xt=0
An important facet of our analysis is that whereas, as far as we are aware, the anal-
ysis of quasi-local similarity measures in the literature has focused on the performance
of algorithms given an optimal choice of k, there is no analysis on the impact of a
suboptimal k on the algorithms. To combat this, we chose to compare all algorithms
using k values of 1, 2 and 3. For the datasets we evaluated, we found that none of the
methods significantly benefited from a higher k value (in fact, in most cases a higher
value was detrimental), but comparing these 3 values was sufficient to highlight the
differences between the methods.
In order to compare the methods, we take 11 networks and randomly remove 30%
of the edges from each of them. Next, we rank non-existing edges within the net-
works (including those that were removed) according to each algorithm. We use the
area under the curve (AUC) and precision to compare the results. We repeat this
process 1000 times for all networks, methods and parameters k and present the av-
erage AUC and precision in Tables 4, and 5, respectively. The networks that we
used to evaluate the algorithms on2 are as follows: Youtube 20 and Amazon 100
[19], Football [13, 5], Taro [16, 28, 35], Jazz [14, 35], Zachary [40, 35], and Dolpins
citekonect:dolphins,konect:2017.
2All datasets except Polbbokos are available at http://konect.uni-koblenz.de/networks/ [35],
https://snap.stanford.edu/data/ [19], or http://vlado.fmf.uni-lj.si/pub/networks/data/
[5]
15
• Youtube 20: A network of users belonging to the 20 top groups in the SNAP dataset
from the popular video-sharing website Youtube [19]. Connections between users
indicate friendship between their user accounts. Link prediction can predict friend-
ships between users whose user accounts are not formally connected as friends on
the website.
• Amazon 100: A network of products from the 100 top product categories in the
SNAP dataset from the Amazon online store website. Connections between products
were mined using the "Customers Who Bought This Item Also Bought" feature
[19]. Link prediction methods can be used to discover new product associations and
therefore improve the impact of the recommendation service.
• US AIR: A network of airports in the USA and their connections [5]. Link prediction
can be used as a method of predicting up and coming flight connections.
• Football: A network of college football teams [13, 5]. Edges represent matches
between the teams.
• Taro: A network of gift-giving (taro) between households in a Papuan village [16,
28, 35].
• Jazz: A collaboration network of jazz musicians from 2003 [14, 35]. Edges indicate
that two musicians performed together in a band.
• Zachary: A friendship network of the Zachary karate club [40, 35].
• Surfers: A network of the interpersonal contacts of windsurfers in southern Califor-
nia in the fall of 1986 [12, 35].
• Dolphins: A network representing a community bottlenose dolphins off Doubtful
Sound and their associations observed between 1994 and 2001 [22, 35].
• Terrorists: The network of suspected terrorists who orchestrated the 2004 Madrid
train bombing [18, 35]. A connection between two terrorists indicates that they
communicated with each other.
• Polbooks: This network represents books about politics sold through Amazon. Two
books are connected if they were frequently co-purchased [39]. This dataset was
kindly provided by [33].
We present some of the characteristics of the networks in Table 3.
4.2 Results
In all but the Zachary network (where LRW 3 achieved the best result), our closeness
Shapley interaction index achieved the best AUC, and in all but the Football network
(where the simplest common neighbour algorithm with a radius of 1 achieved the best
result) our algorithm achieved the best precision. Even in these two networks, how-
ever, the comparative advantage of other methods was marginal. Interestingly, in the
16
Dataset
V
E
Youtube 20
436
1384
Amazon 100
433
2014
Football
115
1226
Taro
22
78
Jazz
198
5484
Zachary
32
156
Surfers
43
672
Dolphins
62
318
Polbooks
105
822
k
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
Average Vk with 30%
edges randomly removed
3.22018
16.8829
40.7019
4.25173
6.39215
6.81899
8.46087
34.3531
87.2797
3.45455
7.18136
11.602
20.3838
113.99
177.578
4.27647
14.1438
22.6532
11.9302
38.1082
42.939
4.58065
13.7555
26.2656
6.86667
28.5871
54.9784
Table 3: The networks' characteristics.
17
Dataset
Youtube 20
Amazon 100
US Air
Football
Taro
Jazz
Zachary
Surfers
Dolphins
Terrorists
Polbooks
k
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
Shp. Cls.
61.351
Shp. Deg.
61.351
70.016
66.896
92.554
96.961
96.992
92.94
91.591
91.285
81.361
82.861
81.291
59.282
51.26
48.993
95.836
94.497
94.995
65.883
67.76
67.842
82.091
81.362
81.825
71.397
77.142
76.816
89.573
88.992
88.469
83.795
87.898
87.515
69.723
66.527
92.554
96.914
96.99
92.94
88.693
84.295
81.361
80.392
54.998
59.282
49.354
44.516
95.836
84.4259
74.376
65.883
63.607
62.803
82.091
69.836
52.137
71.397
76.716
74.841
89.573
85.685
78.282
83.795
85.828
81.134
CN
61.102
69.175
65.898
92.466
96.875
96.834
91.654
85.598
83.885
81.382
77.99
53.042
59.087
42.494
40.734
94.412
80.361
72.735
63.412
59.996
60.997
80.668
68.69
52.131
71.493
74.67
71.378
88.173
79.728
75.632
83.0612
83.379
79.551
SRW
58.75
63.561
62.391
74.426
91.641
92.031
86.436
91.695
91.420
67.18
77.559
76.832
48.41
48.662
45.985
84.561
90.442
89.434
54.199
66.065
67.078
58.715
66.917
65.899
62.996
72.7849
72.618
68.404
82.872
83.128
73.511
83.629
83.741
LRW
58.75
63.626
62.613
74.426
91.594
91.937
86.436
91.801
90.827
67.18
78.423
74.938
48.41
49.17
44.04
84.561
90.73
85.352
54.199
67.447
68.351
58.715
69.018
63.69
62.996
73.160
72.235
68.404
84.334
82.86
73.511
84.643
83.301
Table 4: Average AUC (best result indicated in gray).
18
Data Set
Youtube 20
Amazon 100
US Air
Football
Taro
Jazz
Zachary
Surfers
Dolphins
Terrorists
Polbooks
k
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
1
2
3
Shp. Cls.
9.23527
8.73816
9.37343
60.594
60.988
60.865
53.8612
49.186
50.9319
40.856
40.546
40.104
15.9455
15.2364
12.9273
63.697
60.812
62.261
24.487
19.387
20.587
49.378
49.287
49.391
18.447
20.232
19.728
65.9319
64.4972
64.8903
29.367
29.739
Shp. Deg.
9.23527
3.22899
5.70435
60.594
60.587
64.735
53.8612
37.0044
27.8438
40.856
20.489
3.3776
15.9455
11.4091
4.00909
63.697
28.051
19.901
24.487
9.0522
13.974
49.378
33.981
25.035
18.447
18.002
11.355
65.9319
41.8264
28.5861
29.367
22.363
CN
6.11643
1.35217
4.96667
58.1
49.064
36.161
45.1463
34.402
28.8824
41.105
17.596
3.1885
12.9455
3.8664
3.12727
57.666
24.832
18.588
15.544
7.5696
13.778
47.155
33.552
25.052
20.753
12.172
9.7085
55.8806
35.7958
28.5806
26.664
21.186
SRW
4.17198
5.58599
6.82899
49.129
57.1358
57.443
41.0411
47.1418
47.0859
21.958
28.272
28.52
14.1636
13.7182
12.4273
36.83
42.33
40.858
10.5652
15.178
17.704
26.213
30.671
30.424
13.879
15.975
14.977
26.1722
37.4875
39.3431
16.884
20.049
LRW
4.17198
7.39179
7.91884
49.129
58.59
58.256
41.0411
48.3915
44.7281
21.958
32.802
26.277
14.1636
10.7909
7.73636
36.83
42.244
36.682
10.565
20.096
19.913
26.213
33.475
28.723
13.879
16.515
15.496
26.1722
45.5889
39.0875
16.884
22.404
29.899
15.115
13.077
20.767
20.427
Table 5: Average precision (best result indicated in gray).
19
Football and Dolphins networks the quality the AUC of our method increased when k
was raised from 1 to 2, however the quality of the Shapley k-degree interaction index
fell. We attribute this to the fact that the latter algorithm over-stresses the importance
of second- and third-order relationships. For precision, we see this phenomenon in the
Amazon 100, Dolphins, and most prominently Surfers and Polbooks (where our rank-
ing was slightly improved, but the Shapley degree ranking decreased by approximately
24% and 14%, respectively) networks.
In general, we note that the quality of all algorithms tends to fall when the k value
is too high. It seems that the Shapley value closeness measure is very resilient to this
phenomenon. Even in cases when the quality of SRW and LRW does not fall as much,
they produce worse results at any k value, making this irrelevant. In fact, the results
of both algorithms given any k were worse than random in the Taro network. This
network seems especially difficult, with many of the results being worse than random.
We also note that our algorithm is -- generally -- more resilient than LRW and SRW
when choosing a k value that is too low.
We see that the Shapley degree interaction index and common neighbours are the
most likely to under-perform given a high k value. In fact, this can decrease the AUC
of both measures by nearly 30% (as seen in the Surfers network), and precision by
approximately 40% (in the case of the Jazz and Football networks). Given this, it is
difficult to recommend these algorithms as quasi-local link prediction methods, given
that providing them with too much information (i.e., a k parameter that is too high)
can result in a ranking that is little better than random. Although it is possible to
estimate this parameter when using these methods, there is no way to know whether
the parameter is too high, potentially dramatically decreasing the effectiveness of the
measure.
Finally, we note that whereas SRW is generally viewed as being superior to LRW, it
is LRW that usually achieves the better result in our experiments when each algorithm
is given its own, respective optimal paramter k. We note, however, that given the same
k for a high value of k, it is usually SRW that is superior.
5 Conclusions and Future Work
We developed a new game-theoretic quasi-local algorithm for link prediction that is
based on generalised closeness centrality. Our approach achieves competitive results
when compared to the state-of-the-art, especially given a suboptimal radius, k, within
which to query for similarities between nodes.
We are particularly keen on two future research directions. First, we aim to study
a variable radius for different pairs of nodes. It goes to reason that if a different radius
is required to achieve the optimal result in different networks, perhaps various sections
of the network (such as connected components) should also be studied with a different
radii. Moreover, other group centrality measures may prove to be even more effec-
tive when paired with the interaction index in predicting links between nodes. Group
betweenness centrality [10, 32], for example, has not been studied for this purpose.
We are also keen on studying how resilient the game-theoretic link prediction algo-
rithm proposed in this paper is to strategic manipulation by an evader who purposefully
20
attempts to hide her links. A number of such studies have been recently proposed in the
literature [38, 41, 42, 7]. Interestingly, in a similar line of research on evading detec-
tion by centrality measures [37, 36], it has been shown that game-theoretic centrality
measures [34, 29, 25] are more difficult to evade than the conventional ones [3]. We
believe the same will be the case
6 Acknowledgements
This paper was supported by the Polish National Science Centre grant DEC-2013/09/D/ST6/03920.
Michael Wooldridge was supported by the European Research Council under Ad-
vanced Grant 291528 ("RACE").
References
[1] B. K. Alshebli, T. P. Michalak, O. Skibski, M. Wooldridge, and T. Rahwan. A
measure of added value in groups. ACM Transactions on Autonomous and Adap-
tive Systems (TAAS), 13(4):18, 2019.
[2] A.-L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science,
286(5439):509 -- 512, 1999.
[3] M. Baranowski and A. G´orski. New heuristic for hiding vertices in a social net-
work. Master Thesis, University of Warsaw, 2018.
[4] N. Barbieri, F. Bonchi, and G. Manco. Who to follow and why: link predic-
tion with explanations. In Proceedings of the 20th ACM SIGKDD international
conference on Knowledge discovery and data mining, pages 1266 -- 1275. ACM,
2014.
[5] V.
Batagelj
and
A.
Mrvar.
Pajek
datasets.
http://vlado.fmf.uni-lj.si/pub/networks/data/, 2006.
[6] G. Chalkiadakis, E. Elkind, and M. Wooldridge. Computational Aspects of Coop-
erative Game Theory. Synthesis Lectures on Artificial Intelligence and Machine
Learning. Morgan & Claypool, 2012.
[7] J. Chen, Z. Shi, Y. Wu, X. Xu, and H. Zheng. Link prediction adversarial attack.
arXiv preprint arXiv:1810.01110, 2018.
[8] X. Deng and C. Papadimitriou. On the complexity of cooperative solution con-
cepts. Mathematics of Operations Research, 19(2):257 -- 266, 1994.
[9] E. Dijkstra. A note on two problems in connexion with graphs. Numerische
Mathematik, 1(1):269 -- 271, 1959.
[10] M. G. Everett and S. P. Borgatti. The centrality of groups and classes . Journal
of Mathematical Sociology, 23(3):181 -- 201, 1999.
21
[11] L. Freeman. Centrality in social networks: Conceptual clarification. Social Net-
works, 1(3):215 -- 239, 1979.
[12] L. C. Freeman, S. C. Freeman, and A. G. Michaelson. On human social intelli-
gence. J. of Social and Biological Structures, 11(4):415 -- 425, 1988.
[13] M. Girvan and M. E. Newman. Community structure in social and biological
networks. Proceedings of the national academy of sciences, 99(12):7821 -- 7826,
2002.
[14] P. M. Gleiser and L. Danon. Community structure in jazz. Advances in Complex
Systems, 6(4):565 -- 573, 2003.
[15] M. Grabisch and M. Roubens. An axiomatic approach to the concept of interac-
tion among players in cooperative games. International Journal of Game Theory,
28(4):547 -- 565, 1999.
[16] P. Hage and F. Harary. Structural Models in Anthropology. Cambridge University
Press, 1983.
[17] J. A. Hanley and B. J. McNeil. The meaning and use of the area under a receiver
operating characteristic (roc) curve. Radiology, 143(1):29 -- 36, 1982.
[18] B. Hayes. Connecting the dots. can the tools of graph theory and social-network
studies unravel the next big plot? American Scientist, 94(5):400 -- 404, 2006.
[19] J. Leskovec and A. Krevl. SNAP Datasets: Stanford large network dataset col-
lection. http://snap.stanford.edu/data, 2014.
[20] D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social net-
journal of the Association for Information Science and Technology,
works.
58(7):1019 -- 1031, 2007.
[21] W. Liu and L. Lu. Link prediction based on local random walk. EPL (Europhysics
Letters), 89(5):58007, 2010.
[22] D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, and S. M. Dawson.
The bottlenose dolphin community of Doubtful Sound features a large proportion
of long-lasting associations. Behavioral Ecology and Sociobiology, 54:396 -- 405,
2003.
[23] L. Lu and T. Zhou. Link prediction in complex networks: A survey. Physica A,
390(6):11501170, 2011.
[24] P. T. Michalak, K. V. Aaditha, P. L. Szczepa´nski, B. Ravindran, and N. R. Jen-
nings. Efficient computation of the shapley value for game-theoretic network
centrality. Journal of Artificial Intelligence Research, 46:607 -- 650, 2013.
[25] T. P. Michalak, T. Rahwan, O. Skibski, and M. Wooldridge. Defeating terrorist
networks with game theory. IEEE Intelligent Systems, 30:53 -- 61, 2015.
22
[26] T. P. Michalak, T. Rahwan, P. L. Szczepa´nski, O. Skibski, R. Narayanam, M. J.
Wooldridge, and N. R. Jennings. Computational analysis of connectivity games
with applications to the investigation of terrorist networks. In F. Rossi, editor,
Proceedings of the Twenty-Third international joint conference on Artificial In-
telligence (IJCAI'13), pages 293 -- 301. AAAI Press, 2013.
[27] G. Owen. Multilinear extensions of games. Management Science, 18(5):P64 --
P79, 1972.
[28] E. Schwimmer. Exchange in the Social Structure of the Orokaiva: Traditional
and Emergent Ideologies in the Northern District of Papua. St. Martin's Press,
1973.
[29] O. Skibski, T. P. Michalak, and T. Rahwan. Axiomatic characterization of game-
theoretic centrality. Journal of Artificial Intelligence Research, 62:33 -- 68, 2018.
[30] O. Skibski and J. Sosnowska. Axioms for distance-based centralities. In Thirty-
Second AAAI Conference on Artificial Intelligence, 2018.
[31] P. L. Szczepanski, A. S. Barcz, T. P. Michalak, and T. Rahwan. The game-
theoretic interaction index on social networks with applications to link prediction
and community detection.
In Proceedings of the Twenty-Fourth International
Joint Conference on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina,
July 25-31, 2015, pages 638 -- 644, 2015.
[32] P. L. Szczepa´nski, T. P. Michalak, and T. Rahwan. Efficient algorithms for game-
theoretic betweenness centrality. Artificial Intelligence, 231:39 -- 63, 2016.
[33] P. L. Szczepanski, T. P. Michalak, T. Rahwan, and M. Wooldridge. An extension
of the owen-value interaction index and its application to inter-links prediction.
In ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2
September 2016, The Hague, The Netherlands - Including Prestigious Applica-
tions of Artificial Intelligence (PAIS 2016), pages 90 -- 98, 2016.
[34] M. K. Tarkowski, P. L. Szczepa´nski, T. P. Michalak, P. Harrenstein, and
M. Wooldridge. Efficient computation of semivalues for game-theoretic network
centrality. Journal of Artificial Intelligence Research, 63:145 -- 189, 2018.
[35] University
of
Koblen-Landau.
KONECT.
http://konect.uni-koblenz.de/networks/, 2017.
[36] M. Waniek, T. P. Michalak, T. Rahwan, and M. Wooldridge. On the construc-
tion of covert networks. In Proceedings of the 16th Conference on Autonomous
Agents and MultiAgent Systems, pages 1341 -- 1349. International Foundation for
Autonomous Agents and Multiagent Systems, 2017.
[37] M. Waniek, T. P. Michalak, M. J. Wooldridge, and T. Rahwan. Hiding individuals
and communities in a social network. Nature Human Behaviour, 2(2):139, 2018.
23
[38] M. Waniek, K. Zhou, Y. Vorobeychik, E. Moro, T. P. Michalak, and T. Rahwan.
How to hide one's relationships from link prediction algorithms. Scientific re-
ports, 9(1):1 -- 10, 2019.
[39] Q. Wu, X. Qi, E. Fuller, and C.-Q. Zhang. "follow the leader": A centrality
guided clustering and its application to social network analysis. The Scientific
World Journal, 2013, 2013.
[40] W. W. Zachary. An information flow model for conflict and fission in small
groups. Journal of anthropological research, 33(4):452 -- 473, 1977.
[41] K. Zhou, T. P. Michalak, and Y. Vorobeychik. Adversarial robustness of
similarity-based link prediction. arXiv preprint arXiv:1909.01432, 2019.
[42] K. Zhou, T. P. Michalak, M. Waniek, T. Rahwan, and Y. Vorobeychik. Attacking
similarity-based link prediction in social networks. In Proceedings of the 18th
International Conference on Autonomous Agents and MultiAgent Systems, pages
305 -- 313. International Foundation for Autonomous Agents and Multiagent Sys-
tems, 2019.
24
|
1905.09923 | 1 | 1905 | 2019-05-23T21:01:41 | An Integrated Model for User Innovation Knowledge Based on Super-network | [
"cs.SI"
] | Online user innovation communities are becoming a promising source of user innovation knowledge and creative users. With the purpose of identifying valuable innovation knowledge and users, this study constructs an integrated super-network model, i.e., User Innovation Knowledge Super-Network (UIKSN), to integrate fragmented knowledge, knowledge fields, users and posts in an online community knowledge system. Based on the UIKSN, the core innovation knowledge, core innovation knowledge fields, core creative users, and the knowledge structure of individual users were identified specifically. The findings help capture the innovation trends of products, popular innovations and creative users, and makes contributions on mining, and integrating and analyzing innovation knowledge in community based innovation theory. | cs.SI | cs | An Integrated Model for User Innovation Knowledge Based on
Super-network
Xiao Liao1, Zhihong Li1, Yunjiang Xi1, Haibo Wang2, Kenneth Zantow*3
1 School of Business Administration, South China University of Technology, 510641 GZ China
2 A.R.Sanchez, Jr. School of Business, Texas A&M International University, 78041 TX USA
3 College of Business, University of Southern Mississippi, 39560 MS USA
i.e., User
Innovation Knowledge Super-Network (UIKSN),
Abstract:Online user innovation communities are becoming a promising source of user innovation knowledge and
creative users. With the purpose of identifying valuable innovation knowledge and users, this study constructs an
integrated super-network model,
to integrate
fragmented knowledge, knowledge fields, users and posts in an online community knowledge system. Based on
the UIKSN, the core innovation knowledge, core innovation knowledge fields, core creative users, and the
knowledge structure of individual users were identified specifically. The findings help capture the innovation
trends of products, popular innovations and creative users, and makes contributions on mining, and integrating and
analyzing innovation knowledge in community based innovation theory.
Keywords: User innovation knowledge, super-network, integrated model
1. Introduction
innovations
Users are highly innovative and often
innovate or create new products because the
users are more conscious about their needs.
Nowadays, more and more companies are
trying to follow the trend to adopt users and
their
new product
development (NPD). As the internet facilitates
the
the
production of user generated content (UGC),
opinions and innovations created by users
about products are being shaped in real time
amongst users through online communities.
interaction
between
users
their
and
in
As many scholars have indicated, user
innovation, which is also defined as customer
innovation, open innovation and co-creation,
plays a significant
role in the process of
product
innovation and NPD. In terms of
online community based user innovation, prior
research has provided abundant findings on
the co-creation value of users and on how to
motivate user innovation and user interaction
*Corresponding Author:
Email:[email protected]; [email protected]
1
online
Online
communities.
user
in
communities are becoming promising sources
of user innovations [1-3] which leads to the
following research question:" What are the
innovations and who are the innovators?"
Recent studies mainly emphasize capturing
the innovative ideas [4-6] and interactions
among users in communities [7-9].
to submit
and share
As more and more innovative users
gathered in online innovation communities,
users began to share what they have developed
or innovated through their postings rather than
just
providing innovative ideas. Some
communities even have a special space for
these users
their
innovations. However, many firms do not
very
have
the
innovations
lack of
systematic standards to evaluate them. For
example, what are the main focuses and fields
of the innovations? What are the innovative
posts and who are the creative innovators
related to the hot innovations? While the prior
research
innovation
communities
on
identifying the motivation of users' innovation
clear
and suffer
has mainly
from a
focused
criteria
online
judge
to
on
user
[10-11], there is limited research identifying
and integrating user innovation knowledge in
a systematic view.
in
our
user
study
online
attempts
Therefore,
to
construct an integrated model of innovation
knowledge
innovation
communities. Through integrating the users,
innovation posts, and innovation knowledge,
our study constructs a systematic knowledge
integration model that offers a practical tool to
identify important or popular
innovation
knowledge, knowledge fields, the users and
posts related to these innovations.
We first identify some online innovation
communities as the empirical settings to mine
all the posts, users and the relations. We then
mine the innovation knowledge keywords
from each post. Knowledge mined from posts
can be
fragmented and lack contextual
meaning, which consequently may result in
incomplete and fragmented analysis of user
innovation activities and decrease the integrity
of the measures. To avoid this fragmentation,
our research will use the super-network model
as an integrated tool.
online
innovation
among users,
Super-network was defined as
"the
networks above and beyond the existing
networks" by Nagurney [12]. It can be used to
describe and analyze the structure of systems
composed of multi-type or multi-tie networks.
communities,
In
the
relations
innovation posts,
innovation knowledge and users' interactions
frame the innovation knowledge system which
is composed of the four elements and their
multi-tie
Consequently,
super-network is not only used to integrate the
fragmented knowledge but also construct and
analyze the knowledge system in online
innovation communities.
relations.
The objective of this research is therefore
(1) to analyze the different elements and the
relations in an online innovation community
knowledge
an
system and
construct
2
by
user
analyzing
of
innovation
integrating model
to construct a novel
knowledge, and (2)
the
super-network model
innovation knowledge in
characteristic of
online communities. The research contributes
to the community-based innovation theory for
mining
innovation
knowledge
knowledge
system.
user
community
integrating
and
in
a
2. Theoretical Background
2.1 User Innovation Communities
The importance of users as a valuable
source of innovation has been emphasized
from 1980s and then gained much more
attention in the past ten years [13-14].
and
how to
support users
Prior research on user innovation mainly
focused on how to motivate users to innovate
[15-20]
as
innovators [21-22]. Various ways have been
used to invite users during the innovation
process, such as providing them with toolkits
[23]or virtual customer environments [24],
talking to lead users [25], and establishing
online user communities [26]. Recently, with
more and more innovative users gathered in
online communities, user innovation in online
communities has been receiving more and
more attention from researchers [10, 27-30].
and
cooperation
Online user innovation communities are
groups of
individuals who share similar
interests and needs and be seen as valuable
sources of innovation because of their product
experience
[31]. The
innovation behavior of communities members
is influenced by their innovation willingness,
perceived control and group norm factors
[32](Zhang, 2012), and highly motivated by
the prospect of improvements in their use of
the product [33]. To be seen as a hobbyist and
be
recognized by the firm are two important
motivations community. Members tend to
reveal and share their ideas and innovations in
communities,
join the firm's domain, and
in
process
innovation
engage
[34].
Community members intend to gain high
reputations in the eyes of others such as
colleagues and other community members or
related companies, so the chance to exchange
ideas and experiences and to gain reputation
are also the main motivations for community
members [35-38].
ideas
innovation
about
user
from online
Dong & Wu(2015)analyzed two online
community-enabled
user
capabilities: ideation capability in collecting
user-generated
potential
innovation
innovation
communities, and implementation capability
ideas
in
for
innovation
introducing
developed
user
innovation communities. They found that
ideation capability actually does not influence
firm value, whereas implementation capability
increases firm value [39].
user-generated
and
development
innovation
selecting
online
via
user
Since
online
innovation
communities have been drawing an increasing
number of attention from academic scholars
and firms, these communities have become a
vital source of product and service innovations
and have helped innovation-related knowledge
to blossom[40-42].
and innovative users
Therefore,
the
innovation knowledge and innovative users in
order to improve the firm's implementation
capability of online user
is
needed.
2.2 Knowledge Super-network
an approach to integrate
innovations
Nagurney
and Dong(2002)
defined
super-network as being "above and beyond"
the existing network, and can be used to solve
intertwined
the decision problem in multi
networks[12]. Other
regarded
networks which
as
hyper-graphs as a super-network.
researchers
described
can
be
Since the concept of the super-network
can describe the structure of complex network
system more
the
and reflect
accurately,
3
of
In
prior
share
spread,
network
between
properties
knowledge,
and
networks
and
interaction and impact between the networks,
it provides a new way and useful tool to study
complex network system and gain gradual
attentions
from researchers. Knowledge
super-network research mainly focuses on the
the
study
inter-relations
in
knowledge
transfer
management.
the
research, Knowledge
Super-Network(KSN) models are comprised
of three types of nodes and six types of edges,
reflecting
persons, material
storage media, and the complex interrelations
between them. The KSN model can describe
complex compositions and the structure of
organizational knowledge systems [43]. Yu
(2008) constructed a super-network model of
in which
organizational personnel
there were three types of networks:
the
organization personnel network, the material
carrier network and the knowledge network
[44].
a
purposed
super-network model
organizational
knowledge
sharing network based on a
knowledge network and a social network [45].
Ni et.al (2013) constructed a super-network
model of Wiki ontology based on the concepts
and their multi relations [46]. Wang (2015)
presented an improved knowledge diffusion
hyper-network (IKDH) model and found out
that the diffusion speed of IKDH model is
3.64 times faster
traditional
knowledge diffusion (TKDH) model [47].
(2011)
of
than that of
training,
Liao
et.al
innovation
communities
Based on the prior researches, we present
an improved super-network model of online
user
(UIWKSN)
based on the community's interactions and the
characteristics of user innovations.
3. The Super-network Model of User
Innovation Knowledge System
In the opinion of system science, users'
innovation activities can be viewed as an
innovation
is
system which
knowledge
four elements: users, posts,
composed of
innovation
innovation
knowledge fields. The elements and their
relations can be expressed as fig.1:
knowledge
and
it can be seen that
Fig. 1 Composition of UI Knowledge System
In fig.1,
the UI
knowledge system is composed of 4 kinds of
elements and 6 relations, which can be
described as a super-network model:
(
QEV
UIKSN
The expression of each element and
(1)
)
,
,
relation is defined and explained as:
i
j
f
f
u
1
2
1
2
2
2
,
,
,
,
,
,
,
,
,
,
f
f
,
,
,
,
,
)
(
kp
{
}
fp
k
k
{
}
{
E
E
p
F
V
P
F
bf
ck
mp
E
ku
E
kk
E
fu
,
p
1
set
,
E
fk
of
u
K
of
}
nu
P
)
vertices,
E
edges,
}1
(
E
pu
different
{(
E
u
p
,
U
types
,
,
uu
1
users,
the
,
denotes
in
different
denotes the set of
which
U
community
}
{
of
denotes
denotes the set of
posts;
K
innovation knowledge points mining from
posts;
denotes the set of
innovation knowledge fields integrated from
knowledge points above.
,
,
E
types
)
p
den
otes
in
which
denot
es the relation set of users and posts, in which
iu is the author
u
of
post
den
otes the relation set of posts and innovation
knowledge
in
the
which
post
knowledge
ip
point
de
f
notes the relation set of posts and innovation
knowledge fields, in which
1),(
means that the post
is related to the
knowledge
innovation
field
;
den
E
1),(
p
k
contains
{(
E
f
means
the
)
means user
1),(
),(
),(
),(
),(
points,
p
jk ;
jp ;
k
}1
}1
}1
ip
)
jf
)
{(
{(
E
p
p
p
p
p
p
k
k
k
k
f
,
f
f
,
,
f
p
p
k
i
j
j
i
j
i
j
i
j
i
j
i
f
i
j
i
j
i
j
i
j
4
i
j
i
j
i
j
i
j
f
f
i
j
i
j
i
j
k
k
,
f
,
f
f
f
f
k
k
k
k
k
;
if
{(
)
ik
}1
in
f
to
{(
that
),(
fields,
),(
the
)
1),(
means the field
1),(
and
otes the relation set of knowledge points and
knowledge
which
means the knowledge point
1),(
f
k
belongs
knowledge
ik
field
}1
jf
E
denotes the relation set of knowledge points,
in which
the
means
k
jk co-exist in the
knowledge point
posts;
same
denotes the
E
affiliation relation set of innovation fields, in
which
is
the direct subordinate to field
(
de
notes the weights of vertices and edges, in
denotes the set of
which
knowledge points' weight,
(
)
ik ;
denotes the weight of the knowledge point
of
denotes
set
UQ
knowledge fields' weight,
denotes the
weight
knowledge
denotes the set of
field if
)}
knowledge fields' weight,
denotes the
(
knowledge
weight
field if
deno
,1
tes the set of links' weights of knowledge
points.
kEWFQ
in which
UQKQ
of
({
kw
of
({
q
EW
jf
),
ikq
iuq
FQ
,
nm
the
KQ
},
l
iu
)
)}
ik
if
Q
kk
if
))
),
),
)}
k
q
{
;
;
)
(
.
(
(
(
(
)
(
)
q
{
(
)
(
,
m
(
)
(
n
k
Therefore the UIKSN model can be
expressed as:
(
QEV
,
UIKSN
,
k
),
EWFQUQKQ
,
EFKPU
(
p
),
(
(
p
(
E
),
(
)
,
,
,
,
u
,
E
f
f
,
E
k
k
f
k
))
(2)
4. The Construction of UIKSN
The construction of UIWKSN includes 4
steps:
(1) Data collection: we use the software
of LocoySpider to collect the data including
users and their innovation posts in the selected
user
innovation community. The data of
innovation posts is composed of the post titles,
content, authors, posting time, reviewing and
replying numbers.
(2) Content mining:
first, we encode
authors and posts to get the user set of U and
posts set of P; second, we identify word
segments for each post to get keywords to
set of K after
develop the knowledge
preprocessing
third, we
calculate the frequency of each keyword and
get the set of knowledge weights Q.
keywords;
the
(3) Construction of knowledge network:
we construct a weighted knowledge network
(WKN) based on the knowledge set, the user
attention degree set and the co-occurrence
relations between knowledge points;
then
based on the WKN model, knowledge is
clustered into several groups (each group
represents a knowledge field) that weighted
knowledge
is
constructed.
clustering network (WCN)
(4) Construction of super-network: we
relations between different
calculate
elements
the weighted
knowledge super-network of user innovation
community (UIKSN).
the
and
construct
5. The Analysis of UIKSN in Xiaomi
Community
5.1 Data Mining in Xiaomi community
setting is
Our empirical
the Xiaomi
community which was created by the Xiaomi
company aiming to provide a platform where
the brand's most hardcore users, dubbed "Mi
fans," meet
to discuss gadgets, and share
knowledge. The Xiaomi community is a
famous site of user innovation communication
in China. In the community, there is a special
section that allows users to present
their
We use the
innovations
software LocoySpider 8.2 to collect all
the
posts released before April 29, 2015. After
preprocessing of all the posts, a total of 16741
posts were found and we determined that 5715
of those posts to be excellent posts.
for products.
Considering the quality of posts, we use
excellent posts and 30% of the non-excellent
posts in our research. In Xiaomi Community,
the excellent posts are identified and marked
by their Community staffs. The total number
of the posts used in this research is 9024, with
3824 users in them.
First, the posts set (P) and the users set
and
pp
1
,......,
P
9024
p
}
2
{
,
(U) were encoded as
U
,......
u
,{
uu
1
3824
}
2
.
Second, the software of NLPIR was used
to segment the content of each post and get at
least 5 keywords for each post. Then we got
the knowledge set (K) and their frequency set
(Q(K)). According to the selection rule of high
frequency words, we totally got 47 high
frequency words as the hot keywords, with the
lowest frequency of 200. The hot keywords is
as table 2.
5.2 Construction of UIKSN
The construction of UIWKSN is based
Table 2. Hot Keywords and Their Frequency in Xiaomi Community
Knowledge
Freq. Knowledge
Freq. Knowledge
Freq. Knowledge
Freq. Knowledge
Freq.
points
Function
System
Files
Set up
Downloa
Select
App
Computer
5
Links
Networks
points
points
1264 Method
1154
Desktop
Interface
891
Program
780
Games
708
707
Screen
Data
658
Themes
643
564
Battery
Mode
506
476
Support
468 Manage
Picture
459
Icon
455
Time
437
430
Display
Users
423
Test
413
399
Video
Effect
368
points
Input
Intelligent
Phone
Operate
Music
Headset
Password
Memory
Version
Share
363
356
329
328
316
299
282
281
280
250
points
Mobile
Router
Modify
Package
Service
248 Data Volume
244
243
241
233
231
231
230
227
225
Information
223
219
217
217
212
212
208
in
on the construction of the WKN model
knowledge level and the WCN model
in
knowledge field level. After integrating all the
relations between each element and the WKN
and WCN model, the UIWKSN in Xiaomi
community can be constructed as followed:
Fig 2. UIWKSN in Xiaomi Community (Part)
In figure 2, the red circle nodes represent
knowledge points; the purple rectangle nodes
represent users;
the green square nodes
represent posts, and the blue triangle nodes
represent knowledge fields.
6.The Analysis of Knowledge Integration
Based on UIKSN
6.1 The Discovery and Integration of UI
Hot Knowledge
UI Hot Knowledge means the innovation
knowledge
in
community. In WKN, it can be shown as the
knowledge points with higher frequency.
create most
users
that
1
)
(
{
kqk
i
K
The users and posts related to the hot
(3)
,
iq
0
},
n
,1
i
i
i
i
i
b
b
a
)
)
{
{
p
u
i
(4)
(5)
,1)
k
i
,1
)
k
(
,
kp
a
(
,
k
u
knowledge ik can be expressed as:
}
1K
}
1K
(
kP
(
kU
Then, according to the relations between
knowledge points and the knowledge fields,
we can also figure out
the hot knowledge
related fields.
kL
(
Let
(
knowledge
)
FL
0f
these paths and
k
,
i
i
,
ik
0f
)
to the cluster
denote the path from the
, and then
the set of nodes in
0f
represent the set
represent
k
EL
0f
)
(
,
i
6
ik
0f
f
. Then
)
,
0
0f
and
)
can be expressed as:
(
),
kEL
of links between knowledge point
field 0f
(
kL
i
(
kL
,
(
kL
i
(
(
kFL
clearly show the subordinate
ik and the
relations between hot knowledge
knowledge field it belongs to.
(6)
f
,
))
)
f
,
,
0
0
i
i
i
k
k
),
i
(
EV
of
The
analysis
innovation
can also be done through the
hot
knowledge ik
construction of ego super-network.
(
kQV
),
i
),
)
i
(
kV
(7)
({
kV
(
(
KSN
Here,
(
(
kUkP
)}
denotes the
nodes set of users, posts and fields that related
denotes the set of
to knowledge
links between the nodes in
and
QV
denotes the set of weights of nodes
and links in
ikV
EV
FL
ik
ik
ik
ik
))
V
),
;
.
k
)
(
(
)
(
)
)
(
(
)
i
i
i
i
i
Based on the above analysis method, we
chose 47 core knowledge points (see Table 2)
as the hot innovation knowledge to construct
the hot knowledge
super-network in Xiaomi
community was as followed:
Fig 3. The Hot Knowledge sub-KSN in Xiaomi
Community (Part)
There are 3067 related users and 2816
posts with these 47 hot knowledge points. In
this sub-graph,
the size of the node's label
represents the total contribution of each user
in these 47 hot knowledge categories. So we
can clearly figure out that user 479 and user
300 made the greatest contribution in these hot
knowledge, followed by user 191, user 431
and user 433. Through the super-network, we
can also find out the hot knowledge related
posts of each user. If we want to know more
about a single user or knowledge point, we
can construct the ego super-network to have a
deep analysis. Figure 4 is a ego super-network
of the node "screen".
The ego super-network was constructed
by calculating the shortest path between the
node "screen" and the related knowledge
points, users, posts, and knowledge field.
From figure 4, we can see that user 366 and
user 7 made the greatest contribution in screen
innovation, followed by user 191, user 269,
user 479, user 535, user 413 and user 341.
These users and their posts can be taken into
consideration when the company is going to
innovate the mobile's screen later
Fig 4. Ego Super-network of "Screen"
6.2 The Discovery of Core Innovative Users
of Community
The core innovative users in community
are the users who create and make great
contribution to the core innovation knowledge
in community. Through the UIWKSN,
the
core innovative users can be identified.
'
(
(
(
{
),'
),'
)}'
(8)
( KW
KWK
EWKE
First, we need to find out
the core
innovation knowledge which can be expressed
as a sub-WKSN:
,'
WKN
'K denotes the set of core innovation
denotes the set of
knowledge and
nodes' weights.
is the threshold value which is
used to judge the core innovation knowledge.
denotes the set of links between
)'
( KE
innovation knowledge
core
denotes the set of links' weights.
K
Here,
( EW
and
(9)
kq
0q
0q
)'
)'
}
{
k
)
(
'
j
j
7
KE
(
)'
{(
k
,
k
i
)
k
i
j
,'
kK
j
K
}'
(10)
can construct
and posts, we
Based on the relations among WKN',
the
users
sub-WKSN of core innovation knowledge
super-network in the community. Then,
the
related users and posts of core innovation
knowledge can be identified easily.
(
),'
)'
),'
(
WKSN
E
KE
),'
(
(
),'
(
(
K
E
K
E
K
u
(
),'
))}'
(
EWKW
K
,'
KUKPK
E
p
(
K
),'
),'
K
E
(
EW
(
(
k
)),
{
),'
p
),'
p
K
K
p
(
'
(
u
u
u
k
u
k
p
k
(10)
The set of core knowledge related users
is expressed as:
{)'
ku
i
(
j
i
j
)
K
}'
q
,
kuq
(11)
KU
Here,
(
uq
jk
,
i k
and
(,1)'
(,'
,
qu
i
the core knowledge
represent
)
points;
represent the related level of
jk
iu
user
is a threshold value
which used to judge the core knowledge
related users.
'q
;
j
j
(,'
,
kp
b
'K related posts is:
,
kpq
The set of
{)'
(
Kkp
KP
b
1q is also a threshold value which is
Here,
used to judge the core knowledge related
posts.
(12)
(,1)
}
1q
)
b
j
j
Based on the relations between the 47
core knowledge points and the related users
and posts, the sub-WKSN can be constructed.
Then, by setting the threshold value of the
relations between core knowledge and users,
we can clearly figure out the core innovative
users in community (see fig. 5)
Fig. 5 Sub-WKSN of Core Innovative Users
(edges' weight higher than 15)
In figure 5, the size of knowledge points
represents the knowledge frequency in posts;
the size of users' labels represents the total
For
example,
contribution in these 47 core innovation
knowledge points of each user; the size of
edge between users and core knowledge
points represents the users' contribution in
each core knowledge point. Thus, we can
clearly find out the main core users in the
community.
knowledge
"function" and "system" have the similar
word frequency, but
the number of related
users is far different. There are many more
related users on the innovation of "system"
than "function". Although there are few users
on the innovation of "function", there are more
users who create innovations on it more than
once. Next, the frequency of the knowledge of
"application" is about half of the frequency of
"system", but the number of related core users
who create innovations on it more than once is
much more than "system", which implies that
only some core users concentrate on the
innovation of "application" and innovate it
repeatedly.
Furthermore, from this figure, we can
also identify the users' main innovation
knowledge. For example, users "479 " and
"300" made the most contributions on the core
knowledge, while their innovation focuses are
different. User " 479" mainly focuses on the
innovation of "program" and "system"; while
user "300" mainly focuses on "function" and
"theme".
Therefore, through the sub-WKSN of the
core knowledge, we can not only identify the
core innovative users, but also identify their
main focus on innovations.
6.3 The Discovery of Hot Innovation Fields
of Community
hot
be
constructed as the sub-WCN with higher
cluster weights which is expressed as:
innovation
fields
The
can
i
i
1
2
(
)
,
f
i
)
{
q
if
F
,1
FV
},
c
(
fq
denotes the set of knowledge
fields and their knowledge points included in
the
field
innovation
(13)
hot
8
)
.
K
if
if
(2
denotes the knowledge points
, which
and if
directly or indirectly included in
can be expressed as:
(
(2
fK
Based on the UIKSN, the hot innovation
fields related users and posts can also be
identified:
(14)
}1
{
k
k
)
)
f
,
a
a
i
i
i
j
j
i
a
a
,
f
)
)
k
k
{
p
(
(*)
The posts related to hot fields if :
(2
}1
,
fP
p
The related users:
(2
(*)
fU
In order to analyze the hot innovation
it can also be constructed to a
(
pu
c
{)
j
(16)
(15)
,
kp
a
j
}1)
(*)
,
fk
a
u
,
i
j
i
fields,
sub-WKSN:
(
KSN
f
V
Here,
i
)
(
f
({
fV
i
)
(
),
EV
(
fP
(
k
),
),
i
U
QV
(
f
(
),
f
)}
i
(
K
(17)
))
f
i
i
i
i
de
notes the nodes' set of related users, posts,
fields to the field if
denotes the set
of
in
;
QV
denotes the set of nodes and edges
weights in
relations
(
if
;
among
)
if
nodes
EV
if
V
if
V
.
(
(
)
)
)
(
The sub-KSN can integrate all the related
essences to the hot innovation fields that we
can find out most of the useful information in
these hot fields. In the UIWKSN of Xiaomi
community, there are 8 innovation fields with
104 sub-fields in them. Here, we chose the
fields "FA251" and "FA6" as the two hot
innovation fields with the
threshold of
q
. In these two hot fields, there
are 3749 related users and 8931 related posts.
Through the calculation of all
these users'
contribution on the two fields, we can identify
the core innovative users in the hot fields.
Figure 6 is the sub-KSN of hot innovation
fields
90
innovative users whose contributions are the
head 30% of the whole related users.
community with
in Xiaomi
10000
2
In figure 6, the size of the nodes' label
represents the word frequency or the total
contributions in the hot fields of each user.
Therefore, we can clearly see that the core
innovative users who made great contribution
in hot fields include users "U479", "U4 31",
"U433", "U447", "U878" and so on.
such as users "U479", "U431", "U433" and
"U300". Thus these users can be seen as the
core innovative users in these two fields.
6.4The Integration and Analysis of
Users' Self Innovation Knowledge
6.4.1 The User's Self UIKSN Model
the
f
),
i
k
i
(
),
i
i
k
(
i
i
u
(
{
The online communities gather a large
amount of users who have different expertise.
Through the UIKSN, we can construct
the
sub-KSN model for each user so that we can
know more about his or her
innovation
knowledge structure. Based on the relations
between U-F, U-P and U-K, the sub-WKSN of
each user can be expressed as:
,
(
(
(
),
)
uK
uFu
u
WKSN
E
k
i
i
(
),
(
(
),
(
(
uKWu
E
u
u
E
E
ku
i
f
(
(
)),
(
)
(
),
u
EW
u
EW
uFW
super-network
sub-KSN is
This
including
(user,
posts,
the
innovation fields and innovation knowledge)
in community's knowledge system which is
helpful
in
user's
and expertise when
knowledge
companies need to invite users
to their
innovation or NPD process.
6.4.2 The Construction of User's Self
UIKSN Model
a
elements
the
structure
identification
u
i
)
i
))}
(18)
),
),
ku
i
k
k
i
of
4
Based on the analysis of the above hot
innovation knowledge and hot
innovation
fields, we found that user "U479" is one of the
users who made the most contributions. Thus,
we chose "U479" and the other randomly
chosen user "U127" as the two subjects to
construct their UIKSN model. Table 2 lists the
two users' number of related posts, knowledge
points and the innovation fields.
Table 2 The Innovation Info of "U479" and"U127"
Based on the basic information in table 2, the
two users' UIKSN was constructed and shown
User
No. of P No. of K No. of F
U127
U479
46
143
127
272
32
43
in figure 8 and 9.
Fig. 6 The Sub-KSN of Hot Innovation Fields in
Xiaomi Community
Based on the sub-KSN of hot innovation
fields, we can have a better understanding on
the relations between the hot innovation fields
and the related core innovative users through
calculating the edges' weights between them,
which implies the contributions each user
made in the related fields. Figure 7 is the
sub-KSN of hot
innovation fields and the
related users in which the threshold of edges'
weight is 20.
Fig. 7 The Sub-WKSN of Hot Innovation Fields and
the Related Users (edges' weight higher than 20)
In figure 7, we can see that user "U479"
is the core innovative users in hot fields who
made the most contributions in most of the hot
fields such as "FG1", "FG2", "FF261" and
"FE289". And among the hot fields, "FG1"has
the most related users followed by "FE289"
and "FG2". While the fields "FF261" and
"FF91" have fewer related users but some of
the users made repeat contributions on them
9
Fig. 8 The Self UIKSN of "U127"
Fig. 10 The Core Innovation Knowledge
Super-network of "U127"
Fig. 9 The Self UIKSN of "U479"
Fig. 11 The Core Innovation Knowledge
on
contributions
Since the user "U479" had more posts,
the self UIKSN is much more complicated
than "U127". From the figures, we know that
the main innovation fields of "U127" focused
on "FG1", "FG2", "FE296" and "FD103" with
the most
knowledge
"function", "system", "desktop", "icon" and
"download"; while the main innovation fields
of
"FG2",
"FF92", "FG1", "FE289" and "FE296" with
the most
knowledge
"system",
"program",
"permission",
and
"management".
"application",
"files",
focused on "FF261",
contributions
"download"
"U479"
on
of
the
Through
construction
user's
sub-UIKSN, we can have more specific
analysis such as the user's core innovation
knowledge, core innovation field.
6.4.3The Identification of User's Self Core
Innovation Knowledge
Based on the basic rule of high frequency
words selection,
the super-network of each
user's core knowledge was constructed and
drew as figure 10 and 11.
10
Super-network of "U479"
related
"FE296"
the
are
and
knowledge
Figure 10 and 11 clearly show us the core
innovation knowledge and core innovation
fields of these two users. For example, the
core innovation fields of "U127" are "FG1",
core
"FG2",
innovation
"function",
"interface", "files", "design", "mode", "video"
and so on; while the core innovation fields of
"U479"
"FG1",
"FE296" and the related core innovation
"backup",
knowledge
"permission",
"clear",
"space", "advertisement", "data" and so on.
6.4.4The Analysis of Ego UIKSN
"program",
"FF261",
"screen",
"FG2",
"files",
are
are
Besides the user's self UIKSN model, we
can also construct the ego UIKSN model for
each innovation knowledge, innovation field
and innovation post to have a deep analysis.
For example, the ego super-network of a user
in a certain innovation field (see fig. 12-13);
the ego super-network of a user in a certain
innovation knowledge and the related posts
(see fig. 14-15); the ego super-network of a
in a
user
knowledge (see fig. 16-17).
certain post and the related
the knowledge
"desktop" and "system". This ego UIWKSN
also showed us
related
innovation field and the related posts. So if we
want to know more details in this knowledge
area, we can find the related posts.
Fig. 12 The Ego UIKSN of "U127" in "FG2"
Fig. 16 The Ego UIKSN of "U127" in "P2782"
Fig. 13 The Ego UIKSN of "U479" in "FG2"
From the analysis above, we know "FG2"
is the core innovation field of users "U127"
and "U479". But the figures 15-16 showed
that the two users have different innovation
focus on this field. For example, "U127"
mainly focused on "files",
"design" and
"mode"; while "U479" mainly focused on
"files", "clear", "screen" and "internet access".
Fig. 14 The Ego UIKSN of "U127" in "Desktop"
Fig. 15 The Ego UIKSN of "U479" in "System"
Figures 14-15 showed us the two users'
innovations on a certain knowledge such as
11
Fig. 17 The Ego UIKSN of "U479" in "P1613"
Figure 16-17 showed us the two users'
innovations in a certain post. In this ego
UIKSN, we can easily identify the main
knowledge in the post. For example,
the
innovation knowledge in "P2782" posted by
"U127" are "function", "desktop", "download",
"password"
the
innovation knowledge in "P1613" posted by
"U479"
"program",
"application", "permission" and "information".
"delivery"; while
"system",
and
are
7. Conclusion
innovation in two ways:
This paper aims to provide an knowledge
integrating method in online user innovation
communities by constructing the UIWKSN
model. It contributes to the existing literature
on user
(1) by
analyzing the elements in communities, we
integrate all the elements into a super-network
model which provide a new tool for us to
integrate the different relations between the
elements and (2) by construction the UIKSN,
it provides us with a more specific and deeper
analysis on the hot and core innovation
knowledge, knowledge fields and so on.
that
users
proved
process
development
The internet as an advanced information
and communication medium has led to a large
amount of valuable user generated innovation
content in the online communities. Literature
findings
innovation
knowledge and the related innovative users
are valuable for the product innovation and the
new product
of
companies. Users' innovations not only meet
the needs of users but also imply the
innovation trend of products. Therefore, how
to find out the innovation knowledge created
by users is very important for companies. The
UIKSN model constructed in this paper helps
to integrate and analyze the users' innovation
knowledge in these communities. The hot and
core innovation knowledge, innovation fields,
the core innovative users and the related posts
were identified and showed good in the
empirical setting: Xiaomi community.
Further research might try to focus on
more different communities and consider
more elements such as the interaction among
users in the knowledge system.
Acknowledgment:
This work was supported by the National
Natural Science Foundation of China under
grant No.71371077 and No.71571073, China
Postdoctoral Science Foundation under grant
No.2016M602475.
References
[1] Morrison P.D., Roberts J.H., Midgley D.F..The
nature of lead users and measurement of leading
edge status[J]. Research Policy, 2004, 33(2): 351
-- 362
[2] Füller J., Jawecki G., MühlbacherH..Innovation
creation by on-line basketball communities[J].
Journal of Business Research, 2007, 60: 60 -- 71
[3] Shin J., Shin H., Rao P.M..User innovation and
12
knowledge sourcing: The case of
software[J].
Management Research, 2012, 23: 58 -- 70
financial
of High Technology
Journal
[4] Füller J., Bartl M., EmstH.,et al. Community based
innovation: how to integrate members of virtual
communities into new product development[J].
Electronic Commerce Research, 2006, 6: 57 -- 73
[5] Füller J. Why consumers engage in virtual new
product developments initiated by producers[J].
Advances in Consumer Research, 2006, 33: 639
-- 646
[6] Van Oost, E Verhaegh, S Oudshoorn. From
innovation community to community innovation:
user-initiated innovation in wireless Leiden.
Science[J]. Technology & Human Value, 2009,
34(2),182-205
[7]
Kohler T, Matzler K, Fuller J. Acatar-based
innovation: using virtual worlds for real-world
innovation[J].
29(6):
395-407
Technovation,
2009,
[8] Berthon P R, Pitt L F, McCarthy I, Kates SM.
When
clever: managerial
approaches to dealing with creative customers[J].
Business Horizons, 2007, 50(1), 39-47.
customer
get
[9] Sou-Chin Wu, Wen Chang Fang. The effect of
idea
community
Technovation, 2010, 30:
consumer-to-consumer
generation
relationships [J].
570-581.
interactions
virtual
brand
in
in
[10] P M Di Gangi, M Wasko. Open Innovation
in: W R King
Through Online Communities,
(Ed.),
and
Organizational Learning[M]. Springer Publishing
Company, London, 2009: 206-206.
Management
Knowledge
[11] T Schulze, M Indulska, D Geiger, A Korthaus.
Idea assessment in open innovation: a state of
practice[A], ECIS 2012 Proceedings, 2012:
149-149.
[12]
A,
Dong
Nagurney
J.
Super-networks: Decision-Making
the
Information Age[M]. Cheltenham: Edward Elgar
Publishing, 2002.
for
[13] von Hippel E. Lead Users: A Source of Novel
Product Concepts[J]. Management Science, 1986,
32(7): 691-706.
[14] Lettl C, Herstatt C, Gemuenden H G. Users'
contributions to radical
innovation: evidence
from four cases in the field of medical equipment
technology [J]. R and D Management, 2006,
36(3): 251-272.
[15] G R Foxall, J D Tieney. From CAP1 to CAP2:
user-initiated innovation from the user's point of
view [J]. Management Decision, 1984, 22(5):
3-15.
[16] N Franke, S Shah. How communities support
innovative activities: an exploration of assistance
and security software[J]. Research Policy, 2003,
32: 157-178.
[17] J Füller, K Matzler, M Hoppe. Brand community
members as source of innovation[J]. Journal of
Product Innovation Management, 2008, 25(6) :
608-619.
[18] J Füller, H Mühlbacher, K Matzler, G Jawecki.
Consumer empowerment through internet-based
co-creation[J].
of Management
Information Systems, 2010, 26(3): 71-102.
Journal
[19] K R Lakhani, E von Hippel. How open source
software works: "free" user-to-user assistance[J].
Research Policy, 2003, 32: 923-943.
Leveraging
[20] J M Leimeister, M Huber, U Bretschneider, H
Krcmar.
sourcing:
activation-supporting components in IT-based
idea competitions[J]. Journal of Management
Information Systems, 2009, 26(1): 197-224.
crowd
[21] B Douthwaite, J D H Keatinge, J R Park. Why
promising technologies fail: the neglected role of
user
innovation during adoption[J]. Research
Policy, 2001, 30:819-836.
Leveraging
[22] J M Leimeister, M Huber, U Bretschneider, H
Krcmar.
sourcing:
activation-supporting components in IT-based
idea competitions[J]. Journal of Management
Information Systems, 2009, 26(1):
197-224.
crowd
[23] E von Hippel, R Katz. Shifting innovation to
users via toolkits[J]. Management Science, 2002,
48(7):
821-833.
13
[24] S Nambisan, P Nambisan. How to profit from a
better "virtual customer environment"[J]. MIT
Sloan Management Review, 2008, 49(3): 52-63.
[25] G L Lilien, P D Morrison, K Searls, M Sonnack,
E von Hippel. Performance assessment of the
lead user
for new
product development[J]. Management Science,
2002, 48(8): 1042-1059.
idea-generation process
[26] J Füller, K Matzler, M Hoppe. Brand community
members as source of innovation[J]. Journal of
Product Innovation Management, 2008, 25(6):
608-619.
[27] S C Wu, W C Fang. The
interactions
of
idea
consumer-to-consumer
generation
community
relationships[J]. Technovation, 2010, 30(11-12) :
570-581.
effect
on
virtual
brand
in
[28] Mingguo Li, Atreyi Kankanhalli, Seung Hyun
Kim. Which ideas are more likely to be
implemented
innovation
communities? An empirical analysis[J]. Decision
Support System, 2016, 84: 28-40
online
user
in
[29] P M Di Gangi, M Wasko. Steal my idea!
Organizational adoption of user innovations from
a user innovation community: a case study of
Dell Idea Storm[J]. Decision Support System,
2009, 48: 303-312.
[30] P M Di Gangi, M Wasko, R Hooker. Getting
customers' ideas to work for you: learning from
dell how to succeed with online user innovation
communities[J]. MIS Quarterly Executive, 2010,
9(4):
213-228.
[31] N Franke, E von Hippel, M Schreier. Finding
commercially attractive user innovations: a test
of
Journal of Product
Innovation Management, 2006, 23: 301-315.
theory[J].
lead-user
[33] T Burger-Helmchen,
P Cohendet. User
community and social softwarein the video game
industry[J]. Long Range Plan,
44:
317-343.
2012,
[34] L B Jeppesen, L Frederiksen. Why do users
contribute to firm-hosted user communities? The
case of computer-controlled music instruments[J].
Organ. Sci., 2006, 17: 45-63.
knowledge sharing in the online user community:
social capital and
The mediating roles of
perceived behavioral control[J].
International
Journal of Information Management, 2016, 36:
520-530.
[43] Yunjiang Xi, Yanzhong Dang, Kaiji Liao.
Its
Supernetwork Model
Knowledge
Application
in Organizational Knowledge
Systems[J]. Journal of Management Sciences in
China, 2009(6), 12(3):12-21.
and
[44] Yang Yu, Yanzhong Dang. Super-network Model
of PersonelTraining in Organization[J]. Systems
Engineering Theory & Practice, 2009, 04:
154-160.
[45] Kaiji Liao, Binbin Yang. Similarity Computing
of Documents Based on Weighted Semantic
Network [J]. Journal of The China Society For
Scientific and Technical Information, 2012, 07:
182-186.
[46] Zijiang Ni, Lili Rong, Quan Liu. Study on
Evolving Hyper-network Model
of Wiki
Ontology[J]. Journal of Management Sciences in
China, 2013, 16(12):68-78.
[47] Jiangpan Wang, Qiang Guo, Guangyong Yang,
Improved knowledge diffusion
collaboration
2015,
428:
on
Physica A.
Jianguo Liu.
model
based
hyper-network[J].
250-256.
the
[35] L Dahlander, M G Magnusson. Relationships
between open source software companies and
communities: observations from Nordic firms[J].
Res. Policy, 2005, 34: 481.
[36] J Lerner, J Tirole. Some simple economics of
open source[J]. J. Ind. Econ., 2002, 50:197.
customers
[37] C Wiertz, K de Ruyter. Beyond the call of duty:
why
firm-hosted
commercial online communities[J], Organization
Study, 2007,
contribute
to
28:
347-376.
[38] Guy
Parmentier, Vincent Mangematin.
Orchestrating innovation with user communities
in the
industries[J]. Technological
Forecasting & Social Change , 2014, 83,40-53.
creative
[39] Dong Q J, Wu W F. Business value of social
media technologies: Evidence from online user
innovation communities[J]. Journal of Strategic
Information Systems,
2015, 24: 113-127.
[40] Mahr D, Lievens A. Virtual
lead user
communities: drivers of knowledge creation for
innovation[J]. Research Policy, 2012, 41(1),
167 -- 177.
[41] Füller J, Mühlbacher H, Matzler K, Jawecki G.
Consumer empowerment through internet-based
co-creation[J].
of Management
Information Systems,
2009, 26(3): 71-102.
Journal
[42] Yong Sauk Haua, Minhyung Kang. Extending
innovation-related
theory to users'
lead user
14
|
1912.02602 | 1 | 1912 | 2019-12-05T14:42:13 | Regularity of $R(X)$ does not pass to finite unions | [
"math.FA"
] | We show that there are compact plane sets $X$, $Y$ such that $R(X)$ and $R(Y)$ are regular but $R(X \cup Y)$ is not regular. | math.FA | math |
Regularity of R(X) does not pass to finite unions
J. F. Feinstein
Creative Commons License: CC-BY-NC-ND
Abstract
We show that there are compact plane sets X, Y such that R(X) and
R(Y ) are regular but R(X ∪ Y ) is not regular.
1 Introduction
In [11], McKissick gave the first example of a non-trivial, regular uniform alge-
bra. His example was R(X) for a suitable compact plane set X. (We recall the
relevant definitions in the next section.) In [5, Corollary 7.7] it was shown that
if X and Y are compact plane sets such that R(X) and R(Y ) are regular and
X ∩ Y is countable, then R(X ∪ Y ) is also regular.
This note addresses the question of whether R(X ∪ Y ) is regular whenever
R(X) and R(Y ) are regular, without any additional assumptions on the compact
plane sets X and Y . If the answer was positive, the result would clearly also
hold for all finite unions. Bearing this in mind, we show that the answer is
negative, in Theorem 6 below, by the slightly indirect method of finding four
compact plane sets Xk, 1 ≤ k ≤ 4, such that each R(Xk) is regular, but such
that R 4
[k=1
Xk! is not regular.
We describe this result by saying that regularity of R(X) does not pass to
finite unions. Along the way, in Theorem 5, we give a slightly easier example
showing that (in an obvious sense) regularity of R(X) does not pass to countable
unions.
2 Preliminaries
Throughout this note, by a compact space we shall mean a non-empty, compact,
Hausdorff topological space; by a compact plane set we shall mean a non-empty,
compact subset of the complex plane. We shall use the term clopen to describe
sets which are both open and closed in a given topological space (typically a
compact plane set).
1
Let a ∈ C and let r > 0. We denote the open disk of radius r and centre a by
D(a, r) and the corresponding closed disk by ¯D(a, r). We denote the diameter
of a non-empty, bounded subset E of C by diam(E).
We assume that the reader has some familiarity with uniform algebras. We
refer the reader to [1, 9, 12] for further background. For the general theory of
commutative Banach algebras, the reader may consult [2, 10].
Let X be a compact space, and let C(X) be the algebra of all continuous
complex-valued functions on X. For each function f ∈ C(X) and each non-
empty subset E of X, we denote the uniform norm of the restriction of f to
E by f E. In particular, we denote by · X the uniform norm on X. When
endowed with the norm · X , C(X) is a Banach algebra. A uniform algebra
on X is a closed subalgebra of C(X) that contains the constant functions and
separates the points of X. We say that a uniform algebra A on X is nontrivial
if A 6= C(X), and is natural (on X) if X is the character space of A (under the
usual identification of points of X with evaluation functionals).
Let A be a natural uniform algebra on X, and let x ∈ X. We denote by Jx
the ideal of functions f in A such that x is in the interior of the zero set of f ,
f −1({0}). We denote by Mx the ideal of functions f in A such that f (x) = 0.
We say that x is a point of continuity (for A) if, for all y ∈ X \ {x} we have
Jy * Mx; we say that x is an R-point (for A) if, for all y ∈ X \ {x} we have
Jx * My. We say that A is regular if, for every closed subset F of X and every
y ∈ X \ F , there exists f ∈ A with f (y) = 1 and f (F ) ⊆ {0}.
The natural uniform algebra A is regular if and only if every point of X is a
point of continuity, and this is also equivalent to the condition that every point
of X is an R-point ([6, 7]).
Let X be a compact plane set. By R(X) we denote the set of those functions
f ∈ C(X) which can be uniformly approximated on X by rational functions with
no poles on X. It is standard that R(X) is a natural uniform algebra on X.
Let x ∈ X. As we will sometimes need to work with different compact plane
sets simultaneously, in this note we will denote the ideals Jx and Mx in R(X)
by J X
x and M X
We will occasionally use the fact that all idempotents in C(X) are automat-
ically in R(X). This does not require the full force of the Shilov Idempotent
Theorem, as for R(X) it follows from Runge's theorem.
x respectively.
Let X be a compact plane set, let Y be a compact subset of X and suppose
that x, y ∈ Y with x 6= y. Trivially the restriction R(X)Y is contained in
R(Y ). It follows immediately that if J X
y . Thus if x is
an R-point for R(X) then x is also an R-point for R(Y ). Similarly, if x is a
point of continuity for R(X) then x is a point of continuity for R(Y ). If R(X)
is regular, then so is R(Y ).
x * M X
y
then J Y
x * M Y
We now discuss some conditions under which converses to some of these
implications hold.
2
Lemma 1. Let X be a compact plane set and suppose that E is a non-empty,
clopen subset of X. Let x ∈ E. If x is an R-point for R(E) then x is an R-point
for R(X). Similarly, if x is a point of continuity for R(E) then x is a point of
continuity for R(X).
Proof. This is almost trivial in view of the idempotents available in R(X).
The only point that may be worth noting is the fact that, for all y ∈ E, each
function in J E
y . This is because every function in R(E)
can be extended to give a function in R(X) which is constantly zero on X \ E.
(cid:3)
y has an extension in J X
Let X and Y be compact plane sets, with Y ⊆ X, and suppose that X
contains no bounded component of C \ Y . Then, by Runge's theorem, R(X)Y
is dense in R(Y ). This condition concerning the bounded components of C \ Y
is, of course, automatically satisfied if X has empty interior.
Theorem 2. Let X and Y be compact plane sets, with Y ⊆ X and suppose
that x, y ∈ Y with x 6= y. Suppose that X contains no bounded component
of C \ Y and that X \ Y is the union of a sequence of pairwise disjoint, non-
empty relatively clopen subsets Yn of X whose diameters tend to 0 as n → ∞.
Then Y is a peak set for R(X) and R(X)Y = R(Y ). Moreover the following
implications hold.
(i) If J Y
x * M Y
y then J X
x * M X
y .
(ii) If x is an R-point for R(Y ) then x is an R-point for R(X).
(iii) If x is a point of continuity for R(Y ) then x is a point of continuity for
R(X).
Proof. In this proof, we work on X when discussing clopen sets or characteristic
functions: the characteristic functions of the clopen sets are then precisely the
idempotents in R(X).
Note that clopen subsets of X are automatically peak sets (using idempo-
tents in R(X)). Clearly Y is an intersection of (a sequence of) clopen subsets of
X, so Y is also a peak set for R(X). Thus R(X)Y is a uniformly closed subset
of R(Y ). As X contains no bounded component of C \ Y , R(X)Y is dense in
R(Y ), so equality holds.
Using idempotents, we also see that, for each z ∈ X \ Y , we have J X
x * M X
z
and J X
z * M X
x . Thus (ii) and (iii) follow quickly from (i).
y . Choose f ∈ J Y
x * M Y
To prove (i), suppose that J Y
that f has an extension in J X
extension, say F , in R(X). However F might not be in J X
follows.
y . We shall show
x , from which (i) follows. We know that f has an
x , so we modify F as
x \ M Y
Choose r > 0 such that f ( ¯D(x, r) ∩ Y ) = {0}.
Set
S = {n ∈ N : Yn ∩ ¯D(x, r) 6= ∅} .
3
If S is finite, then F is already in J X
x . So we may assume that S is infinite, say
S = {n1, n2, . . . } with n1 < n2 < · · · . Set U =Sn∈S Yn =S∞
We define f : X → C by f = (1 − χU )F . We claim that f is the extension
of f that we need. Clearly f vanishes on X ∩ D(x, r). It remains to show that
f ∈ R(X) (and, in particular, that f is continuous).
k=1 Ynk .
For each m ∈ N, set Um = Sm
k=m+1 Ynk . Then Um is
clopen in X, so χUm ∈ R(X) and hence (1−χUm)F ∈ R(X). Since diam(Ynk ) →
0 as k → ∞, we see that the the sequence of clopen sets Ynk can accumulate
only at points of ¯D(x, r) ∩ Y , and that dist(Ynk , ¯D(x, r) ∩ Y ) → 0 as k → ∞. It
then follows that F Vm → 0 as m → ∞, and hence (1 − χUm )F → f uniformly
on X. The result follows.
(cid:3)
k=1 Ynk and Vm = S∞
Using Theorem 2 and our earlier observations, we immediately obtain the
following corollary concerning the regularity of R(X) for this type of compact
plane set X.
Corollary 3. Let X and Y be compact plane sets, with Y ⊆ X. Suppose that
X contains no bounded component of C \ Y and that X \ Y is the union of a
sequence of pairwise disjoint, non-empty relatively clopen subsets Yn of X whose
diameters tend to 0 as n → ∞. Then R(X) is regular if and only if R(Y ) is
regular and each R(Yn) is regular.
3 Main results
We are almost ready to construct the examples mentioned in the introduction.
First we need the following result, which is taken from [3] (see also [4, 8]).
Proposition 4. There exist a compact plane set X and a non-degenerate closed
interval J in R with J ⊆ X such that R(X) is not regular, but every point of
X \ J is a point of continuity for R(X).
Let X, J be as in Proposition 4. Clearly X has empty interior. For every
non-empty compact subset K of X \ J, R(K) is regular, because every point
of K is a point of continuity for R(K). We have R(J) = C(J), and so R(J)
is regular. However, R(X) is not regular, so not every point of X is a point
of continuity for R(X). The points of X which are not points of continuity for
R(X) must all be in J. By Lemma 1, J is not clopen in X.
In particular,
X 6= J.
Using this example, we next show that, in a suitable sense, regularity of
R(X) does not pass to countable unions.
Theorem 5. There exist a compact plane set X and a sequence of compact
plane sets Xk (k ∈ N) such that X = Sk∈N Xk and each R(Xk) is regular, but
R(X) is not regular.
Proof. Let X and J be as in Proposition 4. Scaling X if necessary, we may
assume that {z ∈ X : dist(z, J) ≥ 1/2} 6= ∅. Set X1 = J and, for k ≥ 2, set
4
Xk = {z ∈ X : dist(z, J) ≥ 1/k }. Then R(X) is not regular, but each R(Xk) is
(cid:3)
regular, and X =Sk∈N Xk as required.
Thus regularity of R(X) does not pass to countable unions. We finish by
showing that regularity of R(X) does not pass to finite unions either.
Theorem 6. There exist a compact plane set X and four compact plane sets
Xk, k = 1, 2, 3, 4, such that X =
is not regular.
4
[k=1
Xk and each R(Xk) is regular, but R(X)
Proof. Again, let X and J be as in Proposition 4. Scaling X if necessary,
we may assume that X ⊆ {z ∈ C : dist(z, J) ≤ 1}.
We begin by defining subsets Ko and Ke as follows.
Set
{z ∈ X : 1/(2n + 1) ≤ dist(z, J) ≤ 1/2n}
and
Ko = J ∪ [n∈N
Ke = J ∪ [n∈N
{z ∈ X : 1/2n ≤ dist(z, J) ≤ 1/(2n − 1)} .
Then X = Ko ∪ Ke, and R(X) is not regular.
It is not clear whether or not R(Ko) or R(Ke) are regular. In the following,
we assume that J is clopen in neither Ko nor Ke (otherwise the arguments may
be simplified). We now show that each of Ko and Ke is a union of two sets where
we can establish regularity using Corollary 3. We may write Ko = X1 ∪ X3 and
Ke = X2 ∪ X4, where the sets Xk are defined with the help of vertical bands as
follows:
X1 = J ∪ [n∈N
X2 = J ∪ [n∈N
X3 = J ∪ [n∈N
X4 = J ∪ [n∈N
{z ∈ X : 1/(2n + 1) ≤ dist(z, J) ≤ 1/2n and sin(nRe(z)) ≤ 0} ;
{z ∈ X : 1/2n ≤ dist(z, J) ≤ 1/(2n − 1) and sin(nRe(z)) ≤ 0} ;
{z ∈ X : 1/(2n + 1) ≤ dist(z, J) ≤ 1/2n and sin(nRe(z)) ≥ 0} ;
{z ∈ X : 1/2n ≤ dist(z, J) ≤ 1/(2n − 1) and sin(nRe(z)) ≥ 0} .
Then, for 1 ≤ k ≤ 4, it is easy to see that Xk is the disjoint union of J with a
sequence (Yk,n)∞
n=1 of pairwise disjoint, non-empty relatively clopen subsets of
Xk whose diameters tend to 0. Each of the sets Xk then satisfies the conditions
5
of Corollary 3 with Y = J and Yn = Yk,n (n ∈ N). Since R(J) and all of
the R(Yk,n) are regular, each R(Xk) is regular by Corollary 3. Certainly X =
Xk, and R(X) is not regular, as required.
(cid:3)
4
[k=1
As noted earlier, it follows that regularity of R(X) does not pass to unions
of two sets either. However, we do not know which pair of sets mentioned above
demonstrates this. Clearly at least one of the following pairs of sets must provide
a suitable example: X1 and X3; X2 and X4; Ko and Ke.
We do not know whether or not regularity of R(X) does pass to unions of
two sets if the sets are assumed to be connected.
We are grateful to the referee for a careful reading and for useful comments
and suggestions.
References
[1] A. Browder, Introduction to Function Algebras, Benjamin, New York
(1969).
[2] H. G. Dales, Banach Algebras and Automatic Continuity, London Math-
ematical Society Monographs, New Series, vol. 24, The Clarendon Press
Oxford University Press, New York, 2000.
[3] J. F. Feinstein, Trivial Jensen measures without regularity, Studia Math.,
148 (2001), 67 -- 74.
[4] J. F. Feinstein and S. Morley, Quasianalyticity in certain Banach function
algebras, Studia Math., 238 (2017), 133 -- 153
[5] J. F. Feinstein, S. Morley and H. Yang, Abstract Swiss cheese space and
classicalisation of Swiss cheeses, J. Math. Anal. Appl., 438 (2016), 119 -- 141.
[6] J. F. Feinstein, R. Mortini, Partial regularity and t-analytic sets for Banach
function algebras, Math. Z., 271 (2012), 139 -- 155.
[7] J. F. Feinstein and D. W. B. Somerset, Non-regularity for Banach function
algebras, Studia Math., 141 (2000), 53 -- 68.
[8] J. F. Feinstein and H. Yang, Regularity points and Jensen measures for
R(X), Studia Math., 235 (2016), 1 -- 15
[9] T. W. Gamelin, Uniform Algebras, 2nd ed., Chelsea Publishing Company,
New York, NY, 1984.
[10] E. Kaniuth, A Course in Commutative Banach Algebras, Graduate Texts
in Mathematics 246, Springer, New York, 2009.
6
[11] R. McKissick, A nontrivial normal sup norm algebra, Bull. Amer. Math.
Soc., 69 (1963), 391 -- 395.
[12] E. L. Stout, The Theory of Uniform Algebras, Bogden & Quigley, New
York, 1971.
7
|
1912.00720 | 1 | 1912 | 2019-12-02T12:40:04 | On Multipliers and completely bounded Multipliers -- the case SL(2,R) | [
"math.FA"
] | For the Fourier Algebra of SL(2,R) any bounded multiplier is completely bounded. | math.FA | math |
ON MULTIPLIERS AND COMPLETELY BOUNDED
MULTIPLIERS -- THE CASE SL(2, R)
VIKTOR LOSERT
A(G) Fourier algebra of a locally compact group G . B(G) Fourier-Stieltjes algebra.
A(G)′′ bidual of A(G) with (first) Arens product ⊙ .
M(A(G)) multipliers of A(G) with norm k kM . Every f ∈ M(A(G)) is given by
(and identified with) a bounded continuous function on G. It extends to A(G)′′
and this is again denoted by f ⊙ ξ for ξ ∈ A(G)′′ (bidual mapping).
M0(A(G)) completely bounded multipliers of A(G) with norm k kM0 (see [CH] for
basic properties).
VN (G) group von Neumann algebra (generated by the left regular representation
on L2(G) ), we use the standard identification with the dual space A(G)′.
C0(G) continuous functions on G vanishing at infinity.
B(H) bounded linear operators on a Hilbert space H .
N (H) nuclear operators (trace class), identified with the predual B(H)∗ , using
(t, s) = tr(t s).
sin ϕ
For G = SL(2, R) (real 2x2-matrices of determinant one), let K be the subgroup
cos ϕ (cid:19) and H the subgroup of matrices (cid:18)a 0
of rotations kϕ =(cid:18)cos ϕ − sin ϕ
a(cid:19) with
a > 0, b ∈ R . Recall (part of the Iwasawa decomposition) that G = KH , the
decomposition of the elements x = kh being unique. We parametrize the dual
group bK of the compact abelian group K by χj(kϕ) = eijϕ (j ∈ Z, ϕ ∈ R). For a
bounded continuous function f on G, m, n ∈ Z put fmn = (χn ∗ f ∗ χm)H .
To simplify, we describe the main result in the case of PSL(2, R) = SL(2, R)/{±I}
(projective special linear group; {±I} being the centre of SL(2, R) ). Then K is
replaced by K/{±I} and fmn is defined only for even m, n .
1
b
Theorem. For G = PSL(2, R) we have M(A(G)) = M0(A(G)).
kfkM = kfkM0
holds for all f ∈ M(A(G)).
Date: December 2014.
Summary of talks given at the School of Mathematics, University of Leeds, 28 May -- 2 June
2010; revised version.
1
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 2
Then, putting A = VN (H) ¯⊗B(l2(2Z)), the following statements are equivalent for
f ∈ C0(G):
(1) f ∈ M(A(G))
(2) (fmn)m,n∈2Z defines an element of the predual A∗ of A and
θf (ekl) = (fm−k n−l)m,n∈2Z extends to a continuous linear mapping
N (l2(2Z)) → A∗ .
Furthermore kfkM = kfkM0 = kθfk holds.
For general f ∈ M(A(G)), we have that λ = limx→∞ f (x) exists. Then
f − λ ∈ M(A(G)) ∩ C0(G) and kfkM = kf − λkM + λ .
As in [Ta] p.184, elements t ∈ VN (H) ¯⊗B(l2(Z)) are described by matrices
(tmn)m,n∈Z , where tmn ∈ VN (H) and similarly s ∈ A∗ is given by (smn)m,n∈2Z ,
where smn ∈ A(H). This amounts to (t, s) = Pm,n(tmn , snm)
(compare [Ta]
p.65(18)). Analogously for elements of B(l2(Z)) and N (l2(Z)). ekl denotes the
element of N (l2(Z)) given by the matrix with 1 at (k, l) and 0 elsewhere.
For G = SL(2, R) one has to observe that fmn = 0 whenever m− n is odd. With
θf (ekl) = (fm−k n−l)m,n∈Z for k, l ∈ 2Z and A = VN (H) ¯⊗B(l2(Z)) (or the subal-
gebra of operators commuting with the projection l2(Z) → l2(2Z)), the Theorem
holds in the same way. Similarly, the Theorem holds for all connected groups G
that are locally isomorphic to SL(2, R) and have finite centre. With some modifi-
cations, one can find presumably also a version for the universal covering group of
SL(2, R).
For general G , we have A(G) ⊆ B(G) ⊆ M0(A(G)) ⊆ M(A(G)). When G is
amenable (e.g. abelian or compact), M(A(G)) = B(G) holds. When G is non-
amenable (e.g., SL(2, R) or the discrete free group F2), it is known that B(G) is
a proper subspace of M0(A(G)). For a general discrete group G, containing F2
as a subgroup, Bozejko (1981) has shown that M0(A(G)) is a proper subspace of
M(A(G)).
If K is a compact subgroup of some locally compact group G, a function f on
G is called radial (with respect to K) or K -- bi-invariant, if f (k1xk2) = f (x) holds
for all x ∈ G, k1, k2 ∈ K . If there exists a closed amenable subgroup H of G such
that G = KH holds set-theoretically, then for a radial function f , Cowling and
Haagerup [CH] have shown that the following conditions are equivalent:
(i) f ∈ M(A(G))
(ii) f ∈ M0(A(G))
(iii) fH ∈ B(H)
(with equality of norms). This applies, in particular, for a semisimple Lie group G
with finite centre, K a maximal compact subgroup.
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 3
For G = SL(2, R) (or PSL(2, R)) and m, n ∈ Z, using our notation above, we call
f (m, n)-radial, if f (k1xk2) = χm(k1)f (x)χn(k2) holds for all x ∈ G, k1, k2 ∈ K .
Then the same equivalence as above holds for (m, n)-radial functions f and for
(m, n) 6= (0, 0) one even gets (by our Theorem) fH ∈ A(H). Furthermore,
one can show that the closure of A(G) in M(A(G)) ∩ C0(G) contains all K-finite
functions (i.e., all f for which fmn = 0 apart of finitely many (m, n) ). In some cases
(e.g., when f is of diagonal type, i.e., fmn = 0 for m 6= n), one can show that the
condition (fmn)m,n∈2Z ∈ A∗ of the Theorem is already sufficient to conclude that
f ∈ M(A(G)). But one can show that there are f ∈ C0(G) satisfying (fmn)m,n∈2Z ∈
A∗ but f /∈ M(A(G)), i.e., the first condition of (2) above is not sufficient in general
(contrary to the assertion in the first version of this draft). Observe that our
definition of fmn involves transposition, i.e., fmn is (the restriction of) an (n, m)-
radial function.
On the following pages, we indicate the proof of the Theorem:
In one direction, we use a slight extension of the results of [S] Th. 2.1 and 3.1 (the
proofs there work quite similarly).
Proposition 1. Let A0,B0 be unital C*-algebras, H0,H be Hilbert spaces and
assume that given are *-representations of A0 and B0 on both spaces H0 and H (the
operators defined by elements of A0 and B0 will be denoted by the same letters).
Let E be a linear subspace of B(H0) such that aeb ∈ E for a ∈ A0, e ∈ E, b ∈ B0
(i.e., E is an A0 -B0 submodule of B(H0)). Let φ : E → B(H) be a linear map
satisfying φ(aeb) = aφ(e)b for a ∈ A0, e ∈ E, b ∈ B0 .
(i) If φ is bounded and there exist ξ, η ∈ H such that A0ξ and B0η are dense in H ,
then φ is completely bounded and kφkcb = kφk.
(ii) If E = K(H0), φ is completely bounded, then (for some index set I) there exist
families (si), (ti) ⊆ B(H,H0) such that bsi = sib, ati = tia for a ∈ A0, b ∈
B0, i ∈ I (i.e., si , ti are intertwining operators for the actions of A0 and B0),
Pi s∗
i ksi holds
for all k ∈ K(H0).
In fact, we will use statement (ii) slightly more generally for E = K(H1) ⊕ K(H2)
where H1,H2 are A0,B0-invariant subspaces of H0 = H1 ⊕ H2 . As a further ex-
tension (for the case of the universal covering group of SL(2, R)), this holds when
E is a von Neumann subalgebra of B(H0), φ is w*-continuous and the operators on
H0 defined by A0,B0 belong to E .
cb and φ(k) = Pi t∗
i sik kPi t∗
i si ,Pi t∗
i ti ∈ B(H), kPi s∗
i tik = kφk2
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 4
To show that (2) ⇒ (1) assume that f : G → C is continuous, (fmnH)m,n∈2Z defines
an element of the predual of VN (H) ¯⊗B(l2(2Z)) and θf is defined as in (2), with
kθfk = c . As explained later (after Lemma 6), VN (H) is isomorphic (as a W*-
algebra) to B(cid:0)L2(]−∞, 0])(cid:1)⊕B(cid:0)L2([0,∞[)(cid:1) using a certain representation π0 of H
on L2(R). We apply now Proposition 1, taking H = l2(2Z), H0 = L2(R) ⊗ l2(2Z),
A0 = B0 = C ∗(2Z) (operating by translations) and for φ (the restriction of)
the dual mapping of θf . Obtaining (si), (ti) as above, we put pi = si(e0), qi =
ti(e0) (en denoting the standard basis of l2(2Z)). Then pi = (pik)k∈2Z , qi =
i si ,Pi t∗
(qik)k∈2Z ∈ L2(R)⊗ l2(2Z). This gives fmn(h) =Pi(π0(h) pim qin) for h ∈ H . For
x = hz ∈ G, where h ∈ H, z ∈ K put P (x) = (Pk χk(z)π0(h)pik)i∈I , Q(x) =
(Pk χk(z)π0(h)qik)i∈I. Then (observe that Pi s∗
i ti ∈ VN (2Z)) it fol-
lows that P, Q define (a.e.) bounded measurable functions G → L2(R) ⊗ l2(I),
x,y∈G kP (x)k kQ(y)k = c and f (y−1x) = ( P (x) Q(y) ) holds a.e. on G × G.
ess sup
By [CH] p. 508, we get f ∈ M0(A(G)) and kfkM0 ≤ c (to avoid problems of con-
vergence and sets of measure zero, one can use Fejer sums and first consider the
K-finite case [i.e. where only finitely many fmn are non-zero] ). One can also show
that f ∈ C0(G).
For the other direction, we start by recalling the description of the irreducible
unitary representations (going back to Bargmann). We use (essentially) the
notations (and parametrization) of Vilenkin [V].
Put H = L2(R) (for ordinary Lebesgue measure), g =(cid:18)α β
γ δ(cid:19),
for
f ∈ H .
βx + δ(cid:17)βx + δ2l
(cid:0)Tl(g)f(cid:1) (x) = f(cid:16)αx + γ
2 + iλ with λ ∈ R this gives unitary (strongly continuous, irreducible)
2 ± iλ gives equivalent repre-
For l = − 1
representations of SL(2, R) (first principal series). − 1
sentations, hence it will be enough to consider λ ≥ 0.
For l ∈ Z one gets the discrete series (but here the inner product has to be changed
to make Tl unitary, also restricting to subspaces of H for irreducibility; see below).
Further cases for unitary representations are l ∈] − 1, 0[, which gives the comple-
mentary series (again with a different inner product) and, finally, there is also the
trivial (one-dimensional) representation. These are all the irreducible unitary rep-
resentations defined on PSL(2, R).
Tl arises from the right action of SL(2, R) on R2 (and the corresponding action on
the projective line). In the notation of [V] this is Tχ with χ = (l, 0) (the second
parameter can be used to describe further representations of SL(2, R) and other
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 5
Integer case:
covering groups).
(notation of [V]) and for l < 0 the part T +
conjugate representation of Tl .
for l ≥ 0 , we take Tl to be only the part T −
χ
χ . Thus T−l−1 is (equivalent to) the
Multiplication in A(G) and B(G) corresponds to tensor products of representa-
tions. For SL(2, R) the decompositions have been determined by Pukanszky (1961).
A completed and better accessible account has been given by Repka [R].
For lj = − 1
2 + iλj
Tl1 ⊗ Tl2 ∼ 2
T− 1
2 + iλ1 , l2 ∈ N0
For l1 = − 1
For lj ∈ N0
Similarly in the remaining cases.
T− 1
Tl1 ⊗ Tl2 ∼
Tl1 ⊗ Tl2 ∼ Pl>l1+l2
⊕RR+
⊕RR+
2 +iλdλ ⊕ Pl∈Z
2 +iλdλ ⊕Pl≥0
Tl .
Tl .
Tl .
n el
mn(g) = (Tl(g)el
m = e2miϕel
m = χ2m(kϕ) el
m ("elliptic basis").
m) of the Hilbert space Hl of Tl . For l = − 1
To get coefficients for the unitary representations, we use (corresponding to [V])
an orthonormal basis (el
2 + iλ (principal
series), we have Hl = H and the basis is indexed by m ∈ Z . For l ∈ N0 , the range
is m > l and for integers l < 0 : m ≤ l .
The basis vectors satisfy Tl(kϕ) el
We put tl
m). This gives the unitary matrix coefficients of Tl(g).
tl
mn is (2m, 2n)-radial (we get only even integers, since we restrict to representations
of PSL(2, R) ).
For l = − 1
reduced Fourier-Stieltjes algebra Bρ(G), i.e., the w*-closure of A(G) in B(G)).
For l ∈ Z , the representations Tl are square-integrable, thus tl
for l ∈ N0, m, n > l and for l < 0, m, n ≤ l .
For l = − 1
2 + iλ , the "non-radial component" of tl
mn(cid:18)eτ
e−τ(cid:19) for τ ≥ 0 (ch denoting the hyperbolic cosine). In [V] the functions
0
tl
Pl
mn are defined (and investigated) for all l ∈ C , but (apart of the principal series)
using a non-normalized orthogonal basis for the matrix representation. For the
mn ∈ B(G) for all m, n ∈ Z (it even belongs to the
mn ∈ A(G) ∩ L2(G)
mn is described by Pl
2 + iλ , we have tl
mn(ch 2τ ) =
0
discrete series, the corresponding functions arising from the unitary coefficients
are denoted by P l
mn in [VK] (l ∈ Z). For l ∈ N0 , m, n > l they are related by
(m + l)! (n − l − 1)!(cid:17) 1
mn =(cid:16) (m − l − 1)! (n + l)!
2P l
Pl
mn .
Technically, the continuous part in the decomposition of tensor products is more
difficult to handle (and the appearance of multiplicities causes additional compli-
cations). Therefore we restrict to the discrete part.
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 6
For l1 = − 1
2 + iλ , l2 ∈ N0 , we define the Clebsch-Gordan coefficients by
el1
j ⊗ el2
C(l1, l2, l; j, m, j + m) el
j+m + cont. part .
m = Xl≥0
The same for l1 ∈ Z with l1 ≥ −l2− 1 (for l1 < −l2− 1 the discrete part of Tl1 ⊗ Tl2
contains only Tl with l < 0 ). We put C(l1, l2, l; j, m, j + m) = 0 when j + m ≤ l
(in addition, for l1 ∈ Z , the coefficients will be 0 outside the range l > l1 + l2 for
l1 ∈ N0 and outside 0 ≤ l ≤ l1 + l2 for −1− l2 ≤ l1 < 0 ). The isomorphism between
Tl and a component of Tl1 ⊗ Tl2 is determined only up to a factor of modulus 1 .
This is fixed by requiring that C(l1, l2, l; l − l2, l2 + 1, l + 1) > 0 (of course, in the
integer case this refers only to those l ≥ 0 that have not been excluded above).
For l1, l2 as above, this gives a decomposition of products in B(G)
(1)
tl1
jj ′ tl2
Xl≥0
mm′ =
C(l1, l2, l; j, m, j + m) C(l1, l2, l; j′, m′, j′ + m′) tl
j+m j ′+m′ + cont. part .
Now, we consider the behaviour for large l2 .
Proposition 2 (Asymptotics of CG-coefficients). For fixed l1 = − 1
and finite κ ≥ 1, we have
lim
l2→∞
m
→κ
l2
C(l1, l2, l2 + s; j, m, j + m) = Pl1
s j(κ) .
2 + iλ , j, s ∈ Z
For κ = 1, one has to add the restriction m > l2 . Corresponding results hold for
l1 ∈ Z (discrete series), e.g., when l1 ∈ N0 , j, s > l1 , the limit is P l1
s j(κ). Similarly
for the complementary series and unitary representations of covering groups. This
is the counterpart of a classical result of Brussaard, Tolhoek (1957) on the CG-
coefficients of SU(2).
Since (Pl1
norm 1 (in l2(Z)). From kel1
of the continuous part in the decomposition of el1
l1, j fixed, m
It was already noted by Pukanszky that the densities arising in the continuous part
s j(κ))s,j∈Z is the matrix of a unitary operator, its column vectors have
mk = 1, it follows by orthogonality that the norm
m tends to 0 for l2 → ∞ (with
l2 → κ). The same holds for the decomposition of tl1
mm′ in (1).
j ⊗ el2
j ⊗ el2
jj ′ tl2
are given by analytic functions. Thus (with at most contably many exceptions) all
λ ≥ 0 will appear in the decomposition of el1
2 + iλ1). But from
a more quantitative viewpoint, most of the product will be concentrated on the
(positive part of the) discrete series when l2 is large.
m (for l1 = − 1
j ⊗ el2
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 7
Idea of Proof. Recall the Fourier inversion formula:
∞Z
0
1
2
(l +
h(e) =
tr(T− 1
2 +iλ(h)) λ th(πλ) dλ +Xl≥0
)(cid:0) tr(Tl(h)) + tr(T−l−1(h))(cid:1) .
for h ∈ A(PSL(2, R)) ∩ L1(PSL(2, R)) and the extensions of the representations to
L1(PSL(2, R)) for an appropriate choice of the Haar measure. This describes also
the Plancherel measure.
On the level of coefficients, applied to (2m, 2n)-radial functions with m, n ≥ 0, this
gives a generalization of the Mehler-Fock transformation
(l +
1
2
) b(l)P l
mn(x) +
∞Z
0
a(λ) P
2 +iλ
− 1
mn
(x) λ th(πλ) dλ
g(x) =
min(m,n)−1Xl=0
∞R1
g(x)P l
with b(l) =
discrete part is just the expansion with respect to the orthogonal system (P l
L2([1,∞]) (m, n fixed) and the coefficients are obtained from inner products.
We apply this to g = Pl1
mn(x) dx for g ∈ L2([1,∞]) (convergence in L2). Thus the
mn) ⊆
l2+1 l2+1 and get for l = l2 + s by (1)
ss P l2
C(l1, l2, l2 + s; s, l2 + 1, l2 + s + 1)2 =
∞Z
(l2 + s +
1
2
l2+s+1 l2+s+1(x) dx
1
)
ss(x)P l2
Pl1
l+1 l+1(x) = (cid:16) 2
2 )P l2
l2+1 l2+1(x)P l2+s
x + 1(cid:17)l+1
.
l2+1 l2+1 P l2+s
l+1 l+1(x) = Pl
By [V] we have P l
for l2 → ∞ and s ∈ Z fixed, (l2 + s + 1
l2+s+1 l2+s+1 → δ1 (point
measure) holds weakly with respect to bounded continuous functions on [1,∞[ .
Since Pl1
2 +iλ
is fixed) and by our choice of the phase, we get C(l1, l2, l2 +s; s, l2+1, l2 +s+1) → 1.
Next we take g = Pl1
ss(1) = 1, this gives C(l1, l2, l2+s; s, l2+1, l2+s+1) → 1 (when l1 = − 1
l2+1 m and get for l = l2 + s by (1)
It follows easily that
s j P l2
C(l1, l2, l2 + s; s, l2 + 1, l2 + s + 1)
C(l1, l2, l2 + s; j, m, j + m) =
→ 1
(l2 + s +
1
2
)
∞Z
1
Pl1
s j(x)P l2
l2+1 m(x)P l2+s
l2+s+1 j+m(x) dx
Let µl2m be the measure on [1,∞[ with density (l2 + s + 1
Again one can use the formulas of [V] for Pl
coordinates, one gets that
l2+s+1 j+m.
l+1 m(x). With a slight change of
has a β′-distribution and from the values of
l2+1 m P l2+s
2)P l2
µl2m
kµl2mk
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 8
expectation and variance one can conclude that kµl2mk → 1 and µl2m → δκ for
l2 → ∞,
In the next step we use ultraproducts to work with these limit relations. Such
m
l2 → κ .
(cid:3)
l→p
l→p khlk = 0 . We use the notation lim
constructions for group representations have been done by Cowling and Fendler.
We take some element p ∈ βN\N (Stone- Cech compactification). The ultraproduct
of the Hilbert spaces (Hl)l>0 (with respect to p) is denoted by Hp . It consists of
equivalence classes of all sequences (hl) ∈QHl such that lim
l→p khlk < ∞ , factoring
by the subspace of sequences with lim
hl to
denote the equivalence class of (hl). Hp is again a Hilbert space and we get a repre-
sentation Tp of the C*-algebra VN (G) on Hp putting Tp(S)(lim
Tl(S)hl
(for S ∈ VN (G) ).
Each function f : N → N satisfying f (l) > l ∀ l (or more generally, lim
f (l)−l > 0 )
el
defines a unit vector in Hp by e(p, f ) = lim
f (l) . Of course, it is enough to require
that f is defined for l ≥ l0 . For functions f, f ′ we get a coefficient functional by
f f ′ , S ) = (cid:0)Tp(S) e(p, f ′) e(p, f )(cid:1) for S ∈ VN (G) . Then tp
(tp
f f ′ ∈ VN (G)′ (dual
space) and tp
Recall that βN \ N is a Z-module under addition. Thus we get in the same way
Hilbert spaces Hp+s and representations Tp+s for all s ∈ Z .
For f as above, put κp(f ) = lim
l→p
Write κ = κp(f ), κ′ = κp(f ′). Assuming, 1 < κ, κ′ < ∞, l1 = − 1
from (1) and Proposition 2
tl
f (l) f ′(l) (w*-limit).
2 + iλ , we get
(possibly infinite).
hl) = lim
l→p
f f ′ = lim
l→p
f (l)
l→p
l→p
l→p
l
jj ′ tl2
tl1
f (l2)f ′(l2) =Xs∈Z
Pl1
sj(κ) Pl1
sj ′(κ′) lim
l2→p
tl2+s
f (l2)+j f ′(l2)+j ′
f f ′ = lim
l2→p
jj ′ ⊙ tp
tl1
(note that (cid:0) Pl1
sj(κ) Pl1
f (l2)+j f ′(l2)+j ′ = tp+s
tl2+s
lim
l2→p
(2)
f ◦us+j f ′◦us+j ′ and we arrive at
sj ′(κ′)(cid:1)s∈Z ∈ l1 ). Put u(l) = l − 1 for l ∈ Z , then
f f ′ =Xs∈Z
f ◦us+j f ′◦us+j ′ .
sj ′(κ′) tp+s
sj(κ) Pl1
Pl1
jj ′ ⊙ tp
tl1
Tp+s of VN (G).
Next, we consider Hp = Ls∈Z Hp+s (l2-sum) and the corresponding representation
T p = Ls∈Z
For 1 < κ < ∞ , Kκ shall be the closed subspace of Hp generated by the vectors
e(p, f ), taking all functions f with κp(f ) = κ . We put K = L1<κ<∞Kκ .
hl−1 defines an isometric isomorphism of Hp+s and Hp+s+1
and this extends to a unitary operator U : Hp → Hp (in particular U(cid:0)e(p+s, f )(cid:1) =
hl) = lim
U( lim
l→p+s
l→p+s+1
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 9
e(p+s+1, f◦u) ). Let Kκ be the closed U-invariant subspace of Hp generated by Kκ
(it is generated by the vectors e(p+s, f ), taking all functions f with κp+s(f ) = κ for
some s ∈ Z ). Clearly, Kκ ⊥ Kκ′ holds for κ 6= κ′ and we write K = L1<κ<∞Kκ (the
closed U-invariant subspace of Hp generated by K ). V(cid:0)e(p+s, f )(cid:1) = e(p+s, f +1)
defines a unitary operator on Kκ (for 1 < κ < ∞) and this extends to a unitary
operator V : K → K satisfying V (Kκ) ⊆ Kκ and V U = UV on K . (For κ = 1, V
is no longer surjective).
For a fixed function f with κ = κp(f ) satisfying 1 < κ < ∞ , it follows easily that
{e(p + s, f ◦ us + j)} = {U sV je(p, f ) : s, j ∈ Z} defines an orthonormal system of
vectors in Kκ .
A special case, used below, will be the functions fκ(l) = [κ l] (integer part), satis-
fying κp(fκ) = κ for each p and 1 < κ < ∞ .
Lemma 1. For λ ∈ R , j ∈ Z , 1 < κ < ∞
j = V j Ps∈Z
Aλ
U s defines a bounded linear operator Kκ → Kκ .
− 1
sj
2 +iλ
P
(κ)(cid:12)(cid:12)2s(cid:12)(cid:12)iλ
Taking Aλ
linear operator Aλ
j = 0 on K⊥ (in particular, Aλ
j : Hp → Hp satisfying V Aλ
j = Aλ
j V on K.
j = 0 on Hp+s when s 6= 0) gives a bounded
(Here we adopt 0iλ = 1).
jj ′ ⊙ t, S) = (T p(S)Aλ
Corollary. Given e, e′ ∈ K define t ∈ VN (G)′ by (t, S) = (Tp(S) e′ e ). Then
for l = − 1
2 + iλ (λ ∈ R) and j, j′ ∈ Z we have (tl
j ′e′ Aλ
j e)
(S ∈ VN (G)).
Lemma 2. T p(VN (G)) is w*-dense in Qs∈ZB(Hp+s) .
In particular, this implies that Tp is irreducible and (Tp,Hp) is the cyclic represen-
tation for the state tp
f f (with cyclic vector e(p, f ) ) for every function f as above.
Furthermore (slightly more general than in Lemma 2), one has Tp ≁ Tp′ for p 6= p′.
Considering L1(G) as a (w*-dense) subalgebra of VN (G), it is not hard to see that
Tp(h) = 0 for h ∈ L1(G), hence these are singular representations of VN (G).
For the final step we need a refinement of Lemma 2. Although T p(VN (G)) is not
a von Neumann algebra, the fact that VN (G) is a von Neumann algebra allows to
get a stronger result on the size of T p(VN (G)).
Recall that the representations Tl are square integrable for l ∈ Z . Thus they are
equivalent to subrepresentations of the left regular representation on L2(G) and we
can consider Ql≥0B(Hl) as a subalgebra of VN (G).
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 10
For 1 ≤ α < β ≤ ∞ let Pαβ ∈ VN (G) be the orthogonal projection on the closed
< β, l > 0(cid:9). For α < β ≤ α′ < β′, it
subspace ofLl>0Hl generated by (cid:8)el
follows that PαβPα′β ′ = Pα′β ′Pαβ = 0 . For α < κ < β we have Kκ ⊆ im(cid:0)T p(Pαβ)(cid:1) .
Lemma 3. Assume that αm ր ∞ . For m ≥ 1,
m : α <
m
l
Em (⊆ Hp) shall be a finite dimensional subspace of
Sm ∈ B(Hp) are such that kSmk ≤ 1, Sm(Em) ⊆ im(cid:0)T p(Pαmαm+1)(cid:1) and
Sm(Hp+s) ⊆ Hp+s for all s ∈ Z .
Then there exists S ∈ VN (G) such that (cid:13)(cid:13)(cid:0)Sm − T p(S)(cid:1)(cid:12)(cid:12)Em(cid:13)(cid:13) → 0 for m → ∞ .
im(cid:0)T p(Pαmαm+1)(cid:1) ,
At the Harmonic Analysis Conference in Istanbul 2004, I talked about the case
G = SU(2). For that group, one could use a limit of averages of states tp
f f (for
f = fκ ; approaching Lebesgue measure on [−1, 1] ) to get a singular state
ζ ∈ VN (G)′ satisfying kf ⊙ ζk = kfk for all f ∈ A(G). This cannot exist for
Instead of this, we will use another
G = SL(2, R), because of non-amenability.
type of asymptotics.
Now, we fix p ∈ βN \ N and write T for T p . We choose p1 ∈ βN \ N satisfying
(2m) ∈ p1 (a sufficiently "thin" ultrafilter). (Hp)p1 shall denote the ultrapower of
Hp with respect to p1 . If (h(n)) is a bounded sequence in Hp , we write, as before,
h(n) for the corresponding equivalence class, defining an element of (Hp)p1 .
lim
n→p1
The representation T of VN (G) on Hp defines a representation T of VN (G) on
(Hp)p1 . We define ¯¯e ∈ (K)p1 ⊆ (Hp)p1 and ζ ∈ VN (G)′ by
¯¯e = lim
n→p1
1
n
n2−1Xr=1
e(p, fch(n+
)) ,
r
n
(ζ, S) = ( T (S) ¯¯e ¯¯e )
V defines a unitary operator on (K)p1 , again denoted by V . Since (for fixed f )
{V je(p, f ) : j ∈ Z} is an orthonormal family in Kκ(f ), Kκ ⊥ Kκ′ for κ 6= κ′ and V
is unitary , it follows that {V j ¯¯e : j ∈ Z} is orthonormal in (K)p1 . Thus for γ =
(γn) ∈ l2(Z), ¯¯e(γ) = Pj∈Z γjV j ¯¯e defines an isometric embedding l2(Z) → (K)p1 .
For γ1, γ2 ∈ l2(Z), we define (ζγ1γ2 , S) = ( T (S) ¯¯e(γ2) ¯¯e(γ1) ) and for brevity
( (en) denoting the standard basis of l2(Z)) ζij = ζeiej (thus ¯¯e = ¯¯e(e0), ζ = ζ00).
For g ∈ K( (R \ {0}) × Z ) (K(Ω) : continuous functions with compact support),
we put
ϕ(g) = lim
n→p1
1
n
n2−1Xr=1 Xj,s∈Z
ec , j(cid:1) (−1)s √2
g(cid:0)2s
ec/2 U sV j e(p, fch c)
with c = n +
r
n
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 11
Note that the support condition makes the sum finite and restricts it to s 6= 0,
hence ϕ(g) ⊥ (Hp)p1 .
Lemma 4. ϕ(g) ∈ (K)p1 ⊆ (Hp)p1 , kϕ(g)k = kgk2 .
Thus ϕ extends to an isometry ϕ : L2(R × Z) → (Hp)p1 .
Putting ϕ1(g+γ) = ϕ(g)+¯¯e(γ) defines an isometry ϕ1 : L2(R×Z)⊕l2(Z) → (Hp)p1 .
Let P ∈ B(cid:0)(Hp)p1(cid:1) be the orthogonal projection to ϕ(L2(R × Z)) .
For
S ∈ VN (G), g, h ∈ L2(R × Z) put (ψ(S)g h) = (T (S)ϕ(g) ϕ(h)) . This
defines a contractive linear mapping ψ : VN (G) → B(L2(R × Z)) , ψ(VN (G))
being isometrically isomorphic to the dilation P T (VN (G)) P .
Similarly, for P1 the projection to ϕ1(L2(R × Z) ⊕ l2(Z)), one gets ψ1 : VN (G) →
B(L2(R × Z)) ⊕ B(l2(Z)) (note that (Hp)p1 is invariant under T (VN (G)) ).
For n = 2m, αm = ch 2m, the n-th term in the limits defining ¯¯e and ϕ(g) belongs
to im(cid:0)T p(Pαmαm+1)(cid:1). This makes it possible to apply Lemma 3.
Lemma 5. ψ(VN (G)) is w*-dense in B(cid:0)L2(] − ∞, 0] × Z)(cid:1) ⊕ B(cid:0)L2([0,∞[×Z)(cid:1).
Similarly, for ψ1 one has to add a sum with B(l2(Z)). As above, the w*-closure
of ψ(VN (G)) is isometrically isomorphic to P T (VN (G))−P (− denoting the
w*-closure in B(cid:0)(Hp)p1(cid:1) ). The proof shows that corresponding density results
hold for the image of the unit ball of VN (G).
For the final step, we will use the Whittaker functions. They are defined by
∞Z
2
Wλ,µ(z) =
e−zu uµ−λ− 1
2 (1 + u)µ+λ− 1
for Re z > 0, Re(µ− λ + 1
Proposition 3 (Approximation of coefficients). For n ∈ Z, l = − 1
zµ+ 1
2 e− z
Γ(µ − λ + 1
2)
2) > 0 and then for all λ, µ ∈ C by analytic continuation.
2 m2 : τ ≥ 0, m ≥ n, m > 0(cid:27)
mn(ch τ ) −
(−1)n−m
2 + iλ fixed,
2 du
0
τ
lim
eτ (cid:1)(cid:17) e
m→∞(cid:16) Pl
In particular,
mn(ch τ ) −
ml+1Γ(n − l)
τ
2 = 0 holds uni-
Wn,iλ(cid:0) 4m
formly for τ ≥ 0 . This complements classical results on the asymptotic be-
haviour of Pl
if m = n, λ 6= 0 recall that
mn for fixed values l, m, n ;
τ
Pl
cos(λτ + η) → 0 for τ → ∞ (where η ∈ R de-
2 −
mn(ch τ )(cid:1)m>0 can be
Moreover, the Proposition implies also that the row vector(cid:0) Pl
pπλ th(πλ)
pends on λ and m).
mm(ch τ ) e
e.g.,
2
sup(cid:26)(cid:12)(cid:12)(cid:12) Pl
is finite.
ml+1Γ(n − l)
eτ (cid:17)(cid:12)(cid:12)(cid:12) e
Wn,iλ(cid:16) 4m
(−1)n−m
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 12
eτ (cid:1)(cid:17) for τ → ∞ . An approximation
mn = Pl
−m −n .
Wj,iλ(2x)
2 + iλ , we put
ml+1Γ(n−l) Wn,iλ(cid:0) 4m
approximated in l2-norm by(cid:16) (−1)n−m
for the "lower half"(cid:0) Pl
mn(ch τ )(cid:1)m<0 is obtained using the identity Pl
For j ∈ Z, λ ∈ R, l = − 1
0
(−1)j 2iλ
Γ(j − l)√ x
(−1)j 2iλ
Γ(−j − l)√−x
W−j,iλ(−2x)
gj,λ(x, j′) =
for j′ 6= j
for j′ = j , x > 0
Then gj,λ ∈ L2(R × Z).
j ∈ B(Hp) defines a bounded operator on (Hp)p1 , again denoted by Aλ
Aλ
other side, for g ∈ L2(R × Z), we define (V g)(t, j) = g(t, j − 1).
Lemma 6. We have Aλ
Furthermore, V ϕ(g) = ϕ(V g) for g ∈ L2(R× Z), in particular, Aλ
holds for all s ∈ Z .
Corollary. (tl
jj ′ ⊙ ζ , S) = (ψ(S) gj ′,λ gj,λ) (S ∈ VN (G)).
j ¯¯e = ϕ(gj,λ) .
for j′ = j , x < 0
More generally, (tl
jj ′ ⊙ ζii′ , S) = (ψ(S) V i′gj ′,λ V igj,λ) for i, i′ ∈ Z .
j . At the
j V s ¯¯e = ϕ(V sgj,λ)
The basis of L2(R) used by [V] to define the coefficients of Tl for l = − 1
x + i(cid:17)m(cid:0)1 + x2(cid:1)l .
given by el
e2mi arctan(x)(1 + x2)l =
(−1)m
√π
m(x) =
1
2 + iλ is
We consider the real Fourier transform f (y) =
e−ixyf (x) dx . Then we have
√π(cid:16)x − i
√2π RR
1
Wsgn(y)m,iλ(2y) = gm,λ(y, m)y−iλ .
cel
m(y) = (−1)m
(The functions el
Plancherel transform).
2
−iλ
2iλy− 1
Γ(sgn(y)m − l)
m are not integrable, so strictly speaking, this is the Fourier-
1
b
tion with Fourier transform defines equivalent representations (Whittaker model)
a(cid:19) ∈ H , we have (Tl(h)f )(x) = a−2lf (a2x + a b). Composi-
For h = (cid:18)a 0
πλ(g) f = (Tl(g)f )b. For h ∈ H this gives (πλ(h) η)(y) = a−1−2iλ eiy
Put (ρλη)(y) = yiλ η(y) . Then ρλ : L2(R) → L2(R) is an isometric isomorphism
and πλ(h) = ρ−1
λ ◦ π0(h) ◦ ρλ (in particular, all Tl and πλ define equivalent repre-
sentations of H ). π0 splits into two irreducible representations (the restrictions to
L2(] − ∞, 0] and L2([0,∞[) and these are the only infinite dimensional irreducible
unitary representations of H (up to equivalence). Thus π0 defines a normal isomor-
phism of the von Neumann algebras VN (H) and B(cid:0)L2(]−∞, 0])(cid:1)⊕ B(cid:0)L2([0,∞[)(cid:1)
a2(cid:1).
a η(cid:0) y
b
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 13
(3)
jj ′H)
and this extends to a normal isomorphism π0 of the von Neumann algebras A =
VN (H) ¯⊗B(l2(2Z)) and B(cid:0)L2(] − ∞, 0] × Z)(cid:1) ⊕ B(cid:0)L2([0,∞[×Z)(cid:1).
j(cid:1) =
We have gj,λ(·, j) = ρλ bel
ρλ(cid:0)(Tl(S) el
j)b(cid:1), resulting in
(cid:0)π0(S) gj ′,λ(·, j′) gj,λ(·, j)(cid:1) = ( S , tl
j , consequently π0(S) gj,λ(·, j) = ρλ(cid:0)πλ(S)bel
for S ∈ VN (H) .
For f ∈ M(A(G)) put Φ(f ) = (fmn)m,n∈2Z with fmn = (χn ∗ f ∗ χm)H (the matrix
operators, used in the Theorem). Put λ = limx→∞ f00(x), f0 = f − λ, Φ1(f ) =
Φ(f0) + λ e00 . Extend π0 to a normal isomorphism (π0 ⊕ 1)∼ of the von Neumann
algebras (VN (H) ⊕ C) ¯⊗B(l2(2Z)) and B(cid:0)L2(] − ∞, 0] × Z)(cid:1) ⊕ B(cid:0)L2([0,∞[×Z)(cid:1) ⊕
B(l2(Z)). Recall that f is said to be K-finite, if only finitely many fmn are non-zero.
Lemma 7. For f ∈ M(A(G)) ∩ C0(G), Φ(f ) defines an element of the predual of
VN (H) ¯⊗B(l2(2Z)) and, if f is K-finite, we have
(4)
(f ⊙ ζ , S) =(cid:0) π−1
(f ⊙ ζi′i , S) =(cid:0) π−1
0 ◦ ψ(S) , Φ(f )(cid:1) for S ∈ VN (G) ,
0 ◦ ψ(S) , θf (e2i 2i′)(cid:1) for i, i′ ∈ Z .
θf extends to a continuous linear mapping N (l2(2Z)) → A∗ with kθfk ≤ kfkM .
For general f ∈ M(A(G)), f0 ∈ C0(G) holds and Φ1(f ) defines an element of the
predual of (cid:0)VN (H) ⊕ C(cid:1) ¯⊗B(l2(2Z)) . If f is K-finite, we have
With θ1f = θf0 + λ ( θ1f : N (l2(2Z)) → A∗ ⊕N (l2(2Z)), identified with the predual
of A ⊕ B(l2(2Z))), we get (for K-finite f )
(f ⊙ ζ , S) =(cid:0) ((π0 ⊕ 1)∼)−1 ◦ ψ1(S) , Φ1(f )(cid:1) for S ∈ VN (G) .
(f ⊙ ζi′i , S) =(cid:0) ((π0 ⊕ 1)∼)−1 ◦ ψ1(S) , θ1f (e2i 2i′)(cid:1) for S ∈ VN (G) .
Corollary. kΦ1(f )k = kΦ(f0)k + λ ≤ kf ⊙ ζk and kθf0k + λ = kθ1fk ≤ kfkM
holds for all f ∈ M(A(G)).
As indicated earlier this supplies the remaining step for the proof of the Theorem.
Idea of Proof. Recall that the left and right actions of G on A(G) are continuous
and isometric. It follows easily that f ∈ M(A(G)) implies µ ∗ f, f ∗ µ ∈ M(A(G))
for every bounded measure µ on G .
For general f ∈ M(A(G)), the same argument as in [CH] gives fH ∈ B(H). As
mentioned before, the unitary dual of H (ax + b -group) has a very simple structure
and this implies B(H) = A(H) + B(H/[H, H]). Thus for f ∈ M(A(G)) ∩ C0(G),
we get (since [H, H] is not compact) fH ∈ A(H), in particular, fmn ∈ A(H) for
all m, n ∈ Z..
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 14
2 +iλ
− 1
mn
jj ′, with l = − 1
Let M1 be the set of all f ∈ M(A(G)) ∩ C0(G) such that (4) holds. For γ1, γ2 ∈
l2(Z),
it follows from the definition that kζγ1γ2k ≤ kγ1kkγ2k and this gives
kPk,l αklζklk ≤ k(αkl)kN for (αkl) ∈ N (l2(Z)). Thus if f ∈ M1 , then (4) im-
plies, using bilinearity that θf is bounded and kθfk ≤ kfkM and then the earlier
argument, based on Proposition 1 shows kfkM = kfkM0 = kθfk.
If f ∈ M1 is
(m, n)-radial, it follows that kfkM = kΦfk = kfHkA(H) . M1 is clearly a linear
subspace and one can show that if (f (k)) is a bounded sequence in M1 , converging
pointwise to a continuous function f , then kθfk ≤ lim supkθf (k)k. In particular, if
(f (k)) is a Cauchy-sequence, then f ∈ M1 and f (k) → f in M(A(G)).
For f = tl
2 + iλ the evaluation of (f ⊙ ζ , S) follows from (3) and
the Corollary of Lemma 6. Thus f ∈ M1 . This works in a similar way for the
coefficients of discrete series representations. Now observe that (using the formulas
H (R → A(H)) is continuous. Then
above) for fixed m, n the function λ 7→ t
for (m, n)-radial f ∈ A(G) one can approximate the Fourier transform by finitely
supported measures, giving an approximation of f (in M(A(G))-norm) by linear
combinations of coefficients tl
mn . By the properties above this implies f ∈ M1 and
this extends to arbitrary f ∈ A(G) (and its norm closure in M(A(G))). For general
f ∈ M(A(G)) such that fmn ∈ A(H) for all m, n ∈ 2Z, one can use approximations
(e.g. by Fejer sums) and the properties of M1 above to see that Φ(f ) belongs to
the predual and kθfk ≤ kfkM .
In the case of the (n, m)-radial functions f ′
mn = χn ∗ f ∗ χm , it follows easily (using
G = HK , fmn ∈ B(H) ) that f ′
mn is weakly almost periodic and for f K-finite,
this implies that f is weakly almost periodic. By the results of [Ve] it follows
that λ = limx→∞ f (x) exists and f0 ∈ C0(G) . For general f ∈ M(A(G)) this
implies that fmn ∈ A(H) for (m, n) 6= (0, 0) and there exists λ ∈ C such that
(f − λ)00 = f00− λ ∈ A(H) . Then the formulas involving Φ1(f ) and θ1f follow first
for K-finite f , applying the previous results to f0 . Finally, approximation gives
the general case of the Corollary and the earlier argument, based on Proposition 1
shows f − λ ∈ C0(G) (i.e., λ = limx→∞ f (x) ).
As mentioned before we have restricted to representations of PSL(2, R) and this
produces only (m, n)-radial functions with m, n even; the other representations of
SL(2, R) give odd values for m, n and this amounts to extend the definition of
Hp , ϕ, . . . to half-integer j, s .
(cid:3)
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2,
R) 15
References
[CH] Cowling, Haagerup, Inventiones Math. 96 (1989).
[DH] De Canni`ere, Haagerup, American J. Math. 107 (1985).
[R] Repka, American J. Math. 100 (1978).
[S] R.R. Smith, Completely bounded module maps..., J. Funct. Anal. 102 (1991), 156175.
[Ta] M. Takesaki, Theory of operator algebras I, Springer, New York -- Heidelberg 1979.
[V] Vilenkin, Special Functions...,AMS Transl. 1968.
[VK] Vilenkin, Klimyk, Representation of Lie groups..., Vol.1, Kluwer 1991.
[Ve] Veech, Monatsh. Math. 88 (1979).
Institut fur Mathematik, Universitat Wien, Strudlhofg. 4, A 1090 Wien, Austria
E-mail address: [email protected]
|
Subsets and Splits